Chapter 46 System
UAG Series User’s Guide
501
46.7 WWW Overview
The following figure shows secure and insecure management of the UAG coming in from the WAN.
HTTPS and SSH access are secure. HTTP and Telnet access are not secure.
Note: To allow the UAG to be accessed from a specified computer using a service, make
sure you do not have a service control rule or to-Device security policy to block
that traffic.
for more on To-Device security policies.
To stop a service from accessing the UAG, clear
Enable
in the corresponding service screen.
46.7.1 Service Access Limitations
A service cannot be used to access the UAG when:
1
You have disabled that service in the corresponding screen.
2
The allowed IP address (address object) in the
Service Control
table does not match the client IP
address (the UAG disallows the session).
3
The IP address (address object) in the
Service Control
table is not in the allowed zone or the
action is set to
Deny
.
4
There is a security policy that blocks it.
46.7.2 System Timeout
There is a lease timeout for administrators. The UAG automatically logs you out if the management
session remains idle for longer than this timeout period. The management session does not time
out when a statistics screen is polling.
Each user is also forced to log in the UAG for authentication again when the reauthentication time
expires.
You can change the timeout settings in the
User/Group
screens.
Action
Select
Accept
to have the UAG allow the DNS queries from the specified computer.
Select
Deny
to have the UAG reject the DNS queries from the specified computer.
OK
Click
OK
to save your customized settings and exit this screen.
Cancel
Click
Cancel
to exit this screen without saving
Table 240
Configuration > System > DNS > Service Control Rule Add (continued)
LABEL
DESCRIPTION