Cisco 5510 Getting Started Guide - Page 188

Configuring the CSC SSM for Content Security, Obtain Software Activation Key from Cisco.com

Page 188 highlights

Scenario: Security Appliance with CSC SSM Deployed for Content Security Chapter 14 Configuring the CSC SSM Configuring the CSC SSM for Content Security If you ordered your adaptive security appliance with the optional CSC SSM module, there are several steps you need to perform to complete the initial configuration. Some configuration steps are performed on the adaptive security appliance, and some steps are performed in the software running on the CSC SSM. If you followed the procedures in earlier chapters of this document, at this point you have an adaptive security appliance system running with licensed software, and you have entered basic system values using the Startup Wizard. Your next steps are to configure the adaptive security appliance for a content security deployment. The basic steps are as follows: 1. Obtain software activation key from Cisco.com. 2. Gather the information you need to configure the CSC SSM. 3. Using ASDM, verify time settings. 4. In ASDM, run the CSC setup wizard to configure the CSC SSM. 5. Using ASDM, configure the adaptive security appliance to divert traffic to the CSC SSM for scanning. These steps are described in detail in the sections that follow. This section includes the following topics: • Obtain Software Activation Key from Cisco.com, page 14-6 • Gather Information, page 14-7 • Verify Time Settings, page 14-7 • Run the CSC Setup Wizard, page 14-8 Obtain Software Activation Key from Cisco.com With the CSC SSM, you should have received a Product Authorization Key (PAK). Use the PAK to register the CSC SSM at the following URL: http://www.cisco.com/go/license 14-6 Cisco ASA 5500 Series Getting Started Guide 78-19186-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Chapter 14
Configuring the CSC SSM
Scenario: Security Appliance with CSC SSM Deployed for Content Security
14-6
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Configuring the CSC SSM for Content Security
If you ordered your adaptive security appliance with the optional CSC SSM
module, there are several steps you need to perform to complete the initial
configuration. Some configuration steps are performed on the adaptive security
appliance, and some steps are performed in the software running on the CSC
SSM.
If you followed the procedures in earlier chapters of this document, at this point
you have an adaptive security appliance system running with licensed software,
and you have entered basic system values using the Startup Wizard. Your next
steps are to configure the adaptive security appliance for a content security
deployment.
The basic steps are as follows:
1.
Obtain software activation key from Cisco.com.
2.
Gather the information you need to configure the CSC SSM.
3.
Using ASDM, verify time settings.
4.
In ASDM, run the CSC setup wizard to configure the CSC SSM.
5.
Using ASDM, configure the adaptive security appliance to divert traffic to the
CSC SSM for scanning.
These steps are described in detail in the sections that follow.
This section includes the following topics:
Obtain Software Activation Key from Cisco.com, page 14-6
Gather Information, page 14-7
Verify Time Settings, page 14-7
Run the CSC Setup Wizard, page 14-8
Obtain Software Activation Key from Cisco.com
With the CSC SSM, you should have received a Product Authorization Key (PAK).
Use the PAK to register the CSC SSM at the following URL: