
594
Field descriptions
Policy field descriptions
Rule Properties—Advanced Services tab
Use the Advanced Services tab to create special rule services that are not included as part of the
standard services. An example of the use of a special service would be to limit the length of lines in the
body of an SMTP message.
Note:
The syntax must be correct; consult Symantec Technical Support for the exact syntax required
for the special rule service you are creating.
Associated tasks
The task that you can perform with this tab is:
■
“Using advanced service parameters for nonstandard services”
Rule Properties—Authentication tab
The Authentication tab lets you specify an authentication scheme to be used with the rule and users or
user groups who must authenticate.
Associated tasks
The task that you can perform with this tab is:
■
“Adding authentication to rules”
Table D-27
Rule Properties—Advanced Services tab
Field
Description
Parameters list
Lists the parameters for services that have been added to the rule.
Parameter
Lets you add, modify, or delete the syntax for the advanced service.
The syntax must be correct. Contact Symantec Technical Support for the exact syntax.
Table D-28
Rule Properties—Authentication tab
Field
Description
Use Out-of-Band
authentication
Indicates whether Out-of-Band authentication is enabled for this rule.
This option is unchecked by default.
OOBA provides authentication for proxies such as the GSP proxy that do not have
authentication by default.
To use OOBA, you must define the authentication scheme that OOBA uses, and configure the
OOBA daemon.
Authentication
scheme
Displays the authentication scheme that is being used for this rule.
You must select an authentication scheme to use authentication in a rule.
The default is (none), meaning that authentication is not applied to the rule.
Included network
users
Displays users who must authenticate.
For a new rule, the list is empty until you add user accounts to it.
Included user
groups
Displays users groups whose members must authenticate.
All members of user groups that you add are required to authenticate unless you specifically
exclude a user by adding it to the Excluded network users list.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...