cc/td/doc/product/ismg/security
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Task Flow Overview:
How to Complete
the Initial Configuration

Task Flow Overview:
How to Complete
the Initial Configuration

Introduction

This chapter outlines the tasks that you must perform when you first configure your Cisco Security Manager system. For this task flow, we assume that you are installing a single standalone Cisco Security Manager server and managing one PIX Firewall, which is acting as your Policy Enforcement Point (PEP). We will use a sample network diagram to illustrate the task flow.

Network Topology Scenario

Figure 2-1 depicts a small corporation's network topology. An Internet service provider (ISP) has a backbone network 192.168.1.0 with a network mask of 255.255.255.0. The registered external IP address of the access router is 172.31.7.130, while the default gateway on the internal side of the router is 192.168.1.254. All outbound traffic destined for the Internet is routed to the default gateway.


Figure 2-1:
Example Network Topology

For the remainder of this tutorial, we are going to focus on the small corporate network. For this corporation, the PIX Firewall protects a perimeter/administrative network 10.1.1.0 with a network mask of 255.255.255.0. On the 10.1.1.0 network, the 10.1.1.10 server is dedicated for Cisco Security Manager. This PIX Firewall also protects an inside network 10.1.2.0 with a network mask of 255.255.255.0. This network provides connectivity for two key hosts and for the main network users. In this discussion, the 10.1.2.35 host represents the corporate web server and the 10.1.2.36 host represents the corporate e-mail server.

The PIX Firewall itself has an external IP address pool. 192.168.1.51 is the address of the outside interface, for which 192.168.1.52 through 192.168.1.59 are additional IP addresses that can be used for other purposes. In PIX Firewall terminology, we would refer to these additional IP addresses as belonging to a global network address translation (NAT) pool.

Assumptions and Desired Policy

This example assumes that you have installed a standalone Cisco Security Manager server on the 10.1.1.10 host (hostname Admin-NT) and that you are logged on to Cisco Policy Manager for the first time. It also assumes that the PIX Firewall that you want to protect uses 192.168.1.51 as the IP address assigned to its outside interface and that this firewall has the enable password of corp1.

In addition, we want to implement a security policy that accomplishes the following objectives:

Task Flow Overview

The remainder of this tutorial describes in detail how to perform the following tasks on the basis of the network topology example that we have described in this chapter.

    1. Define your Network Topology

    2. Define and apply your security policies

    3. Define your logging and notification settings

    4. Generate, verify, and publish device-specific command sets


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 19 08:57:14 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.