Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 150

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
132
Table 30: Configuring WSAM Resource Profile Details (continued)
Option
Function
Domain
Allows integrated Windows
Authentication
applications, such as file
sharing, Outlook, and so on to
authenticate to the domain
controller when the client
machine is part of a domain.
Settings tab > Autopolicy:SAM Access Control tab
Name
Specifies the name of a policy
that allows or denies users
access to the resource
specified in the Base URL box.
Resource
Specifies the resource name.
Action
Enables you to allow or deny
the users access to the server
that hosts the specified
application.
Settings tab > Settings tab
Application
Specifies the application from
which WSAM intermediates
traffic.
Settings > Roles tab
Your Action
Select Domain Authentication to enable this
feature.
NOTE: Before using this option, you must:
Specify domain controllers in the WSAM
Destination list so that LDAP and Kerberos
traffic can be proxied and sent to the device.
Configure a WSAM access control list (ACL)
policy to allow access to all domain
controllers.
Enter the name.
Enter the resource name.
Select either Allow or Deny from the Action
drop–down list.
Select one of the following options:
Custom—You must manually enter your
custom application's executable file name
(such as telnet.exe). Additionally, you may
specify this file's path and MD5 hash of the
executable file (although it is not required
that you specify the exact path to the
executable). If you enter an MD5 hash value,
WSAM verifies that the checksum value of
the executable matches this value. If the
values do not match, WSAM notifies the
user that the identity of the application
could not be verified and does not forward
connections from the application to the IVE.
Citrix NFuse—WSAM intermediates traffic
from Citrix applications.
Lotus Notes—WSAM intermediates traffic
from the Lotus Notes fat client application.
Microsoft Outlook/Exchange—WSAM
intermediates traffic from the Microsoft
Outlook exchange application.
NetBIOS file browsing—WSAM intercepts
NetBIOS name lookups in the TDI drivers on
port 137.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents