Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 160

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
142
Table 33: Configuring File Rewriting Resource Policies Details (continued)
Option
Username
Variable Password
Fixed Password
Windows Compression
Action
File Policy Options
Function
Specifies a username to
submit to the Windows share
or directory.
NOTE: This box is enabled
only when you select the Use
Specified
Credentials(Variable
Password)... or Use Specified
Credential(Fixed Password)...
options from the Action
drop-down list.
Specifies a variable password
to the Windows share or
directory.
NOTE: This box is enabled
only when you select the Use
Specified
Credentials(Variable
Password)... option from the
Action drop-down list.
Specifies a static password to
the Windows share or
directory.
NOTE: This box is enabled
only when you select the Use
Specified Credential(Fixed
Password)... option from the
Action drop-down list.
Specifies the action you want
to perform to allows or deny
access to the resources.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Enter a variable. For example
enter <USERNAME> or a static
username. For example enter
administrator to submit to the
Windows share or directory.
NOTE: When entering a
variable, you may also include
a domain. For example enter
yourcompany.net\<USERNAME>
Enter the variable password.
Enter the static password.
Select one of the following
options from the drop-down
list:
Compress—Secure Access
device compresses the
supported content types
from the specified resource.
Do not compress—Secure
Access device does not
compress the supported
content types from the
specified resource.
Use Detailed
Rules—Specifies one or
more detailed rules for this
policy.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents