Cisco Cisco Web Security Appliance S680 Guía Del Usuario
26-8
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 26 System Administration
Administering User Accounts
Figure 26-4
The Feature Key Settings Page
To add a new feature key manually, paste or type the key into the Feature Key field and click Submit
Key. An error message is displayed if the feature is not added (if the key is incorrect, etc.), otherwise the
feature key is added to the display.
Key. An error message is displayed if the feature is not added (if the key is incorrect, etc.), otherwise the
feature key is added to the display.
To activate a new feature key from the Pending Activation list, select the key (mark the “Select”
checkbox) and click Activate Selected Keys.
checkbox) and click Activate Selected Keys.
You can configure your appliance to automatically download and install new keys as they are issued. In
this case, the Pending Activation list will always be empty. You can tell AsyncOS to look for new keys
at any time by clicking the Check for New Keys button, even if you have disabled the automatic
checking via the Feature Key Settings page.
this case, the Pending Activation list will always be empty. You can tell AsyncOS to look for new keys
at any time by clicking the Check for New Keys button, even if you have disabled the automatic
checking via the Feature Key Settings page.
You can also use the
featurekeyconfig
CLI command to accomplish the same tasks as on the Feature
Key Settings page.
Expired Feature Keys
If the feature key for the feature you are trying to access (via the web interface) has expired, please
contact your Cisco representative or support organization.
contact your Cisco representative or support organization.
Administering User Accounts
The following types of users can log into the Web Security appliance to manage the appliance:
•
Local users. You can define users locally on the appliance itself. For more information, see
•
Users defined in an external system. You can configure the appliance to connect to an external
RADIUS server to authenticate users logging into the appliance. For information, see
RADIUS server to authenticate users logging into the appliance. For information, see
You can manage local users and connections to external authentication servers using the System
Administration > Users page in the web interface, or the
Administration > Users page in the web interface, or the
userconfig
command in the CLI.
shows where you manage local users and external authentication.
Figure 26-5
System Administration > Users Page