cc/td/doc/product/webscale/css/css_sca
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A

access list   3-8, 5-3, C-6, C-80

configuration manager example   5-17
GUI example   6-13
ambient temperature   2-4

Apache mod_SSL   3-5

ApacheSSL   3-5

ARP   C-22

B

backend server

backend server configuration command set   C-120
configuration manager example   5-14, 5-15
configuring with GUI   6-31
browser support   6-2

C

cables

cable type   2-8
Category 5   2-8
caution

ACL and static route configuration   2-31
connecting Network and Server ports   2-8
factory default reset   3-8, 5-4, C-7
reloading the device   4-15, 6-16
unauthorized modifications   D-3
unsecured transmissions   C-124, C-163
certficate groups

importing   5-21
certificate

certificate configuration command set   C-130
configuration manager example   5-12
default   4-9
exporting   3-4
file formats   3-9
generating a certificate with the CLI   5-25
generating with GUI   6-39
GUI example   6-23
loading   4-8
naming conventions   3-4, 4-9, 5-12
QuickStart wizard   4-8
step-up   5-19
step-up and server-gated cryptography   3-10
using existing   3-4
See also certificate chain
certificate chain

configuration manager example   5-19
description   3-10, 5-19
GUI example   6-32
See also certificate
certificate group

certificate group configuration command set   C-134
importing with GUI   6-43, 6-44
Cisco Secure Content Accelerator

configuration commands   C-1
configuration manager   5-1
description   1-2
free-standing installation   2-4
front panel   2-5
grounding   2-4
installation   2-3
LED descriptions   2-6
mounting brackets   2-5
QuickStart wizard configuration   4-1
rack-mounted installation   2-5
rear panel   2-6
unpacking   2-3
website configuration   2-39
client authentication

certgroup clientauth command in server configuration command set   C-155
clientauth enable command in server configuration command set   C-156
clientauth error command in server configuration command set   C-157
clientauth verifydepth command in server configuration command set   C-158
configuring with CLI   5-24
GUI example   6-31
client IP accounting   2-23

completion features   C-3

configuration

QuickStart wizard   4-1
configuration manager

backend server configuration command set   C-120
certificate configuration command set   C-130
certificate group configuration command set   C-134
completion fexture   C-3
configuration command set   C-79
input data format   C-2
interface configuration command set   C-108
key association configuration command set   C-137
reverse-proxy server configuration command set   C-142
security policy configuration command set   C-150
server configuration command set   C-154
SNMP commands   C-93
SSL configuration command set   C-110
using   5-1
configuring

access list   5-17
access lists with GUI   6-13
adding a route with GUI   6-10
backend server   5-14, 5-15
backend server with GUI   6-31
certificate   4-8, 5-12
certificate chain   5-19
certificate chain with GUI   6-32
certificate with GUI   6-23
clear text and SSL ports   3-2
client authentication with GUI   6-31
client-side Web access   6-4
device name with GUI   6-6
enabling RIP with GUI   6-9
encrypted management sessions   5-16
Ethernet interface   5-18
Ethernet interface with GUI   6-8
generating a certificate   5-25
generating a key with CLI   5-25
group configuration command set   C-77
GUI   3-12, 6-1, C-7
importing a certificate group with GUI   6-43, 6-44
key   4-7, 5-11
key with GUI   6-21
management method comparison   3-12, C-7
non-privileged command set   C-14
other secure protocols   5-28, 6-34
password   4-11
privileged command set   C-58
QuickStart wizard   4-1
reloading with GUI   6-16
remote configuration manager   3-12, C-7
reverse-proxy server with GUI   6-31
RIP   5-27
secure server   5-11
secure server with GUI   6-21, 6-29
Secure Server wizard in GUI   6-45
security policy   4-10, 5-12, 5-14, 5-15
security policy with GUI   6-26
serial connection   3-12, C-7
setting an enable password with GUI   6-16
setting device IP address with GUI   6-7
setting syslog hosts with GUI   6-12
SNMP   5-26
SNMP with GUI   6-18
telnet connection   3-12, C-7
top level command set   C-14
See also example
configuring with CLI

client authentication   5-24
server authentication   5-22
cryptographic algorithm

table of   3-10
CSS, use with

examples   2-11
in-line   2-11
one-armed proxy   2-23
one-armed transparent   2-30
transparent sandwich   2-15

