Cisco Security Manager
Encyclopedia
Cisco Security Manager is an Enterprise software
management application designed to configure firewall
, VPN, and Intrusion-prevention system
(IPS) security services on Cisco
network and security devices. Cisco Security Manager can be used in networks of all sizes—from small networks to large networks consisting of thousands of devices—by using policy-based management techniques.
• Firewall Management: Device-agnostic, unified interface for managing firewall rules across different Cisco devices supporting the firewall feature set flexible rule specification methods for improved productivity and organization of rules; powerful toolset to identify configuration errors and optimize firewall rules
• VPN Management: VPN Wizard for rapid, simple definition of site-to-site and remote access VPNs
• IPS Management: Comprehensive solution for configuration management of all Cisco
IPS technologies and automation
of signature updates
• Policy-based Management: Ability to define aspects of a device's configuration into a named, shareable policy, which can be re-used across multiple devices; support for policy hierarchies to allow logical structuring and maximum re-usability
• Rich client Graphical User Interface
: Integrated, easy-to-use interface providing multiple views optimized around specific configuration tasks; device-centric view, map-centric view, and policy-centric view
• Workflow
: Provides an approval framework, whereby proposed configuration changes and deployments can be reviewed and approved
• Role-based access control
: Integration with Cisco Secure Access Control Server (ACS) for granular, role-based access control
to devices and management
functions
• Flexible Deployment Options: Support for various methods of deploying configuration changes such as direct to device, to file, or using call-home based techniques
Enterprise software
Enterprise software, also known as enterprise application software , is software used in organizations, such as in a business or government, contrary to software chosen by individuals...
management application designed to configure firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....
, VPN, and Intrusion-prevention system
Intrusion-prevention system
Intrusion Prevention Systems , also known as Intrusion Detection and Prevention Systems , are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information...
(IPS) security services on Cisco
Cisco
Cisco may refer to:Companies:*Cisco Systems, a computer networking company* Certis CISCO, corporatised entity of the former Commercial and Industrial Security Corporation in Singapore...
network and security devices. Cisco Security Manager can be used in networks of all sizes—from small networks to large networks consisting of thousands of devices—by using policy-based management techniques.
• Firewall Management: Device-agnostic, unified interface for managing firewall rules across different Cisco devices supporting the firewall feature set flexible rule specification methods for improved productivity and organization of rules; powerful toolset to identify configuration errors and optimize firewall rules
• VPN Management: VPN Wizard for rapid, simple definition of site-to-site and remote access VPNs
• IPS Management: Comprehensive solution for configuration management of all Cisco
Cisco
Cisco may refer to:Companies:*Cisco Systems, a computer networking company* Certis CISCO, corporatised entity of the former Commercial and Industrial Security Corporation in Singapore...
IPS technologies and automation
Automation
Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization...
of signature updates
• Policy-based Management: Ability to define aspects of a device's configuration into a named, shareable policy, which can be re-used across multiple devices; support for policy hierarchies to allow logical structuring and maximum re-usability
• Rich client Graphical User Interface
Graphical user interface
In computing, a graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and...
: Integrated, easy-to-use interface providing multiple views optimized around specific configuration tasks; device-centric view, map-centric view, and policy-centric view
• Workflow
Workflow
A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons, an organization of staff, or one or more simple or complex mechanisms. Workflow may be seen as any abstraction of real work...
: Provides an approval framework, whereby proposed configuration changes and deployments can be reviewed and approved
• Role-based access control
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...
: Integration with Cisco Secure Access Control Server (ACS) for granular, role-based access control
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...
to devices and management
Management
Management in all business and organizational activities is the act of getting people together to accomplish desired goals and objectives using available resources efficiently and effectively...
functions
• Flexible Deployment Options: Support for various methods of deploying configuration changes such as direct to device, to file, or using call-home based techniques
Release history
Release | Date |
---|---|
3.0 | Mar 28, 2006 |
3.0.1 | Jun 18, 2006 |
3.1 | Apr 20, 2007 |
3.1.1 | Sep 24, 2007 |
3.2 | Mar 31, 2008 |
3.2 SP1 | May 29, 2008 |
3.2 SP2 | June 20, 2008 |
3.2.1 | July 23, 2008 |
3.2.1 SP1 | Sept 05, 2008 |
3.2.2 | Dec 13, 2008 |
3.2.2 SP1 | Feb 16, 2009 |
3.2.2 SP2 | Apr 22, 2009 |
3.3 | June 30, 2009 |
4.0 SP1 | Oct 7, 2010 |
4.1 | March 15, 2011 |