Configuring Telnet/Ssh On A Secure Access Device User Role; Configuring Telnet/Ssh On A Secure Access Device User Role (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide

Configuring Telnet/SSH on a Secure Access Device User Role (NSM Procedure)

90
The Telnet/SSH option enables users to connect to internal server hosts in the clear
using Telnet protocols or to communicate over an encrypted Secure Shell (SSH) session
through a Web-based terminal session emulation.
To configure telnet/SSH on a user role:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a
telnet/SSH.
Click the Configuration tab. Select Users > User Roles.
2.
Click the New button. The New Dialog box appears.
3.
Add or modify settings on the access options as specified in Table 20 on page 90.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 20: User Role Telnet/SSH Configuration Details
Option
Telnet/SSH > Telnet Bookmarks tab
Name
Description
Host
Session Type
Port
Username
Font Size
Function
Specifies the name for the
Terminal Sessions page
bookmark.
Specifies the bookmark
description for the Terminal
Sessions page bookmark.
Specifies the name or IP
address of the remote host for
this session.
Specifies the session type.
Specifies the port if different
from the prepopulated port
assignment.
Specifies the username or
other Secure Access
device-appropriate, session
variable for Telnet bookmark.
Specifies the font size for the
Telnet bookmark.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Enter the name for the
bookmark.
Enter the description.
Enter the name or IP address.
Select telnet or SSH from the
drop-down list.
Enter the port.
Enter a username or other
Secure Access
device-appropriate, session
variable.
Select the font size.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents