42
Becoming familiar with the SGMI
Navigating in the SGMI
Policy > Advanced > System Parameters
Host name included in log
Forwarding filter
Reverse lookups
Reverse lookup timeout
Policy > Policy Parameters
Include host name in log entries
Packet filter
Policy > Policy Parameters
Enable reverse lookups
Reverse lookup timeout
Location Settings > Network Entities
Assets > Network > Network Entities
Location Settings > DNS
Assets > Network > DNS
Location Settings > Tunnels
Policy > VPN > Tunnels
Location Settings > Users
Assets > Users > Network Users
Location Settings > Groups
Assets > Users > User Groups
Location Settings > Notifications
Monitoring > Notifications
Location Settings > Advanced > Proxies
Assets > Proxies > Proxies
Location Settings > Advanced > Services
System > Configuration > Services
Location Settings > Advanced > Address Transforms
Assets > Network > Address Transforms
Location Settings > Advanced > Redirected Services
Assets > Network > Redirected Services
Location Settings > Advanced > NAT Pools
Assets > Network > NAT Pools
Location Settings > Advanced > Authentication
Assets > Authentication Servers
Location Settings > Advanced > H.323 Aliases
Assets > Proxies > H.323 Aliases
Location Settings > Advanced > Local Administrators
System > Administration > Local Administrators
Location Settings > Advanced > Machine Accounts
System > Administration > Machine Accounts
Location Settings > Advanced > LiveUpdate
System > Administration > LiveUpdate
Location Settings > Advanced > System Parameters
User password minimum length
Assets > Asset Parameters
Minimum user password length
System > System Home Page
System > System Information
System > Network Interfaces
Assets > Network > Network Interfaces
System > Routes
Assets > Network > Routes
System > Clusters
Clusters
System > Features
System > Configuration > Features
System > Advanced > Advanced Options
System > Administration > Advanced Options
System > Advanced > System Parameters
System > Configuration > Features
System > Advanced > Hardware Encryption
Diagnostics
Monitors > Status > Hardware Encryption Diagnostics
Monitoring > Summary
Monitors > Status > Connection Summary
Monitoring > Active Connections
Monitors > Status > Active Connections
Monitoring > View Logs
Monitors > Logging > View Logs
Monitoring > IDS Alerts
Monitors > Logging > IDS Alerts
Table 2-4
Navigation for SGMI v2.0 mapped to SGMI v3.0
SGMI v2.0
SGMI v 3.0
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...