Reading through the document "How-To Configure Mailbox Auto Remediation for Office 365 on Cisco Email Security". It talks about "Building a Public and Private Certificate and Key Pair". We have previously generated these items for SSH access to our Cloud ESA. Can we use the same Key Pairs or do you recommend generating new Key Pairs?
I would recommend just creating a new pair specifically for this operation. Doesn't need to be anything fancy, just simple self signed cert, export - etc. In my testing and repros on this, I have seen instances where existing pub/private key pairs caused the .json build to fail.
This white paper gives the same technique I use, using XCA:
We have followed the instructions provided, and believe everything is configured properly, but when running the "Check Connection" test at the very end, we are receiving a failure with the following error message:
Details: int() argument must be a string or a number, not 'Sequence'
Not sure if this is a configuration issue on our side, or what, but if you have any insight, or have any idea of how to dig deeper into the problem, it would be appreciated.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...