Cisco Security Manager, Security Manager Versions 4.18+ User guide

  • Hello! I am an AI chatbot trained to assist you with the Cisco Security Manager User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
User Guide for Cisco Security Manager 4.21
First Published: 2020-04-06
Last Modified: 2020-04-10
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright ©1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
©2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
The Basics of Using Security Manager 71
PART I
Getting Started With Security Manager 1
CHAPTER 1
Product Overview 1
Primary Benefits of Cisco Security Manager 2
Security Manager Policy Feature Sets 4
Security Manager Applications Overview 6
Device Monitoring Overview 7
IPv6 Support in Security Manager 8
Configuring IPv6 on Security Manager Server 9
Configuring IPv6 Policies 9
Policy Object Changes in Security Manager 4.4 11
Logging In to and Exiting Security Manager 11
Understanding User Permissions 12
Logging In to the Cisco Security Management Suite Server 12
Logging In to and Exiting the Security Manager Client 13
Using Configuration Manager - Overview 14
Configuration Manager Overview 15
Device View Overview 15
Policy View Overview 17
Map View Overview 18
Task Flow for Configuring Security Policies 19
Policy and Policy Object Overview 20
Workflow and Activities Overview 20
Working in Workflow Mode 21
Working in Non-Workflow Mode 22
User Guide for Cisco Security Manager 4.21
iii
Comparing Workflow Modes 22
Using the JumpStart to Learn About Security Manager 24
Completing the Initial Security Manager Configuration 25
Configuring an SMTP Server and Default Addresses for E-Mail Notifications 27
Changing Workflow Modes 28
Understanding Basic Security Manager Interface Features 29
Menu Bar Reference for Configuration Manager 29
File Menu (Configuration Manager) 30
Edit Menu (Configuration Manager) 31
View Menu (Configuration Manager) 32
Policy Menu (Configuration Manager) 32
Map Menu (Configuration Manager) 33
Manage Menu (Configuration Manager) 35
Tools Menu (Configuration Manager) 35
Activities Menu (Configuration Manager) 37
Tickets Menu (Configuration Manager) 37
Launch Menu (Configuration Manager) 38
Help Menu (Configuration Manager) 39
Toolbar Reference (Configuration Manager) 40
Using Global Search 43
Using Selectors 46
Filtering Items in Selectors 47
Create Filter Dialog Box 48
Using Wizards 49
Using Tables 50
Filtering Tables 50
Table Columns and Column Heading Features 51
Using Text Fields 51
Understanding ASCII Limitations for Text 51
Finding Text in Text Boxes 52
Navigating Within Text Boxes 52
Selecting or Specifying a File or Directory in Security Manager 52
Troubleshooting User Interface Problems 53
Accessing Online Help 54
User Guide for Cisco Security Manager 4.21
iv
Contents
Preparing Devices for Management 55
CHAPTER 2
Understanding Device Communication Requirements 55
Setting Up SSL (HTTPS) 57
Setting Up SSL (HTTPS) on PIX Firewall, ASA and FWSM Devices 57
Setting Up SSL on Cisco IOS Routers 58
Setting Up SSH 60
Critical Line-Ending Conventions for SSH 60
Testing Authentication 61
Setting Up SSH on Cisco IOS Routers, Catalyst Switches, and Catalyst 6500/7600 devices 61
Preventing Non-SSH Connections (Optional) 63
Setting Up AUS or Configuration Engine 64
Setting Up AUS on PIX Firewall and ASA Devices 64
Configuring Licenses on Cisco ASA Devices 65
Configuring Licenses on Cisco IOS Devices 66
Initializing IPS Devices 67
Managing the Device Inventory 69
CHAPTER 3
Understanding the Device Inventory 69
Understanding the Device View 69
Understanding Device Names and What Is Considered a Device 71
Understanding Device Credentials 73
Understanding Device Properties 74
Adding Devices to the Device Inventory 75
Working with Device Clusters 77
Adding Devices from the Network 80
Device Information Page – Add Device from Network 82
Service Module Credentials Dialog Box 85
IPS Module Discovery Dialog Box 87
Adding Devices from Configuration Files 88
Device Information Page—Configuration File 89
Adding Devices by Manual Definition 91
Device Information Page—New Device 93
Adding Devices from an Inventory File 96
User Guide for Cisco Security Manager 4.21
v
Contents
Device Information Page—Add Device from File 98
Working with the Device Inventory 102
Adding, Editing, or Deleting Auto Update Servers or Configuration Engines 102
Server Properties Dialog Box 104
Available Servers Dialog Box 105
Adding or Changing Interface Modules 106
Viewing or Changing Device Properties 107
Device Properties: General Page 107
Device Credentials Page 112
Device Groups Page 116
Cluster Information Page 117
Policy Object Override Pages 119
Changing Critical Device Properties 119
Image Version Changes That Do Not Change the Feature Set in Security Manager 120
Changes That Change the Feature Set in Security Manager 121
Showing Device Containment 123
Cloning a Device 124
Deleting Devices from the Security Manager Inventory 125
Device Delete Validation Dialog Box 126
Working with Device Groups 126
Understanding Device Grouping 127
Edit Device Groups Dialog Box 128
Creating Device Group Types 129
Creating Device Groups 130
Deleting Device Groups or Group Types 130
Adding Devices to or Removing Them From Device Groups 131
Working with Device Status View 131
Managing Activities 137
CHAPTER 4
Understanding Activities 137
Benefits of Activities 138
Activity Approval 139
Activities and Locking 139
Activities and Multiple Users 140
User Guide for Cisco Security Manager 4.21
vi
Contents
Understanding Activity/Ticket States 140
Working with Activities/Tickets 145
Accessing Activity Functions in Workflow Mode 145
Accessing Ticket Functions in Non-Workflow Mode 146
Activity/Ticket Manager Window 147
Creating an Activity/Ticket 151
Responding to the Activity/Ticket Required Dialog Box 151
Opening an Activity/Ticket 152
Closing an Activity/Ticket 153
Viewing Change Reports 154
Selecting a Change Report in Non-Workflow Mode with Ticket Management Disabled 155
Validating an Activity/Ticket 156
Submitting an Activity for Approval (Workflow Mode with Activity Approver) 157
Approving or Rejecting an Activity (Workflow Mode) 158
Discarding an Activity/Ticket 160
Viewing Activity/Ticket Status and History 161
Managing Policies 163
CHAPTER 5
Understanding Policies 163
Settings-Based Policies vs. Rule-Based Policies 164
Service Policies vs. Platform-Specific Policies 164
Local Policies vs. Shared Policies 165
Understanding Rule Inheritance 166
Inheritance vs. Assignment 168
Policy Management and Objects 169
Understanding Policy Locking 170
Understanding Locking and Policies 171
Understanding Locking and VPN Topologies 172
Understanding Locking and Objects 172
Customizing Policy Management for Routers and Firewall Devices 173
Discovering Policies 174
Discovering Policies on Devices Already in Security Manager 178
Create Discovery Task and Bulk Rediscovery Dialog Boxes 181
Viewing Policy Discovery Task Status 185
User Guide for Cisco Security Manager 4.21
vii
Contents
Discovery Status Dialog Box 186
Policy Discovery Status Page 188
Frequently Asked Questions about Policy Discovery 190
Managing Policies in Device View and the Site-to-Site VPN Manager 193
Policy Status Icons 193
Performing Basic Policy Management 194
Configuring Local Policies in Device View 194
Copying Policies Between Devices 196
Unassigning a Policy 199
Working with Shared Policies in Device View or the Site-to-Site VPN Manager 200
Using the Policy Banner 202
Policy Shortcut Menu Commands in Device View and the Site-to-Site VPN Manager 203
Sharing a Local Policy 204
Sharing Multiple Policies of a Selected Device 205
Unsharing a Policy 207
Assigning a Shared Policy to a Device or VPN Topology 208
Adding Local Rules to a Shared Policy 209
Inheriting or Uninheriting Rules 210
Cloning (Copying) a Shared Policy 211
Renaming a Shared Policy 212
Modifying Shared Policy Definitions in Device View or the Site-to-Site VPN Manager 212
Modifying Shared Policy Assignments in Device View or the Site-to-Site VPN Manager 213
Managing Shared Policies in Policy View 214
Policy View Selectors 216
Policy View—Shared Policy Selector Options 217
Creating a New Shared Policy 218
Modifying Policy Assignments in Policy View 218
Deleting a Shared Policy 220
Managing Policy Bundles 221
Creating a New Policy Bundle 221
Cloning a Policy Bundle 222
Renaming a Policy Bundle 223
Assigning Policy Bundles to Devices 223
User Guide for Cisco Security Manager 4.21
viii
Contents
Managing Policy Objects 225
CHAPTER 6
Selecting Objects for Policies 226
Policy Object Manager 228
Policy Object Manager: Undocking and Docking 232
Policy Object Manager Shortcut Menu 232
Working with Policy Objects—Basic Procedures 233
Creating Policy Objects 233
Editing Objects 237
Using Category Objects 237
Cloning (Duplicating) Objects 238
Viewing Object Details 239
Generating Object Usage Reports 239
Deleting Objects 241
Managing Object Overrides 242
Understanding Policy Object Overrides for Individual Devices 242
Allowing a Policy Object to Be Overridden 243
Creating or Editing Object Overrides for a Single Device 244
Creating or Editing Object Overrides for Multiple Devices At A Time 244
Deleting Device-Level Object Overrides 246
Overridable Objects in Security Manager 247
Importing and Exporting Policy Objects 249
Understanding AAA Server and Server Group Objects 252
Supported AAA Server Types 253
Additional AAA Support on ASA, PIX, and FWSM Devices 254
Predefined AAA Authentication Server Groups 256
Default AAA Server Groups and IOS Devices 257
Creating AAA Server Objects 258
Add or Edit AAA Server Dialog Box 259
AAA Server Dialog Box—RADIUS Settings 261
AAA Server Dialog Box—TACACS+ Settings 264
AAA Server Dialog Box—Kerberos Settings 265
AAA Server Dialog Box—LDAP Settings 266
AAA Server Dialog Box—NT Settings 269
User Guide for Cisco Security Manager 4.21
ix
Contents
AAA Server Dialog Box—SDI Settings 270
AAA Server Dialog Box—HTTP-FORM Settings 271
Add and Edit LDAP Attribute Map Dialog Boxes 272
Add and Edit LDAP Attribute Map Value Dialog Boxes 273
Add and Edit Map Value Dialog Boxes 274
Creating AAA Server Group Objects 274
AAA Server Group Dialog Box 276
Creating Access Control List Objects 279
Creating Extended Access Control List Objects 280
Creating Standard Access Control List Objects 282
Creating Web Access Control List Objects 283
Creating Unified Access Control List Objects 285
Add or Edit Access List Dialog Boxes 286
Add and Edit Extended Access Control Entry Dialog Boxes 287
Add and Edit Standard Access Control Entry Dialog Boxes 290
Add and Edit Web Access Control Entry Dialog Boxes 292
Add and Edit Unified Access Control Entry Dialog Boxes 294
Configuring Time Range Objects 297
Recurring Ranges Dialog Box 298
Understanding Interface Role Objects 299
Creating Interface Role Objects 300
Interface Role Dialog Box 301
Specifying Interfaces During Policy Definition 302
Using Interface Roles When a Single Interface Specification is Allowed 303
Handling Name Conflicts between Interfaces and Interface Roles 304
Understanding Map Objects 304
Understanding Networks/Hosts Objects 306
Contiguous and Discontiguous Network Masks for IPv4 Addresses 307
Creating Networks/Hosts Objects 309
Add or Edit Network/Host Dialog Box 310
Using Unspecified Networks/Hosts Objects 313
Specifying IP Addresses During Policy Definition 314
VM Attribute Policies 316
Communication between the VM attribute agent and vCenter 316
User Guide for Cisco Security Manager 4.21
x
Contents
Attribute Agent States 317
Guidelines for Configuring vCenter Virtual Machines 317
Configuring VM Attribute Policies 318
Understanding Pool Objects 319
Add or Edit IPv4 Pool Dialog Box 319
Add or Edit IPv6 Pool Dialog Box 320
Add or Edit MAC Address Pool Dialog Box 321
Add or Edit NET Pool Object Dialog Box 322
Add or Edit DHCPv6 Pool Dialog Box 323
Configuring SAML Identity Provider 325
Adding or Editing SAML Identity Provider 325
Understanding and Specifying Services and Service and Port List Objects 327
Configuring Port List Objects 329
Configuring Service Objects 330
How Policy Objects are Provisioned as Object Groups 333
How Network/Host, Port List, and Service Objects are Named When Provisioned As Object Groups
334
How Service Objects are Provisioned as Object Groups 335
Managing Flexconfigs 337
CHAPTER 7
Understanding FlexConfig Policies and Policy Objects 338
Using CLI Commands in FlexConfig Policy Objects 338
Using Scripting Language Instructions 339
Scripting Language Example 1: Looping 339
Scripting Language Example 2: Looping with Two-Dimensional Arrays 340
Example 3: Looping with If/Else Statements 340
Understanding FlexConfig Object Variables 341
Example of FlexConfig Policy Object Variables 342
FlexConfig System Variables 343
Predefined FlexConfig Policy Objects 356
Configuring FlexConfig Policies and Policy Objects 361
A FlexConfig Creation Scenario 361
Creating FlexConfig Policy Objects 364
Add or Edit FlexConfig Dialog Box 365
User Guide for Cisco Security Manager 4.21
xi
Contents
Create Text Object Dialog Box 367
Add or Edit Text Object Dialog Box 368
FlexConfig Undefined Variables Dialog Box 369
Property Selector Dialog Box 370
Editing FlexConfig Policies 371
FlexConfig Policy Page 372
Values Assignment Dialog Box 373
FlexConfig Preview Dialog Box 374
Troubleshooting FlexConfigs 374
Managing Deployment 377
CHAPTER 8
Understanding Deployment 377
Overview of the Deployment Process 377
Deployment in Non-Workflow Mode 380
Deployment Task Flow in Non-Workflow Mode 380
Job States in Non-Workflow Mode 381
Deployment in Workflow Mode 381
Deployment Task Flow in Workflow Mode 381
Job States in Workflow Mode 383
Deployment Job Approval 384
Deployment Jobs and Multiple Users 385
Including Devices in Deployment Jobs or Schedules 385
Understanding Deployment Methods 385
Deploying Directly to a Device 386
Deploying to a Device through an Intermediate Server 387
Deploying to a File 388
Understanding How Out-of-Band Changes are Handled 389
Handling Device OS Version Mismatches 390
Overview of the Deployment Manager and Configuration Archive 391
Understanding What You Can Do with the Deployment Manager 392
Deployment Manager Window 392
Deployment Workflow Commentary Dialog Box 396
Deployment Schedules Tab, Deployment Manager 397
Configuration Archive Window 399
User Guide for Cisco Security Manager 4.21
xii
Contents
Working with Deployment and the Configuration Archive 402
Viewing Deployment Status and History for Jobs and Schedules 402
Tips for Successful Deployment Jobs 403
Deploying Configurations in Non-Workflow Mode 405
Edit Deploy Method Dialog Box 407
Warning - Partial VPN Deployment Dialog Box 408
Deployment Status Details Dialog Box 409
Deploying Configurations in Workflow Mode 411
Creating and Editing Deployment Jobs 412
