758
Field descriptions
System field descriptions
Administration
When you expand the Administration folder, you have access to tabs from which you can do the
following:
Admin Account Properties—General tab
Use the Admin Account Properties dialog box to create new administrators for the security gateway or
to change administrator privileges.
Associated tasks
The task that you can perform with this tab is:
■
“Creating administrator accounts”
■
“Changing administrator passwords”
Create and modify local
administrator accounts
“Admin Account Properties—General tab”
Create and modify machine
accounts
“Machine Account Properties—General tab”
Configure advanced options
“Advanced Options Properties—General tab”
Configure SYN flood allowed
hosts
Table D-242
Admin Account Properties—General tab
Fields
Description
Enable
Indicates whether this option is enabled.
This option is checked by default.
User Name
Name of the administrator.
The maximum length is 32 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @,!,#,$,%,^,&,*,<,> and other reserved
characters are also invalid.
Given Name
Given name of the administrator.
The maximum length is 32 characters.
Spaces are allowed and no characters are restricted.
Surname
Surname of the administrator.
This can be used to distinguish between similar user names.
The maximum length is 32 characters.
Spaces are allowed and no characters are restricted.
Password
Administrator’s password.
The password is encrypted and appears as a string of asterisk (*) characters.
The password should be at least 10 characters long, with both upper and lowercase letters, a
punctuation mark, and at least one numeric digit.
Confirm Password
Confirms the administrator’s password.
Last password
change
Indicates the last time the password was changed.
This field is read-only.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...