Cisco Cisco Content Security Management Appliance M160 Guida Utente

Pagina di 418
 
15-28
AsyncOS 9.1 for Cisco Content Security Management Appliances User Guide
 
Chapter 15      Logging
  Log Subscriptions
Example
In the following example, the commands scan for host keys and add them for the host:
mail3.example.com> logconfig
Currently configured logs:
list of logs ]
Choose the operation you want to perform:
- NEW - Create a new log.
- EDIT - Modify a log subscription.
- DELETE - Remove a log subscription.
- SETUP - General settings.
- LOGHEADERS - Configure headers to log.
- HOSTKEYCONFIG - Configure SSH host keys.
[]> hostkeyconfig
Currently installed host keys:
1. mail3.example.com ssh-dss [ key displayed ]
Choose the operation you want to perform:
- NEW - Add a new key.
- EDIT - Modify a key.
- DELETE - Remove a key.
- SCAN - Automatically download a host key.
- PRINT - Display a key.
- HOST - Display system host keys.
- FINGERPRINT - Display system host key fingerprints.
- USER - Display system user keys.
[]> scan
Please enter the host or IP address to lookup.
[]> mail3.example.com
Choose the ssh protocol type:
1. SSH2:rsa
2. SSH2:dsa
3. All
[3]>
SSH2:dsa
mail3.example.com ssh-dss 
key displayed ]
SSH2:rsa
mail3.example.com ssh-rsa
key displayed ]
Print
Display a key.
Host
Display system host keys. This is the value to place in the remote system's 
“known_hosts” file.
Fingerprint
Display system host key fingerprints.
User
Display the public key of the system account that pushes the logs to the remote 
machine. This is the same key that appears when setting up an SCP push subscription. 
This is the value to place in the remote system's “authorized_keys” file. 
Table 15-24
Managing Host Keys - List of Subcommands
Command
Description