cc/td/doc/product/webscale/css/css_sca
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A

access list   4-4, C-7, C-88, E-8

configuration manager example   4-22
GUI example   5-13
ambient temperature   2-4

Apache mod_SSL   E-5

ApacheSSL   E-5

ARP   C-23

B

backend server

backend server configuration command set   C-130
configuration manager example   4-15, 4-16
configuring with GUI   5-32
browser support   5-2

C

cables

cable type   2-9
Category 5   2-9
caution

ACL and static route configuration   B-24
connecting Network and Server ports   2-9
factory default reset   4-4, C-7, E-8
FailSafe password   6-5
reloading the device   3-16, 5-16
unauthorized modifications   17
unsecured transmissions   C-134, C-177
use of keys and certificates   6-2
certficate groups

importing   4-26
certificate

certificate configuration command set   C-141
configuration manager example   4-13
default   3-10
exporting   E-4
file formats   E-9
generating a certificate with the CLI   4-30
generating with GUI   5-40
GUI example   5-23
loading   3-9
naming conventions   3-10, 4-13, E-4
QuickStart wizard   3-9
step-up   4-23
step-up and server-gated cryptography   E-10
using existing   E-4
See also certificate chain
certificate chain

configuration manager example   4-24
description   4-24, E-10
GUI example   5-32
See also certificate
certificate group

certificate group configuration command set   C-145
importing with GUI   5-44, 5-45
Cisco Secure Content Accelerator

configuration commands   C-1
configuration manager   4-1
description   1-2
free-standing installation   2-4
front panel   2-5
grounding   2-4
installation   2-3
LED descriptions   2-6
mounting brackets   2-5
QuickStart wizard configuration   3-1
rack-mounted installation   2-5
rear panel   2-6
unpacking   2-3
website configuration   B-31
client authentication

certgroup clientauth command in server configuration command set   C-168
clientauth enable command in server configuration command set   C-169
clientauth error command in server configuration command set   C-170
clientauth verifydepth command in server configuration command set   C-171
configuring with CLI   4-29
GUI example   5-31
client IP accounting   B-16

completion features   C-3

configuration

QuickStart wizard   3-1
configuration manager

backend server configuration command set   C-130
certificate configuration command set   C-141
certificate group configuration command set   C-145
completion fexture   C-3
configuration command set   C-87
input data format   C-2
interface configuration command set   C-118
key association configuration command set   C-148
reverse-proxy server configuration command set   C-153
security policy configuration command set   C-161
server configuration command set   C-167
SNMP commands   C-102
SSL configuration command set   C-120
using   4-1
configuring

access list   4-22
access lists with GUI   5-13
adding a route with GUI   5-10
backend server   4-15, 4-16
backend server with GUI   5-32
certificate   3-9, 4-13
certificate chain   4-24
certificate chain with GUI   5-32
certificate with GUI   5-23
clear text and SSL ports   E-2
client authentication with GUI   5-31
client-side Web access   5-4
device name with GUI   5-6
enabling RIP with GUI   5-9
encrypted management sessions   4-20
Ethernet interface   4-23
Ethernet interface with GUI   5-8
generating a certificate   4-30
generating a key with CLI   4-30
group configuration command set   C-85
GUI   5-1, 6-1, C-8, E-12
importing a certificate group with GUI   5-44, 5-45
key   3-8, 4-13
key with GUI   5-21
management method comparison   C-8, E-12
non-privileged command set   C-15
other secure protocols   4-32, 5-35
password   3-12
privileged command set   C-63
QuickStart wizard   3-1
reloading with GUI   5-16
remote configuration manager   C-8, E-12
reverse-proxy server with GUI   5-32
RIP   4-32
secure server   4-12
secure server with GUI   5-21, 5-29
Secure Server wizard in GUI   5-46
security policy   3-11, 4-14, 4-15, 4-16
security policy with GUI   5-26
serial connection   C-8, E-12
setting an enable password with GUI   5-16
setting device IP address with GUI   5-7
setting syslog hosts with GUI   5-12
SNMP   4-31
SNMP with GUI   5-18
SNTP servers   4-19
telnet connection   C-8, E-12
top level command set   C-15
URL rewrite   4-17
See also example
configuring with CLI

client authentication   4-29
server authentication   4-27
cryptographic algorithm

table of   E-10
CSS, use with

examples   B-3
in-line   B-4
one-armed proxy   B-16
one-armed transparent   B-22
transparent sandwich   B-8

