Cisco Cisco Web Security Appliance S670 故障排查指南

下载
页码 4
Contents
Introduction
Content Security Appliance Downloads, Updates or Upgrades using a Static Host
Service Update configuration via GUI
Configuration of updateconfig via the CLI
Verify Upgrades and Updates
Troubleshooting
Introduction
This document describes the IP address(es) and hosts needed to configure your Cisco Content
Security appliance for use with a static host for downloads, updates, and upgrades.  These
configurations are to be used for either hardware or virtual Cisco Email Security Appliance (ESA),
Web Security Appliance (WSA), or Security Management Appliance (SMA).
Content Security Appliance Downloads, Updates or
Upgrades using a Static Host
Cisco offers static hosts for customers that have strict firewall or proxy requirements. It is
important to note that if you configure your appliance to use the static hosts for downloads and
updates,  same static hosts for downloads and updates must be allowed in the firewall and proxy
on network as well.
Here are the hostname(s), IP address(es), and ports that are involved in the download, update,
and upgrade processes:
downloads-static.ironport.com:
208.90.58.105 on port 80
update-manifests.ironport.com (hardware ESA):
208.90.58.5 on port 443
184.94.240.102 on port 443
update-manifests.sco.cisco.co:
208.90.58.6 on port 443
184.94.240.125 on port 443
updates-static.ironport.com:
208.90.58.25 on port 80
184.94.240.106 on port 80
Note: The 'update-manifests' URLs and port numbers provided are configured from the CLI
only via the command updateconfig. From with-in this command, there is a hidden sub-
command that needs to be run in order to validate the update manifest. Run dynamichost
from the first configuration prompt once in the configuration options for updateconfig.