Table 19: User Role Web Rewriting Configuration Details
(continued)
Your Action
Function
Option
Select the
Mask hostnames
while browsing
check box to
enable this feature.
Conceals the target resources
in the URLs to which users
browse.
Users can mask IP addresses
and hostnames in the user’s:
•
Web browser address bar
(when the user navigates to
a page.)
•
Web browser status bar
(when the user hovers over
a hyperlink.)
•
HTML source files (when
the user chooses to view
source.)
Mask hostnames while
browsing
Select the
Allow Java applets
check box to enable this
feature.
Enables users to: and allows
user to
•
Browse to web pages
containing client-side Java
applets.
•
Run applications that are
implemented as client-side
Java applets.
•
Run application such as the
Virtual Network Computing
(VNC) Java client, Citrix
NFuse Java client, WRQ
Reflection Web client, and
Lotus WebMail.
Allow Java applets
Select the
Allow Flash content
check box to enable this
feature.
NOTE: Secure Access device
provides limited support for
ActionScript 2.0 Flash
Remoting, and does not
support XML Socket
connections.
Enables the Secure Access
device to intermediate flash
content through its Content
Intermediation Engine.
Allow Flash content
Select the
Persistent cookies
to enable this feature.
By default, the Secure Access
device flushes Web cookies
that are stored during a user
session. A user can delete
cookies through the Advanced
Preferences if you enable this
option.
Enables users to customize
their browsing experiences
through persistent cookies.
Persistent cookies
87
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...