Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
Index
IN-91
User Guide for Cisco Security Manager 4.4
OL-28826-01
Select VPN to Configure dialog box 34-22
self near-end crosstalk (SNEXT) 59-45
Self zone 21-5
sensors, IPS
allowed hosts
35-7
anomaly detection
configuring
40-6
configuring histograms 40-11
configuring learning accept mode 40-8
configuring signatures 40-4
configuring thresholds 40-11
detection zones 40-3
managing 40-1
modes 40-2
understanding 40-1
understanding histograms 40-9
understanding thresholds 40-9
understanding worms 40-2
when to turn off 40-4
blocking
configuring
42-7
configuring ARC 42-1
configuring blocking devices 42-14
configuring master blocking sensors 42-13
configuring never block hosts and
networks
42-17
configuring router blocking interfaces 42-15
configuring user profiles 42-12
configuring VLAN blocking interfaces 42-16
general options 42-10
master blocking sensor 42-6
policy 42-8
rate limiting 42-4
router and switch blocking devices 42-4
strategies 42-3
understanding 42-1
capturing network traffic 35-2
certificates 43-10
configuration overview 35-5
configuration overview for IOS IPS 44-3
configuring AAA 35-19
configuring Analysis Engine global variables 35-26
configuring DNS servers 35-22
configuring HTTP proxy server 35-23
configuring NTP 35-21
configuring OS maps 39-18
configuring SNMP 35-8
configuring target value ratings 39-15
configuring the external product interface 35-23
configuring user accounts 35-16
deployment of passwords 35-15
deployment topology 35-4
discovery of passwords 35-15
event actions
example filter rule
66-58
filter rule attributes 39-9
filter rules 39-4, 39-7
filter rules tips 39-6
network information 39-14
overrides 39-13
overview 39-1
possible actions 39-2
process overview 39-1
settings 39-21
getting started 35-1
global correlation
configuring
41-1
configuring inspection and reputation 41-5
configuring network participation 41-7
data collected 41-3
requirements and limitations 41-4
understanding 41-1
understanding network participation 41-3
understanding reputation 41-2
interfaces
configuring
36-6
configuring bypass mode 36-12
configuring CDP mode 36-13