502
Generating reports
Configuration reports
Generating and viewing a configuration report
You can generate and view a configuration report in either HTML or PDF format.
Prerequisites
None.
To generate and view a configuration report
1
In the SGMI, on the Reports menu, click
Configuration
.
2
In the Configuration Reports dialog box, in the Reports list box, select the report category to
generate.
3
Under Format, select either
or
HTML
.
4
If you click PDF, in the Paper type drop-down list, select the paper size for your report.
This is the default selection and requires that you have Adobe Acrobat installed on the computer
from which you use the SGMI.
5
Click
Generate Report
.
After you generate a report, you can view, save, or print it.
6
Click
Close
.
Related information
For further information related to this topic, see the following:
■
■
“Printing and saving a configuration report”
■
“Configuration report descriptions”
Printing and saving a configuration report
To view PDF reports, you must have Adobe Reader installed on the same computer as the one that
hosts the SGMI. The security gateway displays reports generated in PDF in a separate window. From
this window, you can save the report.
Prerequisites
None.
To print a configuration report
1
In the SGMI, in Reports menu, select
Configuration
.
2
In the Configuration Reports dialog box, in the Reports list box, select the report you want.
3
Under Report Format, select one of the following report file formats:
■
To prepare reports in PDF format, click
.
This is the default selection and requires that you have Adobe Acrobat installed on the
computer from which you use the SGMI.
■
To prepare reports in HTML format, click
HTML
.
You cannot choose a paper type with this option.
4
If using a PDF format, in the Paper type drop-down list, select the paper size for your report.
5
Click
Generate Report
.
6
To print a configuration report, do one of the following:
■
From a PDF file, on the File menu, click
.
■
From an HTML file, in the browser File menu, click
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...