50
Becoming familiar with the SGMI
Working with configurations of objects
2
For each property by which you want to search, do one of the following:
■
To search on part of a property name, click
Contains
, and specify one or more letters
contained in the name.
■
To search on the beginning of a property name, click
Starts with
, and then specify the first
letters of the name.
■
To search on a specific property name, click
Equals
, and then type the exact name.
3
The Description property is included in most search dialog boxes. If your organization uses the
Description tab to record configuration changes, you can use those changes as search criteria. For
example, if you record who makes configuration changes, you can search for the changes made by
one administrator.
From the Description drop-down list, choose
Contains
, and then type the name of the
administrator.
4
Click
OK
.
5
To modify the search, click
Search
.
6
To re-display the entire table of objects, click
Clear Search
.
Viewing and modifying object properties
When you view a table of objects in the SGMI, you can see the primary properties of each object. For
example, if you view a table of rules, you can see the source and destination of the traffic controlled by
the rule, the interface on which the traffic arrives and leaves the security gateway, and the service
group that contains the protocols that are applied to the rule.
You can change these properties by displaying a object’s properties dialog box.
This section contains the following topics:
■
Viewing the properties of an existing object
■
Modifying the properties of an object
Viewing the properties of an existing object
Every object in the SGMI has a properties dialog box that shows the details of the object’s
configuration.
To view the properties of an existing object
1
In the SGMI, in the right pane, do one of the following:
■
Double-click an object in the table.
■
Select the object and, above the table, click
Properties
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...