CHAPTER 8
Configuring Access Options using Remote
Access Mechanisms
•
Configuring Access Options using Remote Access Mechanisms Overview on page 65
•
Configuring File Rewriting on a Secure Access Device User Role (NSM
Procedure) on page 66
•
Configuring Network Connect on a Secure Access Device User Role (NSM
Procedure) on page 69
•
Configuring Secure Application Manager on a Secure Access Device User Role (NSM
Procedure) on page 74
•
Configuring Secure Meeting on a Secure Access Device User Role (NSM
Procedure) on page 79
•
Configuring Web Rewriting on a Secure Access Device User Role (NSM
Procedure) on page 84
•
Configuring Telnet/SSH on a Secure Access Device User Role (NSM
Procedure) on page 90
Configuring Access Options using Remote Access Mechanisms Overview
This chapter contains the following information about configuring access in NSM to
various applications, servers, and other resources using remote access mechanisms..
When you enable an access feature, make sure to create corresponding resource policies.
To enable access features See “Configuring Secure Access Device User Roles (NSM
Procedure).”
For instance, if you want to secure access to Microsoft Outlook, you can use the Secure
Application Manager (SAM). The Secure Application Manager intermediates traffic to
client/server applications including Microsoft Outlook, Lotus Notes, and Citrix. Or, if you
want to secure access to your company Intranet, you can use the Web rewriting feature.
This feature uses the Secure Access devices Content Intermediation Engine to
intermediate traffic to Web-based applications and Web pages.
However, you can only access features through a user role if you are licensed for the
feature. For instance, if you are using an SA-700 appliance and have not purchased a
Core Clientless Access upgrade license, you cannot enable Web rewriting for a user role.
65
Copyright © 2010, Juniper Networks, Inc.
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...