786
Field descriptions
Menu option field descriptions
User/Group Role panel
In the User/Group Role panel, you can select the clientless role to which to assign the rule.
Associated tasks
The task that you can perform with this panel is:
■
“Using the Remote Access Tunnel Wizard to set up clientless VPN connections”
■
Gateway-to-Gateway Tunnel Wizard
The Gateway-to-Gateway Tunnel Wizard helps you build VPN tunnels between two IPsec-compliant
security gateways.
Associated panels
These are the individual panels of the Gateway-to-Gateway Tunnel Wizard:
■
“Gateway-to-Gateway Tunnel Wizard panel”
■
“Gateway-to-Gateway Tunnel Information panel”
■
“Local Security Gateway panel”
■
■
“New Local Endpoint and Create a Local End Group panels”
■
“Remote Security Gateway panel”
■
■
■
Table D-286
User/Group Role panel
Field
Description
Use existing role
Lets you select an existing role from the drop-down list.
Create a new user
role
Lets you create a new user role by specifying the following:
■
User name
A unique name for the new user role.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), and dashes (-).
Do not include spaces in the name. The characters @, !, #, $, %, ^, &, *, <, >, and other
reserved characters are also invalid.
■
User authentication server
Select the authentication server from the drop-down list.
Create new group
role
Lets you create a new group role by specifying the following:
■
Group name
A unique name for the new group role.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), and dashes (-).
Do not include spaces in the name. The characters @, !, #, $, %, ^, &, *, <, >, and other
reserved characters are also invalid.
■
Group authentication server
Select the group authentication server from the drop-down list
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...