Cisco Cisco Content Security Management Appliance M160 Guia Do Utilizador
14-42
AsyncOS 10.0 for Cisco Content Security Management Appliances User Guide
Chapter 14 Common Administrative Tasks
Specifying a Secure Communication Protocol
Step 3
Submit and commit your changes.
Configuring the Default Gateway
You can configure the default gateway via the GUI through the Management Appliance > Network >
Routing page (see
Routing page (see
) or via the
setgateway
command
in the CLI.
Specifying a Secure Communication Protocol
•
SSL v3 is not secure and you should not use it.
•
You can choose the communication protocol to be used for each of the following:
–
Updater server
–
End-user access to the spam quarantine
–
Web-based administrative interface to the appliance
–
LDAPS
•
To view the currently selected protocols and available options, or to change protocols, use the
sslconfig
command in the command-line interface.
•
Cisco update servers do not support SSL v3.
•
If you are using a local (remote) update server, and for all other services and web browsers, the
protocol you choose must be supported by and enabled on the server and tools you are using.
protocol you choose must be supported by and enabled on the server and tools you are using.
•
One of the available options must be enabled for each service you use.
•
Changes made using the
sslconfig
command require a Commit.
•
Affected services will be briefly interrupted after you commit changes made using the
sslconfig
command.
Configuring the System Time
Note
When gathering data for reports, the Security Management appliance applies the time stamp from the
information that was set when you configured the time settings on the Security Management appliance.
For information, see
information that was set when you configured the time settings on the Security Management appliance.
For information, see
To set time-related settings using the command-line interface, use the
ntpconfig
,
settime
, and
settz
commands.