728
Field descriptions
Assets field descriptions
Parameters for protocols within service groups
Additional parameters can be configured for some protocols when they are included in a service group.
Parameters for cifs—General tab
These parameters let you further customize the behavior of the CIFS protocol.
Associated tasks
None.
Table D-205
Parameters for cifs—General tab
Field
Description
Service Group Name
A unique name for this service group.
This field is read-only.
Protocol Name
Name of the modifiable protocol in this service group.
This field is read-only.
File Reading Allowed
Lets users read files or query attributes of files on an SMB server. This is
useful for setting up public directories for download purposes only.
File Printing Allowed
Lets users perform print operations or connect to print shares on an SMB
server.
File Renaming Allowed
Lets users and applications rename or move files on an SMB server.
File Writing Allowed
Lets users write or copy files, or create directories on an SMB server. This is
useful in setting up public directories for upload purposes only.
File Deleting Allowed
Lets users or applications delete files and directories from the SMB server.
File Access Allowed
Lets users connect to file shares on an SMB server.
File Permission Change Allowed
Lets users and applications change modal attributes of any file on an SMB
server.
File Generic Access Allowed
Lets users connect to any shared resource not covered by:
■
File Printing Allowed
■
Pipe Use Allowed
■
File Access Allowed
■
COM Port Access Allowed
Some CIFS clients use generic access to connect to CIFS servers for
administrative purposes. In general, they connect to server-namePC$ with a
target of “$$$$” (the generic device). The connection to the IPC$ share on the
server lets the server validate the client as existing in the domain. To prevent
this type of traffic from passing through the security gateway, uncheck this
option. However, if you uncheck this option, and the client and server are in
different domains, file and print sharing between client and server will not
work.
File Directory Access Allowed
Lets users and applications obtain directory listings.
Pipe Use Allowed
Lets applications use named pipes over an SMB connection. Named pipes are
used for a variety of applications, such as remote management, network
printer sharing, and SQL server (using default transport). If you uncheck this
option, you cannot pass traffic from these applications through the security
gateway. If you do not want your inside servers remotely managed from the
outside, and you have CIFS enabled, uncheck this option.
COM Port Access Allowed
Lets users connect to shared communication devices (such as serial ports).
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...