Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 151

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 30: Configuring WSAM Resource Profile Details (continued)
Option
Function
Role Selections
Allows you to specify the roles
to which the resource profile
applies.
To configure WSAM destination network resource profile:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
a WSAM destination network resource profile.
Click the Configuration tab, and select Users > Resource Profiles > SAM > WSAM
2.
Destinations. The corresponding workspace appears.
Click the New button and the New dialog box appears.
3.
Add or modify settings as specified in Table 31 on page 133.
4.
Click one:
5.
OK — Saves the changes.
Cancel — Cancels the modifications.
Table 31: Configuring WSAM Destination Resource Profile Details
Option
Function
Settings tab
Name
Specifies a name for the resource
profile.
Description
Describes the resource profile.
Allowed WSAM
Specifies which servers you want to
Servers > Network
secure using WSAM.
Destination
Create an access
Allows access to the server specified
control policy
in the Network Destination box
(enabled by default).
Settings > Roles tab
Role Selections
Specifies the roles to which the
resource profile applies.
Configuring a File Rewriting Resource Policy (NSM Procedure) on page 137
Configuring a JSAM Resource Profile (NSM Procedure) on page 93
Chapter 9: Configuring Secure Access Resource Profiles
Your Action
Select the role, and click Add .
Your Action
Enter the name.
Enter the description.
Enter a hostname or IP/netmask
pairs. You may include a port.
Select the Create an access
control policy check box to
enable this option.
Select the role, and then click
Add.
133

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents