Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 139

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Click the New button, the New dialog box appears.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 27: Configuring File Rewriting Resource Profiles Details
Option
Function
Settings tab
Name
Specifies the name of the resource
profile.
Description
Describes the resource profile.
Server/share
Specifies the resource to which
you want to control access.
Autopolicy:Windows File Access Control
Name
Specifies the name of the policy
that allows or denies users access
to the resource.
Action
Allows or denies user access to
resource.
Read-only
Allows users to view but not edit
the specified resource.
Resources
Specifies the resource name for
which this policy applies.
Autopolicy:Windows File Compression
Name
Specifies the name of the policy
that allows you to compress data
from the specified resource.
Action
Allows you to compress data from
the specified resource.
Resources
Specifies the resource names for
which this policy applies.
Autopolicy:Windows Server Single Sign-On
Chapter 9: Configuring Secure Access Resource Profiles
Your Action
Enter the name.
Enter the description.
Enter the server name or IP address, share
name, and optionally the path that you want
to control access. When entering the
resource, use the format:
\\server[\share[\path]].
Enter the name.
Select Allow or Deny from the Action
drop–down list.
Select the Read-only check box to enable
this option.
Enter the resource name.
Enter a name.
Select any one of the following options:
Compress—Compresses data from the
specified resource.
Do not compress—Disables compression
for the specified resource.
Enter the names.
121

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents