![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 94](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862094.webp)
Table 17: User Role SAM Configuration Details
(continued)
Your Action
Function
Option
SAM > WSAM Allowed Servers tab
Enter the name of the
application.
Displays the application name
in the Client Application
Sessions area of the Secure
Access device end-user home
page.
Name
Enter the description.
Displays the description in the
Client Application Sessions
area of the Secure Access
device end-user home page.
Description
Enter the server’s hostname.
Allows you to specify the
server’s hostname (the wild
cards '*' or '?' are accepted)
or an IP/netmask pair.
Server
Enter the port numbers.
Allows you to specify multiple
ports for a host as separate
entries.
Ports
SAM > WSAM Bypass Applications tab
Enter the name of the
application.
Displays the application name
in the Client Application
Sessions area of the Secure
Access device in the end-user
home page.
Name
Enter the description.
Displays the description in the
Client Application Sessions
area of the Secure Access
device in the end-user home
page.
Description
Enter the application name.
Specifies the application for
which WSAM client does not
secure traffic.
Application
Enter the path.
Allows you to provide an
absolute path to the
application.
Path
SAM tab > Options tab
Copyright © 2010, Juniper Networks, Inc.
76
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...