62
Becoming familiar with the SGMI
Working with configurations of objects
4
If the object is referenced by other security gateway configurations, a warning displays, telling you
that the object cannot be deleted because it is in use. Do the following:
■
To clear the warning, click
OK
.
■
Right-click the object that you could not delete and click
In Use By
.
The In Use By tab of the lower pane opens, listing the other configurations that are affected.
Before you can delete the object, you must revise or delete the objects that use it.
You can also click
Copy
to copy the warning message to the clipboard and paste the message in a
document for use in locating the object at a later time.
5
A deletion is not final until you save the change. To undo a deletion, right click on the deleted
object and then click
Revert
.
In the table, a blue ball beside the object indicates that it has been modified.
Using the lower pane when you change configurations
The SGMI usually appears with two panes visible: the left pane that contains folders for navigation and
the right pane that contains the configuration details of the selected folder.
As you modify configuration details, you can display an additional lower pane at the bottom of the
SGMI window to let you view error warnings, validation messages, and other security gateway objects
that use a selected object.
This section includes the following topics:
■
Displaying and hiding the lower pane
■
Viewing objects used by an object you want to modify
Displaying and hiding the lower pane
The lower pane displays automatically in the following circumstances:
■
When you activate a change and activation fails.
■
When you select an object and click the In Use By option on the Table menu.
You can also open the lower pane manually.
To display and hide the lower pane
1
To display the lower pane, in the SGMI, hold the left mouse button down and drag the divider bar at
the bottom of the window up until the pane is the desired height.
2
To hide the lower pane, in the upper left corner of the pane, click
X
, or drag the divider bar down.
Viewing objects used by an object you want to modify
When you make configuration changes to a security gateway object, the changes affect other objects
that use the object you change. For example, if you change the properties of a network entity that is
used in a rule, the behavior of the rule changes. If you rename an object, all referencing objects are
updated automatically.
If you attempt to delete an object that is in use by other configuration objects, a message warns you
that the object is in use and cannot be deleted.
Before you begin to modify an object, you can use the In Use By option to display a list of objects that
reference the object you want to change.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...