Cisco Cisco Content Security Management Appliance M1070 Guida Utente
14-45
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 14 Common Administrative Tasks
•
Reset Configuration: used to reset the current configuration back to the factory defaults (you
should save your configuration prior to resetting it)
should save your configuration prior to resetting it)
Related Topics
•
Saving and Exporting the Current Configuration File
Using the Current Configuration section of the Management Appliance > System Administration >
Configuration File page, you can save the current configuration file to your local machine, save it on the
appliance (placed in the
Configuration File page, you can save the current configuration file to your local machine, save it on the
appliance (placed in the
configuration
directory in the FTP/SCP root), or email it to the address
specified.
Masking the password
Optionally, mask the user’s passwords by selecting the check box. Masking a password causes the
original, encrypted password to be replaced with “*****” in the exported or saved file.
original, encrypted password to be replaced with “*****” in the exported or saved file.
Note
Configuration files with masked passwords cannot be loaded back into AsyncOS.
Loading a Configuration File
The configuration file must have been saved from an appliance running the same AsyncOS version as
the appliance on which you will load the configuration.
the appliance on which you will load the configuration.
Use the Load Configuration section of the Management Appliance > System Administration >
Configuration File page to load new configuration information into the appliance. You can load
information using one of three methods:
Configuration File page to load new configuration information into the appliance. You can load
information using one of three methods:
•
Placing information in the
configuration
directory and uploading it
•
Uploading the configuration file directly from your local machine
•
Pasting configuration information directly into the GUI
Configuration files with masked passwords cannot be loaded.
Regardless of the method, you must include the following tags at the top of your configuration:
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE config SYSTEM "config.dtd">
<config>
... your configuration information in valid XML
</config>
The closing
</config>
tag should follow your configuration information. The values in XML syntax are
parsed and validated against the DTD located in the
configuration
directory on your Cisco Content
Security appliance. The DTD file is named
config.dtd
. If validation errors are reported at the command
line when you use the
loadconfig
command, the changes are not loaded. You can download the DTD to
validate configuration files outside of the appliance before uploading them.
In either method, you can import an entire configuration file (the information defined between the
highest level tags:
highest level tags:
<config></config>
), or a complete and unique subsection of the configuration file,
as long as it contains the declaration tags (above) and is contained within the
<config></config>
tags.
“Complete” means that the entire start and end tags for a given subsection as defined by the DTD are
included. For example, uploading or pasting the following code causes validation errors:
included. For example, uploading or pasting the following code causes validation errors: