Table 18: User Role Secure Meeting Configuration Details
(continued)
Your Action
Function
Option
Select one of the following
options from the drop-down
list:
•
Do not display the
password in the notification
email (more
secure)
—Requires that
meeting creators manually
distribute the meeting
password to invitees.
•
Display the password in the
notification email (more
accessible)
—Automatically
distributes the meeting
password in the e-mail
notification sent by Secure
Meeting and displays the
Secure Meeting tab in
Microsoft Outlook calendar
entries.
•
Allow the meeting creator
to decide
—Allows meeting
creator to determine
whether or not Secure
Meeting and Microsoft
Outlook should
automatically distribute the
meeting password to
meeting invitees.
Specifies the distribution
method that you want
meeting creators to employ.
Password Distribution
Select one of the following
options from the drop-down
list:
•
Do not allow hiding of
attendee names
—Always
displays the names of
meeting attendees.
•
Allow meeting creator to
hide attendee
names
—Allows the meeting
creator to decide whether or
not to display the names of
meeting attendees.
•
Hide attendee
names
—Always hides the
names of meeting
attendees.
NOTE: When you select this
option, Secure Meeting still
exposes the names of the
meeting conductor and
presenter to other meeting
attendees.
Specifies whether you want
Secure Meeting to display the
names of attendees during a
meeting.
Attendee Names
81
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...