Cisco Cisco TelePresence MX700 Manuale Di Manutenzione

Pagina di 115
D14850.08 MX200 and MX300 Administrator Guide TC7.0, DECEMBER 2013.  
www.cisco.com — Copyright © 2011–2013 Cisco Systems, Inc. All rights reserved. 
38
Cisco TelePresence MX200 and MX300  
Administrator Guide
Navigate to: Configuration > Security: CAs tab  /  Configuration > System Configuration
i
ii
iii
Adding audit certificates
Audit logging records all sign in activity and configuration 
changes on your video system.
Audit logging is disabled by default, but you can enable it 
using the 
Security > Audit > Logging > Mode
 setting on the 
web interface.
In ExternalSecure audit logging mode the video system 
sends encrypted audit logs to an external audit server 
(syslog server), which identity must be verified by a signed 
certificate.
To be able to verify the signature of the audit server 
certificates, a list of trusted audit certificate authorities (CAs) 
must reside on the video system. 
If the audit server cannot be authenticated, the logs will not 
be sent.
Always upload the audit certificate list before enabling 
secure audit logging.
1. Upload a list of audit server certificates
The entries in a new file with CA 
certificates will overwrite the existing 
list, that is, any previously stored audit 
certificates will be lost when you add a 
new file. 
i.  Click 
Browse...
 and find the file containing the 
list of audit CA certificates (.PEM format) on 
your computer.
ii.  Click 
Add audit certificate 
to store the 
certificate(s) on your system.
Contact your system administrator to 
obtain the Audit CA list (file format: .PEM).
2. Enable secure audit 
logging
i.  Go to the 
System 
Configuration 
page and  
choose the 
Security
 
category.
ii.  Enter the 
Address
 of 
the audit server. If 
you choose 
Manual 
PortAssignment,
 you 
must also enter a 
Port
 
number for the audit 
server. Click 
Save
 for the 
changes to take effect.
iii.  Choose 
ExternalSecure 
from the 
Logging Mode
 
drop-down list. Click 
Save
 for the change to 
take effect.
Contents
Introduction
System settings
Setting passwords
Appendices
Web interface
Web interface