Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 141

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 27: Configuring File Rewriting Resource Profiles Details (continued)
Option
Function
Path
Adds a suffix to the resource if you
want to create links to
subdirectories of the resource
defined in the primary resource
profile.
Appearance
Displays the bookmark on a user's
welcome page and when browsing
network files.
Applies to
Specifies the roles to which you
roles
want to display the bookmark.
`Bookmarks > Role Selections
Roles
Specifies the roles to which the
Selections
resource profile applies.
NOTE: The Role Selections tab is
enable only when you select the
Subset of File Profile roles option
from the Applies to roles
drop-down list.
Configuring Windows Terminal Services (NSM Procedure) on page 124
Configuring a Telnet/SSH Resource Profile (NSM Procedure) on page 129
Configuring Custom Web Applications Resource Profile (NSM Procedure) on page 112
Chapter 9: Configuring Secure Access Resource Profiles
Your Action
Enter a suffix to the resource.
Select one of the following options:
Appear as bookmark on homepage and
file browsing—Bookmark appears on
both a user's welcome page and when
browsing network files.
Appear in file browsing only—Bookmark
appears only when users are browsing
network files.
Select one of the following options:
All File Profile roles— Bookmark appears
both on a user's welcome page and when
browsing network files.
Subset of File Profile roles—Bookmark
appears only when users are browsing
network files.
Select the role, and then click Add.
123

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents