3.
Click the
Configuration
tab and select
Users > Resource Policies >
Select Resource
> Select Policy
> Detailed Rules
.
4.
Select or create the rule and configure the Cache Cleaner restrictions at the resource
policy level using the settings described in Table 73 on page 256.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 73: Configuring Global Cache Cleaner Restriction Detail at Resource
Policy Level
Your Action
Function
Option
General tab
Enter the name.
Specifies the resource policy’s detailed rule name.
Name
Select
Allow
or
Deny
from
the drop–down list.
Specifies the action to allow the Secure Access
device to access the resource if the user's
machine does not meet the Cache Cleaner
requirement.
Action
Enter specific URL, directory
path, file, or file type.
Specifies the resource or a partial list of the
resources.
Resources
Enter the custom
expression.
Specifies a custom expression in a detailed rule
for the Secure Access device to determine
whether or not Cache Cleaner needs to be
installed or running on the user's workstation.
Conditions
Related
Documentation
•
Configuring the Network Communications Protocol (NSM Procedure) on page 257
•
Configuring Global Cache Cleaner Options (NSM Procedure) on page 251
Copyright © 2010, Juniper Networks, Inc.
256
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...