Procedure); Configuring Secure Access Resource Profiles; Chapter 9 Configuring Secure Access Resource Profiles; Configuring A Jsam Resource Profile (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 9
Configuring Secure Access Resource
Profiles

Configuring a JSAM Resource Profile (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Configuring a JSAM Resource Profile (NSM Procedure) on page 93
Procedure) on page 95
A JSAM resource profile configures JSAM to secure traffic to a client/server application.
When you create a JSAM application resource profile, the JSAM client tunnels network
traffic generated by the specified client applications to servers in your internal network.
To create a JSAM application resource profile:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
JSAM application resource profile.
Click the Configuration tab, and select Users > Resource Profiles > SAM > Client
2.
Applications. The corresponding workspace appears.
Click the New button and the New dialog box appears.
3.
93

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents