Table of Contents
Index
- .CPM file extension B-3
- AAA A-1
- accept 1-3
- access
- control lists 1-2
- filter 1-2
- router 3-1
- access control lists A-4
- action 1-3
- active security policy 1-2
- add a host 3-18
- Add or Remove individual Network Services 4-8
- address hiding rule 1-3, 3-24
- administrative account B-4
- alert Syslog messages 5-9
- alerts 1-11
- alias IP address 3-33
- Apache Web server 1-6
- application protocol filters A-3
- Approve Now A-11
- ARP A-1
- audit events 3-17, 5-1
- audit records 5-1
- AUI cable connection 3-10
- authentication 1-6, 5-5
- backup configuration B-1
- bi-directional authentication 1-6
- BNC cable interface 3-10
- boundary 1-4
- bundled network service 1-3
- CCO xii
- checklist xi
- child
- children of the branch 1-10
- node 1-10
- objects 1-11
- choke point 5-1
- Cisco Connection Online (CCO) xii
- Cisco Security Manager policy 4-20
- Cisco Security Manager server 3-17
- Clear current sessions A-10
- CLI (command line interface) 1-1
- client-server architecture 1-11
- cloud
- as a gateway 1-4
- cloud network 1-5
- Command Approval A-10
- Command panel A-1, A-8
- Command Review/Edit A-9
- command sets 6-1
- Commands/Messages A-10
- condition branch 1-3
- condition nodes 4-1
- conduit 1-2, 1-3, 4-1, A-2
- configuration rules 1-2
- configuration tasks overview 2-1
- configuration, backup B-1
- container objects 3-17
- contents xi
- control agent A-8
- conventions xi
- Corporate E-Mail Server 4-4, 4-12
- Corporate Firewall Internal Perimeter 4-22
- corporate network 2-2
- Corporate Web Server 4-4
- critical Syslog messages 5-9
- Crypto 1-6
- Current Configuration A-9
- debugging Syslog messages 5-9
- default gateway 1-5
- default routes A-5
- deny 1-3
- device-specific command sets 6-1
- device-specific conduit 4-1
- discard event 5-5
- Distribution Status A-9
- DMZ network 4-4
- DNS 4-14, 4-18, 5-5
- document
- conventions xi
- feedback xiii
- document objectives ix
- dominance 1-4
- downstream
- defined 1-2
- PEP 1-4
- drag and drop 4-2
- e-mail server 4-4
- embryonic links 3-28, 3-34, 3-35
- emergency Syslog messages 5-9
- enable password A-2, A-13
- Epilogue A-9, A-12
- error Syslog messages 5-9
- Ethernet 3-10
- event classifications 5-2
- Event Disposition 5-5
- event filtering 5-1
- Examiner.exe 1-6
- export configuration B-2
- exposed server 1-5, 3-31
- external 1-2
- failover A-2
- feedback xiii
- File Export A-11
- File Import A-11
- filter
- condition branch 1-3
- rules 5-1
- use of security policy abstract 1-2
- WebSENSE A-3
- Find A-11
- firewall
- interface name 3-4
- interface renaming 3-4
- fixup protocol feature A-3
- flat file B-1
- FTP 4-14, 4-18, 5-3, 5-9
- gateway
- cloud as gateway 1-4
- device 3-1
- Generation Status A-9
- getting help xiii
- global pool 2-2
- graphical decision trees 4-1
- help, PIX Firewall A-3
- hide a network or host 3-26
- hiding rule 1-3, 3-24
- hierarchical lists 1-4
- history of traffic B-2
- host 3-23
- address 1-7
- host ID 1-7
- hostname, firewall
- PIX Firewall
- hostname A-3
- HTTP 4-6, 4-14, 4-17, 5-3, 5-9
- ICMP 4-6, 4-20, 5-3, A-2
- IDENT 5-5
- IDENT, reset A-5
- identify 3-23
- If destination is
- ADMIN-NT 4-17
- Corporate E-Mail Server 4-12
- Corporate Web Server 4-11
- If service is
- HTTP 4-10
- ICMP Echo Reply 4-9
- Security Policy Abstract 4-18
- SMTP 4-11
- If Source 1-9
- import configuration B-3
- inactive security policy 1-2
- Indication Method 4-12
- information Syslog messages 5-9
- inheritance 1-4
- interface
- address 1-7
- command A-4
- defined 1-7
- Interfaces panel 3-1
- internal 1-2
- Internet
- network requirements 1-5
- node 1-5
- perimeter 1-4
- Internet policy 4-5
- IP range 3-27
- ISP (Internet Service Provider) 3-1
- keys 1-6
- license key xi
- log
- event 5-5
- facility number 5-8
- levels 5-7
- settings 5-1
- mail server
- hide 3-34
- identify 3-24
- reference 4-4
- mask 1-7
- maximum number of simultaneous connections 3-28, 3-34, 3-35
- Microsoft Crypto API 1-6
- monitor network traffic 3-17
- MTU A-4
- NAT A-4
- NAT (network address translation) 1-3
- network
- adapter 1-6
- address translation (NAT) 1-3
- interface card (NIC) 1-6
- network ID 1-7
- object 1-9
- policy, keep global view 1-8
- service 1-2, 4-1
- network mask 3-6, 3-7, 3-8, 3-10, 3-12, 3-14, 3-16
- Network Policy tree 4-2
- network topology
- components of 2-3
- define 3-1
- defining 1-8
- Network Topology tree 1-2, 4-2
- scenario 2-1
- NIC (network interface card) 1-6
- NNTP 5-5
- notification 1-11
- notification Syslog messages 5-9
- Otherwise Reject 4-10
- outside-to-Inside topology definition 1-8
