Getting Started

[ LiB ]  

In this section, we go through the login details for Security Monitor via CiscoWorks and see how authorization roles in CiscoWorks allow for delegation of tasks .

You need to log in to the CiscoWorks server desktop to access the Security Monitor. Launch a browser and enter the IP address of the CiscoWorks server with a port number of 1741. If you're logging into the machine where CiscoWorks is installed, enter http://127.0.0.1:1741 in the browser address field. Enter the default username and password of admin and admin , respectively.

graphics/alert_icon.gif

The default username/password combination for logging into CiscoWorks at http://127.0.0.1:1741 is admin, admin .


CiscoWorks User Authorization Roles

The user authentication roles within CiscoWorks allow you to delegate different responsibilities to your junior administrators who log in to the Security Monitor. Security Monitor uses the following user authorization roles:

  • Help Desk Read-only for the entire system

  • Approver Read-only for the entire system

  • Network Operator Generates reports ; read-only for all other system functions

  • Network Administrator Configures devices and modifies reports and rules

  • Systems Administrator Performs all functions

graphics/note_icon.gif

Users can be assigned multiple authorization roles, and the user is allowed to perform the sum of the functions of each role.


CiscoWorks Add User

The steps to add a user to CiscoWorks should look familiar because they are the same steps as those described for the IDS MC in Chapter 14, "Enterprise IDS Management with the Cisco IDS Management Center for VMS." Those steps are as follows :

  1. After logging into the CiscoWorks server desktop, navigate to Server Configuration, Setup, Security, Add Users.

  2. At the Add Users page, enter values for the settings listed and described in Table 15.3.

    Table 15.3. CiscoWorks Add User Settings

    Setting

    Description

    User name

    Username for new user

    Local password

    Password for new user

    Confirm password

    Password confirmation

    Email

    Email address of the new user

    CCO login

    The new user's Cisco Connection Online (CCO) Login

    CCO password

    The new user's CCO password

    Confirm password

    CCO password confirmation

    Proxy login

    The new user's proxy login name, if you use a proxy server on your network

    Proxy password

    The new user's proxy password, if you use a proxy Web server on your network

    Confirm password

    Proxy password confirmation


  3. Check the check boxes for the roles that your new user will fulfill, and click the Add button to add the new user.

Launching Security Monitor

Now that you've added some users through CiscoWorks, you will want to launch the Security Monitor application. At the far left side of the CiscoWorks screen is a drawer for the VPN/Security Management Solution. Click on this drawer to expand the set of folders, as shown in Figure 15.2.

Figure 15.2. Launching Security Monitor from CiscoWorks.

graphics/15fig02.jpg


After you click Security Monitor within the Monitoring Center folder, a security alert prompts you to accept the certificate. Click Yes to accept the certificate and launch the Security Monitor in a new browser window.

Understanding the Security Monitor Interface

As mentioned earlier, the Security Monitor has four tab sheetsDevices, Monitor, Reports, and Administration (Admin). Figure 15.3 shows the other features of the Security Monitor interface.

Figure 15.3. Navigating the Security Monitor interface.

graphics/15fig03.jpg


You can see from Figure 15.3 that the interface very much resembles that of the IDS MC. Although the tab sheets in the IDS MC are Devices, Configuration, Deployment, Reports, and Admin, Security Monitor replaces the Configuration and Deployment tab sheets with the Monitor tab sheet.

Again, each of the four tab sheets has options within them, as displayed on the option bar beneath the tab sheet label. Then, within each option, you have a list of choices in the TOC list on the left side of the page. As you would expect, the TOC list depends on the tab and option that you have navigated to; this path appears in the path bar.

The remaining features are the same as those in IDS MC, so we do not go through them again here; refer to Chapter 14 to review the interface features.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net