Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 460
 
15-4
Cisco IronPort AsyncOS 7.6 for Email Configuration Guide
OL-25136-01
Chapter 15      System Administration
Figure 15-2
The Service Updates Page
Note
Regardless of which upgrade method you use, you should also consider saving your configuration via 
the 
saveconfig
 command after your upgrade is complete. For more information, see “Managing the 
Configuration File” in the Cisco IronPort AsyncOS for Email Daily Management Guide.
Upgrading Clustered Systems
If you are upgrading clustered machines, please see “Upgrading Machines in a Cluster” in the 
“Centralized Management” chapter of the Cisco IronPort AsyncOS for Email Advanced Configuration 
Guide
.
Streaming Upgrade Overview
In Streaming upgrades, your Cisco IronPort appliance connects directly to the Cisco IronPort update 
servers to find and download upgrades:
Figure 15-3
Streaming Update Method
Cisco IronPort Systems uses a distributed upgrade server architecture to make sure customers can 
quickly download AsyncOS upgrades wherever in the world they are located. Because of this distributed 
server architecture, the Cisco IronPort update servers use dynamic IP addresses. If you have strict 
firewall policies, you may need to configure a static location for AsyncOS upgrades. For more 
information, see 
You will need to create a firewall rule to allow downloading of upgrades from Cisco IronPort update 
servers on ports 80 and 443. If you have any existing firewall rules allowing download of legacy 
upgrades from 
upgrades.ironport.com
 on ports such as 22, 25, 80, 4766, they will need to be removed 
and/or replaced with revised firewall rules. For more information, see 
.
Configuring a Static Address for Streaming Upgrades
The McAfee Anti-Virus and Cisco IronPort AsyncOS update servers use dynamic IP addresses. If you 
have strict firewall policies, you may need to configure a static location for updates and AsyncOS 
upgrades. 
Your IronPort Appliance
IronPort Systems 
Update Servers
HTTP connection through firewall