Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
8-29
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 8 Managing Deployment
Working with Deployment and the Configuration Archive
The status of deployments to Catalyst 6500/7600 devices shows deployment to the device as well as
its interface contexts when policy changes contain interface commands that affect the interface
contexts (child devices). This can occur when you deploy a policy change that affects a VLAN in
which the switch participates or when you update inventory, for example, by adding or deleting
interface contexts.
Related Topics
Overview of the Deployment Process, page 8-1
Deploying Configurations in Non-Workflow Mode, page 8-29
Creating and Editing Deployment Jobs, page 8-36
Managing Device Communication Settings and Certificates, page 9-4
Detecting and Analyzing Out of Band Changes, page 8-46
Job States in Non-Workflow Mode, page 8-4
Job States in Workflow Mode, page 8-6
Deploying Configurations in Non-Workflow Mode
When you deploy configurations, you can transfer them to devices either directly or to another transport
server (such as AUS, CNS, or TMS) in the network or create them as configuration files in a directory
on the Security Manager server. See Understanding Deployment Methods, page 8-8 for more
information.
Tip Before creating the deployment job, read Tips for Successful Deployment Jobs, page 8-28. That topic
includes tips and cautions you should keep in mind when creating deployment jobs.
Caution You must configure at least one policy on a device before deploying to that device. If you deploy to a
device without assigning at least one policy, the device’s current configuration is overwritten with a
blank configuration.
Note When using virtual sensors: An IPS device and all of the virtual sensors on it must be deployed as a
group. If you make changes to a virtual sensor and then deploy it, Security Manager deploys the parent
device and all virtual sensors associated with it.
Before You Begin
Make sure that devices have been bootstrapped. For more information, see Chapter 2, “Preparing
Devices for Management”.
If you are deploying to a transport server, such as AUS, CNS, or TMS, make sure the server, Security
Manager settings, and device have been set up properly.
Related Topics
Overview of the Deployment Process, page 8-1
Including Devices in Deployment Jobs or Schedules, page 8-8