Table 55: User/Administrator URLs Configuration Details
(continued)
Your Action
Function
Option
Select the admin realms from
Non-members to Members.
Moves the selected admin realms from
non-members to members.
Administrator >
Selected Admin
Realms >
Non-members
Select the meeting URL from the
drop-down list.
Specifies the URL that controls the
sign-in page, which you can view when
you sign into a meeting on the Secure
Access device.
User > Meeting URL
Select the user realms from
Non-members to Members.
Moves the selected user realms from
non-members to members.
User > Selected User
Realms >
Non-members
Creating Meeting URLs
To configure a meeting URL:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the Device Tree
tab, and then double-click the Secure Access device for which you want to configure
a meeting URL.
2.
Click the
Configuration
tab, and select
Authentication
>
Signing In
>
Sign-in Policies
>
Meeting URLs
. The corresponding workspace appears.
3.
Add or modify settings on the meeting URL as specified in Table 56 on page 210.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 56: Meeting URLs Configuration Details
Your Action
Function
Option
Select the type of policy from the
drop-down list (for example, enter
Meeting
).
Specifies the type of sign-in
policy.
User Type
Enter a valid URL.
NOTE: Use the format <host>/<path>
where<host> is the hostname of the device
and <path> is any string that you enter.
Specifies the URL that you want
to associate with the meeting
URL policy.
Sign-in URL
Enter a description of the meeting URL
policy.
Describes of the meeting URL
policy.
Description
Select
Meeting URLs
>
Enable
to enable
this option.
Enables or disables the individual
policy.
Enable
Copyright © 2010, Juniper Networks, Inc.
210
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...