Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1094
 
29-18
Cisco AsyncOS 8.0.1 for Email User Guide
 
Chapter 29      System Administration
  Setting Up to Download Upgrades and Updates
Upgrading Clustered Systems
If you are upgrading clustered machines, please see 
Downloading Upgrades and Updates from the Cisco IronPort Servers
The Cisco appliance can connect directly to the Cisco update servers to find and download upgrades and 
updates:
Figure 29-1
Streaming Update Method
Cisco Systems uses a distributed server architecture to make sure customers can quickly download 
AsyncOS upgrades and service updates wherever in the world they are located. Because of this 
distributed server architecture, the Cisco update servers use dynamic IP addresses. If you have strict 
firewall policies, you may need to configure a static location instead. For more information, see 
Configuring Your Network for Downloads 
You will need to create a firewall rule to allow downloading of upgrades from Cisco update servers on 
ports 80 and 443. 
Configuring the Appliance to Receive Upgrades and Updates in Strict Firewall Environments
The Cisco IronPort upgrade and update servers use dynamic IP addresses. If you have strict firewall 
policies, you may need to configure a static location for updates and AsyncOS upgrades. 
Procedure 
Step 1
Contact Cisco Customer support to obtain the static URL address.
Step 2
Create a firewall rule to allow downloading of upgrades and updates from the static IP address on port 80.
Step 3
Choose Security Services > Service Updates
Step 4
Click Edit Update Settings.
Step 5
On the Edit Update Settings page, in the “Update Servers (images)” section, choose Local Update 
Servers and enter the static URL received in step 
 in the Base URL field for AsyncOS upgrades and 
McAfee Anti-Virus definitions. 
Step 6
Verify that IronPort Update Servers is selected for the “Update Servers (list)” section.
Step 7
Submit and commit your changes.
Your IronPort Appliance
IronPort Systems 
Update Servers
HTTP connection through firewall