Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
A-2
Cisco IronPort AsyncOS 8.0 for Security Management User Guide
Appendix A IP Interfaces and Accessing the Appliance
Figure A-1
IP Interfaces Page
Configuring IP Interfaces
The Management Appliance > Network > IP Interfaces page (and
interfaceconfig
command) enables
you to add, edit, or delete IP interfaces.
Note
You cannot change the name or Ethernet port associated with the Management interface on the Security
Management appliance. Further, the Security Management appliance does not support all of the features
discussed below (Virtual Gateways, for example).
Management appliance. Further, the Security Management appliance does not support all of the features
discussed below (Virtual Gateways, for example).
The following information is required when you configure an IP interface:
Note
If you have completed the System Setup Wizard as described in
configured on the appliance.
Table A-2
IP Interface Components
Name
The nickname of the interface.
IP address
IP addresses within the same subnet cannot be configured on separate physical
Ethernet interfaces.
Ethernet interfaces.
Netmask (or
subnetmask)
subnetmask)
You can enter the netmask in standard dotted octet form (for example,
255.255.255.0) or hexadecimal form (for example, 0xffffff00). The default
netmask is 255.255.255.0, a common class C value.
255.255.255.0) or hexadecimal form (for example, 0xffffff00). The default
netmask is 255.255.255.0, a common class C value.
Broadcast address
AsyncOS automatically calculates the default broadcast address from the IP
address and the netmask.
address and the netmask.
Hostname
The hostname that is related to the interface. This hostname is used to identify the
server during the SMTP conversation. You are responsible for entering a valid
hostname associated with each IP address. The software does not check that DNS
correctly resolves the hostname to the matching IP address, or that reverse DNS
resolves to the given hostname.
server during the SMTP conversation. You are responsible for entering a valid
hostname associated with each IP address. The software does not check that DNS
correctly resolves the hostname to the matching IP address, or that reverse DNS
resolves to the given hostname.
Allowed services
FTP, SSH, Telnet, Cisco IronPort Spam Quarantine, HTTP, and HTTPS can be
enabled or disabled on the interface. You can configure the port for each service.
You can also specify the HTTP/HTTPS, port, and URL for the Cisco IronPort
Spam Quarantine.
enabled or disabled on the interface. You can configure the port for each service.
You can also specify the HTTP/HTTPS, port, and URL for the Cisco IronPort
Spam Quarantine.