NOTE:
After you upload a Host Checker policy package to the NSM shared object, you
cannot modify the package contents. Instead, you must modify the package on your
local system and then upload the modified version to NSM.
4.
Implement the policy at the realm, role, or resource policy level using the options
described in the
Secure Access Administration Guide
or the
Unified Access Control
Administration Guide
section about configuring host checker restrictions.
To verify that the package itself is installed and running on the client computer, you
can use the name you specified when you uploaded the policy package (for example,
myPestPatrol
). To enforce a particular policy in the package, use the syntax
package-name
.
policy-name
. For example, to enforce the
FileCheck
policy in the
myPestPatrol
package, use
myPestPatrol.FileCheck
.
Linking to a Third-Party Host Checker Policy Shared Object
To create a link from a Secure Access or Infranet Controller device configuration tree to
a shared object containing a third-party host checker policy, follow these steps:
1.
In the Device Manager, double-click the Secure Access or Infranet Controller device
to open the device editor, and then select the
Configuration
tab.
2.
Expand
Authentication
.
3.
Select
Endpoint Security
.
4.
From the Host Checker tab, select the
Settings
tab, and then click the Add icon in
the Policies box.
5.
From the Policy type list, select
3rd Party Policy
.
6.
Give the policy a name.
7.
Select a shared binary data object from the
Package
list.
8.
Click
OK
to save the configuration.
Importing a Secure Virtual Workspace Wallpaper Image (Secure Access Devices Only)
These files are generated by the system administrator.
Uploading a Secure Virtual Workspace Wallpaper Image
Upload the original generated file, and create a shared object for it.
Linking to a Secure Virtual Workspace Wallpaper Image Shared Object
To create a link from a Secure Access device configuration tree to a shared object
containing a secure virtual workspace wallpaper image, follow these steps:
1.
In the Device Manager, double-click the Secure Access device to open the device
editor, and then select the
Configuration
tab.
2.
Expand
Authentication
.
3.
Select
Endpoint Security
.
Copyright © 2010, Juniper Networks, Inc.
278
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...