Cisco Secure Firewall 3120 Começar a trabalhar - Página 8

Procurar online ou descarregar pdf Começar a trabalhar para Hardware de rede Cisco Secure Firewall 3120. Cisco Secure Firewall 3120 42 páginas.

Your User Role Controls What You Can See and Do
Command Line Interface (CLI, Console)
The following topics explain how to log into these interfaces and manage your user account.
Your User Role Controls What You Can See and Do
Your username is assigned a role, and your role determines what you can do or what you can see in the FDM.
The locally-defined admin user has all privileges, but if you log in using a different account, you might have
fewer privileges.
The upper-right corner of the FDM window shows your username and privilege level.
The privileges are:
• Administrator—You can see and use all features.
• Read-Write User—You can do everything a read-only user can do, and you can also edit and deploy
• Read-Only User—You can view dashboards and the configuration, but you cannot make any changes.
These privileges are not related to those available for CLI users.
Logging Into the FDM
Use the FDM to configure, manage, and monitor the system. The features that you can configure through the
browser are not configurable through the command-line interface (CLI); you must use the web interface to
implement your security policies.
Use a current version of the following browsers: Firefox, Chrome, Safari, Edge.
Note
Before you begin
Initially, you can log into the FDM using the admin username only. However, you can then configure
authorization for additional users defined in an external AAA server, as described in
FTD User
There can be up to 5 active logins at one time. This includes users logged into the device manager and active
API sessions, which are represented by non-expired API tokens. If you exceed this limit, the oldest session,
either the device manager login or API token, is expired to allow the new session. These limits do not apply
to SSH sessions.
Getting Started
8
Use the CLI for troubleshooting. You can also use it for initial setup instead of the FDM.
the configuration. The only restrictions are for system-critical actions, which include installing upgrades,
creating and restoring backups, viewing the audit log, and ending the sessions of other FDM users.
If you try to make a change, the error message explains that this is due to lack of permission.
If you type in the wrong password and fail to log in on 3 consecutive attempts, your account is locked for 5
minutes. You must wait before trying to log in again.
Access.
Getting Started
Managing FDM and