788
Field descriptions
Menu option field descriptions
Local Endpoint panel
In the Local Endpoint panel, you select an existing network entity or create a new network entity to
serve as the local tunnel endpoint.
Associated tasks
The task that you can perform with this panel is:
■
“Running the Gateway-to-Gateway Tunnel Wizard”
■
New Local Endpoint and Create a Local End Group panels
The New Local Endpoint and Create a Local End Group panels let you configure a new network entity to
serve as the local tunnel endpoint for the gateway-to-gateway tunnel.
The panel that displays depends on your selection on the Local Endpoint panel.
Associated tasks
The task that you can perform with this panel is:
■
“Running the Gateway-to-Gateway Tunnel Wizard”
Create new network
entity
Lets you create a new security gateway network entity by specifying the following:
■
Name
A unique name for the new security gateway network entity.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), and dashes (-).
Do not include spaces in the name. The characters @, !, #, $, %, ^, &, *, <, > and other
reserved characters are also invalid.
■
Address type
Lets you select whether the security gateway network entity’s address type is a
configured logical network interface or a virtual IP address (VIP).
■
IP address
Depending on the address type you selected, the logical network interface or VIP
address of the new security gateway network entity.
Table D-289
Local Endpoint panel
Field
Description
Use existing
network entity
Lets you select an existing network entity from the drop-down list.
Create new network
entity
Lets you select the type of network entity to serve as the local endpoint.
Depending on your choice, a wizard panel is displayed to help you define a new host,
subnet, or group network entity.
Table D-288
Local Security Gateway panel (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...