506
Generating reports
Viewing validation reports
Viewing validation reports
When you activate configuration changes, your configurations are validated against security gateway
rules. When activation fails, a validation report is created. You can use this report to locate and fix
specific problems.
Prerequisites
Complete the following task before beginning this procedure:
■
“Saving and activating configuration changes”
To view a validation report
1
In the SGMI, on the Reports menu, click
Validation
.
In the Validation Report dialog box, the report displays the configuration errors.
If activation completed with no reported problems, this report simply says “No error or warning in
validation.”
2
To preserve the report, you can select the text and copy it to the clipboard. You can then paste it to
a document for later use in resolving your problems.
Related information
None.
Upgrade reports
Upgrades generate report messages for all configuration modifications made during the upgrade.
These messages are categorized into the following four priorities:
Service Group
Displays all configured service groups. Covered information includes the group’s
description, protocols, applied ratings, and any additional parameters.
Services
Shows the current status of key daemons and services. Gateway services interact with
other security gateway processes. Information reported is specific to the service
described.
Time Period
Shows any defined time restrictions available for use. Fields include the starting and
ending time, day, and year.
User Account
Shows configured static users. Fields include the name, authentication type, and
description.
User Group
Details all user group settings.
VPN Tunnel
Displays all configured gateway-to-gateway and client-to-gateway VPN tunnels.
Information displayed includes the VPN policy, local and remote endpoints, local and
remote gateways, and description.
VPN Tunnel Policy
Lists all of the VPN policies currently configured, including the respective parameters
of each. It also covers the global IKE policy.
Table 13-8
Configuration reports categories (Continued)
Report
Description
Action
Describes changes that you have to modify to ensure proper gateway functionality, such as
an authentication method that is no longer supported.
Refer to the S
ymantec Gateway Security 5000 Series v3.0 Installation Guide
for detailed
information about upgrades
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...