
Creating Meeting URLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Configuring Secure Access Sign-In Pages (NSM Procedure) . . . . . . . . . . . . . . . . . 211
Creating Users/Administrator Sign-in Pages . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Creating Meeting Sign-in Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Chapter 14
Configuring Single Sign-On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Defining Basic, NTLM, and Kerberos Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Configuring Basic, NTLM, and Kerberos Resources (NSM Procedure) . . . . . . . . . 218
Defining a Basic Authentication, NTLM, or Kerberos Intermediation Resource
Policy (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Configuring a SAML Access Control Resource Policy (NSM Procedure) . . . . . . . 223
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure) . . . . . 226
Chapter 15
Configuring Secure Access Host Checker Policies . . . . . . . . . . . . . . . . . . . . . 231
Setting Up Secure Access Device Host Checker Options (NSM Procedure) . . . . 231
Configuring General Host Checker Remediation (NSM Procedure) . . . . . . . . . . . 233
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Configuring the Remote Integrity Measurement Verifier Server (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
Configuring Host Checker Customized Requirements Using Custom Rules (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Enabling Advanced Endpoint Defense (NSM Procedure) . . . . . . . . . . . . . . . . . . 246
Enabling Predefined Client-Side Policies for Windows Only (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Enabling Connection Control Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Configuring Virus Signature Version Monitoring (NSM Procedure) . . . . . . . . . . . 248
Importing Virus Signature Version Monitoring or Patch Management Version
Monitoring List (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Assigning a Proxy Server an Auto-Update Server (NSM Procedure) . . . . . . . . . . 250
Chapter 16
Configuring Secure Access Cache Cleaner . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Configuring Global Cache Cleaner Options (NSM Procedure) . . . . . . . . . . . . . . . 251
Configuring Cache Cleaner Restrictions (NSM Procedure) . . . . . . . . . . . . . . . . . 254
Chapter 17
Configuring Secure Access System Management Features . . . . . . . . . . . . 257
Configuring the Network Communications Protocol (NSM Procedure) . . . . . . . 257
Configuring Secure Meetings (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Configuring Global Security (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Configuring Sensors (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Creating a Custom Expression for Sensor Settings (NSM Procedure) . . . . . . . . 268
Chapter 18
Configuring Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Configuring General Network Settings (NSM Procedure) . . . . . . . . . . . . . . . . . . . 271
Configuring Internal Ports (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Configuring Hosts (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Configuring Internet Protocol Filters (NSM Procedure) . . . . . . . . . . . . . . . . . . . . 276
Chapter 19
Synchronizing User Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Enabling User Record Synchronization (NSM Procedure) . . . . . . . . . . . . . . . . . . 278
Configuring the Authentication Server (NSM Procedure) . . . . . . . . . . . . . . . . . . 279
Copyright © 2010, Juniper Networks, Inc.
x
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...