Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario

Descargar
Página de 446
 
14-18
AsyncOS 10.0 for Cisco Content Security Management Appliances User Guide
 
Chapter 14      Common Administrative Tasks
  Disaster Recovery on the Security Management Appliance
After this process is complete, SMA 2 becomes the primary Security Management appliance. All data 
from ESAs 1-3 and WSA 1 now goes to SMA 2, as shown in 
Step
Do This 
More Information 
Step 1
 If you are using Centralized Policy, Virus, 
and Outbreak Quarantines:
On each Email Security appliance, disable 
the centralized quarantines. 
See instructions for disabling Centralized 
Policy, Virus, and Outbreak Quarantines in 
the Email Security appliance documentation. 
This will create local quarantines on each 
Email Security appliance, which you will 
migrate later to the new Security 
Management appliance. 
Step 2
Load onto your backup Security 
Management appliance (SMA2) the 
configuration file that you saved from your 
primary Security Management appliance 
(SMA1). 
See 
Step 3
Recreate the IP address from the failed SMA 
1 to be the IP address on SMA 2
1.
On SMA 2 choose Network > IP 
Interfaces > Add IP Interfaces
2.
On the Add IP Interfaces page, enter all 
of the relevant IP Interface information 
from the failed SMA1 into the text fields 
to recreate the interface on SMA 2. 
For more information about Adding IP 
Interfaces, see 
Step 4
Submit and commit your changes. 
Step 5
Enable all applicable centralized services on 
the new Security Management appliance 
(SMA 2).
See 
Step 6
Add all appliances on to the new Security 
Management appliance (SMA 2).
Test to see that each appliance is enabled and 
working by establishing a connection to the 
appliances and testing the connections. 
See 
Step 7
If you are using Centralized Policy, Virus, 
and Outbreak Quarantines, configure 
quarantine migration on the new Security 
Management appliance, then enable and 
configure the migration on each applicable 
Email Security appliance. 
See 
Centralizing Policy, Virus, and Outbreak 
Quarantines, page 8-4
Step 8
If necessary, restore additional data. 
See