Configuring Wsam Resource Profile (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Configuring WSAM Resource Profile (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Configuring WSAM Resource Profile (NSM Procedure) on page 131
Configuring a File Rewriting Resource Policy (NSM Procedure) on page 137
Configuring a JSAM Resource Profile (NSM Procedure) on page 93
You can create two types of WSAM resource profiles:
WSAM application resource profiles—These resource profiles configure WSAM to
secure traffic to a client/server application. When you create a WSAM application
resource profile, the WSAM client intercepts requests from the specified client
applications to servers in your internal network.
WSAM destination network resource profiles—These resource profiles configure
WSAM to secure traffic to a server. When you create a WSAM destination network
resource profile, the WSAM client intercepts requests from processes running on the
client that are connecting to the specified internal hosts.
To configure a WSAM application resource profile:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
user roles.
Click the Configuration tree tab, and select Users > Resource Profiles > SAM > Client
2.
Applications. The corresponding workspace appears.
Click the New button, the New dialog box appears.
3.
Add or modify settings as specified in Table 30 on page 131.
4.
Click one:
5.
OK — Saves the changes.
Cancel — Cancels the modifications.
Table 30: Configuring WSAM Resource Profile Details
Option
Function
Settings tab
Name
Specifies a name for the
resource profile.
Description
Describes the resource profile.
Type
Allows you to select WSAM.
Chapter 9: Configuring Secure Access Resource Profiles
Your Action
Enter the name.
Enter the description.
Select the WSAM option to configure a WSAM
resource profile.
131

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents