![Juniper NETWORK AND SECURITY MANAGER Скачать руководство пользователя страница 262](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862262.webp)
Table 67: Configuring Host Checker Customized Requirements Using
Custom Rules Details
(continued)
Your Action
Function
Option
Settings tab
1.
Enter the rule name.
2. Select the
Required
option to require that
NETBIOS name of the client machine
matches or does not match any one of the
names you specify.
3. Enter a a comma-delimited list (without
spaces) of NetBIOS names. The name can
be up to 15 characters in length. You can
use wildcard characters in the name and it
is not case-sensitive. For example:
md*, m*xp and *xp all match MDXP.
4. Click
OK
.
(Windows only, does not include
Windows Mobile)—Use this rule
type to check the NetBIOS name
of the client machine before the
user can access the Secure
Access device.
NetBIOS
Rules
1.
Enter the
Rule Name
.
2. Select the
Required
option to require that
a MAC address of the client machine
matches or does not match any of the
addresses you specify.
3. Enter a comma-delimited list (without
spaces) of MAC addresses in the form
XX:XX:XX:XX:XX:XX where the X’s are
hexadecimal numbers. For example:
00:0e:1b:04:40:29
.
4. Click
OK
.
(Windows only)—Use this rule
type to check the MAC addresses
of the client machine before the
user can access the Secure
Access device.
MAC
Address
Rules
1.
Enter the rule name.
2. From the Select Issuer Certificate list, select
the certificate that you want to retrieve from
the user’s machine and validate. Or, select
Any Certificate
to skip the issuer check and
only validate the machine certificate based
on the optional criteria that you specify
below.
3. Enterany additional criteria that Host
Checker should use when verifying the
machine certificate in the Certificate field
and Expected value box.
4. Click
OK
.
(Windows only)—Use this rule
type to check that the client
machine is permitted access by
validating the machine certificate
stored on the client machine.
Machine
Certificate
Rules
Patch Assessment Rules
Copyright © 2010, Juniper Networks, Inc.
244
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...