Cisco Preparative Procedures & Operational User Guide
© 2016 Cisco Systems, Inc. All rights reserved.
4.5.2
Image Management ............................................................................................................. 49
4.5.2.1
Download Images from Cisco.com ..................................................................................... 49
4.5.2.2
Copy Platform Bundle Image to the FXOS Chassis via CLI .............................................. 50
4.5.2.3
Verifying the Integrity of an Image .................................................................................... 50
4.5.2.4
Upload Platform Bundle Image via GUI ............................................................................ 50
4.5.2.5
Update the Platform Bundle Image via CLI ....................................................................... 51
4.5.2.6
Update the Platform Bundle Image via GUI ....................................................................... 51
4.5.2.7
Copy Application Image to FXOS Chassis ......................................................................... 52
4.5.2.8
Update Application Image via CLI ..................................................................................... 53
4.5.2.9
Update Application Image via GUI .................................................................................... 53
4.5.3
User and Role Management ................................................................................................ 54
4.5.4
Configure Time Synchronization ........................................................................................ 60
4.5.5
Configure SSH Access ........................................................................................................ 63
4.5.5.1
Configure SSH via CLI ....................................................................................................... 63
4.5.5.2
Configure SSH via GUI ...................................................................................................... 64
4.5.6
Configure PKI ..................................................................................................................... 64
4.5.6.1
Certificates and Trust Points ............................................................................................... 64
4.5.6.2
Creating a Key Ring ............................................................................................................ 64
4.5.6.3
Creating a Certificate Request for a Key Ring .................................................................... 65
4.5.6.4
Creating a Trust Point ......................................................................................................... 66
4.5.6.5
Importing a Certificate into a Key Ring .............................................................................. 66
4.5.6.6
Configuring HTTPS ............................................................................................................ 67
4.5.7
Logical Device Management .............................................................................................. 69
4.5.7.1
Create a ASA Logical Device via CLI ................................................................................ 69
4.5.7.2
Create a ASA Logical Device via GUI ............................................................................... 70
4.5.7.3
Delete a ASA Logical Device via CLI ................................................................................ 71
4.5.7.4
Delete a ASA Logical Device via GUI ............................................................................... 71
4.6
Self-Tests ................................................................................................................................ 72