Submitting Deployment Jobs 415
Approving and Rejecting Deployment Jobs 416
Deploying a Deployment Job in Workflow Mode 417
Discarding Deployment Jobs 418
Deploying Configurations Using an Auto Update Server or CNS Configuration Engine 419
Deploying Configurations to a Token Management Server 420
Previewing Configurations 421
Detecting and Analyzing Out of Band Changes 423
Exceptions to Out of Band Change Detection 425
Exceptions to Out of Band Change Detection 425
OOB (Out of Band) Changes Dialog Box 426
OOB Re-sync. Tool 427
Redeploying Configurations to Devices 430
Aborting Deployment Jobs 432
Creating or Editing Deployment Schedules 433
Schedule Dialog Box 434
Add Other Devices Dialog Box 436
Suspending or Resuming Deployment Schedules 436
Adding Configuration Versions from a Device to the Configuration Archive 437
Viewing and Comparing Archived Configuration Versions 437
Configuration Version Viewer 438
Viewing Deployment Transcripts 440
Rolling Back Configurations 441
Understanding Configuration Rollback 441
Understanding Rollback for Devices in Multiple Context Mode 443
User Guide for Cisco Security Manager 4.21
xiii
Contents
Understanding Rollback for Failover Devices 443
Understanding Rollback for Catalyst 6500/7600 Devices 444
Understanding Rollback for IPS and IOS IPS 444
Commands that Can Cause Conflicts after Rollback 446
Commands to Recover from Failover Misconfiguration after Rollback 447
Rolling Back Configurations to Devices Using the Deployment Manager 448
Using Rollback to Deploy Archived Configurations 449
Performing Rollback When Deploying to a File 450
Troubleshooting Device Communication and Deployment 453
CHAPTER 9
Testing Device Connectivity 453
Device Connectivity Test Dialog Box 455
Managing Device Communication Settings and Certificates 456
Multiple Certificate Authentication Support 456
Manually Adding SSL Certificates for Devices that Use HTTPS Communications 457
Security Certificate Rejected When Discovering Device 458
Invalid Certificate Error During Device Discovery 459
Troubleshooting SSH Connection Problems 459
Troubleshooting Device Communication Failures 460
Resolving Red X Marks in the Device Selector 461
Troubleshooting Deployment 462
Changing How Security Manager Responds to Device Messages 462
Memory Violation Deployment Errors for ASA 8.3+ Devices 464
Error While Attempting to Remove Unreferenced Object 464
Security Manager Unable to Communicate With Device After Deployment 464
Updating VPNs That Include Routing Processes 465
Mixing Deployment Methods with Router and VPN Policies 466
Deployment Failures for Routers 467
Deployment Failures for Catalyst Switches and Service Modules 468
Changing How Security Manager Deploys Configurations to Multiple-Context FWSM 470
Deployment Failures to Devices Managed by AUS 470
Troubleshooting the Setup of Configuration Engine-Managed Devices 471
Managing Security Manager Server 475
CHAPTER 10
User Guide for Cisco Security Manager 4.21
xiv
Contents
Overview of Security Manager Server Management and Administration 475
Managing a Cluster of Security Manager Servers 476
Overview of Security Manager Server Cluster Management 476
Splitting a Security Manager Server 477
Synchronizing Shared Policies Among Security Manager Servers 478
Exporting the Device Inventory 479
Exporting the Device Inventory from the Security Manager Client 480
Supported CSV Formats for Inventory Import/Export 483
Exporting the Device Inventory from the Command Line 484
Exporting Shared Policies 485
Importing Policies or Devices 487
Installing Security Manager License Files 490
Certificate Trust Management 491
Working with Audit Reports 493
Understanding Audit Reports 493