D

deployment examples

in-line   2-11
load balancing   2-10
one-armed proxy   2-23
one-armed transparent   2-30
single device   2-9
transparent sandwich   2-15
use with the CSS   2-11

E

encrypted management

configuration manager example   5-16
description   3-8, 5-4, C-7
Ethernet

configuration manager example   5-18
connecting   2-8
example (CLI)

configuring client authentication   5-24
configuring server authentication   5-22
example, configuration manager

access list   5-17
configuring an Ethernet interface   5-18
configuring a secure mail server   5-28
configuring encrypted management sessions   5-16
configuring RIP   5-27
configuring SNMP   5-26
enabling chained certificates   5-19
generating a certificate   5-25
generating a key   5-25
setting up a backend server   5-14, 5-15
setting up a secure server   5-11
setting up basic device parameters
example, GUI

adding a route   6-10
client authentication   6-31
configuring access lists   6-13
configuring a certificate   6-23
configuring a certificate chain   6-32
configuring a key   6-21
configuring an Ethernet interface   6-8
configuring a reverse-proxy server   6-31
configuring a secure server   6-29
configuring a security policy   6-26
configuring backend server   6-31
configuring other secure protocols   6-34
configuring secure server   6-21
configuring SNMP   6-18
enabling RIP   6-9
generating an RSA key   6-35
generting a certificate   6-39
importing a certificate group   6-43, 6-44
reloading the device   6-16
resetting the IP address   6-7
setting an enable password   6-16
setting syslog hosts   6-12
setting the device name   6-6

F

free-standing installation   2-4

front panel   2-5

G

gateway   4-11

graphical user interface (GUI)

description   3-12, C-7
group configuration command set   C-77

GUI

adding a route   6-10
browser support   6-2
configuring a certificate   6-23
configuring a certificate chain   6-32
configuring a key   6-21
configuring an Ethernet interface   6-8
configuring a reverse-proxy server   6-31
configuring a secure server   6-21, 6-29
configuring a security policy   6-26
configuring backend server   6-31
configuring client authentication   6-31
configuring client-side access   6-4
configuring device name   6-6
configuring other secure protocols   6-34
configuring SNMP   6-18
enabling RIP   6-9
enabling Web management   6-2
generating a certificate   6-39
generating an RSA key   6-35
importing a certificate group   6-43, 6-44
interface   6-5
reloading the device   6-16
resetting the IP address   6-7
restricing Web management   6-3
Secure Server wizard   6-45
setting an enable password   6-16
setting syslog hosts   6-12
starting   6-3
GUI (graphical user interface)

configuration with   6-1

I

IIS 4 on Windows NT   3-5

IIS 5   3-6

importing certificate groups   5-21

input data format   C-2

K

key

configuration manager example   5-11
default   4-8
exporting   3-4
file formats   3-9
generating a key with the CLI   5-25
generating with genrsa command   C-138
generating with GUI   6-35
GUI example   6-21
key association configuraiton command set   C-137
loading   4-7
naming conventions   3-4, 4-8, 5-12
QuickStart wizard   4-7
using existing   3-4

L

LED descriptions   2-6

Linux

remote configuration manager   4-3, 5-6, C-11
software   2-37
softwre   1-2

M

management session

initiating   4-2, 5-4, C-9
mounting brackets   2-5

N

network deployment

in-line   2-11
load balancing   2-10
one-armed transparent   2-30
single device   2-9
transparent sandwich   2-15
use with the CSS   2-11
non-privileged command set   C-14

