Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
3-33
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 3 Managing the Device Inventory
Adding Devices to the Device Inventory
Details Pane
Below the device import table is a pane that displays the details for the device selected in the table. The
Identity information repeats the table fields. The Status text box displays an extended explanation of
the import status.
The Discover Device Settings and Transport groups let you specify how Security Manager should
import the device. If you select a folder instead of a device, the settings you select apply to all devices
in the folder. The settings are explained below.
Discover Device Settings
Perform Device Discovery Whether to discover policies directly from the device:
If the inventory file is in Security Manager format, you must select
Perform Device Discovery to discovery inventory and policies
(otherwise, the device is added without being evaluated). If you are
adding offline or standby devices, you can leave this option
deselected to easily add the device to the inventory.
All other inventory file types require device discovery.
System Context Whether the selected device is the system execution space on a device
running in multiple context mode (that is, more than one security
context is defined on the device). If the device is the system execution
space, you must select this option for discovery to complete correctly.
Discover The type of elements that should be discovered and added to the
inventory. You have these options:
Policies and Inventory—Discover policies, interfaces, and service
modules (if applicable). This is the default and recommended
option.
When policy discovery is initiated, the system analyzes the
configuration on the device, then imports the configured service
and platform policies. When inventory discovery is initiated, the
system analyzes the interfaces on the device and then imports the
interface list. If the device is a composite device, all the service
modules in the device are discovered and imported.
If you select this option, the checkboxes below are activated and
you can use them to control the types of policies that are
discovered.
Note During discovery, if you import an ACL that is inactive, it is
shown as disabled in Security Manager. If you deploy the same
ACL, it will be removed by Security Manager.
Inventory Only—Discovers interfaces and service modules (if
applicable).
Table 3-7 New Device Wizard, Device Information Page When Adding Devices from Inventory
Files (Continued)
Element Description