CHAPTER 16
Configuring Secure Access Cache Cleaner
•
Configuring Global Cache Cleaner Options (NSM Procedure) on page 251
•
Configuring Cache Cleaner Restrictions (NSM Procedure) on page 254
Configuring Global Cache Cleaner Options (NSM Procedure)
Cache Cleaner is a Windows client-side agent that removes residual data, such as
temporary files or application caches, left on a user’s machine after a Secure Access
session. When you enable Cache Cleaner, it clears all content downloaded through the
Secure Access devices Content Intermediation Engine from a user’s system.
To configure global Cache Cleaner options:
1.
In the navigation tree, select
Device Manager
>
Devices
.
2.
Click the
Device Tree
tab, and then double-click the Secure Access device for which
you want to configure global Cache Cleaner options.
3.
Click the
Configuration
tab and select
Authentication > Endpoint Security > Cache
Cleaner
. The corresponding workspace appears.
4.
Configure the global Cache Cleaner options using the settings described in Table 70
on page 251.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 70: Configuring Global Cache Cleaner Details
Your Action
Function
Option
Cache Cleaner > General tab
Enter the time in minutes.
NOTE: Valid values range from
1 to 60 minutes.
Specifies how often Cache Cleaner is
to run. Each time Cache Cleaner must
run, it clears all content downloaded
through the Secure Access device’s
Content Intermediation Engine plus the
browser cache, files, and folders you
specify under the Browser Cache and
Files and Folders sections.
Cleaner Frequency
(minutes)
251
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...