Note that if this user is being set up for the Secure Remote Client function, the Non-Secure IP field should be set to "password". See the Secure Remote Client section in the Users' Guide for more information.
![]() |
Administering Users at the Firewall |
/bin/csh The C shell /bin/bsh The Bourne shell /bin/ksh The Korn shell /bin/restrict.sh A restricted shell /bin/oneact.sh A shell that performs a single action
/bin/csh The C shell /bin/ksh The Korn shell /bin/bsh The Bourne shell /bin/restrict.sh A restricted shell /bin/oneact.sh A shell that performs a single action.
deny user cannot login to the firewall none use no authentication password use password authentication SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot FTP through the Firewall none use no authentication password use password authentication SecureNet Key use a AssureNet Pathways SecureNet Key card SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot FTP through the Firewall none use no authentication password use password authentication SecureNet Key use a AssureNet Pathways SecureNet Key card SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot Telnet through the Firewall none use no authentication password use password authentication SecureNet Key use a AssureNet Pathways SecureNet Key card SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot login to the firewall none use no authentication password use password authentication SecureNet Key use a Digital Pathways SecureNet Key card SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot authenticate password use password authentication
deny user cannot authenticate password use password authenticationNote that this field should be set to "password" if this user is being set up for the Secure Remote Client function. See the Secure Remote Client section in the Users' Guide for more information.
deny user cannot login to the firewall none use no authentication password use password authentication SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
deny user cannot login to the firewall none use no authentication password use password authentication SecurID Card use a Security Dynamics SecurID Card User-Supplied use the authentication method supplied by you
Note: To unlock a user's account that was locked because of too many failed logins,the system administrator can use the Reset User's Failed Login Count menu item under the Users menu item of the Security & Users menu.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
This field is only applicable if the authentication method is password.
Network Objects | Click on this item to allow this network
administrator to configure network objects.
If Network Objects is selected, decide if you would like this
user to have either "Basic" or "Advanced" access to the Network Objects.
Advanced and Basic are defined as follows:
|
---|---|
Traffic Control | Click on this item to allow this network administrator to configure Traffic Control functions. See Controlling Traffic Through the Firewall in the User's Guide for more information. |
NAT | Click on this item to allow this network administrator to configure Network Address Translation. See Translating Network Addresses in the User's Guide for more information. |
DNS | Click on this item to allow this network administrator to configure domain name services. See Handling Domain Name and Mail Services in the User's Guide for more information. |
Click on this item to allow this network administrator to configure mail services. See Handling Domain Name and Mail Services in the User's Guide for more information. | |
Virtual Private Network | Click on this item to allow this network administrator to configure the virtual private network for this firewall. See Creating a Virtual Private Network in the User's Guide for more information. |
Proxy Administration | Click on this item to allow this network administrator to configure proxy services. See Using Proxy Servers in the User's Guide for more information. |
Users | Click on this item to allow this network administrator to define users. See Administering Users at the Firewall in the User's Guide for more information. |
SNMP | Click on this item to allow this network administrator to configure the Simple Network Management Protocol agent on the firewall. See SNMP in the User's Guide for more information. |
Log Facilities | Click on this item to allow this network administrator to configure the system logs. See Managing Log and Archive Files in the User's Guide for more information. |
Log Monitor | Click on this item to allow this network administrator to configure the log monitor function. See Monitoring the Firewall Logging in the User's Guide for more information. |
Secure/Non-Secure Interface | Click on this item to allow this network administrator to configure the security status of interfaces on the firewall. See Designating Your Network Interface in the User's Guide for more information. |
Pager | Click on this item to allow this network administrator to setup the pager. See Pager Notification Support in the User's Guide for more information. |
Note: Anytime you click on a checkbox that pertains to a Predefined Service, and you click on "OK", you must activate these changes via the Connection Activation window. You do not need to activate after changing either of the Transparent Proxy checkboxes as these two do not pertain to Predefined Services.
![]() |
Using the Configuration Client to Define a Security Policy |
Warning: Use of this Service can open your Firewall up to security exposures. Use this service with extreme caution.
![]() | Create new |
![]() | Carrier |
![]() | Create new modem |
![]() | Modem |