Netgear SRX5308 SRX5308 Reference Manual - Page 239

Setting User Login Policies, Configuring Login Policies, Apply, Select All, Delete, Users, Policies

Page 239 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual Table 7-4. Add User Settings (continued) Setting Description (or Subfield and Description) Select Group The drop-down list shows the groups that are listed on the Group screen. From the drop-down list, select the group to which the user is assigned. For information about how to configure groups, see "Configuring Groups for VPN Policies" on page 7-6. Note: The user is automatically assigned to the domain that is associated with the selected group. Password The password that the user must enter to gain access to the VPN firewall. The password must contain alphanumeric, "-" or "_" characters. Confirm Password The password in this field must be identical to the one in the Password field. Idle Timeout The period after which an idle user is automatically logged out of the Web Management Interface. The default idle timeout period is 10 minutes. 4. Click Apply to save your settings. The user is added to the List of Users table. To delete one or more users: 1. In the List of Users table, select the check box to the left of the user that you want to delete, or click the Select All table button to select all users. You cannot delete a default user. 2. Click the Delete table button. Setting User Login Policies You can restrict the ability of defined users to log in to the VPN firewall's Web Management Interface. You can also require or prohibit logging in from certain IP addresses or from particular browsers. Configuring Login Policies To configure user login policies: 1. Select Users > Users from the menu. The Users screen displays (see Figure 7-5 on page 7-9). 2. In the Action column of the List of Users table, click the Policies table button for the user for which you want to set login policies. The Policies submenu tabs display, with the Login Policies screen in view (see Figure 7-7 on page 7-12). Managing Users, Authentication, and Certificates v1.0, April 2010 7-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
Managing Users, Authentication, and Certificates
7-11
v1.0, April 2010
4.
Click
Apply
to save your settings. The user is added to the List of Users table.
To delete one or more users:
1.
In the List of Users table, select the check box to the left of the user that you want to delete, or
click the
Select All
table button to select all users. You cannot delete a default user.
2.
Click the
Delete
table button.
Setting User Login Policies
You can restrict the ability of defined users to log in to the VPN firewall’s Web Management
Interface. You can also require or prohibit logging in from certain IP addresses or from particular
browsers.
Configuring Login Policies
To configure user login policies:
1.
Select
Users
>
Users
from the menu. The Users screen displays (see
Figure 7-5 on page 7-9
).
2.
In the Action column of the List of Users table, click the
Policies
table button for the user for
which you want to set login policies. The Policies submenu tabs display, with the Login
Policies screen in view (see
Figure 7-7 on page 7-12
).
Select Group
The drop-down list shows the groups that are listed on the Group screen. From the
drop-down list, select the group to which the user is assigned. For information
about how to configure groups, see
“Configuring Groups for VPN Policies” on
page 7-6
.
Note
: The user is automatically assigned to the domain that is associated with the
selected group.
Password
The password that the user must enter to gain access to the VPN firewall. The
password must contain alphanumeric, “—” or “_” characters.
Confirm Password
The password in this field must be identical to the one in the
Password
field.
Idle Timeout
The period after which an idle user is automatically logged out of the Web
Management Interface. The default idle timeout period is 10 minutes.
Table 7-4. Add User Settings (continued)
Setting
Description (or Subfield and Description)