Enabling Predefined Client-Side Policies for Windows Only (NSM Procedure)
The Secure Access device comes equipped with predefined client-side Host Checker
policies that you simply need to enable, not create or configure, to use them. The
connection control policies work only on Windows systems. It includes:
•
Enabling Connection Control Policies on page 247
Enabling Connection Control Policies
The predefined connection control Host Checker policy prevents attacks on Windows
client computers from other infected computers on the same physical network. The Host
Checker connection control policy blocks all incoming TCP connections. This policy allows
all outgoing TCP and Network Connect traffic, as well as all connections to DNS servers,
WINS servers, DHCP servers, proxy servers, and the Secure Access device.
NOTE:
Users must have administrator privileges for the Host Checker to
enforce the connection control policy on the client computer.
To enable the predefined Host Checker connection control policy:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to enable
the predefined Host Checker connection control policy.
2.
Click the
Configuration
tab, and select
Authentication
>
Endpoint Security
>
Host
Checker
.
3.
Select
Settings > Options
, and then select the
Perform dynamic policy reevaluation
check box.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
NOTE:
You must evaluate or enforce the connection control policy at the
realm level to make the policy effective on client computers.
Related
Documentation
Enabling Predefined Client-Side Policies for Windows Only (NSM Procedure) on page 247
•
•
Configuring Virus Signature Version Monitoring (NSM Procedure) on page 248
247
Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Configuring Secure Access Host Checker Policies
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...