![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 172](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862172.webp)
Table 37: Configuring Web Rewriting Resource Policy Details
(continued)
Your Action
Function
Option
Select the
Rewrite XML
to enable
this feature.
Allows Secure Access device to
rewrite URLs contained within XML
content.
Rewrite XML
Select the
Rewrite external links
to
enable this feature.
Allows Secure Access device to
rewrite all URLs.
Rewrite external
links
Select the
Block cookies from being
sent to the browse
to enable this
feature.
Allows Secure Access device to
block cookies destined for the
client’s browser.
Block cookies from
being sent to the
browser
Select the
Host-Header forwarding
check box to enable this feature.
Allows Secure Access device to pass
the hostname as part of the host
header instead of the actual host
identifier.
Host-Header
forwarding
ActiveX Parameters
Enter the class ID.
Specifies class ID of the ActiveX
control that you want to control with
the policy.
Class Id
Enter the description.
Describes the policy.
Description
Enter the parameters.
Specifies the ActiveX parameters
that you want to control with the
policy.
Parameters >
Parameter
Rewriting Filter
Enter the bug information.
Specifies the bug created for the
device.
Bug
Enter the description for the bug.
Describes about the bug.
Description
Select
Enabled
to enable this
feature.
Specifies if the bug needs to be
filtered.
Enabled
Web Proxy > Web Proxy Servers tab
Enter the name or IP address.
Specifies the name or IP address of
the Web proxy server and the port
number at which the proxy server
listens.
Name
Enter the hostname.
Specifies the hostname of the Web
proxy server.
Host
Enter the port.
Specifies the port number at which
the proxy server listens.
Port
Web Proxy > Web Proxy Policies > General tab
Copyright © 2010, Juniper Networks, Inc.
154
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...