cc/td/doc/product/ismg/security
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

Symbols


.CPM file extension     B-3

A


AAA     A-1

accept     1-3

access
control lists     1-2
filter     1-2
router     3-1

access control lists     A-4

action     1-3

active security policy     1-2

add a host     3-18

Add or Remove individual Network Services     4-8

address hiding rule     1-3, 3-24

administrative account     B-4

alert Syslog messages     5-9

alerts     1-11

alias IP address     3-33

Apache Web server     1-6

application protocol filters     A-3

Approve Now     A-11

ARP     A-1

audit events     3-17, 5-1

audit records     5-1

AUI cable connection     3-10

authentication     1-6, 5-5

B


backup configuration     B-1

bi-directional authentication     1-6

BNC cable interface     3-10

boundary     1-4

bundled network service     1-3

C


CCO     xii

checklist     xi

child
children of the branch     1-10
node     1-10
objects     1-11

choke point     5-1

Cisco Connection Online (CCO)     xii

Cisco Security Manager policy     4-20

Cisco Security Manager server     3-17

Clear current sessions     A-10

CLI (command line interface)     1-1

client-server architecture     1-11

cloud
as a gateway     1-4
cloud network     1-5

Command Approval     A-10

Command panel     A-1, A-8

Command Review/Edit     A-9

command sets     6-1

Commands/Messages     A-10

condition branch     1-3

condition nodes     4-1

conduit     1-2, 1-3, 4-1, A-2

configuration rules     1-2

configuration tasks overview     2-1

configuration, backup     B-1

container objects     3-17

contents     xi

control agent     A-8

conventions     xi

Corporate E-Mail Server     4-4, 4-12

Corporate Firewall Internal Perimeter     4-22

corporate network     2-2

Corporate Web Server     4-4

critical Syslog messages     5-9

Crypto     1-6

Current Configuration     A-9

D


debugging Syslog messages     5-9

default gateway     1-5

default routes     A-5

deny     1-3

device-specific command sets     6-1

device-specific conduit     4-1

discard event     5-5

Distribution Status     A-9

DMZ network     4-4

DNS     4-14, 4-18, 5-5

document
conventions     xi
feedback     xiii

document objectives     ix

dominance     1-4

downstream
defined     1-2
PEP     1-4

drag and drop     4-2

E


e-mail server     4-4

embryonic links     3-28, 3-34, 3-35

emergency Syslog messages     5-9

enable password     A-2, A-13

Epilogue     A-9, A-12

error Syslog messages     5-9

Ethernet     3-10

event classifications     5-2

Event Disposition     5-5

event filtering     5-1

Examiner.exe     1-6

export configuration     B-2

exposed server     1-5, 3-31

external     1-2

F


failover     A-2

feedback     xiii

File Export     A-11

File Import     A-11

filter
condition branch     1-3
rules     5-1
use of security policy abstract     1-2
WebSENSE     A-3

Find     A-11

firewall
interface name     3-4
interface renaming     3-4

fixup protocol feature     A-3

flat file     B-1

FTP     4-14, 4-18, 5-3, 5-9

G


gateway
cloud as gateway     1-4
device     3-1

Generation Status     A-9

getting help     xiii

global pool     2-2

graphical decision trees     4-1

H


help, PIX Firewall     A-3

hide a network or host     3-26

hiding rule     1-3, 3-24

hierarchical lists     1-4

history of traffic     B-2

host     3-23
address     1-7
host ID     1-7

hostname, firewall
PIX Firewall
hostname     A-3

HTTP     4-6, 4-14, 4-17, 5-3, 5-9

I


ICMP     4-6, 4-20, 5-3, A-2

IDENT     5-5

IDENT, reset     A-5

identify     3-23

If destination is
ADMIN-NT     4-17
Corporate E-Mail Server     4-12
Corporate Web Server     4-11

If service is
HTTP     4-10
ICMP Echo Reply     4-9
Security Policy Abstract     4-18
SMTP     4-11

If Source     1-9

import configuration     B-3

inactive security policy     1-2

Indication Method     4-12

information Syslog messages     5-9

inheritance     1-4

interface
address     1-7
command     A-4
defined     1-7

Interfaces panel     3-1

internal     1-2

Internet
network requirements     1-5
node     1-5
perimeter     1-4

Internet policy     4-5

IP range     3-27

ISP (Internet Service Provider)     3-1

K


keys     1-6

L


license key     xi

log
event     5-5
facility number     5-8
levels     5-7
settings     5-1

M


mail server
hide     3-34
identify     3-24
reference     4-4

mask     1-7

maximum number of simultaneous connections     3-28, 3-34, 3-35

Microsoft Crypto API     1-6

monitor network traffic     3-17

MTU     A-4

N


NAT     A-4

NAT (network address translation)     1-3

network
adapter     1-6
address translation (NAT)     1-3
interface card (NIC)     1-6
network ID     1-7
object     1-9
policy, keep global view     1-8
service     1-2, 4-1

network mask     3-6, 3-7, 3-8, 3-10, 3-12, 3-14, 3-16

Network Policy tree     4-2

network topology
components of     2-3
define     3-1
defining     1-8
Network Topology tree     1-2, 4-2
scenario     2-1

