Table 39: Configuring Network Connect Split Tunneling Policy Details
(continued)
Your Action
Options
Select one of the following options from the drop-down list:
•
ALL
—To apply this policy to all users.
•
Selected
—To apply this policy only to users who are mapped to roles in the
Selected roles list. Upon selecting this option, the Role Selections tab is enabled.
•
Except those selected
—To apply this policy to all users except for those who
map to the roles in the Selected roles list.
Applies to Roles
Select one of the following options from the drop-down list:
•
Allow
—This option allows the Network IP address/netmask combinations
specified in the Resources field to pass through the NC tunnel.
•
Detailed Rules
—This option defines resource policy rules that put additional
restrictions on the specified resources. Upon selecting this option, the Detailed
Rules tab is enabled.
•
Deny
—This option denies the Network IP address/netmask combinations specified
in the Resources field not to pass through the NC tunnel.
Action
Roles Selection tab
Select the members from the
Members
list. You can add or remove the members
to the Non-members list by selecting
Add, Remove, Add All,
or
Remove All
.
Roles Selections
Detailed Rules tab
Enter the name for the rule.
Name
Select
Allow
or
deny
from the drop-down list.
Enter the new resource name for the rule.
Action
NOTE:
On the Network Connect Split Tunneling Policies page, prioritize the
policies according to how you want the device to evaluate them. Once the
device matches the resource requested by the user to a resource that belongs
to a Resource list of a policy (or a detailed rule’s), it performs the specified
action and stops processing policies.
Related
Documentation
•
Configuring a Network Connect Connection Profile Resource Policy (NSM Procedure)
on page 155
•
Configuring Web Rewriting Resource Policies (NSM Procedure) on page 151
Copyright © 2010, Juniper Networks, Inc.
160
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...