12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

106 Monitoring security gateway trafficConfiguration reportsTable 8-2ReportAvailable configuration reports (Continued)DescriptionLogical Network InterfaceMachine AccountNAT PoolNetwork EntityNetwork InterfaceNetwork ProtocolNotificationProxy ServicesRedirected ServiceRuleVPN TunnelVPN Tunnel PolicyService GroupSystem Parameters forLocationSystem Parameters forPolicySystem informationTime PeriodUser AccountUser GroupServicesShows all defined logical network interfaces.Lists all configured systems, and the functions they can perform.Details any configured network address translation (NAT) pools, including the starting andending addresses in the pool, the addresses being modified, and the description.Lists all configured network entities. Information reported is dependent on the type ofentity, and can include the network address, MAC address, and description.Displays information on all of the hardware adapters in the machine. It includesinformation on the IP address assigned to each interface, whether or not spoof protection isenabled, and whether or not the interface allows multicast traffic. In addition, it also showsif one or more filters are assigned.Lists all of the protocols either in use or available, including any custom protocols.Displays all configured notifications. You can set notifications to alert administrators ofnoteworthy security gateway conditions.Lists the current state, enabled or disabled, or each of the proxies. Information displayed isdependent upon the section viewed, and includes default and customized field parameters.Lists any configured service redirects, including the requested address, requested addressnetmask, redirected address, redirected port, and description.Lists configured definitions to allow or deny traffic based on network entities. There areseveral fields of information displayed including the applicable entry and exit points, thesource and destination, protocol, authentication method, and description.Displays all configured Gateway-to-Gateway and Client-to-Gateway VPN tunnels.Information displayed includes the VPN policy, local and remote endpoints, local andremote gateways, and description.Lists all of the VPN policies currently configured, including the respective parameters ofeach. It also covers the Global IKE policy.Displays all configured service groups. Covered information includes the group’sdescription, protocols, applied ratings, and any additional parameters.Shows the minimum password length for gateway and Bellcore S/Key passwords.Reports on the assigned forward filter (if any), if reverse lookups are enabled and the timeto wait for them, and whether or not the host name is used in the log file in place of the IPaddress.Details the current system state, licensed options, and SESA Agent status, for SESAenabledsecurity gateways.Shows any defined time restrictions available for use. Fields include the starting andending time, day, and year.Shows configured static users. Fields include the name, authentication type, anddescription.Details any user groups currently configured.Shows the current status of key daemons and services. Gateway services interact with othersecurity gateway processes. Information reported is specific to the service described. Forexample, the LDAP window section lists the primary and alternate LDAP servers, and theOOBA section covers timeout periods and whether or not to use SSL.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!