800
Field descriptions
Menu option field descriptions
Network Interfaces panel
The Network Interfaces panel lets you specify parameters for all security gateway interfaces, including
virtual local area network (VLAN) interfaces.
When you are configuring eth1 as an outside interface, you can also enable the appliance as a DHCP
client.
Associated tasks
The tasks that you can perform with this panel include:
■
■
“Modifying a network interface”
■
Add VLANs dialog box
You use the Add VLANs dialog box to specify a trunk port and the VLANs that use it.
Associated tasks
The task that you can perform with this dialog box is:
■
Table D-303
Network Interfaces panel
Field
Description
Interface type
From the drop-down list, select Outside or Inside.
Name
Logical name of the interface. This is the name that is used in rules.
IP address
IP address in dotted quad notation.
You must use an IP address that is unique to the subnet to which it connects.
Netmask
Subnet mask address.
MAC address
MAC address is assigned automatically and cannot be changed.
Enable external ping
Lets users issue a ping command on your security gateway.
This option is unchecked by default.
Ping on outside interfaces is disabled as a security measure. The security gateway
does not respond to ping commands issued to the outside interface.
DHCP Client
Enables DHCP.
To use DHCP, there must be a DHCP server running on the outside network. When
you enable DHCP, the IP address and netmask text boxes are disabled. The IP
address of eth1 automatically changes to 0.0.0.0.
This option is unchecked by default.
To enable DHCP you must meet the following conditions:
■
You must be modifying the eth1 interface
■
Eth1 must be configured as an outside interface
■
High availability and load balancing (HA/LB) must be disabled
Table D-304
Add VLANs dialog box
Field
Description
Interface
Network interface that serves as the trunk port for the VLANs.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...