
730
Field descriptions
Assets field descriptions
Parameters for ftp—Additional Commands tab
These parameters let you further customize the behavior of the FTP protocol.
Associated tasks
None.
Parameters for ftp—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
Parameters for http—General tab
These parameters let you further customize the behavior of the HTTP protocol.
Associated tasks
None.
Parameters for http—Options tab
These parameters let you further customize the behavior of the HTTP protocol.
Associated tasks
None.
Table D-207
Parameters for ftp—Additional Commands tab
Field
Description
Command list
Current list of additional commands for this protocol.
Command
Additional command to add.
Table D-208
Parameters for http—General tab
Field
Description
Service group name
Unique name of the service group. This field is read-only.
Protocol name
Protocol with which you are currently working. This field is read-only.
Caption
An optional, brief description of the configurable parameters for the HTTP protocol.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Table D-209
Parameters for http—Options tab
Field
Description
Allow HTTP
Allows HTTP.
This option is checked by default.
Allow Upload
Lets HTTP connections use the POST and PUT commands.
This option is checked by default.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...