Managing IOS Devices with Security Cloud Control
Cisco Security Cloud Control (formerly Cisco Defense Orchestrator) allows you to manage Cisco IOS devices. These are the features we support for those devices:
-
Onboard Security Cloud Control Integrations . You can use the username and password of a highly privileged user stored on the IOS device to onboard the device.
-
View a Device's Configuration File. You can view the device configuration file.
-
Read Changes from Cisco IOS or SSH to Security Cloud Control. When you check for changes in the configuration file from the Cisco IOS device, it will be saved in Security Cloud Control's database.
-
Out-of-Band Changes on Devices. When you enable Conflict Detection, Security Cloud Control checks the device every 10 minutes for changes to the device's configuration. If there is a change, the device's status will change to Conflict Detected and you will be able to resolve the conflict.
-
Security Cloud Control Command Line Interface. You can issue all IOS commands to the device through Security Cloud Control's command line interface.
-
Individual CLI commands and groups of commands can be turned into editable and reusable "macros." You can use the system-defined macros provided by Security Cloud Control and create your own macros for tasks you perform often.
-
Detect and manage SSH fingerprint changes. If any credentials or properties of the device change, and that causes a change to the SSH fingerprint, Security Cloud Control detects that change and gives you a chance to review and accept the new fingerprint.
-
Manage Change Logs in Security Cloud Control. The change log captures all the commands you issue to the IOS device.