Table 18: User Role Secure Meeting Configuration Details
(continued)
Your Action
Function
Option
Select the
Users can create
Scheduled meetings
check
box to enable this feature.
Allows users to create
scheduled meetings.
Users can create Scheduled
meetings
Select the
Meetings > Options
> Meeting Types > Users can
create Instant meetings
check
box to enable this feature.
Allows users to create instant
meetings.
Users can create Instant
meetings
Select the
Meetings > Options
> Meeting Types > Users can
create Support meetings
check box to enable this
feature.
Allows users to create
two-person support meetings.
Users can create Support
meetings
Select the
Meetings > Options
> Meeting Types > Users can
create additional meeting
URLs under their personal
URL
check box to enable this
feature.
Allows users to create an
additional meetingID.
Users can create additional
meeting URLs under their
personal URL
Meetings > Options > Meeting Options tab
Select one of the following
types from the drop-down list:
•
Meeting password optional
(more accessible)
—Allows
the meeting creator to
decide whether or not the
meeting requires a
password to join.
•
Require meeting password
(more secure)
—Requires
the meeting creator to either
create a meeting password
or use the one generated by
Secure Meeting.
•
Require server-generated
password (even more
secure)
—Requires the
meeting creator to use the
password generated by
Secure Meeting.
•
Require secure gateway
authentication (most
secure)
—Allows only invited
users authenticated against
the Secure Access device
secure gateway to attend
the meetings.
Specifies the authentication
restrictions that you want
users to apply to the meetings
that they create.
Authentication Requirements
Copyright © 2010, Juniper Networks, Inc.
80
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...