Chapter 46 System
UAG Series User’s Guide
501
46.7 WWW Overview
The following figure shows secure and insecure management of the UAG coming in from the WAN.
HTTPS and SSH access are secure. HTTP and Telnet access are not secure.
Note: To allow the UAG to be accessed from a specified computer using a service, make
sure you do not have a service control rule or to-Device security policy to block
that traffic.
•See To-Device Rules on page 290 for more on To-Device security policies.
To stop a service from accessing the UAG, clear Enable in the corresponding service screen.
46.7.1 Service Access Limitations
A service cannot be used to access the UAG when:
1 You have disabled that service in the corresponding screen.
2 The allowed IP address (address object) in the Service Control table does not match the client IP
address (the UAG disallows the session).
3 The IP address (address object) in the Service Control table is not in the allowed zone or the
action is set to Deny.
4 There is a security policy that blocks it.
46.7.2 System Timeout
There is a lease timeout for administrators. The UAG automatically logs you out if the management
session remains idle for longer than this timeout period. The management session does not time
out when a statistics screen is polling.
Each user is also forced to log in the UAG for authentication again when the reauthentication time
expires.
You can change the timeout settings in the User/Group screens.
Action Select Accept to have the UAG allow the DNS queries from the specified computer.
Select Deny to have the UAG reject the DNS queries from the specified computer.
OK Click OK to save your customized settings and exit this screen.
Cancel Click Cancel to exit this screen without saving
Table 240 Configuration > System > DNS > Service Control Rule Add (continued)
LABEL DESCRIPTION