63
Becoming familiar with the SGMI
Viewing system information
To view objects used by an object you want to modify
1
In the SGMI, in the right pane, select the object that you want to modify.
2
Do one of the following:
■
On the View menu, click
In Use By
.
■
Right-click, and click
In Use By
.
The SGMI searches for references to the selected object in other objects and displays the results on
the In Use By tab of the lower pane.
3
When a large number of object are returned, you can use the icons to the left of the window to
control the search.
4
To view the results of the search, drag the pane divider up to increase the size of the window, or use
the scroll bar.
Related information
For further information related to this topic, see the following:
■
“Viewing and modifying object properties”
■
“Deleting configuration objects”
Viewing system information
The System window is a read-only display of several security gateway statistics. This page displays the
operating system, system date and time, host name and gateway address, product name including the
security gateway version number, and the Symantec System ID. You can also view the Symantec
System ID on the LCD panel of the appliance.
If you are connected to SESA, the System page also displays information about the SESA Agent,
including whether it is installed and enabled and the port over which it is connected.
Note:
Symantec Gateway Security 5000 Series v3.0 requires Symantec Advanced Manager for Security
Gateways v3.0.
Prerequisites
None.
Restart the search.
This can only be used after the search has been paused.
Pause the search.
Stop the search.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...