CHAPTER 10
Configuring Secure Access Resource
Policies
•
Configuring a File Rewriting Resource Policy (NSM Procedure) on page 137
•
Configuring a Secure Application Manager Resource Policy (NSM Procedure) on page 144
•
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure) on page 146
•
Configuring a Terminal Service Resource Policy (NSM Procedure) on page 149
•
Configuring Web Rewriting Resource Policies (NSM Procedure) on page 151
•
Configuring a Network Connect Connection Profile Resource Policy (NSM
Procedure) on page 155
•
Defining Network Connect Split Tunneling Policies (NSM Procedure) on page 159
Configuring a File Rewriting Resource Policy (NSM Procedure)
File rewriting resource policies speciy which Windows resources a user may access, as
well as the encoding to use when communicating with Windows and NFS file shares.
When a user makes a file request, the Secure Access device evaluates the resource
policies corresponding to the request, such as Windows access resource policies for a
request to fetch an MS Word document (.doc file). After matching a user’s request to a
resource listed in a relevant policy, the Secure Access device performs the action specified
for the resource.
To configure a file rewriting resource policy:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a file
rewriting resource policy.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
Files
.
3.
Select a policy, and then enter the name, the description, and the resources for the
policy.
4.
In the Applies to roles list. Select one:
•
All
—Applies the policy to all users.
•
Selected
—Applies the policy only to users who are mapped to roles in the Role
Selection section.
137
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...