Техническая Спецификация для Cisco Cisco Prime Security Manager 9.0
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 9
Data Sheet
Cisco Prime Security Manager
An evolving global workforce and the proliferation of applications and devices
have amplified network complexity, requiring firewall administrators to choose
between enabling the anytime, anywhere, any device access required for employee
productivity, and the degree of security required to protect the business. Cisco
have amplified network complexity, requiring firewall administrators to choose
between enabling the anytime, anywhere, any device access required for employee
productivity, and the degree of security required to protect the business. Cisco
®
ASA
Next-Generation Firewalls address this issue by enabling access control based on
applications, devices, and users.
applications, devices, and users.
Cisco Prime Security Manager is the management tool for the Cisco ASA 5500-X Series Next-Generation Firewalls
(NGFW). This application is built on Web 2.0 technologies and supports both single-device and multidevice
manager form factors to help manage the following capabilities:
●
Application Visibility and Control to help block applications, users and devices
●
Web Security Essentials, which includes URL filtering and Web reputation
●
Intrusion Prevention on the Cisco Next-Generation Firewalls
●
Stateful inspection capabilities to configure layer 3/Layer 4 access control rules
Unprecedented Network Visibility
Cisco Prime Security Manager provides security administrators with end-to-end visibility across the security
network, including top-level traffic patterns, granular logs, and the health and performance of ASA Next-Generation
Firewalls and Cisco Next-Generation Firewall Services.
This application also provides reports that give administrators a better understanding of the traffic flows throughout
the network. For example, the Network Dashboard report (Figure 1) highlights the top ASA Next-Generation
Firewall sources and destinations along with traffic by location. It also shows the policies that have been hit from
web and nonweb requests.
Figure 1. Report on Top Sources, Destinations, Policies, Traffic, and Applications