Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 105

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 19: User Role Web Rewriting Configuration Details (continued)
Option
Mask hostnames while
browsing
Allow Java applets
Allow Flash content
Persistent cookies
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Function
Conceals the target resources
in the URLs to which users
browse.
Users can mask IP addresses
and hostnames in the user's:
Web browser address bar
(when the user navigates to
a page.)
Web browser status bar
(when the user hovers over
a hyperlink.)
HTML source files (when
the user chooses to view
source.)
Enables users to: and allows
user to
Browse to web pages
containing client-side Java
applets.
Run applications that are
implemented as client-side
Java applets.
Run application such as the
Virtual Network Computing
(VNC) Java client, Citrix
NFuse Java client, WRQ
Reflection Web client, and
Lotus WebMail.
Enables the Secure Access
device to intermediate flash
content through its Content
Intermediation Engine.
Enables users to customize
their browsing experiences
through persistent cookies.
Your Action
Select the Mask hostnames
while browsing check box to
enable this feature.
Select the Allow Java applets
check box to enable this
feature.
Select the Allow Flash content
check box to enable this
feature.
NOTE: Secure Access device
provides limited support for
ActionScript 2.0 Flash
Remoting, and does not
support XML Socket
connections.
Select the Persistent cookies
to enable this feature.
By default, the Secure Access
device flushes Web cookies
that are stored during a user
session. A user can delete
cookies through the Advanced
Preferences if you enable this
option.
87

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents