![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 84](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862084.webp)
This chapter contains the following information about the access options using remote
mechanisms in NSM:
•
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 66
•
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
on page 69
•
Configuring Secure Application Manager on a Secure Access Device User Role (NSM
Procedure) on page 74
•
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
on page 79
•
Configuring Web Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 84
•
Configuring Telnet/SSH on a Secure Access Device User Role (NSM Procedure) on
page 90
Related
Documentation
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 66
•
•
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
on page 69
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure)
A file resource profile controls access to resources on Windows server shares or UNIX
servers.
To configure file rewriting on a user role:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a file
rewriting option.
2.
Click the
Configuration
tab. Select
Users
>
User Roles
.
3.
Click the
New
button. The New dialog box appears.
4.
Add or modify settings as specified in Table 15 on page 66.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 15: User Role File Rewriting Configuration Details
Your Action
Function
Option
Files > File Bookmarks > Windows Bookmarks tab
Copyright © 2010, Juniper Networks, Inc.
66
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...