Generating the Audit Report 494
Using the Audit Report Window 495
Purging Audit Log Entries 497
Taking Over Another User’s Work 497
Changing Passwords for the Admin or Other Users 498
Backing up and Restoring the Security Manager Database 498
Backing Up the Server Database 498
Restoring the Server Database 500
Generating Data for the Cisco Technical Assistance Center 502
Creating Diagnostics Files for the Cisco Technical Assistance Center 502
Generating Deployment or Discovery Status Reports 504
Generating a Partial Database Backup for the Cisco Technical Assistance Center 504
Configuring Security Manager Administrative Settings 507
CHAPTER 11
API Settings Page 508
AutoL-ink Settings Page 509
ACL Hit Count Settings Page 509
CCO Settings Page 510
Configuration Archive Page 512
User Guide for Cisco Security Manager 4.21
xv
Contents
CS-MARS Page 513
New or Edit CS-MARS Device Dialog Box 515
CSM Mobile Page 515
Customize Desktop Page 516
Debug Options Page 518
Deployment Page 520
Device Communication Page 527
Add Certificate Dialog Box 530
Device Groups Page 530
Discovery Page 531
Event Management Page 533
Troubleshooting Syslog Relay Servers 538
Device Management via IP 538
CPU Throttling Policy Dialog Box 539
Syslog Relay Statistics Dialog Box 540
Health and Performance Monitor Page 541
Report Manager Page 543
Identity Settings Page 544
Image Manager Page 546
IP Intelligence Settings Page 547
Eventing Notification Settings Page 550
IPS Updates Page 553
Edit Update Server Settings Dialog Box 558
Edit Auto Update Settings Dialog Box 560
Edit Signature Download Filter Settings Dialog Box 561
ISE Settings Page 562
Licensing Page 563
CSM Tab, Licensing Page 563
IPS Tab, Licensing Page 564
Verifying IPS Devices for License Update or Redeployment 566
Selecting IPS License Files 567
License Update Status Details Dialog Box 568
Logs Page 568
Policy Management Page 570
User Guide for Cisco Security Manager 4.21
xvi
Contents
Policy Objects Page 572
Process Monitoring Settings Page 573
Single Sign-on Configuration Page 574
Rule Expiration Page 576
Server Security Page 577
Take Over User Session Page 578
Ticket Management Page 579
Token Management Page 580
VPN Policy Defaults Page 581
Workflow Page 583
Wall Settings Page 585
Firewall Services and NAT 589
PART II
Introduction to Firewall Services 591
CHAPTER 12
Overview of Firewall Services 591
Understanding the Processing Order of Firewall Rules 592
Understanding How NAT Affects Firewall Rules 593
ACL Names Preserved by Security Manager 594
ACL Naming Conventions 595
Resolving User Defined ACL Policy Naming Conflicts 597
Resolving ACL Name Conflicts Between Policies 597
Managing Your Rules Tables 598
Using Rules Tables 598
Adding and Removing Rules 600
Editing Rules 601
Adding or Editing Address Cells in Rules Tables 603
Adding or Editing User Cells in Rules Tables 604
Adding or Editing Services Cells in Rules Tables 604
Adding or Editing Interfaces or Zones Cells in Rules Tables 605
Editing Category Cells in Rules Tables 606
Editing Description Cells in Rules Tables 606
Showing the Contents of Cells in Rules Tables 606
Finding and Replacing Items in Rules Tables 608
User Guide for Cisco Security Manager 4.21
xvii
Contents
Find and Replace Dialog Box 609
Moving Rules and the Importance of Rule Order 611
Enabling and Disabling Rules 612
Using Sections to Organize Rules Tables 612
Add and Edit Rule Section Dialog Boxes 614
Combining Rules 614
Combine Rules Selection Summary Dialog Box 616
Interpreting Rule Combiner Results 617
Example Rule Combiner Results 619
Converting IPv4 Rules to Unified Rules 620
Generating Policy Query Reports 621
Querying Device or Policy Dialog Box 622
Interpreting Policy Query Results 625
