Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
Contents
xv
User Guide for Cisco Security Manager 4.4
OL-28826-01
ACL Naming Conventions 12-5
Resolving ACL Name Conflicts Between Policies 12-6
Managing Your Rules Tables 12-7
Using Rules Tables 12-7
Adding and Removing Rules 12-9
Editing Rules 12-9
Adding or Editing Address Cells in Rules Tables 12-11
Adding or Editing User Cells in Rules Tables 12-12
Adding or Editing Services Cells in Rules Tables 12-12
Adding or Editing Interfaces or Zones Cells in Rules Tables 12-13
Editing Category Cells in Rules Tables 12-14
Editing Description Cells in Rules Tables 12-14
Showing the Contents of Cells in Rules Tables 12-14
Finding and Replacing Items in Rules Tables 12-16
Find and Replace Dialog Box 12-17
Moving Rules and the Importance of Rule Order 12-19
Enabling and Disabling Rules 12-20
Using Sections to Organize Rules Tables 12-20
Add and Edit Rule Section Dialog Boxes 12-22
Combining Rules 12-22
Combine Rules Selection Summary Dialog Box 12-24
Interpreting Rule Combiner Results 12-25
Example Rule Combiner Results 12-27
Converting IPv4 Rules to Unified Rules 12-28
Generating Policy Query Reports 12-28
Querying Device or Policy Dialog Box 12-29
Interpreting Policy Query Results 12-32
Example Policy Query Result 12-34
Optimizing Network Object Groups When Deploying Firewall Rules 12-35
Expanding Object Groups During Discovery 12-35
CHAPTER
13 Managing Identity-Aware Firewall Policies 13-1
Overview of Identity-Aware Firewall Policies 13-1
User Identity Acquisition 13-2
Requirements for Identity-Aware Firewall Policies 13-3
Configuring the Firewall to Provide Identity-Aware Services 13-7
Configuring Identity-Aware Firewall Policies 13-7
Enabling Identity-Aware Firewall Services 13-8
Identifying Active Directory Servers and Agents 13-8