Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
1-2
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 1 Getting Started with Security Manager
Product Overview
The following topics provide an overview of Security Manager:
Primary Benefits of Cisco Security Manager, page 1-2
Security Manager Policy Feature Sets, page 1-4
Security Manager Applications Overview, page 1-6
Device Monitoring Overview, page 1-6
IPv6 Support in Security Manager, page 1-7
Primary Benefits of Cisco Security Manager
These are the primary benefits of working with Security Manager:
Scalable network management—Centrally administer security policies and device settings for
either small networks or large scale networks consisting of thousands of devices. Define policies and
settings once and then optionally assign them to individual devices, groups of devices or all the
devices in the enterprise.
Provisioning of multiple security technologies across different platforms—Manage VPN,
firewall, and IPS technologies on routers, security appliances, Catalyst devices and service modules,
and IPS devices.
Provisioning of platform-specific settings and policies—Manage platform-specific settings on
specific device types. For example: routing, 802.1x, EzSDD, and Network Admission Control on
routers, and device access security, DHCP, AAA, and multicast on firewall devices.
VPN wizards—Quickly and easily configure point-to-point, hub-and-spoke, full-mesh, and
Extranet site-to-site VPNs across different VPN device types. Quickly and easily configure remote
access IPsec and SSL VPNs on ASA, IOS, and PIX devices.
Multiple management views—Device, policy, and map views enable you to manage your security
in the environment that best suits your needs.
Reusable policy objects—Create reusable objects to represent network addresses, device settings,
VPN parameters, and so on, then use them instead of manually entering values.
Device grouping capabilities—Create device groups to represent your organizational structure.
Manage all devices in the groups concurrently.
Policy inheritance—Centrally specify which policies are mandatory and enforced lower in the
organization.
Role-based administration—Enable appropriate access controls for different operators.
Workflow—Optionally allow division of responsibility and workload between network operators
and security operators and provide a change management approval and tracking mechanism.
Ticket Management—Associate a ticket ID with policy changes, easily add and update comments
pertaining to those changes, and quickly navigate to an external change management system from
Security Manager.
Single, consistent user interface for managing common firewall features—Single rule table for
all platforms (router, PIX, ASA, and FWSM).
Image management—Complete image management for ASA devices. Facilitates at every stage of
image upgrade of devices by: downloading and maintaining image repository, evaluating images,
analyzing impact of upgrades, preparing and planning reliable and stable device upgrades, and
ensuring sufficient fallback and recovery mechanisms.