Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 400
 
8-22
Cisco IronPort AsyncOS 7.6 for Email Advanced Configuration Guide
OL-25137-01
Chapter 8      Centralized Management
If you choose not to discard your changes, they are still intact (but uncommitted). You can review your 
changes against the current settings and decide how to proceed.
You can also use the 
clustercheck
 command at any time to verify that the cluster is operating correctly.
Interdependent Settings
In a centrally managed environment, some interdependent settings are configured in different modes. 
The flexibility of the configuration model allows you to configure settings at multiple modes, and the 
laws of inheritance govern which settings will be used on a per-machine basis. However, some settings 
have dependencies on other settings, and the availability of the dependent settings’ configuration is not 
limited to settings at the same mode. Thus, it is possible to configure a setting for one level that 
references a setting that is configured for a specific machine at a different level.
The most common example of an interdependent setting involves a select field on a page that pulls data 
from a different cluster section. For example, the following features can be configured in different 
modes:
  •
using LDAP queries
  •
using dictionaries or text resources
  •
using bounce or SMTP authentication profiles.
Within centralized management, there are restricted and non-restricted commands. (See 
.) Non-restricted commands are generally configuration commands that can be 
shared across the cluster. 
The 
listenerconfig
 command is an example of a command that can be configured for all machines in 
a cluster. Non-restricted commands represent commands that can be mirrored on all machines in a 
cluster, and do not require machine-specific data to be modified. 
Restricted commands, on the other hand, are commands that only apply to a specific mode. For example, 
users cannot be configured for specific machines — there must be only one user set across the whole 
cluster. (Otherwise, it would be impossible to login to remote machines with the same login.) Likewise, 
since the Mail Flow Monitor data, System Overview counters, and log files are only maintained on a 
per-machine basis, these commands and pages must be restricted to a machine. 
You will notice that while Scheduled Reports may be configured identically across the whole cluster, the 
viewing of reports is machine-specific. Therefore, within a single Scheduled Reports page in the GUI, 
configuration must be performed at the cluster mode, but viewing of reports must be done at the machine 
mode.
losangeles> clustercheck
Do you want to check the config consistency across all machines in the cluster? [Y]> y
Checking losangeles...
Checking newyork...
No inconsistencies found.