Руководство Пользователя для Cisco Cisco Email Security Appliance C190
Chapter 7 Centralized Management
7-486
Cisco IronPort AsyncOS 7.1 for Email Advanced Configuration Guide
OL-22164-02
The most common example of an interdependent setting involves a select field on
a page that pulls data from a different cluster section. For example, the following
features can be configured in different modes:
a page that pulls data from a different cluster section. For example, the following
features can be configured in different modes:
•
using LDAP queries
•
using dictionaries or text resources
•
using bounce or SMTP authentication profiles.
Within centralized management, there are restricted and non-restricted
commands. (See
commands. (See
.) Non-restricted commands
are generally configuration commands that can be shared across the cluster.
The
listenerconfig
command is an example of a command that can be
configured for all machines in a cluster. Non-restricted commands represent
commands that can be mirrored on all machines in a cluster, and do not require
machine-specific data to be modified.
commands that can be mirrored on all machines in a cluster, and do not require
machine-specific data to be modified.
Restricted commands, on the other hand, are commands that only apply to a
specific mode. For example, users cannot be configured for specific machines —
there must be only one user set across the whole cluster. (Otherwise, it would be
impossible to login to remote machines with the same login.) Likewise, since the
Mail Flow Monitor data, System Overview counters, and log files are only
maintained on a per-machine basis, these commands and pages must be restricted
to a machine.
specific mode. For example, users cannot be configured for specific machines —
there must be only one user set across the whole cluster. (Otherwise, it would be
impossible to login to remote machines with the same login.) Likewise, since the
Mail Flow Monitor data, System Overview counters, and log files are only
maintained on a per-machine basis, these commands and pages must be restricted
to a machine.
You will notice that while Scheduled Reports may be configured identically
across the whole cluster, the viewing of reports is machine-specific. Therefore,
within a single Scheduled Reports page in the GUI, configuration must be
performed at the cluster mode, but viewing of reports must be done at the machine
mode.
across the whole cluster, the viewing of reports is machine-specific. Therefore,
within a single Scheduled Reports page in the GUI, configuration must be
performed at the cluster mode, but viewing of reports must be done at the machine
mode.
The System Time pages encompass the
settz
,
ntpconfig
, and
settime
commands, and thus represents a mixture of restricted and non-restricted
commands. In this case,
commands. In this case,
settime
must be restricted to machine-only modes (since
time settings are specific for machine), while
settz
and
ntpconfig
may be
configured at cluster or group modes.
Consider the following example: