Table 16: User Role Network Connect Configuration Details
(continued)
Your Action
Function
Option
Select one of the following
options from the drop-down
list:
•
Disable Split
Tunneling
—When Network
Connect successfully
establishes a connection to
the Secure Access device,
the device removes any
predefined local (client)
subnet and host-to-host
routes that might cause
split-tunneling behavior. If
any changes are made to
the client’s route table
during an active Network
Connect session, the Secure
Access device terminates
the session.
•
Allow access to local
subnet
—The Secure Access
device preserves the route
on the client, retaining
access to local resources
such as printers. If needed,
you can add entries to the
client’s route table during
the Network Connect
session. The Secure Access
device does not terminate
the session. This is the
default option.
•
Enable Split
Tunneling
—This option
activates split-tunneling and
requires you to specify the
network IP
address/netmask
combinations. For the
specified network IP
address/netmask
combinations, the Secure
Access device handles
traffic passed between the
remote client and the
corporate intranet.
•
Enable Split Tunneling with
route change monitor
—
This option retains access
to local resources such as
printers.
•
Enable Split Tunneling with
allowed access to local
subnet
—This option
activates split-tunneling and
71
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...