Cisco Cisco Email Security Appliance C160 Betriebsanweisung
19-13
Cisco AsyncOS 9.0 for Email User Guide
Chapter 19 S/MIME Security Services
Verifying, Decrypting, or Decrypting and Verifying Incoming Messages using S/MIME
Step 6
Click Next to view the certificate’s information.
Step 7
Enter a name for the certificate.
Step 8
Submit and commit your changes.
Setting Up Public Keys for Verifying Incoming Signed Messages
You must add the public key of the sender’s S/MIME certificate to verify signed messages. Use the Mail
Policies > Public Keys page to add or import public keys. See
Policies > Public Keys page to add or import public keys. See
and
.
Adding a Public Key for S/MIME Verification
Before You Begin
•
Make sure that the S/MIME certificate meets the requirements described in RFC 5750:
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 - Certificate Handling.
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 - Certificate Handling.
•
Make sure that the public key is in PEM format.
Procedure
Step 1
Click Mail Policies > Public Keys.
Step 2
Click Add Public Key.
Step 3
Enter the name of the public key.
Step 4
Enter the public key in PEM format.
Step 5
Submit and commit your changes.
Importing a Public Key for S/MIME Verification
You can import S/MIME certificates from the
/configuration
directory of your appliance.
Before You Begin
•
Make sure that the S/MIME certificate meets the requirements described in RFC 5750:
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 - Certificate Handling.
Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 - Certificate Handling.
•
Make sure that the public key is available in the
/configuration
directory of the appliance.
Procedure
Step 1
Click Mail Policies > Public Keys.
Step 2
Click Import Public Keys.
Step 3
Select the public key and click Submit.