- parent
- node 1-9
- objects 1-11
- Use Parent Policy 1-10
- password for PIX Firewall 3-16
- password, changing A-13
- PAT (port address translation) 1-3
- Pending Commands A-9, A-12
- PEP (Policy Enforcement Point) 1-2
- perimeter 1-4, 3-11
- permit
- defined 1-3
- permit/deny lists 1-8
- PIX Firewall
- aaa command A-1
- alias command A-1
- arp command A-1
- authentication 1-6
- auth-prompt command A-1
- clear uauth command A-7
- clear xlate command A-7
- commands, specifying A-8
- conduit 1-3, 4-1, A-2
- configure command A-2
- debug command A-2
- default gateway 1-5
- defining policy rules (concept) 1-1
- disable command A-2
- enable password A-2, A-13
- enable privileged mode A-2
- established command A-2
- exit or quit modes A-2
- failover A-2
- fixup protocol A-3
- global pool 2-2
- help command A-3
- hiding rule (same as NAT) 1-3
- interface command A-4
- interface name 3-4
- interface speed 3-10, 3-12, 3-14
- IP address A-4
- kill command A-4
- link commands A-4
- logging command 5-7, A-4
- mtu command A-4
- name command A-4
- nameif command A-4
- NAT 1-3, 2-2
- nat command A-4
- outbound command 4-1, A-4
- pager command A-4
- passwd command A-5
- PAT 1-3
- ping command A-5
- PIX Firewall (also known as PEP) 1-2
- Private Link 1-11
- Private Link commands A-4
- RADIUS 5-5, A-5
- reload command A-5
- rip command A-5
- route command A-5
- routing rules 3-5
- service command A-5
- session command A-5
- show command A-6
- snmp-server command A-6
- static 1-4, 3-30, A-6
- Syslog 5-7, 5-9
- TACACS+ 5-5, A-6
- telnet command A-6
- terminal command A-6
- tftp-server command A-6
- timeout command A-7
- unsupported commands A-1
- url-cache and url-server commands A-7
- user authentication 1-6
- virtual command A-7
- WebSENSE filtering A-3
- who command A-7
- write command A-7
- plugs A-3
- policy
- abstracts 1-2
- development model 4-2
- distribution point 1-2
- inheritance 1-4, 1-10
- Policy Assignment 4-3, 4-8, 4-21
- Policy Builder 4-1
- Policy Database 1-6
- Policy Distribution Point, Telnet access 1-11
- Policy Enforcement Point (PEP) ix, 1-2
- Policy Manager 1-4
- Policy-Based Management 1-1, 1-8
- Policy Manager B-2
- Poll, command panel A-8
- POP-3 5-5
- port address translation (PAT) 1-3
- PPTP 5-5
- primary server 1-5
- Private Link 1-11, A-4
- privileged mode A-2
- product contents xi
- Prologue A-9, A-12
- protocol filters A-3
- proxy agent 3-27
- public-private key handshake 1-6
- publish command sets 6-1
- RADIUS 5-5, A-5
- real address 3-32
- RealPlayer (TCP) 5-5
- reject 1-3
- reload (reboot) A-5
- reporting agent 1-6
- reports, generating 5-6
- RIP A-5
- router 3-1, A-5
- routes, static and default A-5
- rules 1-1
- secondary server 1-5
- Secure Sockets (SSL) 5-5
- SecureScript pane 4-10
- security policy
- abstract, active and inactive 1-2
- abstracts as templates 1-8
- example of evaluation 1-10
- how evaluated 1-9
- instruct PEPs to control traffic 1-8
- Security Policy Abstracts 4-8, 4-13
- Security Policy Enforcement branch 1-2, 1-9, 1-10, 4-2
- umbrella 1-10
- server
- Apache web server 1-6
- burden, reducing 1-11
- exposed 1-5, 3-31
- mail 3-24
- primary 1-5
- secondary 1-5
- upstream 1-11
- web 3-23
- service statistics 5-3
- session request 1-2
- show firewall information A-6
- SMTP 4-6, 4-14, 4-18, 5-3
- SNMP A-6
- source remapping 3-28
- specific events 5-2
- Specify destination conditions 4-9
- Specify Service Conditions 4-8
- standalone Cisco Security Manager 2-3
- static routes A-5
- static translation rule 1-4, 3-30, A-6
- Status A-8
- subnet mask 1-7
- Syslog 1-11, 5-9
- TAC xiii
- TACACS+ 5-5, A-6
- tasks, configuration 2-1
- TCP 5-5
- TCP_SYN attacks 3-28, 3-34
- Technical Assistance Center (TAC) xiii, B-1
- Telnet 1-11, 4-14, 4-18, 5-3, A-6, A-7
- Telnet password A-5
- template 1-2
- terminal action nodes 4-1
- then Reject 4-10
- Token Ring 3-10
- Tools and Services tree 4-21
- topology definition 1-8
- traffic, regulate with security policy 4-1
- translation rule 1-4
- troubleshooting B-1
- Trusted Networks folder 1-10
- trusted networks policy 4-14
- umbrella security policy 1-10
- unknown networks 3-32
- unsupported PIX Firewall commands A-1, A-12
- upstream
- defined 1-2
- servers 1-11
- URLs 5-9
- Use Next Policy 1-4
- Use Parent Policy 1-10, 4-12
- user authentication 1-6, 5-5
- warning Syslog messages 5-9
- web server
- hide 3-32
- identify 3-23
- IP address of 3-33
- properties 3-23
- reference 4-4
- WebSENSE server A-7
- zone transfers 5-5







Posted: Tue Sep 28 15:08:51 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.