Configuring Infranet Controller Radius Request Attribute Restrictions For User; Realms (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 Manual

Configuring infranet controllers guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Configuring Infranet Controller RADIUS Request Attribute Restrictions for User Realms
(NSM Procedure)
Copyright © 2010, Juniper Networks, Inc.
Table 16: Host Checker Access Restrictions for Realm Level Configuration
Details (continued)
Field
Function
Evaluate selected
Specifies that the selected
policies
policies are to be evaluated.
Enforce ALL policies
Specifies if all policies must
be enforced.
Enforce selected
Specifies that the selected
policies
policies are to be enforced.
Allow access to the
Specifies access to the realm.
realm if
Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure) on
page 61
Configuring Infranet Controller Browser Access Restrictions (NSM Procedure) on
page 63
Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure) on
page 64
Configuring Infranet Controller Password Access Restrictions (NSM Procedure) on
page 66
Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure) on page 70
Configuring Infranet Controller User Roles (NSM Procedure) on page 35
Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
page 48
You can create RADIUS request attribute policies to require authentication requests to
contain specific RADIUS attribute values. If an endpoint attempts to access a realm with
a RADIUS request attribute policy, the endpoint must meet the conditions specified in
the policy.
Chapter 7: Configuring Security Requirements for Administrators and Users
Your Action
Select the policies that must be evaluated
and add them to the Members list.
Select to enforce all policies.
Select the policies that must be enforced
and add them to the Members list.
Select All of the enforced policies pass
to allow access only if all the enforced
policy requirements are met.
Select Any ONE of the enforced
policies pass to allow access even if
one enforced policy requirement is met.
69

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INFRANET CONTROLLER GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents