Cisco Preparative Procedures & Operational User Guide
© 2016 Cisco Systems, Inc. All rights reserved.
4.5.2 Image Management ............................................................................................................. 49
4.5.2.1 Download Images from Cisco.com ..................................................................................... 49
4.5.2.2 Copy Platform Bundle Image to the FXOS Chassis via CLI .............................................. 50
4.5.2.3 Verifying the Integrity of an Image .................................................................................... 50
4.5.2.4 Upload Platform Bundle Image via GUI ............................................................................ 50
4.5.2.5 Update the Platform Bundle Image via CLI ....................................................................... 51
4.5.2.6 Update the Platform Bundle Image via GUI ....................................................................... 51
4.5.2.7 Copy Application Image to FXOS Chassis ......................................................................... 52
4.5.2.8 Update Application Image via CLI ..................................................................................... 53
4.5.2.9 Update Application Image via GUI .................................................................................... 53
4.5.3 User and Role Management ................................................................................................ 54
4.5.4 Configure Time Synchronization ........................................................................................ 60
4.5.5 Configure SSH Access ........................................................................................................ 63
4.5.5.1 Configure SSH via CLI ....................................................................................................... 63
4.5.5.2 Configure SSH via GUI ...................................................................................................... 64
4.5.6 Configure PKI ..................................................................................................................... 64
4.5.6.1 Certificates and Trust Points ............................................................................................... 64
4.5.6.2 Creating a Key Ring ............................................................................................................ 64
4.5.6.3 Creating a Certificate Request for a Key Ring .................................................................... 65
4.5.6.4 Creating a Trust Point ......................................................................................................... 66
4.5.6.5 Importing a Certificate into a Key Ring .............................................................................. 66
4.5.6.6 Configuring HTTPS ............................................................................................................ 67
4.5.7 Logical Device Management .............................................................................................. 69
4.5.7.1 Create a ASA Logical Device via CLI ................................................................................ 69
4.5.7.2 Create a ASA Logical Device via GUI ............................................................................... 70
4.5.7.3 Delete a ASA Logical Device via CLI ................................................................................ 71
4.5.7.4 Delete a ASA Logical Device via GUI ............................................................................... 71
4.6 Self-Tests ................................................................................................................................ 72