Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario

Descargar
Página de 416
 
2-12
AsyncOS 9.0 for Cisco Content Security Management Appliances User Guide
 
Chapter 2      Setup, Installation, and Basic Configuration
  About Adding Managed Appliances
After you install the Security Management appliance and run the System Setup Wizard, you can modify 
other settings on the appliance and configure the monitoring services. 
To simplify configuration and troubleshooting, we recommend that you follow the process outlined in 
About Adding Managed Appliances
You will add managed Email and Web Security appliances to the Security Management appliance when 
you configure the first centralized service for each appliance. 
Supported Email and Web Security appliances are shown in the 
When you add a remote appliance, the Security Management appliance compares the product name of 
the remote appliance with the type of appliance you are adding. For example, you add an appliance using 
the Add Web Security appliance page, the Security Management appliance checks the product name of 
the remote appliance to make sure that it is a Web Security appliance and not an Email Security 
appliance. The Security Management appliance will also check the monitoring services on the remote 
appliances to make sure that they are correctly configured and compatible. 
The Security Appliances page shows the managed appliances that you have added. The Connection 
Established? column shows whether or not the connection for monitoring services is properly 
configured. 
Instructions for adding managed appliances are included in the following procedures: 
 
 
Editing Managed Appliance Configurations
Procedure 
Step 1
On the Security Management appliance, choose Management Appliance > Centralized Services > 
Security Appliances
.
Step 2
In the Security Appliance section, click on the name of the appliance you want to edit.
Step 3
Make the necessary changes to the appliance configuration.
For example, select or clear check boxes for monitoring services, reconfigure file transfer access, or 
change the IP address.