![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 109](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862109.webp)
Table 20: User Role Telnet/SSH Configuration Details
(continued)
Your Action
Function
Option
Select one of the options from
drop-down list.
Specifies the screen size for
the telnet bookmark.
Screen Size
Select the screen buffer size.
Specifies the screen buffer size
for the Telnet bookmark.
Screen Buffer
Telnet/SSH > Options tab
Select the
User can add
sessions
check box to enable
this feature.
Allows users to define their
own session bookmarks and
to allow users to browse to a
terminal session using the
following syntax:
•
telnet://
•
ssh://
•
/dana/term/newlaunchterm.cgi
The Add Terminal Session
button appears on the
Terminal Sessions page the
next time a user refreshes the
Secure Access device
welcome page.
User can add sessions
Related
Documentation
•
Configuring Access Options using Remote Access Mechanisms Overview on page 65
•
Configuring a File Rewriting Resource Policy (NSM Procedure) on page 137
91
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...