Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 156

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
138
Except those selected—Applies this policy to all users except for those who map
to the roles in the Role Selection section.
Select the role, and click Add to move the roles form non-members to members list.
5.
NOTE: The Role Selections tab is enabled only when you select Selected
or
Except those selected
Enter the name, and specify the resources for the detailed rules.
6.
NOTE: The Detailed Rules tab is enabled only when you select the Detailed
Rules option from the Action drop-down list.
NOTE: To apply detailed rules to the roles, see Step 4.
Specify one or more expressions in the Conditions box to evaluate in order to perform
7.
the action.
To specify actions and additional settings on the file rewriting policy using Table 33
8.
on page 138.
Click one:
9.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 33: Configuring File Rewriting Resource Policies Details
Option
Windows ACL > General tab
Action
option from the Applies to roles drop-down list.
Function
Specifies the action to access
resources.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Select one of the following
options from the drop-down
list:
Allow—Allows access to the
resources specified in the
Members list.
Deny—Denies access to the
resources specified in the
Members list.
Detailed Rules—Allows you
to specify one or more
detailed rules for this policy.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents