815
Field descriptions
Menu option field descriptions
FTP Options panel
The FTP Options panel helps you create a rule to allow FTP services. Additional configuration options
for SMTP rules are available through the Rule Property and Service Group Property dialog boxes.
Associated tasks
The tasks that you can perform with this panel include:
■
“Configuring HTTP, FTP, and mail (SMTP and POP3) rules with the Firewall Rule Wizard”
■
Confirmation panel
In the Confirmation panel, you can review the results of rules you have configured before activating
the configurations.
If you are satisfied that the information is correct, click Finish to create the tunnel or configure the
connection.
To make changes, click Back to return to a previous panel.
Allow HTTPS only on
standard ports
Specifies that HTTPS connections will use only port 443/tcp or 563/tcp as the
destination port.
Other port numbers are disallowed.
This option is checked by default.
Allow FTP through HTTP
Lets the FTP protocol be handled by the HTTP proxy.
This option is checked by default.
Inside interface
If more than one inside interface is enabled on the security gateway, specifies the
interface to be used for HTTP traffic.
When the security gateway is in a cluster, you can select from inside VIPs.
Table D-323
FTP Options panel
Field
Description
Apply antivirus scanning
Antivirus scanning is applied to the FTP rule created by the wizard.
This option is checked by default.
Allow puts
FTP puts are allowed by the rule.
This option is checked by default.
Allow gets
FTP gets are allowed by the rule.
This option is checked by default.
Inside Interface
If more than one inside interface is enabled on the security gateway, shows the
interface to be used by the FTP rule created by the wizard.
When the security gateway is in a cluster, you can select from inside VIPs.
Table D-322
HTTP Options panel (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...