Procedure); Configuring Secure Access Resource Policies; Chapter 10 Configuring Secure Access Resource Policies; Configuring A File Rewriting Resource Policy (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 10
Configuring Secure Access Resource
Policies

Configuring a File Rewriting Resource Policy (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Procedure) on page 155
File rewriting resource policies speciy which Windows resources a user may access, as
well as the encoding to use when communicating with Windows and NFS file shares.
When a user makes a file request, the Secure Access device evaluates the resource
policies corresponding to the request, such as Windows access resource policies for a
request to fetch an MS Word document (.doc file). After matching a user's request to a
resource listed in a relevant policy, the Secure Access device performs the action specified
for the resource.
To configure a file rewriting resource policy:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a file
rewriting resource policy.
Click the Configuration tab. Select Users > Resource Policies > Files.
2.
Select a policy, and then enter the name, the description, and the resources for the
3.
policy.
In the Applies to roles list. Select one:
4.
All-Applies the policy to all users.
Selected-Applies the policy only to users who are mapped to roles in the Role
Selection section.
137

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents