Cisco Cisco Security Manager 4.6 Guida All'Installazione

Pagina di 30
 
3
Deployment Planning Guide for Cisco Security Manager 4.6
OL-31289-01
  Cisco Security Manager 4.6 Applications
Provides an alert mechanism for different monitoring parameters 
Provides a set of pre-defined monitoring views 
Allows users to create, edit, and delete custom monitoring views 
Image Manager 
The Image Manager provides for complete image management for ASA devices. Specifically, it helps 
the user in the various stages of the entire ASA image upgrade process by doing the following: 
Downloading and maintaining a repository of the different types and versions of images 
Evaluating the images 
Analyzing the impact of upgrading these images to the devices (the analysis includes the impact of 
upgrade on device configuration) 
Preparing and planning the upgrade 
Providing a reliable and stable way to upgrade devices with sufficient fallback and recovery 
mechanisms built in, ensuring minimal downtime 
Dashboard 
The Dashboard is a configurable launch point for Security Manager that makes IPS and FW tasks more 
convenient for you. In addition to the original dashboard, you can create new, additional dashboards, and 
you can customize all dashboards. By using the dashboard, you can accomplish in one place many tasks 
that are found in several other areas of Security Manager, such as the IPS Health Monitor page, Report 
Manager, Health and Performance Monitor, and IP Intelligence Settings. 
CSM Mobile 
CSM Mobile allows you to access device health summary information from mobile devices. The 
information available to you in this way is the same as that available in the Device Health Summary 
widget in the Dashboard: current high or medium severity active alerts generated by HPM. Alerts can be 
grouped by Alert-Description, Predefined-Category, Device, or Alert Technology. 
The principal users of CSM Mobile are expected to be those who use an Apple iPad, an Apple iPhone, 
the Google Chrome browser, or the Apple Safari browser.
Syslog Relay 
In addition to events being received by the Security Manager server, they can be forwarded to a 
maximum of two external/remote controllers (syslog hosts). This feature, syslog relay, will forward the 
received messages to another syslog host using the UDP syslog protocol. 
Retain the original source address of the message 
This feature provides the option of preserving the original source IP address of the message. That is, if 
the user wants to show the events received on the remote controller source IP address. This is the default 
configuration.