3.
Click the
Configuration
tab and select
Users > Resource Policies >
Select Resource
> Select Policy
> Detailed Rules
.
4.
Select or create the rule and configure the Cache Cleaner restrictions at the resource
policy level using the settings described in Table 73 on page 256.
5.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 73: Configuring Global Cache Cleaner Restriction Detail at Resource
Policy Level
Your Action
Function
Option
General tab
Enter the name.
Specifies the resource policy’s detailed rule name.
Name
Select
Allow
or
Deny
from
the drop–down list.
Specifies the action to allow the Secure Access
device to access the resource if the user's
machine does not meet the Cache Cleaner
requirement.
Action
Enter specific URL, directory
path, file, or file type.
Specifies the resource or a partial list of the
resources.
Resources
Enter the custom
expression.
Specifies a custom expression in a detailed rule
for the Secure Access device to determine
whether or not Cache Cleaner needs to be
installed or running on the user's workstation.
Conditions
Related
Documentation
•
Configuring the Network Communications Protocol (NSM Procedure) on page 257
•
Configuring Global Cache Cleaner Options (NSM Procedure) on page 251
Copyright © 2010, Juniper Networks, Inc.
256
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...