Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1224
 
24-3
Cisco AsyncOS 9.5 for Email User Guide
 
Chapter 24      Encrypting Communication with Other MTAs
  Working with Certificates
Deploying a Signed Certificate 
Use a signed certificate when you cannot exchange self-signed certificates between the Email Security 
appliance and the other machine, for example because that machine is not in your domain. Your 
corporate security department may have other requirements. 
Deploying Self-Signed Certificates 
You can generally use self-signed certificates for communications between appliances that are behind 
your corporate firewall. Your corporate security department may have other requirements. 
Do This 
More Info 
Step 1
If you are deploying in a cluster, follow 
instructions. 
Step 2
Generate a self-signed certificate and 
Certificate Signing Request (CSR). 
Step 3
Send the generated certificate to a 
recognized Certificate Authority for 
signing. 
Step 4
Upload the signed certificate. 
Step 5
Ensure that the certificate authority that 
signed the certificate is on the list of 
trusted authorities. 
Step 6
If applicable, use an intermediate 
certificate. 
Do This
More Info 
Step 1
If you are deploying in a cluster, 
follow instructions. 
Step 2
Generate a self-signed certificate 
from the Email Security appliance. 
Step 3
Export the self-signed certificate. 
Step 4
Import the self-signed certificate to 
the machine with which the Email 
Security appliance will 
communicate. 
See the documentation for the other machine. 
Step 5
Generate and export a self-signed 
certificate from the other machine. 
See the documentation for the other machine. 
Step 6
Import the self-signed certificate 
from the other machine into the 
Email Security appliance. 
or 
See the chapter in this guide for configuring communication with 
that machine.