O

on prefix   5-8, C-13

operating systems   1-2

P

password

access   3-7, 5-3, C-6
description   3-7, 5-3, C-6
enable   3-7, 5-3, 6-16, C-6
FailSafe   3-8, 5-4, C-7
setting with QuickStart wizard   4-11
PCKS7 file importing   5-21

platforms   1-2

port blocking   3-2

power cords

connecting   2-7
power supply

ensuring availability   2-7
LEDs   2-7
privileged command set   C-58

Q

QuickStart wizard

description   3-13, C-9
starting   4-4
using   4-1
using with configured appliance   4-15

R

rack-mounted installation   2-5

rear panel   2-6

remote configuration manager

caching   5-9, C-13
description   3-12, C-7
device groups   5-8, C-12
initiating a management session   4-3, 5-6, C-11
Linux   4-3, 5-6, C-11
on prefix   5-8, C-13
Solaris   4-3, 5-6, C-11
specifying devices   5-7, C-12
using   5-7, C-11
using the QuickStart wizard   4-5
Windows 2000   4-3, 5-6, C-11
Windows NT   4-3, 5-6, C-11
requirements

installation tools and equipment   2-2
site planning   2-2
resetting to factory defaults   3-8, 5-4, C-7

reverse-proxy server

configuring with GUI   6-31
reverse-proxy server configuration command set   C-142
RIP   5-27, C-37, C-92

S

secure management

See also encrypted management
secure server

configuration manager example   5-11
description   3-9
GUI example   6-21, 6-29
naming conventions   4-6
server configuration command set   C-154
Secure Server wizard   6-45

security policy

configuration manager example   5-12, 5-14, 5-15
cryptographic algorithms (table)   3-10
default   4-10
description   3-10
GUI example   6-26
naming conventions   5-13
QuickStart wizard   4-10
security policy configuration command set   C-150
serial connection

description   3-12, C-7
initiating a management session   4-2, 5-4, C-9
symbolic hostnames   3-12, C-8
terminal settings   4-2, 5-5, C-9
using the QuickStart wizard   4-4
server authentication

certgroup serverauth command in backend server configuration command set   C-120
certgroup serverauth command in reverse-proxy server configuration command set   C-142
configuring with CLI   5-22
serverauth enable command in backend server configuration command set   C-125
serverauth enable command in reverse-proxy configuration command set   C-146
serverauth ignore command in backend server configuration command set   C-125
serverauth ignore command in reverse-proxy server configuration command set   C-147
shipment contents   2-2

site requirements   2-2

SNMP

commands   C-72
configuration commands   C-93
configuration manager example   5-26
GUI example   6-18
MIB-II support   1-2
software

Linux   1-2, 2-37
Solaris   2-38
Windows 2000   1-2, 2-38
Windows NT   1-2, 2-38
Solaris

remote configuration manager   4-3, 5-6, C-11
software   2-38
specifications

electrical   A-2
environmental   A-2
physical   A-3
SSL

Cisco configuration components   3-9
GUI examples   6-21
introduction   3-2
versions supported   1-2
SSL commands   C-110

backend server configuraiton command set   C-120
certificate configuration command set   C-130
certificate group configuration command set   C-134
key association configuration command set   C-137
reverse-proxy server configuraition command set   C-142
security policy configuration command set   C-150
server configuration command set   C-154
SSL configuration command set   C-110

Stronghold   3-5

T

telnet connection

description   3-12, C-7
initiating a managment session   4-3, 5-6, C-10
symbolic hostnames   3-12, C-8
using the QuickStart wizard   4-4
terminal settings   4-2, 5-5, C-9

text conventions   xxix, C-2

tools for installation   2-2

top level command set   C-14

troubleshooting   B-2

W

warning

CISPR 22 (EN 55022) Class A   D-4
equipment rack stability   2-4
grounding   2-4
power systems   A-2
shock hazard   2-3, 2-4
site requirement   2-2
Web management

configuring client-side access   6-4
enabling   6-2
restricting access   6-3
See also GUI
website configuration   2-39

Windows 2000

IIS 5   3-6
remote configuration manager   4-3, 5-6, C-11
software   1-2, 2-38
Windows NT

IIS 4   3-5
remote configuration manager   4-3, 5-6, C-11
software   1-2, 2-38

hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Aug 19 21:54:57 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.