18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2: Protecting<br />

multiple networks with<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

management<br />

options<br />

Chapter 1: Introduction<br />

<strong>Sidewinder</strong> <strong>G2</strong> management options<br />

The configuration shown in Figure 2 is useful in providing protection for two<br />

otherwise separate networks within your organization, or between your<br />

organization and a strategic business partner. This configuration uses three<br />

network interfaces.<br />

your<br />

network<br />

protected networks<br />

trusted<br />

network<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

R<br />

router<br />

Internet<br />

The <strong>Sidewinder</strong> <strong>G2</strong> provides interface flexibility that allows multiple<br />

management options:<br />

• Admin Console—You can install and use the graphical user interface<br />

s<strong>of</strong>tware, referred to as the Admin Console, on a Windows ® operating<br />

system, allowing you to easily connect to and manage your <strong>Sidewinder</strong> <strong>G2</strong>.<br />

The Admin Console displays the <strong>Sidewinder</strong> <strong>G2</strong> dashboard, a centralized<br />

way to view system status, from current patch level and uptime to recent<br />

attempted attacks. All Admin Console sessions are encrypted.<br />

• SSH session—You can establish a secure shell (SSH) session to<br />

administer the <strong>Sidewinder</strong> <strong>G2</strong> via the command-line interface from a<br />

Windows, UNIX, or other workstation capable <strong>of</strong> running an SSH client.<br />

• Telnet session—You can also establish a Telnet connection to establish a<br />

command line session with <strong>Sidewinder</strong> <strong>G2</strong>. Telnet is not encrypted and<br />

therefore not secure; only use Telnet sessions to your <strong>Sidewinder</strong> <strong>G2</strong> when<br />

on a secure network.<br />

Tip: See Chapter 2 for details on using each management option.<br />

?<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!