Example Policy Query Result 627
Optimizing Network Object Groups When Deploying Firewall Rules 628
Expanding Object Groups During Discovery 628
Managing Identity-Aware Firewall Policies 631
CHAPTER 13
Overview of Identity-Aware Firewall Policies 631
User Identity Acquisition 632
Requirements for Identity-Aware Firewall Policies 633
Configuring the Firewall to Provide Identity-Aware Services 635
Configuring Identity-Aware Firewall Policies 636
Enabling Identity-Aware Firewall Services 637
Identifying Active Directory Servers and Agents 637
Configuring Identity Options 645
Creating Identity User Group Objects 648
Selecting Identity Users in Policies 650
Configuring Identity-Based Firewall Rules 651
Configuring Cut-Through Proxy 653
Collecting User Statistics 655
Filtering VPN Traffic with Identity-Based Rules 656
Monitoring Identity Firewall Policies 656
User Guide for Cisco Security Manager 4.21
xviii
Contents
Managing Trustsec Firewall Policies 659
CHAPTER 14
Overview of TrustSec Firewall Policies 659
Understanding SGT and SXP Support in Cisco TrustSec 660
Roles in the Cisco TrustSec Solution 661
Security Group Policy Enforcement 661
About Speaker and Listener Roles 664
Prerequisites for Integrating an ASA with Cisco TrustSec 664
Configuring TrustSec Firewall Policies 665
Configuring Cisco TrustSec Services 666
Configuring Security Exchange Protocol (SXP) Settings 666
Defining SXP Connection Peers 670
Creating Security Group Objects 673
Selecting Security Groups in Policies 674
Configuring TrustSec-Based Firewall Rules 675
Monitoring TrustSec Firewall Policies 675
Managing Firewall AAA Rules 677
CHAPTER 15
Understanding AAA Rules 677
Understanding How Users Authenticate 678
Configuring AAA Rules for ASA, PIX, and FWSM Devices 680
Configuring AAA Rules for IOS Devices 683
AAA Rules Page 685
Add and Edit AAA Rule Dialog Boxes 689
Edit AAA Option Dialog Box 695
AuthProxy Dialog Box 695
Edit Server Group Dialog Box 695
AAA Firewall Settings Policies 696
AAA Firewall Settings Page, Advanced Setting Tab 696
Interactive Authentication Configuration Dialog Box 700
Clear Connection Configuration Dialog Box 701
AAA Firewall Page, MAC-Exempt List Tab 702
Firewall AAA MAC Exempt Setting Dialog Box 703
AAA Page 704
User Guide for Cisco Security Manager 4.21
xix
Contents
Firewall AAA IOS Timeout Value Setting 706
Managing Firewall Access Rules 709
CHAPTER 16
Understanding Access Rules 709
Understanding Global Access Rules 711
Understanding Device Specific Access Rule Behavior 712
Understanding Access Rule Address Requirements and How Rules Are Deployed 713
Configuring Access Rules 715
Access Rules Page 718
Add and Edit Access Rule Dialog Boxes 722
Advanced and Edit Options Dialog Boxes 725
Hit Count Selection Summary Dialog Box 729
Configuring Expiration Dates for Access Rules 730
Configuring Settings for Access Control 731
Access Control Settings Page 732
Firewall ACL Setting Dialog Box 734
Using Automatic Conflict Detection 736
Understanding Automatic Conflict Detection 736
Understanding the Automatic Conflict Detection User Interface 738
Resolving Conflicts 743
Viewing Hit Count Details 744
Sample Hit Count Details Window 746
Importing Rules 748
Import Rules Wizard—Enter Parameters Page 749
Import Rules Wizard—Status Page 751
Import Rules Wizard—Preview Page 751
Examples of Imported Rules 753
Optimizing Access Rules Automatically During Deployment 754
Customizing defaults in the Add Access Rule dialog 756
Managing Firewall Inspection Rules 757
CHAPTER 17
Understanding Inspection Rules 757
Choosing the Interfaces for Inspection Rules 758
Selecting Which Protocols To Inspect 759
User Guide for Cisco Security Manager 4.21
xx
Contents
/