61
Becoming familiar with the SGMI
Working with configurations of objects
Reverting changes
The actions of saving and activating changes are not irrevocable.
Prerequisites
Complete the following task before beginning this procedure:
■
“Saving and activating configuration changes”
Revert changes
When you want to undo changes, you can do either of the following:
■
If you have unsaved changes, you can revert to the last changes that you saved.
■
If you have changes that have been saved but not activated, you can revert to the state at the last
time you activated changes.
■
If you want to undo changes to a single object, you can revert just those changes.
To revert unsaved changes
1
On the File menu, click
Revert to Last Saved
.
2
When prompted to confirm that you want to revert, click
Yes
.
The changes and change indicators are removed from the objects.
To revert changes that have not been activated
1
On the File menu, click
Revert to Last Active
.
2
In the Confirm Discard of Pending Changes message, click
Yes
.
The changes and change indicators are removed from the objects.
To revert changes to a single object
1
In the right pane, select the object for which you want to revert changes.
2
Right-click and click
Revert
.
Only the changes you made to the selected object are reverted. Changes are retained for all other
objects, and can be saved and activated.
Deleting configuration objects
When changes take place in your network infrastructure or corporate security policy, you can delete
objects that are no longer used. For example, if a mail server is no longer in use, you can delete the
network entity that represents it.
To delete a configuration object
1
In the SGMI, in the left pane, click the section and folder that contain the object.
For example, to delete a network entity, under Assets, click
Network
.
2
In the right pane, click the appropriate tab.
For example, in the right pane, click
Network Entities
.
3
Do one of the following:
■
Select the object to be deleted, and then, on the Edit menu, click
Delete
.
■
Right-click the object, and then click
Delete
.
■
Select the object, and then, at the top of the pane, click
Delete
.
If no other objects reference this object, a red X to the left of the object in the table marks it for
deletion.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...