NIC (network interface card)     1-6

NNTP     5-5

notification     1-11

notification Syslog messages     5-9

O


Otherwise Reject     4-10

outside-to-Inside topology definition     1-8

P


parent
node     1-9
objects     1-11
Use Parent Policy     1-10

password for PIX Firewall     3-16

password, changing     A-13

PAT (port address translation)     1-3

Pending Commands     A-9, A-12

PEP (Policy Enforcement Point)     1-2

perimeter     1-4, 3-11

permit
defined     1-3
permit/deny lists     1-8

PIX Firewall
aaa command     A-1
alias command     A-1
arp command     A-1
authentication     1-6
auth-prompt command     A-1
clear uauth command     A-7
clear xlate command     A-7
commands, specifying     A-8
conduit     1-3, 4-1, A-2
configure command     A-2
debug command     A-2
default gateway     1-5
defining policy rules (concept)     1-1
disable command     A-2
enable password     A-2, A-13
enable privileged mode     A-2
established command     A-2
exit or quit modes     A-2
failover     A-2
fixup protocol     A-3
global pool     2-2
help command     A-3
hiding rule (same as NAT)     1-3
interface command     A-4
interface name     3-4
interface speed     3-10, 3-12, 3-14
IP address     A-4
kill command     A-4
link commands     A-4
logging command     5-7, A-4
mtu command     A-4
name command     A-4
nameif command     A-4
NAT     1-3, 2-2
nat command     A-4
outbound command     4-1, A-4
pager command     A-4
passwd command     A-5
PAT     1-3
ping command     A-5
PIX Firewall (also known as PEP)     1-2
Private Link     1-11
Private Link commands     A-4
RADIUS     5-5, A-5
reload command     A-5
rip command     A-5
route command     A-5
routing rules     3-5
service command     A-5
session command     A-5
show command     A-6
snmp-server command     A-6
static     1-4, 3-30, A-6
Syslog     5-7, 5-9
TACACS+     5-5, A-6
telnet command     A-6
terminal command     A-6
tftp-server command     A-6
timeout command     A-7
unsupported commands     A-1
url-cache and url-server commands     A-7
user authentication     1-6
virtual command     A-7
WebSENSE filtering     A-3
who command     A-7
write command     A-7

plugs     A-3

policy
abstracts     1-2
development model     4-2
distribution point     1-2
inheritance     1-4, 1-10
Policy Assignment     4-3, 4-8, 4-21
Policy Builder     4-1
Policy Database     1-6
Policy Distribution Point, Telnet access     1-11
Policy Enforcement Point (PEP)     ix, 1-2
Policy Manager     1-4
Policy-Based Management     1-1, 1-8

Policy Manager     B-2

Poll, command panel     A-8

POP-3     5-5

port address translation (PAT)     1-3

PPTP     5-5

primary server     1-5

Private Link     1-11, A-4

privileged mode     A-2

product contents     xi

Prologue     A-9, A-12

protocol filters     A-3

proxy agent     3-27

public-private key handshake     1-6

publish command sets     6-1

R


RADIUS     5-5, A-5

real address     3-32

RealPlayer (TCP)     5-5

reject     1-3

reload (reboot)     A-5

reporting agent     1-6

reports, generating     5-6

RIP     A-5

router     3-1, A-5

routes, static and default     A-5

rules     1-1

S


secondary server     1-5

Secure Sockets (SSL)     5-5

SecureScript pane     4-10

security policy
abstract, active and inactive     1-2
abstracts as templates     1-8
example of evaluation     1-10
how evaluated     1-9
instruct PEPs to control traffic     1-8
Security Policy Abstracts     4-8, 4-13
Security Policy Enforcement branch     1-2, 1-9, 1-10, 4-2
umbrella     1-10

server
Apache web server     1-6
burden, reducing     1-11
exposed     1-5, 3-31
mail     3-24
primary     1-5
secondary     1-5
upstream     1-11
web     3-23

service statistics     5-3

session request     1-2

show firewall information     A-6

SMTP     4-6, 4-14, 4-18, 5-3

SNMP     A-6

source remapping     3-28

specific events     5-2

Specify destination conditions     4-9

Specify Service Conditions     4-8

standalone Cisco Security Manager     2-3

static routes     A-5

static translation rule     1-4, 3-30, A-6

Status     A-8

subnet mask     1-7

Syslog     1-11, 5-9

T


TAC     xiii

TACACS+     5-5, A-6

tasks, configuration     2-1

TCP     5-5

TCP_SYN attacks     3-28, 3-34

Technical Assistance Center (TAC)     xiii, B-1

Telnet     1-11, 4-14, 4-18, 5-3, A-6, A-7

Telnet password     A-5

template     1-2

terminal action nodes     4-1

then Reject     4-10

Token Ring     3-10

Tools and Services tree     4-21

topology definition     1-8

traffic, regulate with security policy     4-1

translation rule     1-4

troubleshooting     B-1

Trusted Networks folder     1-10

trusted networks policy     4-14

U


umbrella security policy     1-10

unknown networks     3-32

unsupported PIX Firewall commands     A-1, A-12

upstream
defined     1-2
servers     1-11

URLs     5-9

Use Next Policy     1-4

Use Parent Policy     1-10, 4-12

user authentication     1-6, 5-5

W


warning Syslog messages     5-9

web server
hide     3-32
identify     3-23
IP address of     3-33
properties     3-23
reference     4-4

WebSENSE server     A-7

Z


zone transfers     5-5

hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Sep 28 15:08:51 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.