Table 18: User Role Secure Meeting Configuration Details
(continued)
Your Action
Function
Option
Enter the number.
NOTE: Enter <-1> to not renew
the meeting password.
Allows you to prompt user to
renew password after specific
number of meetings.
Password Management
Select one of the following
options from drop-down list:
•
Allow remote control of
shared windows (more
functional)
—Allows the
meeting presenter or
conductor to pass control of
the presenter’s desktop and
desktop applications to any
of the meeting attendees,
including non-Secure
Access device users.
•
Disable remote control
(more secure)
—Allows
Limited control of the
meeting presenter’s desktop
and desktop applications
exclusively to the presenter.
Specifies whether you want to
allow meeting presenters to
share control of their desktops
and applications with other
meeting attendees.
Remote Control
Meetings > Options > Meeting Policy Settings tab
Select the
Limit number of
simultaneous meetings
check
box to enable this feature.
Allows you to specify the
maximum number of meetings
that may be held by at any
given time by members of the
role.
Limit number of simultaneous
meetings
Select the
Limit number of
simultaneous meeting
attendees
check box to enable
this feature.
Allows you to specify the
maximum number of people
who may simultaneously
attend meetings scheduled by
members of the role.
Limit number of simultaneous
meeting attendees
Select the
Limit duration of
meetings (minutes)
to enable
this feature.
Allows you to specify a
maximum duration (in
minutes) that a meeting may
run.
Limit duration of meetings
(minutes)
Meetings > Auth Servers
Select the
ALL Authentication
Servers
check box to enable
this feature.
Exports all authentication
servers or selected
authentication servers.
All Authentication Servers
Select the authentication
server and click
Add
.
Specifies whether the
members of this role may
access and search the
authentication servers that
they are currently
authenticated against.
Auth Servers with Access
Priviledge
83
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...