
41
Becoming familiar with the SGMI
Navigating in the SGMI
For a comparison of navigation in Symantec Gateway Security v2.0 and Symantec Gateway Security
5000 Series v3.0, see
Changes to Symantec Gateway Security 5000 Series v3.0 navigation
This section is intended to ease the transition from the Symantec Gateway Security v2.0 SGMI to the
Symantec Gateway Security 5000 Series v3.0 SGMI. The table below compares the location of tasks in
the two versions of the user interface.
Cluster
Lets you modify parameters of cluster members you have created to ensure high availability
(HA) and increases performance through load balancing (LB).
Cluster Status
Lets you monitor a cluster of security gateways, including whether
each member is up and running, IP and Virtual IP (VIP) addresses,
and the relative load of traffic on each cluster member.
Cluster Members
Lets you modify settings for hot standby, load balancing, and
weight on each cluster member.
VIPs
Lets you add, modify, or delete virtual IP addresses used in a
cluster.
Watchlist
Lets you select cluster processes to monitor.
Ping groups
Lets you configure ping groups to monitor servers that are not part
of the cluster, but that offer services on the internal network.
NIC Monitoring
Lets you monitor the status of network interfaces with the
exception of virtual local area network s (VLANs).
Traffic Grouping
Lets you assign specific traffic, such as traffic from a Web server,
through a specific cluster member, regardless of load balancing.
Table 2-4
Navigation for SGMI v2.0 mapped to SGMI v3.0
SGMI v2.0
SGMI v 3.0
Policy > Rules
Policy > Firewall > Rules
Policy > Service Groups
Assets > Protocols > Service Groups
Policy > Filters
Policy > Firewall > Filters
Policy > Content Filtering
Policy > Content Filtering
Policy > VPN Policies
Policy > VPN > VPN Policies
Policy > Global IKE Policies
Tools menu > VPN > Global IKE Policy
Policy > AntiVirus
Policy > Antivirus
Policy > IDS/IPS
Policy > IDS/IPS
Policy > Advanced > Logical Network Interfaces
Assets > Network > Network Interfaces
Policy > Advanced > Network Protocols
Assets > Protocols > Network Protocols
Policy > Advanced > Time Periods
Policy > Firewall > Time Periods
Table 2-3
Section and folder descriptions (Continued)
Section name
Folder name
Description
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...