Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual page 86

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

NSM Infranet Controller Configuration Guide
68
Administrators > Admin Realms >Select Realm > Authentication Policies >
Host Checker to configure Host Checker access restrictions for admin realms.
Users > User Realms >Select Realm > Authentication Policies > Host Checker
to configure Host Checker access restrictions for user realms.
Role level—Select:
Administrators > Admin Roles > Select Role > General > Restrictions > Host
Checker Restrictions to configure Host Checker access restrictions for admin
roles.
Users > User Roles > Select Role > General > Restrictions > Host Checker
Restrictions to configure Host Checker access restrictions for user roles.
Add or modify settings as specified in
4.
Table 15 on page 68 to configure role level restrictions.
Table 16 on page 68 to configure realm level restrictions.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 15: Host Checker Access Restrictions for Role Level Configuration
Details
Option
Function
Enforce/Allow
Specifies the Host
Checker policy at the
role level.
Host Checker
Specifies the Host
policies
Checker policies.
Allow access to
Specifies access to the
the role if
role.
Table 16: Host Checker Access Restrictions for Realm Level Configuration
Details
Field
Function
Evaluate ALL
Specifies if all policies must
policies
be evaluated.
Your Action
Select Allow all users to permit access to all
users.
Select Allow users whose workstations meet
the requirements specified by the Host Checker
policies to require that Host Checker is running
the specified Host Checker policies for the user
to meet the access requirement.
Select the required Host Checker policies.
Select All of the selected policies pass to allow
access only if all the policy requirements are met.
Select Any ONE of the selected policies pass to
allow access even if one policy requirement is
met.
Your Action
Select to evaluate all policies.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents