Cisco Cisco Email Security Appliance C190 Guía Del Usuario
24-3
Cisco AsyncOS 9.5 for Email User Guide
Chapter 24 Encrypting Communication with Other MTAs
Working with Certificates
Deploying a Signed Certificate
Use a signed certificate when you cannot exchange self-signed certificates between the Email Security
appliance and the other machine, for example because that machine is not in your domain. Your
corporate security department may have other requirements.
appliance and the other machine, for example because that machine is not in your domain. Your
corporate security department may have other requirements.
Deploying Self-Signed Certificates
You can generally use self-signed certificates for communications between appliances that are behind
your corporate firewall. Your corporate security department may have other requirements.
your corporate firewall. Your corporate security department may have other requirements.
Do This
More Info
Step 1
If you are deploying in a cluster, follow
instructions.
instructions.
Step 2
Generate a self-signed certificate and
Certificate Signing Request (CSR).
Certificate Signing Request (CSR).
Step 3
Send the generated certificate to a
recognized Certificate Authority for
signing.
recognized Certificate Authority for
signing.
Step 4
Upload the signed certificate.
Step 5
Ensure that the certificate authority that
signed the certificate is on the list of
trusted authorities.
signed the certificate is on the list of
trusted authorities.
Step 6
If applicable, use an intermediate
certificate.
certificate.
Do This
More Info
Step 1
If you are deploying in a cluster,
follow instructions.
follow instructions.
Step 2
Generate a self-signed certificate
from the Email Security appliance.
from the Email Security appliance.
Step 3
Export the self-signed certificate.
Step 4
Import the self-signed certificate to
the machine with which the Email
Security appliance will
communicate.
the machine with which the Email
Security appliance will
communicate.
See the documentation for the other machine.
Step 5
Generate and export a self-signed
certificate from the other machine.
certificate from the other machine.
See the documentation for the other machine.
Step 6
Import the self-signed certificate
from the other machine into the
Email Security appliance.
from the other machine into the
Email Security appliance.
or
See the chapter in this guide for configuring communication with
that machine.
that machine.