Cisco Cisco Content Security Management Appliance M390 Guida Utente
Chapter 12 Logging
12-48
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
The
hostkeyconfig
subcommand performs the following functions:
In the following example, the commands scan for host keys and add them for the
host:
host:
Table 12-24
Managing Host Keys - List of Subcommands
Command
Description
New
Add a new key.
Edit
Modify an existing key.
Delete
Delete an existing key.
Scan
Automatically download a host key.
Print
Display a key.
Host
Display system host keys. This is the value to place in the remote
system's “known_hosts” file.
system's “known_hosts” file.
Fingerprint
Display system host key fingerprints.
User
Display the public key of the system account that pushes the logs
to the remote machine. This is the same key that appears when
setting up an SCP push subscription. This is the value to place in
the remote system's “authorized_keys” file.
to the remote machine. This is the same key that appears when
setting up an SCP push subscription. This is the value to place in
the remote system's “authorized_keys” file.
mail3.example.com> logconfig
Currently configured logs:
[
list of logs
]
Choose the operation you want to perform:
- NEW - Create a new log.
- EDIT - Modify a log subscription.
- DELETE - Remove a log subscription.