Cisco Cisco Security Manager 4.10 Notas de publicación
3
Release Notes for Cisco Security Manager 4.10
What’s New
What’s New
Cisco Security Manager 4.10 SP2
In addition to the resolved caveats, this release provides support for the SNMP Host Group and User List
feature. You can now add and edit the host group entries for SNMP users. You can also add a user list
containing multiple SNMP users.
feature. You can now add and edit the host group entries for SNMP users. You can also add a user list
containing multiple SNMP users.
Cisco Security Manager 4.10
In addition to resolved caveats, this release includes the following new features and enhancements:
•
High-availability on VMware based solutions
You can now install Security Manager in a VMware based High Availability (HA) or Disaster Recovery
(DR) environment. Security Manager 4.10 supports the following scenarios:
(DR) environment. Security Manager 4.10 supports the following scenarios:
–
Host-based Failover (Local HA)—In this configuration Security Manager is installed on a
virtual machine on an ESXi host within a VMware cluster. In the event of a hardware failure on
the existing ESXi host, the host-based failover configuration automatically starts up the same
virtual machine (VM) on another host within the VMware cluster.
virtual machine on an ESXi host within a VMware cluster. In the event of a hardware failure on
the existing ESXi host, the host-based failover configuration automatically starts up the same
virtual machine (VM) on another host within the VMware cluster.
–
Fault Tolerance—In the VMware Fault Tolerance configuration, when a hardware failure is
detected on a host, a second VM is created on a different host and Security Manager starts
running on the second VM without an interruption of service. VMware Fault Tolerance enables
a new level of guest redundancy. VMware Fault Tolerance implies that two copies of the VM
are maintained, each on separate hosts. This feature can be enabled by turning on Fault
Tolerance on the VM on which Security Manager has been installed.
detected on a host, a second VM is created on a different host and Security Manager starts
running on the second VM without an interruption of service. VMware Fault Tolerance enables
a new level of guest redundancy. VMware Fault Tolerance implies that two copies of the VM
are maintained, each on separate hosts. This feature can be enabled by turning on Fault
Tolerance on the VM on which Security Manager has been installed.
–
Disaster Recovery—Security Manager uses the VMware vCenter Site Recovery Manager tool
with VMware vSphere Replication for disaster recovery and management. Site Recovery
Manager integrates natively with VMware vSphere Replication and supports a broad set of
high-performance array-based replication products to reliably copy virtual machines across
sites according to business requirements. Site Recovery Manager is an extension to VMware
vCenter Server that delivers a disaster recovery solution that helps to plan, test, and run the
recovery of virtual machines. Site Recovery Manager can discover and manage replicated
datastores, and automate migration of inventory between vCenter Server instances.
with VMware vSphere Replication for disaster recovery and management. Site Recovery
Manager integrates natively with VMware vSphere Replication and supports a broad set of
high-performance array-based replication products to reliably copy virtual machines across
sites according to business requirements. Site Recovery Manager is an extension to VMware
vCenter Server that delivers a disaster recovery solution that helps to plan, test, and run the
recovery of virtual machines. Site Recovery Manager can discover and manage replicated
datastores, and automate migration of inventory between vCenter Server instances.
Cisco Secure Access Control Server (ACS) for Windows
Notes
•
Cisco Secure ACS Solution Engine 4.1(4) is also supported.
•
Cisco Secure ACS 5.x is supported for authentication.
•
You can use other versions of Cisco Secure ACS if you configure them
as non-ACS TACACS+ servers. A non-ACS configuration does not
provide the granular control possible when you configure the server in
ACS mode.
as non-ACS TACACS+ servers. A non-ACS configuration does not
provide the granular control possible when you configure the server in
ACS mode.
4.2(0), 5.x
Cisco Configuration Engine
3.5, 3.5(1)
Table 1
Supported Versions for Components and Related Applications (Continued)
Application
Support Releases