Chapter
2
Becoming familiar with the SGMI
This chapter includes the following topics:
■
■
■
■
■
■
Working with configurations of objects
■
■
Using wizards to simplify configuration
About the SGMI
You manage Symantec Gateway Security 5000 Series v3.0 using the Security Gateway Management
Interface (SGMI). The SGMI is an easy to navigate graphical user interface that lets you perform a
variety of management functions.These include configuring the security gateway to meet the needs of
your security plan, monitoring the performance of the security gateway appliance, or monitoring log
and IDS/IPS alert messages to identify security threats.
To share administrative functions, you can create additional administrator accounts, with privileges
appropriate to the administrator. These accounts can be used for simultaneous access to the security
gateway. For example, the administrator who configures the security gateway can log on at the same
time as an administrator who is responsible for monitoring log messages and alerts. Only the first
workstation that connects to the security gateway has write access.
The SGMI runs as a Java application, giving you free access from the SGMI to the clipboard, the local
file system, and printers, making it easy to share log message details and configuration reports.
Logging on to the SGMI
You access the SGMI by performing a password controlled log on.
The SGMI uses Secure Sockets Layer (SSL) to make a secure connection between your workstation and
the appliance. You may see several security warnings regarding SSL certificates during logon. After
examining these certificates, you can safely accept them. You also have the option of installing a third-
party certificate authority (CA), which eliminates some of these security warnings.
The first time you log on, the procedure ensures that you have the required Java environment and lets
you install an icon to the desktop for easy access in future logons.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...