Overview

This chapter contains the following sections:

Introduction to Component Applications

The Security Manager installer enables you to install certain applications and, when you do, requires that you install certain other applications. This section describes those applications and their interdependencies:

From version 4.21 onwards, Cisco Security Manager terminates whole support, including support for any bug fixes or enhancements, for all Aggregation Service Routers, Integrated Service Routers, Embedded Service Routers, and any device operating on Cisco IOS software, including the following devices:

  • Cisco Catalyst 6500 and 7600 Series Firewall Services Modules (EOL8184 )

  • Cisco Catalyst 6500 Series Intrusion Detection System Services Module 2 ( EOL8843 )

  • Cisco Intrusion Prevention System: IPS 4200, 4300, and 4500 Series Sensors ( EOL9916 )

  • Cisco SR 500 Series Secure Routers ( EOL7687 , EOL7657 )

  • PIX Firewalls (EOL)

Common Services

Common Services 4.2.2 is bundled by default with Security Manager 4.26.

Common Services provides the framework for data storage, login, user role definitions, access privileges, security protocols, and navigation. It also provides the framework for installation, data management, event and message handling, and job and process management. Common Services supplies essential server-side components to Security Manager that include the following:

  • SSL1 libraries

  • The MariaDB Database

  • The Apache webserver

  • The Tomcat servlet engine

  • The CiscoWorks home page

  • Backup and restore functions


Note

Device and Credential Repository (DCR) functionality within Common Services is not supported in Security Manager 4.26.

Note

In this version 4.26, CiscoSSL version 1.1.1N and Apache version 2.4.51 is being used.


Security Manager

Cisco Security Manager is an enterprise-class management application designed to configure firewall, VPN services on Cisco network and security devices. Cisco Security Manager can be used in networks of all sizes—from small networks to large networks consisting of thousands of devices—by using policy-based management techniques. Cisco Security Manager works in conjunction with the Cisco Security Monitoring, Analysis, and Response System (MARS). Used together, these two products provide a comprehensive security management solution that addresses configuration management, security monitoring, analysis, and mitigation.


Note

For more information about Security Manager, visit http://www.cisco.com/go/csmanager . For more information about Cisco Security MARS, visit http://www.cisco.com/go/mars .

To use Security Manager, you must install server and client software.

Security Manager offers the following features and capabilities:

  • Service-level and device-level provisioning of VPN, firewall, and intrusion prevention systems from one desktop

  • Device configuration rollback

  • Network visualization in the form of topology maps

  • Workflow mode

  • Predefined and user-defined FlexConfig service templates

  • Integrated inventory, credentials, grouping, and shared policy objects

  • Convenient cross-launch access to related applications:

    • When you install the server software, you also install read-only versions of the following device managers: Adaptive Security Device Manager (ASDM) and Security Device Manager (SDM)

    • When you install the server software, you also install a cross-launch point to (but not actual installation of) Cisco Prime Security Manager.

  • Integrated monitoring of events generated by ASA devices. You can selectively monitor, view, and examine events from ASA devices by using the Event Viewer feature.

Introduction to Related Applications

Other applications are available from Cisco that integrate with Security Manager to provide additional features and benefits:

  • Cisco Security Monitoring Analysis and Response System (MARS)—Security Manager supports cross linkages between policies and events with MARS for firewall. Using the Security Manager client you highlight specific firewall rules and request to see the events related to those rules or signatures. Using MARS you can select firewall events and request to see the matching rule or signature in Security Manager. These policy-event cross-linkages are especially useful for network connectivity troubleshooting, identifying unused rules, and signature tuning activities. The policy-event cross-linkage feature is explained in detail in the User Guide for Cisco Security Manager . For more information about MARS you can visit http://www.cisco.com/go/mars .

  • Cisco Secure Access Control System (ACS)—You can optionally configure Security Manager to use ACS for authentication and authorization of Security Manager users. ACS supports defining custom user profiles for fine-grained role based authorization control and ability to restrict users to specific sets of devices. For details on configuring Security Manager and ACS integration, see Integrating Security Manager with Cisco Secure ACS. For more information about ACS, visit http://www.cisco.com/go/acs .


Note

Beginning with Cisco Security Manager 4.21, Cisco Identity Services Engine (ISE) can be used for authentication purposes, in the place of earlier ACS server.
  • Cisco Configuration Engine—Security Manager supports the use of the Cisco Configuration Engine as a mechanism for deploying device configurations. Security Manager deploys the delta configuration file to the Cisco Configuration Engine, where it is stored for later retrieval from the device. The ASA devices that use a Dynamic Host Configuration Protocol (DHCP) server, contact the Cisco Configuration Engine for configuration (and image) updates. You can also use Security Manager with Configuration Engine to manage devices that have static IP addresses. When using static IP addresses, you can discover the device from the network and then deploy configurations through Configuration Engine. For information about the Configuration Engine releases you can use with Security Manager, see the release notes for this version of the product at http://www.cisco.com/c/en/us/support/security/security-manager/products-release-notes-list.html . For more information about the Configuration Engine, visit http://www.cisco.com/c/en/us/products/cloud-systems-management/configuration-engine/index.html .

Effect of Enabling Event Management

If you enable Event Management on your Security Manager server, you cannot use that server for the following services:

  • Syslog on CiscoWorks Common Services

During the installation or upgrade of Security Manager, the Common Services syslog service port is changed from 514 to 49514. Later, if Security Manager is uninstalled, the port is not reverted to 514. Additional information regarding ports is available in Table 3-1 and in Table A-1.

If the amount of RAM available to the operating system is insufficient, Event Viewer is disabled (see details in Table 3-3); however, the Common Services syslog service port is still changed.

1 Cisco Security Manager was using OpenSSL for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. Beginning with version 4.13, Cisco Security Manager replaced OpenSSL with CiscoSSL.