D

deployment examples

in-line   B-4
load balancing   B-2
one-armed proxy   B-16
one-armed transparent   B-22
single device   B-2
transparent sandwich   B-8
use with the CSS   B-3

E

encrypted management

configuration manager example   4-20
description   4-4, C-7, E-8
Ethernet

configuration manager example   4-23
connecting   2-9
example (CLI)

configuring client authentication   4-29
configuring server authentication   4-27
example, configuration manager

access list   4-22
configuring an Ethernet interface   4-23
configuring a secure mail server   4-33
configuring encrypted management sessions   4-20
configuring RIP   4-32
configuring SNMP   4-31
configuring SNTP servers   4-19
configuring URL rewrite   4-17
enabling chained certificates   4-24
generating a certificate   4-30
generating a key   4-30
setting up a backend server   4-15, 4-16
setting up a secure server   4-12
setting up basic device parameters
example, GUI

adding a route   5-10
client authentication   5-31
configuring access lists   5-13
configuring a certificate   5-23
configuring a certificate chain   5-32
configuring a key   5-21
configuring an Ethernet interface   5-8
configuring a reverse-proxy server   5-32
configuring a secure server   5-29
configuring a security policy   5-26
configuring backend server   5-32
configuring other secure protocols   5-35
configuring secure server   5-21
configuring SNMP   5-18
enabling RIP   5-9
generating an RSA key   5-36
generting a certificate   5-40
importing a certificate group   5-44, 5-45
reloading the device   5-16
resetting the IP address   5-7
setting an enable password   5-16
setting syslog hosts   5-12
setting the device name   5-6

F

FIPS Mode

configuring and using   6-1
fips enable command   C-74
product overview   1-2
free-standing installation   2-4

front panel   2-5

G

gateway   3-12

graphical user interface (GUI)

description   C-8, E-12
group configuration command set   C-85

GUI

adding a route   5-10
browser support   5-2
configuring a certificate   5-23
configuring a certificate chain   5-32
configuring a key   5-21
configuring an Ethernet interface   5-8
configuring a reverse-proxy server   5-32
configuring a secure server   5-21, 5-29
configuring a security policy   5-26
configuring backend server   5-32
configuring client authentication   5-31
configuring client-side access   5-4
configuring device name   5-6
configuring other secure protocols   5-35
configuring SNMP   5-18
enabling RIP   5-9
enabling Web management   5-2
generating a certificate   5-40
generating an RSA key   5-36
importing a certificate group   5-44, 5-45
interface   5-5
reloading the device   5-16
resetting the IP address   5-7
restricing Web management   5-3
Secure Server wizard   5-46
setting an enable password   5-16
setting syslog hosts   5-12
starting   5-3
GUI (graphical user interface)

configuration with   5-1

I

IIS 4 on Windows NT   E-5

IIS 5   E-6

importing certificate groups   4-26

input data format   C-2

K

key

configuration manager example   4-13
default   3-9
exporting   E-4
file formats   E-9
generating a key with the CLI   4-30
generating with genrsa command   C-149
generating with GUI   5-36
GUI example   5-21
key association configuraiton command set   C-148
loading   3-8
naming conventions   3-9, 4-13, E-4
QuickStart wizard   3-8
using existing   E-4

L

LED descriptions   2-6

Linux

remote configuration manager   3-4, 4-7, C-11
software   2-10
softwre   1-4

M

management session

initiating   3-2, 4-5, C-10
mounting brackets   2-5

N

network deployment

in-line   B-4
load balancing   B-2
one-armed transparent   B-22
single device   B-2
transparent sandwich   B-8
use with the CSS   B-3
non-privileged command set   C-15

O

on prefix   4-9, C-13

operating systems   1-4

P

password

access   4-3, C-6, E-7
description   4-3, C-6, E-7
enable   4-3, 5-16, C-6, E-7
FailSafe   4-4, C-7, E-8
setting with QuickStart wizard   3-12
PCKS7 file importing   4-26

platforms   1-4

port blocking   E-2

power cords

connecting   2-7
power supply

ensuring availability   2-8
LEDs   2-7
privileged command set   C-63

Q

QuickStart wizard

description   C-9, E-13
starting   3-5
using   3-1
using with configured appliance   3-16

R

rack-mounted installation   2-5

rear panel   2-6

remote configuration manager

caching   4-10, C-14
description   C-8, E-12
device groups   4-9, C-13
initiating a management session   3-4, 4-7, C-11
Linux   3-4, 4-7, C-11
on prefix   4-9, C-13
Solaris   3-4, 4-7, C-11
specifying devices   4-8, C-12
using   4-8, C-12
using the QuickStart wizard   3-6
Windows 2000   3-4, 4-7, C-12
Windows NT   3-4, 4-7, C-12
requirements

installation tools and equipment   2-2
site planning   2-2
resetting to factory defaults   4-4, C-7, E-8

reverse-proxy server

configuring with GUI   5-32
reverse-proxy server configuration command set   C-153
RIP   4-32, C-38, C-101

S

secure management

See also encrypted management
secure server

configuration manager example   4-12
description   E-9
GUI example   5-21, 5-29
naming conventions   3-7
server configuration command set   C-167
Secure Server wizard   5-46

secure URL rewrite

product overview   1-2
security policy

configuration manager example   4-14, 4-15, 4-16
cryptographic algorithms (table)   E-10
default   3-11
description   E-10
GUI example   5-26
naming conventions   4-14
QuickStart wizard   3-11
security policy configuration command set   C-161
serial connection

description   C-8, E-12
initiating a management session   3-2, 4-5, C-10
symbolic hostnames   C-9, E-12
terminal settings   3-3, 4-6, C-10
using the QuickStart wizard   3-5
server authentication

certgroup serverauth command in backend server configuration command set   C-130
certgroup serverauth command in reverse-proxy server configuration command set   C-153
configuring with CLI   4-27
serverauth enable command in backend server configuration command set   C-135
serverauth enable command in reverse-proxy configuration command set   C-157
serverauth ignore command in backend server configuration command set   C-136
serverauth ignore command in reverse-proxy server configuration command set   C-158
shipment contents   2-2

site requirements   2-2

SNMP

commands   C-79
configuration commands   C-102
configuration manager example   4-31
GUI example   5-18
MIB-II support   1-2
SNTP

product overview   1-2
SNTP servers

configuration manager example   4-19
software

Linux   1-4, 2-10
Solaris   2-10
Windows 2000   1-4, 2-11
Windows NT   1-4, 2-11
Solaris

remote configuration manager   3-4, 4-7, C-11
software   2-10
specifications

electrical   A-2
environmental   A-2
physical   A-3
SSL

Cisco configuration components   E-9
GUI examples   5-21
introduction   E-2
versions supported   1-3
SSL commands   C-120

backend server configuraiton command set   C-130
certificate configuration command set   C-141
certificate group configuration command set   C-145
key association configuration command set   C-148
reverse-proxy server configuraition command set   C-153
security policy configuration command set   C-161
server configuration command set   C-167
SSL configuration command set   C-120

Stronghold   E-5

T

telnet connection

description   C-8, E-12
initiating a managment session   3-3, 4-7, C-11
symbolic hostnames   C-9, E-12
using the QuickStart wizard   3-5
terminal settings   3-3, 4-6, C-10

text conventions   xxxiii, C-2

tools for installation   2-2

top level command set   C-15

troubleshooting   D-2

U

URL rewrite

configuration manager example   4-17

W

warning

CISPR 22 (EN 55022) Class A   18
equipment rack stability   2-5
grounding   2-4
power systems   A-2
shock hazard   2-3, 2-4
site requirement   2-2
Web management

configuring client-side access   5-4
enabling   5-2
restricting access   5-3
See also GUI
website configuration   B-31

Windows 2000

IIS 5   E-6
remote configuration manager   3-4, 4-7, C-12
software   1-4, 2-11
Windows NT

IIS 4   E-5
remote configuration manager   3-4, 4-7, C-12
software   1-4, 2-11

hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Aug 21 02:08:04 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.