Cisco Cisco Content Security Management Appliance M160 사용자 가이드
2-11
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 2 Setup, Installation, and Basic Configuration
Note
The appliance requires access to a working DNS server to perform DNS lookups for incoming
connections. If you cannot specify a working DNS server that is reachable by the appliance while you
are setting up the appliance, you can select Use Internet Root DNS Servers, or else temporarily specify
the IP address of the Management interface so that you can complete the System Setup Wizard.
connections. If you cannot specify a working DNS server that is reachable by the appliance while you
are setting up the appliance, you can select Use Internet Root DNS Servers, or else temporarily specify
the IP address of the Management interface so that you can complete the System Setup Wizard.
Review Your Configuration
Now, the System Setup Wizard displays a summary of the setup information that you have entered. If
you need to make any changes, click Previous at the bottom of the page and edit the information.
you need to make any changes, click Previous at the bottom of the page and edit the information.
After you have reviewed the information, click Install This Configuration. Then click Install in the
confirmation dialog box that appears.
confirmation dialog box that appears.
Proceeding to the Next Steps
If the System Setup Wizard properly installs the configuration on the Security Management appliance,
the System Setup Next Steps page appears.
the System Setup Next Steps page appears.
Click on any of the links on the System Setup Next Steps page to proceed with the configuration of your
Cisco Content Security appliances.
Cisco Content Security appliances.
After you install the Security Management appliance and run the System Setup Wizard, you can modify
other settings on the appliance and configure the monitoring services.
other settings on the appliance and configure the monitoring services.
To simplify configuration and troubleshooting, we recommend that you follow the process outlined in
About Adding Managed Appliances
You will add managed Email and Web Security appliances to the Security Management appliance when
you configure the first centralized service for each appliance.
you configure the first centralized service for each appliance.
Supported Email and Web Security appliances are shown in the
.
When you add a remote appliance, the Security Management appliance compares the product name of
the remote appliance with the type of appliance you are adding. For example, you add an appliance using
the Add Web Security appliance page, the Security Management appliance checks the product name of
the remote appliance to make sure that it is a Web Security appliance and not an Email Security
appliance. The Security Management appliance will also check the monitoring services on the remote
appliances to make sure that they are correctly configured and compatible.
the remote appliance with the type of appliance you are adding. For example, you add an appliance using
the Add Web Security appliance page, the Security Management appliance checks the product name of
the remote appliance to make sure that it is a Web Security appliance and not an Email Security
appliance. The Security Management appliance will also check the monitoring services on the remote
appliances to make sure that they are correctly configured and compatible.
The Security Appliances page shows the managed appliances that you have added. The Connection
Established? column shows whether or not the connection for monitoring services is properly
configured.
Established? column shows whether or not the connection for monitoring services is properly
configured.
Instructions for adding managed appliances are included in the following procedures:
•
•
•