Cisco Systems ASA 5500 manual 19-8, •DNS server IP address

Models: ASA 5500

1 16
Download 16 pages 52 Kb
Page 8
Image 8
•DNS server IP address.

Chapter 19 Managing the AIP SSM and CSC SSM

Managing the CSC SSM

Note The SSM management port IP address must be accessible by the hosts used to run ASDM. The IP addresses for the SSM management port and the adaptive security appliance management interface can be in different subnets.

DNS server IP address.

HTTP proxy server IP address (required only if your security policies require use of a proxy server for HTTP access to the Internet).

Domain name and hostname for the SSM.

An email address and an SMTP server IP address and port number, for email notifications.

IP addresses of hosts or networks allowed to manage the CSC SSM.

Password for the CSC SSM.

Step 4 In a web browser, access ASDM for the adaptive security appliance that the CSC SSM is in.

Note If you are accessing ASDM for the first time, see the Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide for assistance with the Startup Wizard.

For more information about enabling ASDM access, see the “Allowing HTTPS Access for ASDM” section on page 33-4.

Step 5 Verify time settings on the adaptive security appliance. Time setting accuracy is important for logging of security events and for automatic updates of CSC SSM software.

If you manually control time settings, verify the clock settings, including time zone. Choose Configuration > Properties > Device Administration > Clock.

If you are using NTP, verify the NTP configuration. Choose Configuration > Properties > Device Administration > NTP.

Step 6 In ASDM, run the Content Security setup wizard. To do so, access the ASDM GUI in a supported web browser and on the Home page, click the Content Security tab. The Content Security setup wizard runs. For assistance with the Content Security setup wizard, click the Help button.

Note If you are accessing ASDM for the first time, see the Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide for assistance with the Startup Wizard.

Step 7 On the ASA 5500 series adaptive security appliance, identify traffic to divert to the CSC SSM (as described in the “Diverting Traffic to the CSC SSM” section on page 19-11).

Step 8 (Optional) Review the default content security policies in the CSC SSM GUI. The default content security policies are suitable for most implementations. Modifying them is advanced configuration that you should perform only after reading the Cisco Content Security and Control SSM Administrator Guide.

You review the content security policies by viewing the enabled features in the CSC SSM GUI. The availability of features depends on the license level you purchased. By default, all features included in the license you purchased are enabled.

With a Base License, the features enabled by default are SMTP virus scanning, POP3 virus scanning and content filtering, webmail virus scanning, HTTP file blocking, FTP virus scanning and file blocking, logging, and automatic updates.

Cisco Security Appliance Command Line Configuration Guide

19-8

OL-8629-01

 

 

Page 8
Image 8
Cisco Systems ASA 5500 manual 19-8, •DNS server IP address