Table 67: Configuring Host Checker Customized Requirements Using
Custom Rules Details
(continued)
Your Action
Function
Option
Settings tab
1.
Enter the rule name.
2. Select the
Required
option to require that
NETBIOS name of the client machine
matches or does not match any one of the
names you specify.
3. Enter a a comma-delimited list (without
spaces) of NetBIOS names. The name can
be up to 15 characters in length. You can
use wildcard characters in the name and it
is not case-sensitive. For example:
md*, m*xp and *xp all match MDXP.
4. Click
OK
.
(Windows only, does not include
Windows Mobile)—Use this rule
type to check the NetBIOS name
of the client machine before the
user can access the Secure
Access device.
NetBIOS
Rules
1.
Enter the
Rule Name
.
2. Select the
Required
option to require that
a MAC address of the client machine
matches or does not match any of the
addresses you specify.
3. Enter a comma-delimited list (without
spaces) of MAC addresses in the form
XX:XX:XX:XX:XX:XX where the X’s are
hexadecimal numbers. For example:
00:0e:1b:04:40:29
.
4. Click
OK
.
(Windows only)—Use this rule
type to check the MAC addresses
of the client machine before the
user can access the Secure
Access device.
MAC
Address
Rules
1.
Enter the rule name.
2. From the Select Issuer Certificate list, select
the certificate that you want to retrieve from
the user’s machine and validate. Or, select
Any Certificate
to skip the issuer check and
only validate the machine certificate based
on the optional criteria that you specify
below.
3. Enterany additional criteria that Host
Checker should use when verifying the
machine certificate in the Certificate field
and Expected value box.
4. Click
OK
.
(Windows only)—Use this rule
type to check that the client
machine is permitted access by
validating the machine certificate
stored on the client machine.
Machine
Certificate
Rules
Patch Assessment Rules
Copyright © 2010, Juniper Networks, Inc.
244
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...