Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1197
 
32-26
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
 
Chapter 32      Distributing Administrative Tasks
  Displaying Messages to Administrative Users
Displaying Messages to Administrative Users 
Displaying a Message Before Login 
You can configure the Email Security appliance to display a message before a user attempts to log into 
the appliance through SSH, FTP, or Web UI. The login banner is customizable text that appears above 
the login prompt. You can use the login banner to display internal security information or best practice 
instructions for the appliance. For example, you can create a simple note that saying that unauthorized 
use of the appliance is prohibited or a detailed warning concerning the organization’s right to review 
changes made by the user to the appliance. 
Use the 
adminaccessconfig > banner
 command in the CLI to create the login banner. The maximum 
length of the login banner is 2000 characters to fit 80x25 consoles. A login banner can be imported from 
a file in the
 /data/pub/configuration
 directory on the appliance. After creating the banner, commit 
your changes.
Displaying a Message After Login 
You can configure AsyncOS to display a welcome banner after a user successfully logs into the appliance 
through SSH, FTP, or Web UI. You can use the welcome banner to display internal security information 
or best practice instructions for the appliance. 
Use the 
adminaccessconfig
 > 
welcome
 command in CLI to create the welcome banner. The maximum 
length of the welcome banner is 1600 characters. 
You can import a welcome banner from a file in the 
/data/pub/configuration
 directory on your 
appliance. After creating the banner, commit your changes.
For more information, see CLI Reference Guide for AsyncOS for Cisco Email Security Appliances.
Managing Secure Shell (SSH) Keys
Use the 
sshconfig
 command to:
Add or delete secure shell (SSH) public User keys to the 
authorized_keys
 file of user accounts that 
have been configured on the system, including the admin account. This allows authentication to user 
accounts using SSH keys rather than password challenge. 
Edit the following SSH server configuration settings:
Public Key Authentication Algorithms
Cipher Algorithms
KEX Algorithms
MAC Methods
Minimum Server Key Size. 
Note
To configure Host keys, which are used when performing SCP pushes of log files from the Cisco 
appliance to other host machines, use 
logconfig -> hostkeyconfig
. For more information, see