Configuration of using a non-management interface to manage the USG6000 series on the web UI

2

To manage the USG6000 series through a non-management interface, you can configure the web UI as follows:
1. Choose Network > Interface.
2. On the interface editing page, select Enable Access Management and the corresponding protocol. This configuration has a higher priority than security policies. After enabling access management on the interface, even if the security policy between the local zone and the interface locating security zone is disabled, as an administrator, you can still log in to the device through the interface.

Other related questions:
Configuration of using a non-management interface to manage the USG6000 series on the CLI
To manage the USG6000 series through a non-management interface, you can configure the CLI as follows: # On GigabitEthernet 1/0/1, configure to allow the administrator to access the device using HTTP. system-view [sysname] interface GigabitEthernet 1/0/1 [sysname-GigabitEthernet1/0/1] service-manage http permit This configuration has a higher priority than security policies. After enabling access management on the interface, even if the security policy between the local zone and the interface locating security zone is disabled, as an administrator, you can still log in to the device through the interface.

Configuration of using a non-management interface to manage the USG2000&5000 series
To use a non-management interface to manage the USG2000&5000 series, you can configure as follows: 1. Choose Network > Interface > Interface on the web page. 2. On the interface editing page, select Enable Access Management and the corresponding protocol. This configuration has a higher priority than security policies. After enabling access management on the interface, even if the security policy between the local zone and the interface locating security zone is disabled, as an administrator, you can still log in to the device through the interface.

Configuration of USG6000 series interworking with the ATIC on the web UI
The USG6000 series can be configured on the web UI to interwork with the ATIC. 1. Choose Policy > Security Protection > Attack Defense > Anti-DDoS. 2. Select the ATIC Interworking check box and enter the IP address of the ATIC server. After the USG6000 is configured to interwork with the ATIC server, it can send traffic anomaly logs to the ATIC server.

IAD132E(T)How to configure in web management interface
Refer to the following links

Whether the management interface of the USG6000 supports VRRP
The USG6000 management interface supports configuring VRRP.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top