Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
11-10
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 11 Configuring Security Manager Administrative Settings
Deployment Page
Default Deployment Method
Directory
The method to use as the default method for deploying configurations
to devices:
Device—Deploys the configuration directly to the device or to the
transport mechanism specified for the device. For more
information, see Deploying Directly to a Device, page 8-9.
File—Deploys the configuration file to a directory on the Security
Manager server. If you select File, specify the directory to which
you want to deploy the configuration file in the Destination
column. Even if you select file as the default, the setting does not
apply to IPS devices; you can use device deployment only for IPS
devices. For more information, see Deploying to a File, page 8-11.
You can override this method when you create deployment jobs.
When Out of Band Changes
Detected
How Security Manager should respond when it detects that changes
were made directly on the device CLI since a configuration was last
deployed to the device. Out of band change detection works correctly
only when deploying to device, not to file, and applies only when the
deployment method is configured to obtain the reference configuration
from the device (see below for a description of the Reference
Configuration setting).
This setting specifies the default action, which you can override when
you create deployment jobs. You can choose one of the following:
Overwrite changes and show warning (default)—If changes
were made to the device manually, Security Manager continues
with the deployment, overwrites the changes, and displays a
warning notifying you of this action.
Cancel deployment—If changes were made to the device
manually, Security Manager cancels the deployment and displays a
warning notifying you of this action.
Do not check for changes—Security Manager does not check for
changes and deploys the changes to the device, overwriting any
local modifications.
For a more complete discussion of out-of-band change handling, see
Understanding How Out-of-Band Changes are Handled, page 8-12.
Deploy to File Reference
Configuration
The configuration that Security Manager uses to compare new policies
against the previous configuration for the device, if you are deploying
the configuration to a file on the Security Manager server.
Archive (default)—The most recently archived configuration.
Device—The current running device configuration, which is
obtained from the device.
After comparing the configurations, Security Manager generates the
correct CLI for deployment.
Table 11-8 Deployment Page (Continued)
Element Description