32
Becoming familiar with the SGMI
Leaving the SGMI
To log off from the SGMI
1
In the SGMI, on the File menu, click
Log Off
.
If you have saved all of your changes, the Symantec Gateway Security 5000 Series v3.0 logon dialog
box is displayed.
2
If you have unsaved changes, a message asks if you want to save the current changes before logging
off. Click one of the following:
■
Yes: Save the changes.
All current changes are saved to a temporary staging location. They are visible the next time
you log on.
■
No: Discard the changes.
All pending changes are discarded.
In either case, the logon dialog box is displayed.
3
The logon dialog box retains your user name and the IP address of the appliance you last managed.
You can do one of the following:
■
To return to managing the security gateway you logged off from, enter your password and
click
Log On
.
■
To manage a different security gateway, enter your user name and password for that gateway.
Enter the IP address or domain name of the security gateway.
If you have previously connected to a different security gateway, you can use the drop-down
list to display its IP address so that you can log on to it.
Click
Log On
.
To exit from the SGMI
1
In the SGMI, on the File menu, click
Exit
.
If you have saved all of your changes, the SGMI application closes.
2
If you have unsaved changes, a message asks if you want to save current changes before logging off.
Click one of the following:
■
Yes: Save the changes.
All current changes are saved to a temporary staging location, and the SGMI closes.
The changes are visible the next time you log on.
■
No: Discard the changes.
All unsaved changes are discarded, and the SGMI closes.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...