47
Becoming familiar with the SGMI
Working with configurations of objects
Prerequisites
Complete the following tasks before beginning this procedure:
■
To search Help
1
In the Symantec Gateway 5000 Series v3.0 Help window, on the Search tab, in the Find text box,
type a search term.
2
Press
Enter
.
To the right of the list of topics that is returned, two indicators help you choose a topic:
■
A full red circle indicates that the topic meets the entire search criteria.
When you use a multiple word search phrase, a half circle indicates that not all words are
found in the topic.
■
A numeral indicates how many instances of the search phrase are found.
3
Double-click a topic title to open it in the right pane.
Related information
None.
Printing Help
You can print Help to have a hard copy of one or more topics.
Prerequisites
Complete the following tasks before beginning this procedure:
■
To print Help
1
In the Symantec Gateway Security 5000 Series v3.0 Help window, on the Table of Contents, Index,
or Search results tabs, do one of the following:
■
To print a single topic, select it.
■
To print multiple topics at one time, press Ctrl, and then select multiple topics.
2
Click
.
Related information
None.
Working with configurations of objects
With the SGMI, you create objects to represent specific aspects of your network environment such as
users, authentication servers, network hosts, subnets, DNS settings, routes, and so forth. You also
create rule, filter, and tunnel objects that control network traffic.
When the right pane displays a table, each line of the table represents an object. Each column shows a
property of the object, such as the network address of a subnet or network host, or the source and
destination of traffic that is controlled by a rule.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...