Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 135

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 26: Configuring Custom Web Applications Resource Profile
Details (continued)
Option
Action
Sign Java applets with
uploaded code-signing
certificate(s)
Autopolicy: Rewriting Options > Passthrough Proxy tab
Use virtual hostname
Use IVE port
Rewrite XML
Rewrite external links
Chapter 9: Configuring Secure Access Resource Profiles
Function
Allows or denies Java applets
to connect to the servers
Resigns the specified
resources using the uploaded
certificate.
Specifies the hostname alias
for the application server.
When the Secure Access
device receives a client request
for the application server
hostname alias, it forwards the
request to the specified
application server port in the
Base URL box.
Specifies a unique Secure
Access device port in the range
11,000-11,099.
Allows Secure Access device
to rewrite URLs contained
within XML content. If this
option is disabled, the Secure
Access device passes the XML
content "as is" to the server.
Allows Secure Access device
to rewrite all the URLs
presented to the proxy. If this
option is disabled, the Secure
Access device rewrites only
those URLs where the
hostname is configured as part
of the passthrough proxy
policy.
Your Action
Select one of the following
options:
Allow Socket
Access—Allows Java
applets to connect to the
servers (and optionally
ports) in the resource list.
Deny Socket
Access—Prevents Java
applets from connecting to
the servers (and optionally
ports) in the resource list.
Select the Sign Java applets
with uploaded code-signing
certificate(s) check box to
enable this option.
Enter the hostname.
Enter the port in the range
11,000-11,099.
Select the Rewrite XML tab
check box to enable this
option.
Select the Rewrite external
links check box to enable this
option.
117

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents