Table 34: Secure Application Manager Resource Policy Configuration
Details
(continued)
Your Action
Function
Option
Specify one of the following options:
•
Boolean expressions: Using system
variables, write one or more Boolean
expressions using the NOT, OR, or AND
operators.
•
Custom expressions: Using the custom
expression syntax, write one or more
custom expressions.
Specifies one or more expressions
to evaluate to perform the action.
Conditions
Options
Select
Options > IP based matching for
Hostname based policy resources
option
to enable this feature.
Secure Access device compares
the IP to its cached list of IP
addresses to determine if a host
name matches an IP address. If
there is a match, then the Secure
Access device accepts the match
as a policy match and applies the
action specified for the resource
policy.
IP based
matching for
Hostname
based policy
resources
Related
Documentation
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure) on page 146
•
•
Configuring a Terminal Service Resource Policy (NSM Procedure) on page 149
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure)
When you enable the Telnet/SSH access feature for a role, you need to create resource
policies that specify which remote servers a user may access. If the Secure Access device
matches a user’s request to a resource listed in a Telnet/SSH policy, the Secure Access
device performs the action specified for the resource.
To configure a Telnet and secure shell resource policy:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a
Telnet and secure shell resource policy.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
Telnet/SSH
.
3.
Add or modify settings as specified in Table 34 on page 144.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Copyright © 2010, Juniper Networks, Inc.
146
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...