Index
IN-36
User Guide for Cisco Security Manager 4.4
OL-28826-01
attributes 33-25
selecting 33-27
files
deploying to
8-11
selecting or specifying 1-47
Filter Item dialog box 39-9
filter rules, event action (IPS)
attributes
39-9
configuring 39-4
example rule 66-58
exporting 39-4
policy 39-7
tips 39-6
filters
Event Viewer
clearing
66-44
column based 66-41
context menu 66-45
event based 66-43
overview 66-39
refreshing event list 66-40
selecting time range 66-39
text searches (quick filter) 66-44
using time slider 66-40
filtering selectors 1-42
filtering tables 1-45
HPM
column based
68-15
custom 68-16
filters (Event Viewer)
advantages of using network/host objects
66-59
overview 66-3
submission requirements for policy objects 66-59
Find and Replace dialog box 12-17
find and replace in rules policies 12-16
Find Map Node command 1-31
Find Node dialog box 34-12
Firewall
AAA IOS Timeout Values
15-27
firewall
AAA firewall
advanced settings
15-19
configuring 15-6
MAC exempt lists 15-23
AAA firewall policy
advanced settings
15-19
configuring 15-6
AAA page 15-25
AAA rules
configuring AAA firewall settings
15-6
configuring AuthProxy settings 15-9
configuring cut-through proxy (ASA) 13-23
configuring for ASA/PIX/FWSM devices 15-4
configuring for IOS devices 15-7
configuring identity aware 13-21
configuring security group aware 14-13
managing 15-1
properties 15-13
understanding 15-1
understanding how users authenticate 15-2
Access Control page 16-21
access controls
per user downloadable ACLs
16-24
access control settings
configuring settings
16-20
access rule
event analysis example, user access
blocked
66-50
finding from CS-MARS events 69-31
finding from Event Viewer events 66-48
viewing related CS-MARS events 69-28
access rules
address requirements
16-5
configuring 16-7
configuring expiration dates 16-19
configuring identity aware 13-21
configuring security group aware 14-13
how deployed 16-5