ZyXEL UAG715 User Guide - Page 440
Service Access Limitations, System Timeout
View all ZyXEL UAG715 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 440 highlights
Chapter 39 System Note: To allow the UAG to be accessed from a specified computer using a service, make sure you do not have a service control rule or to-Device firewall rule to block that traffic. • See To-Device Rules on page 240 for more on To-Device firewall rules. To stop a service from accessing the UAG, clear Enable in the corresponding service screen. 39.7.1 Service Access Limitations A service cannot be used to access the UAG when: 1 You have disabled that service in the corresponding screen. 2 The allowed IP address (address object) in the Service Control table does not match the client IP address (the UAG disallows the session). 3 The IP address (address object) in the Service Control table is not in the allowed zone or the action is set to Deny. 4 There is a firewall rule that blocks it. 39.7.2 System Timeout There is a lease timeout for administrators. The UAG automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. Each user is also forced to log in the UAG for authentication again when the reauthentication time expires. You can change the timeout settings in the User/Group screens. 39.7.3 HTTPS You can set the UAG to use HTTP or HTTPS (HTTPS adds security) for Web Configurator sessions. Specify which zones allow Web Configurator access and from which IP address the access can come. HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages. Secure Socket Layer (SSL) is an application-level protocol that enables secure transactions of data by ensuring confidentiality (an unauthorized party cannot read the transferred data), authentication (one party can identify the other party) and data integrity (you know if data has been changed). It relies upon certificates, public keys, and private keys (see Chapter 35 on page 394 for more information). HTTPS on the UAG is used so that you can securely access the UAG using the Web Configurator. The SSL protocol specifies that the HTTPS server (the UAG) must always authenticate itself to the HTTPS client (the computer which requests the HTTPS connection with the UAG), whereas the HTTPS client only should authenticate itself when the HTTPS server requires it to do so (select 440 UAG715 User's Guide