40
Becoming familiar with the SGMI
Navigating in the SGMI
Assets
Lets you define your organizations infrastructure and the external resources that you want to
make available to your users. You also configure how the security gateway functions within
your network.
Network
Lets you configure the network assets users can access, such as
servers and subnets.
Authentication Servers
Lets you configure the internal and external authentication
servers that are used to validate user when they connect.
Users
Lets you create users accounts and user groups on the security
gateway, which are used in combination with authentication
servers to control user access.
Proxies
Lets you configure the security gateway’s predefined proxies, that
allow you to control how data is passed.
Protocols
Provides access to the security gateway’s predefined protocols and
lets you combine them in service groups for use in rules. You can
also create new protocols as needed for special kinds of traffic.
Portal Pages
Lets you customize the user experience for clientless VPN users.
Remote Mail
Lets you configure clientless VPN to handle non-standard mail
resources.
Asset Parameters
Lets you specify asset parameters that affect the system as a
whole.
System
Helps you manage your security gateway, including creating administrator and machine
accounts, using LiveUpdate, and configuring the use of self-signed SSL certificates.
System Information
Displays system data such as system time, hardware model,
domain name, gateway address, and system ID.
Configuration
Lets you enable and disable security gateway features, control how
events are sent to SESA, configure LiveUpdate of content security
components, and manage clientless VPN certificates.
Note:
Symantec Gateway Security 5000 Series v3.0 requires
Symantec Advanced Manager for Security Gateways v3.0.
Administration
Lets you define security gateway administrators and machine
accounts with access to the security gateway.
Licensing
Lets you view and install licenses for security gateway components
and support, and view the use of those license.
Table 2-3
Section and folder descriptions (Continued)
Section name
Folder name
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...