70
Managing administrative access
Changing passwords
4
On the Privileges tab, do the following:
5
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
6
Click
OK
.
7
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Machine Account Properties—General tab”
■
“Machine Account Properties—Privileges tab”
Changing passwords
The administrative and machine accounts you create are secured by passwords, which you should
change regularly to protect the integrity of your security gateway.
The following topics describe how to change these passwords using the SGMI:
■
Changing administrator passwords
■
■
Changing a machine account password
You can also use the LCD panel on the appliance to generate a new random root and admin password.
For more information, see the Connecting and Configuring section of the
Symantec Gateway Security
5000 Series Getting Started
guide.
Last password
change
The Last Password Change text box is read only; it displays the date of the most recent
password change.
Caption
Type a brief description of the machine account.
View log
Check to let the remote computer view security gateway log files.
Manage log
Check to let the remote computer access and manage security gateway log files.
Provide IDS blacklist
entries
Check to let the remote computer add or change entries in the Blacklist file.
If you check this entry, complete the following fields:
■
Pass entries on port
Type the port number to be used to connect to the blacklist.
■
Entry lifetime (minutes)
Type the length of time the blacklist entries are valid.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...