Network Router User Manual
Table Of Contents
- Router Platform User Interface Reference
- NAT Policy Page
- Router Interfaces Page
- Advanced Interface Settings Page
- AIM-IPS Interface Settings Page
- Dialer Policy Page
- ADSL Policy Page
- SHDSL Policy Page
- PVC Policy Page
- PPP/MLP Policy Page
- AAA Policy Page
- Accounts and Credential s Policy Page
- Bridging Policy Page
- Clock Policy Page
- CPU Policy Page
- HTTP Policy Page
- Console Policy Page
- VTY Policy Page
- Secure Shell Policy Page
- SNMP Policy Page
- DNS Policy Page
- Hostname Policy Page
- Memory Policy Page
- Secure Device Provisioning Policy Page
- DHCP Policy Page
- NTP Policy Page
- 802.1x Policy Page
- Network Admission Control Policy Page
- Logging Setup Policy Page
- Syslog Servers Policy Page
- Quality of Service Policy Page
- BGP Routing Policy Page
- EIGRP Routing Policy Page
- OSPF Interface Policy Page
- OSPF Process Policy Page
- RIP Routing Policy Page
- Static Routing Policy Page

Appendix K Router Platform User Interface Reference
Secure Device Provisioning Policy Page
K-166
User Guide for Cisco Security Manager 3.2
OL-16066-01
Bootstrap
Configuration
The source of the bootstrap configuration to provide to the petitioner for
first-time configuration:
• Non-Security Manager URL—Used when the bootstrap configuration is
located externally to Security Manager. Enter its location in the URL
field.
If required, enter a username and password to access the server containing
the bootstrap configuration.
• Security Manager URL—Used when Security Manager is providing the
bootstrap configuration. Enter information in the following fields:
–
FlexConfig—The FlexConfig that contains the basic CLI structure
required to create the bootstrap configuration. Enter the name of a
FlexConfig object, or click Select to display a selector.
After selecting the FlexConfig, you must enter a username and
password to access the Security Manager server that contains the
FlexConfig.
–
Device name formula—The formula required by Security Manager
to determine the device name of the petitioner from the username
that the introducer supplied.
Typically a fixed relationship exists between the username and the
device name, which enables a formula like this to be established.
The default formula is $n, which uses the introducer name to
determine the device name. The device name is required to
determine the configuration file that the petitioner should receive.
If required, enter a username and password to access the server
containing the bootstrap configuration. The password can contain
alphanumeric characters, but cannot consist of a single digit.
Save button Saves your changes to the Security Manager server but keeps them private.
Note To publish your changes, click the Submit button on the toolbar.
Table K-73 Secure Device Provisioning Page (Continued)










