Cisco Cisco Prime Security Manager 9.0
3
Release Notes for ASA CX and Cisco Prime Security Manager 9.3
OL-32019-01
Applications that Support Integration with PRSM
Applications that Support Integration with PRSM
You can share information between Cisco Prime Security Manager and some other applications. The
following table lists the supported applications and the type of integration available.
following table lists the supported applications and the type of integration available.
If supported, Cisco Prime Security Manager allows you to configure a single-sign-on (SSO) relationship
between PRSM and other applications. An SSO relationship allows you to log into the other application,
then directly access PRSM from within that application without needing to log into PRSM. Your
username/password for the other application suffices for PRSM authentication.
between PRSM and other applications. An SSO relationship allows you to log into the other application,
then directly access PRSM from within that application without needing to log into PRSM. Your
username/password for the other application suffices for PRSM authentication.
Use the following steps to configure this relationship:
1.
Identify the application’s SSO directory to PRSM.
2.
Add users defined in the SSO directory to PRSM.
See the PRSM user guide or online help for detailed information. See the documentation for these
products for information on their SSO server and PRSM cross-launch access points.
products for information on their SSO server and PRSM cross-launch access points.
Dashboard and Report Data Calculations
The “Top N” dashboards are limited to a certain number of data points. If there are more data points than
the limit in a 5 minute bucket, only the data points within the limit are counted; data points outside the
limit are ignored (although the events for these items persist).
the limit in a 5 minute bucket, only the data points within the limit are counted; data points outside the
limit are ignored (although the events for these items persist).
Thus, as data is aggregated from the 5 minute buckets, items that appear in the top N in one bucket, but
not in another, will have incomplete metrics. For example, consider the Top Users report. During the first
5 minute window, user John Doe is in the Top N users. During the next 5 minute bucket, John Doe is still
generating some network traffic, but he is not in the Top N for that time window. Then, when the hourly
summary is calculated from the twelve 5-minute buckets that comprise that hour, the entry for user John
Doe in that summary will include the data from the first 5-minutes, but it will not include anything of
John Doe's traffic from the second 5-minutes because John Doe was not in the Top-N for that time period.
not in another, will have incomplete metrics. For example, consider the Top Users report. During the first
5 minute window, user John Doe is in the Top N users. During the next 5 minute bucket, John Doe is still
generating some network traffic, but he is not in the Top N for that time window. Then, when the hourly
summary is calculated from the twelve 5-minute buckets that comprise that hour, the entry for user John
Doe in that summary will include the data from the first 5-minutes, but it will not include anything of
John Doe's traffic from the second 5-minutes because John Doe was not in the Top-N for that time period.
The number of data points used in the Top N dashboards is 50.
Sites Supported for Safe Search
You can enforce Safe Search settings on certain web sites. By enforcing Safe Search, you prevent users
from relaxing search results to include inappropriate or explicit materials. If you enable an access policy
to enforce Safe Search, search URLs are rewritten to ensure strict Safe Search settings. If CX does not
support rewrite for a search engine, that engine is blocked for any traffic flows that match an access
policy that enforces Safe Search.
from relaxing search results to include inappropriate or explicit materials. If you enable an access policy
to enforce Safe Search, search URLs are rewritten to ensure strict Safe Search settings. If CX does not
support rewrite for a search engine, that engine is blocked for any traffic flows that match an access
policy that enforces Safe Search.
Table 2
Applications that support integration with PRSM 9.3(x)
Application
Feature Notes
Cisco Security Manager 4.5
•
Single sign-on cross launching.
•
Export network, network group, service, and service group objects for import
into PRSM.
into PRSM.
Note
Cross-launch, but not single sign-on or object import, is supported in
Cisco Security Manager 4.4.
Cisco Security Manager 4.4.