Table 37: Configuring Web Rewriting Resource Policy Details
(continued)
Your Action
Function
Option
Enter or select a Web proxy server
from the drop down list.
Specify a Web proxy server that you
have defined.
NOTE: This field is enabled only
when you select
Access web
resources through web proxy
from
the
Action
drop-down list.
Server
Options
Select the
IP based matching for
Hostname based policy resources
to enable this feature.
Allows Secure Access device to look
up corresponding to each host name
specified in a Web resource policy.
IP based matching
for Hostname
based policy
resources
Select the
Case sensitive matching
for the Path and Query string
components in Web Resources
to
enable this feature.
Allows you to require users to enter
a case-sensitive URL to a resource.
Case sensitive
matching for the
Path and Query
string components
in Web Resources
Related
Documentation
Configuring a Secure Access ACE Server Instance (NSM Procedure) on page 161
•
•
Configuring a File Rewriting Resource Policy (NSM Procedure) on page 137
Configuring a Network Connect Connection Profile Resource Policy (NSM Procedure)
Use the Network Connect (NC) Connection Profiles tab to create an NC resource profile.
When a Secure Access device receives a client request to start an NC session, the device
assigns an IP address to the client-side NC agent. The device assigns this IP address
based on the DHCP server or IP address pool policies that apply to a user’s role. In addition,
this feature allows users to specify the transport protocol, encryption method, and
whether or not to employ data compression for the NC session.
To configure an NC connection profile:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to configure a NC
connection profile.
2.
Click the
Configuration
tab. Select
Users
>
Resource Policies
>
Network Connect
>
NC Connection Profile
.
3.
Click
New
and then enter the name and the description for the NC connection profile.
4.
Add or modify more settings as specified in Table 38 on page 156.
5.
Click one:
•
OK
—Saves the changes.
155
Copyright © 2010, Juniper Networks, Inc.
Chapter 10: Configuring Secure Access Resource Policies
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...