Procedure); Configuring A Telnet And Secure Shell Resource Policy (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation

Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure)

146
Table 34: Secure Application Manager Resource Policy Configuration
Details (continued)
Option
Function
Conditions
Specifies one or more expressions
to evaluate to perform the action.
Options
IP based
Secure Access device compares
matching for
the IP to its cached list of IP
Hostname
addresses to determine if a host
based policy
name matches an IP address. If
resources
there is a match, then the Secure
Access device accepts the match
as a policy match and applies the
action specified for the resource
policy.
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure) on page 146
Configuring a Terminal Service Resource Policy (NSM Procedure) on page 149
When you enable the Telnet/SSH access feature for a role, you need to create resource
policies that specify which remote servers a user may access. If the Secure Access device
matches a user's request to a resource listed in a Telnet/SSH policy, the Secure Access
device performs the action specified for the resource.
To configure a Telnet and secure shell resource policy:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a
Telnet and secure shell resource policy.
Click the Configuration tab. Select Users > Resource Policies > Telnet/SSH.
2.
Add or modify settings as specified in Table 34 on page 144.
3.
Click one:
4.
OK—Saves the changes.
Cancel—Cancels the modifications.
Your Action
Specify one of the following options:
Boolean expressions: Using system
variables, write one or more Boolean
expressions using the NOT, OR, or AND
operators.
Custom expressions: Using the custom
expression syntax, write one or more
custom expressions.
Select Options > IP based matching for
Hostname based policy resources option
to enable this feature.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents