- Introduction
- Setup, Installation, and Basic Configuration
- Working With Reports on the Legacy Web Interface
- Using Centralized Email Security Reporting on the Legacy Web Interface
- Working With Reports on the Cloud Email Security Management Console
- Using Centralized Email Security Reporting on the Cloud Email Security Management Console
- Tracking Messages
- Spam Quarantine
- Centralized Policy, Virus, and Outbreak Quarantines
- Monitoring System Status
- Integrating With LDAP
- Configuring SMTP Routing
- Distributing Administrative Tasks
- Common Administrative Tasks
- Logging
- Troubleshooting
- IP Interfaces and Accessing the Appliance
- Assigning Network and IP Addresses
- Firewall Information
- Additional Resources
- End User License Agreement
- Index
- Solution Deployment Overview
- Installation Planning
- Preparing for Setup
- Accessing the Security Management Appliance
- Running the System Setup Wizard
Setup, Installation,
and Basic Configuration
This chapter contains the following sections:
- Solution Deployment Overview
- Installation Planning
- Preparing for Setup
- Accessing the Security Management Appliance
- Running the System Setup Wizard
- About Adding Managed Appliances
- Configuring Services on the Security Management Appliance
- Committing and Abandoning Configuration Changes
Solution Deployment Overview
To configure your Cisco Content Security Management appliance to provide service to your Cisco Content Security solution:
|
On These Appliances |
Do This |
More Information |
---|---|---|---|
Step 1 |
All appliances |
Ensure that your appliances meet the system requirements for the features you will use. If necessary, upgrade your appliances. |
|
Step 2 |
Email Security appliances |
Before you introduce centralized services to your environment, configure all Email Security appliances to provide the security features you want, and verify that all features are working as expected on each appliance. |
See the documentation for your Cisco Email Security release. |
Step 3 |
Security Management appliance |
Set up the appliance and run the System Setup Wizard. |
See the Installation Planning, Preparing for Setup and the Running the System Setup Wizard. |
Step 4 |
All appliances |
Configure each centralized service that you want to deploy. |
Start with the Configuring Services on the Security Management Appliance. |
Installation Planning
- Network Planning
- About Integrating a Security Management Appliance with Email Security Appliances
- Deployments with Clustered Email Security Appliances
Network Planning
The Security Management appliance lets you separate end user applications from the more secure gateway systems residing in your demilitarized zones (DMZs). Using a two-layer firewall can provide flexibility in network planning so that end users do not connect directly to the outer DMZ .

The following figure shows a typical network configuration incorporating the Security Management appliance and multiple DMZs. You deploy the Security Management appliance outside your DMZ, in your internal networks. All connections are initiated by the Security Management appliances (M-Series) to the managed Email Security appliances (C-Series).
Corporate data centers can share a Security Management appliance to perform centralized reporting and message tracking for multiple Email Security appliances. The Security Management appliance can also be used as an external spam quarantine.
After you connect the Email Security appliance to a Security Management appliance and properly configure all appliances, AsyncOS gathers and aggregates data from the managed appliances. From the aggregated data, reports can be generated and an overall view of email usage can be determined.
About Integrating a Security Management Appliance with Email Security Appliances
Additional information about integrating the Security Management appliance with your Email Security appliances, see the “Centralizing Services on a Cisco Content Security Management Appliance” chapter in the user documentation or online help for your Email Security appliance.
Deployments with Clustered Email Security Appliances
The Security Management appliance cannot be placed in a cluster of Email Security appliances that are using the email appliances’ centralized management feature. However, clustered Email Security appliances can deliver messages to the Security Management appliance for centralized reporting and tracking and to quarantine messages.
Preparing for Setup
Before you run the System Setup Wizard:
Step 1 | Review the latest release notes for your product. See Network Planning. |
Step 2 | Verify that the components of your security solution are compatible. . |
Step 3 | Ensure that your network and physical space are ready to support this deployment. See Installation Planning. |
Step 4 | Physically set up and connect the Security Management appliance. See Physically Setting Up and Connecting the Appliance. |
Step 5 | Determine network and IP address assignments. See Determining Network and IP Address Assignments. |
Step 6 | Gather information about your system setup. See Gathering the Setup Information. |
Physically Setting Up and Connecting the Appliance
Before you follow the procedures in this chapter, complete the steps described in the quick start guide that came with your appliance. In this guide, it is assumed that you have unpacked the appliance, physically installed it in a rack, and turned it on.
Before you can log in to the GUI, you need to set up a private connection between a PC and the Security Management appliance. For example, you can use the included crossover cable to connect directly from the Management port on the appliance to a laptop. Optionally, you can connect through an Ethernet connection between a PC and the network (for example, an Ethernet hub) and between the network and the Management port on the Security Management appliance.
Determining Network and IP Address Assignments
![]() Note | If you have already cabled your appliance to your network, ensure that the default IP address for the content security appliance does not conflict with other IP addresses on your network. The IP address that is pre-configured on the Management port of each appliance is 192.168.42.42. |
After setup, go to the Management Appliance > Network > IP Interfaces page on the main Security Management appliance to change the interface that the Security Management appliance uses.
You need the following network information about each Ethernet port that you choose to use:
In addition, you need the following information about your overall network:
- IP address of the default router (gateway) on your network
- IP address and hostname of your DNS servers (not required if you want to use Internet root servers)
- Hostname or IP address of your NTP servers (not required if you want to manually set system time)
For more information, see Assigning Network and IP Addresses.
![]() Note | If you are running a firewall on your network between the Internet and the content security appliance, it may be necessary to open specific ports for the appliance to work properly. For more information on firewalls, see Firewall Information Always use the same IP address on the Security Management appliance for receiving and sending email messages to the Email Security appliances. For an explanation, see information about Mail Flow in the documentation for your Email Security appliance. |
Note that IPv6 is not supported for communication between the Cisco Content Security Management appliance and the appliances it manages.
Gathering the Setup Information
Use the following table to gather information about system setup. You will need this information at hand while running the System Setup Wizard.
![]() Note | See the Assigning Network and IP Addresses for detailed information about network and IP addresses. |
The following table shows the system setup worksheet
1 |
Notifications |
|
Email address where system alerts are sent: |
2 |
System Time |
|
NTP Server (IP address or hostname): |
3 |
Admin Password |
|
Choose a new password for the “admin” account: |
4 |
AutoSupport |
|
Enable AutoSupport? ___ Yes ___ No |
5 |
Hostname |
|
Fully qualified hostname of the Security Management appliance: |
6 |
Interface / IP Address
|
|
IP address: |
|
|
|
Netmask: |
7 |
Network |
Gateway |
Default Gateway (router) IP address: |
|
|
DNS |
___ Use the Internet’s root DNS servers |
|
|
|
___ Use these DNS servers: |
Accessing the Security Management Appliance
The Security Management appliance has a standard web-based graphical user interface, a separate web-based interface for managing the spam quarantine, a command-line interface, and special or limited web interfaces for administrative users granted access to specific features and functionality.
- Browser Requirements
- About Accessing the Web Interfaces
- Accessing the Web Interface
- Accessing the Command Line Interface
- Supported Languages
Browser Requirements
To access the GUI, your browser must support and be enabled to accept JavaScript and cookies, and it must be able to render HTML pages containing Cascading Style Sheets (CSS).
Browser |
Windows 7 |
MacOS 10.6 |
---|---|---|
Safari |
— |
7.0 and later |
Google Chrome |
Latest Stable Version |
Latest Stable Version |
Microsoft Internet Explorer |
11.0 |
— |
Mozilla Firefox |
Latest Stable Version |
Latest Stable Version |
-
Internet Explorer 11.0 (Windows 7 only)
-
Safari (7 and later)
-
Firefox (Latest Stable Version)
-
Google Chrome (Latest Stable Version)
Browsers are supported only for operating systems officially supported by the browser.
You may need to configure your browser’s pop-up blocking settings in order to use the GUI, because some buttons or links in the interface will cause additional windows to open.
![]() Note | The best viewed resolution for the AsyncOS (11.4 and above) web interface is 1366x786, for all the browsers. |
About Accessing the Web Interfaces
The Security Management appliance has two web interfaces: the standard administrator interface, available by default on port 80, and the spam quarantine end user interface, available by default on port 82. The spam quarantine HTTPS interface defaults to port 83 when enabled.
Because you can specify HTTP or HTTPS when configuring each of the web interfaces (go to Management Appliance > Network > IP Interfaces on the Security Management appliance), you may be asked to reauthenticate if you switch between the two during your session. For example, if you access the admin web interface through HTTP on port 80 and then, in the same browser, access the spam quarantine end user web interface through HTTPS on port 83, you are asked to reauthenticate if you return to the admin web interface.
![]() Note | - When accessing the GUI, do not use multiple browser windows or tabs simultaneously to make changes to the Security Management appliance. Do not use concurrent GUI and CLI sessions either. Doing so will cause unexpected behavior and is not supported. - By default, your session times out if you are idle for more than 30 minutes or if you close the browser without logging out. If this happens, you must reenter your user name and password. To change the timeout limit, see Configuring the Web UI Session Timeout. |
Accessing the Web Interface
Accessing the Command Line Interface
The command line interface, or CLI, is accessed on the Security Management appliance in the same way that the CLI is accessed on all Cisco Content Security appliances. There are, however, some differences:
- System setup must be performed through the GUI.
- Some CLI commands are not available on the Security Management appliance. For a list of which commands are not supported, see the IronPort AsyncOS CLI Reference Guide for Cisco Content Security Appliances.
For production deployments, you should use SSH to access the CLI. Use a standard SSH client to access the appliance on port 22. For lab deployments, you can also use telnet; however, this protocol is not encrypted.
Supported Languages
With the appropriate license key, AsyncOS can display the GUI and CLI in any of the following languages:
- English
- French
- Spanish
- German
- Italian
- Korean
- Japanese
- Portuguese (Brazil)
- Chinese (traditional and simplified)
- Russian
To choose the GUI and default reporting language, do one of the following:
- Set the language preference. See Setting Preferences.
- Use the Options menu at the top right side of the GUI window to select the language for the session.
(The method that works depends on the method used to authenticate your login credentials.)
Running the System Setup Wizard
AsyncOS provides a browser-based System Setup Wizard to guide you through the process of system configuration. Later, you may want to take advantage of custom configuration options not available in the wizard. However, you must use the wizard for the initial setup to ensure a complete configuration.
The Security Management appliance supports this wizard via the GUI only. It does not support system setup through the command line interface (CLI).
Before You Begin
Complete all tasks in the Preparing for Setup.
![]() Caution | The System Setup Wizard completely reconfigures the appliance. Only use the wizard when you initially install the appliance, or if you want to completely overwrite the existing configuration. |
Be sure to connect the Security Management appliance to your network through the Management port.
![]() Caution | The Security Management appliance ships with a default IP address of 192.168.42.42 on the Management port. Before connecting the Security Management appliance to your network, ensure that no other device’s IP address conflicts with the factory default setting. |
![]() Note | By default, your session times out if you are idle for more than 30 minutes or if you close the browser without logging out. If this happens, you must reenter your user name and password. If the session times out while you are running the System Setup Wizard, you need to start over from the beginning. To change the timeout limit, see Configuring the Web UI Session Timeout. |
Overview of the System Setup Wizard
Step 1 |
Launch the System Setup Wizard
|
Step 2 |
Review the End User License Agreement
|
Step 3 |
Configure the System Settings
|
Step 4 |
Configure the Network Settings
|
Step 5 |
Review Your Configuration
Proceed through the wizard pages, and carefully review your configuration at step 4. You can return to a step by clicking Previous. At the end of the process, the wizard prompts you to commit the changes that you have made. Most changes do not take effect until you commit them. |
Step 6 |
Proceeding to the Next Steps
|
Launch the System Setup Wizard
To launch the wizard, log in to the GUI as described in the Accessing the Web Interface. The first time you log in to the GUI, the initial page of the System Setup Wizard appears by default. You can also access the System Setup Wizard from the System Administration menu (Management Appliance > System Administration > System Setup Wizard).
Review the End User License Agreement
Begin by reading the license agreement. After you have read and agreed to the license agreement, select the check box indicating that you agree, and then click Begin Setup to proceed.
Configure the System Settings
- Entering an Email Address for System alertsAlerts
- Setting the Time
- Setting the Password
- Enabling AutoSupport
Entering an Email Address for System alertsAlerts
AsyncOS sends alert messages through email if there is a system error that requires your intervention. Enter the email address (or addresses) where the alerts are sent.
You need to add at least one email address for the system alerts. Separate multiple addresses with commas. The email addresses that you enter initially receive all types of alerts at all levels. You can customize the alert configuration later. For more information, see the Managing Alerts.
Setting the Time
Set the time zone on the Security Management appliance so that timestamps in reports, message headers and log files are correct. Use the drop-down menus to locate your time zone or to define the time zone by GMT offset.
You can set the system clock time manually, but Cisco recommends using an Network Time Protocol (NTP) server to synchronize time with other servers on your network or the Internet. By default, the Cisco NTP server (time.sco.cisco.com) is added as an entry to synchronize the time on your content security appliance. Enter the hostname of the NTP server, and click Add Entry to configure an additional NTP server. For more information, see the Configuring the System Time.
Setting the Password
You must change the password:adminpassword for the AsyncOS admin account. Keep the password in a secure location. Changes to the password take effect immediately.
![]() Note | If you cancel the system setup after resetting the password, your password changes are not undone. |
Enabling AutoSupport
The AutoSupport feature (enabled by default) notifies Customer Support about issues with the Security Management appliance so that they can provide optimal support. For more information, see the Cisco AutoSupport.
Configure the Network Settings
Define the hostname of the machine and then configure the gateway and DNS settings.
![]() Note | Verify that you have connected the Security Management appliance to your network through the Management port. |
Network Settings
Enter the fully qualified hostname for the Security Management appliance. This name should be assigned by the network administrator.
Enter the IP address of the Security Management appliance.
Enter the network mask and IP address of the default deerrouter (gateway) on your network.
Next, configure the Domain Name Service (DNS) settings. AsyncOS contains a high-performance internal DNS resolver/cache that can query the Internet’s root servers directly, or the system can use DNS servers that you specify. If you use your own servers, you need to supply the IP address of each DNS server. You can enter up to four DNS servers when you are using the System Setup Wizard.
![]() Note | The DNS servers you specify have an initial priority of 0. For more information, see the Configuring Domain Name System Settings. |
![]() Note | The appliance requires access to a working DNS server to perform DNS lookups for incoming connections. If you cannot specify a working DNS server that is reachable by the appliance while you are setting up the appliance, you can select Use Internet Root DNS Servers, or else temporarily specify the IP address of the Management interface so that you can complete the System Setup Wizard. |
Review Your Configuration
Now, the System Setup Wizard displays a summary of the setup information that you have entered. If you need to make any changes, click Previous at the bottom of the page and edit the information.
After you have reviewed the information, click Install This Configuration. Then click Install in the confirmation dialog box that appears.
If the page appears not to respond when you click Install This Configuration, this is because the appliance is now using the the new IP address that you specified in the wizard. To continue using the appliance, use the new IP address. If you followed the instructions in the Quick Start Guide to temporarily change the IP address of the computer you used to access your new hardware appliance, revert your computer’s IP address to its original settings first.
Proceeding to the Next Steps
After you install the Security Management appliance and run the System Setup Wizard, you can modify other settings on the appliance and configure the monitoring services.
Depending on the process you used to access the appliance in order to run the system setup wizard, the System Setup Next Steps page appears. If this page dos not appear automatically, you can access it by choosing Management Appliance > System Administration > Next Steps.
Click on any of the links on the System Setup Next Steps page to proceed with the configuration of your Cisco Content Security appliances.
About Adding Managed Appliances
You will add managed Email appliances to the Security Management appliance when you configure the first centralized service for each appliance.
When you add a remote appliance, the Security Management appliance compares the product name of the remote appliance with the type of appliance you are adding. The Security Management appliance will also check the monitoring services on the remote appliances to make sure that they are correctly configured and compatible.
The Security Appliances page shows the managed appliances that you have added. The Connection Established? column shows whether or not the connection for monitoring services is properly configured.
Instructions for adding managed appliances are included in the following procedures:
Editing Managed Appliance Configurations
Removing an Appliance from the List of Managed Appliances
You may need to disable any enabled centralized services on the remote appliance before you can remove that appliance from the Security Management appliance. For example, if the Centralized Policy, Virus, and Outbreak Quarantine service is enabled, you must disable that service first on the Email Security appliance. See the documentation for your email appliance.
Step 1 | [New Web Interface Only] On the Cloud Email Security Management Console, click on the gear |
Step 2 | Choose Management Appliance > Centralized Services > Security Appliances. |
Step 3 | In the Security Appliances section, and click the trash can icon in the row for the managed appliance that you want to delete. |
Step 4 | In the confirmation dialog box, click Delete. |
Step 5 | Submit and commit your changes. |
Configuring Services on the Security Management Appliance
Email security services:
Committing and Abandoning Configuration Changes
After you make most configuration changes in the Cisco Content Security appliance GUI, you must explicitly commit the changes.

To |
Do This |
---|---|
Commit all pending changes |
Click the orange Commit Changes button at the top right side of the window. Add a description of the changes and then click commit. If you have not made any changes that require a commit, then a gray No Changes Pending button appears instead of Commit Changes. |
Abandon all pending changes |
Click the orange Commit Changes button at the top right side of the window, then click Abandon Changes. |
![]() Note | The configuration changes made on the old web interface is updated on the new web interface, after you logout and login to the new Cisco Content Security Management web interface. |