Table 33: Configuring File Rewriting Resource Policies Details
(continued)
Your Action
Function
Option
Select the
IP based matching
for Hostname based policy
resources
check box to enable
this feature.
Secure Access device
compares the IP to its cached
list of IP addresses to
determine if a host name
matches an IP address. If there
is a match, then the Secure
Access device accepts the
match as a policy match and
applies the action specified for
the resource policy.
IP based matching for
Hostname based policy
resources
Select the
Case sensitive
matching for the path
component in File resources
check box to enable this
feature.
Requires users to enter a
case-sensitive path
component.
Case sensitive matching for
the path component in File
resources
Select from the drop-down
list.
Specifies the encoding to use
when communicating with
Windows and NFS file shares.
Encoding
Select one of the following
options from the drop-down
list:
•
NTLM v1
—Uses only NTLM
V1 for file share
authentication.
•
NTLM v2
—Uses only NTLM
V2 for file share
authentication.
Specifies NTLM for file share
authentication.
NTLM Version
Select either
High
or
Low
.
Controls the number of login
attempts while doing SSO.
Number of NTLM
authentication protocol variant
attempts
Related
Documentation
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure) on page 226
•
•
Configuring a SAML Access Control Resource Policy (NSM Procedure) on page 223
143
Copyright © 2010, Juniper Networks, Inc.
Chapter 10: Configuring Secure Access Resource Policies
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...