Configuring Web Rewriting Resource Policies (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Configuring Web Rewriting Resource Policies (NSM Procedure)

Copyright © 2010, Juniper Networks, Inc.
Table 36: Configuring Terminal Service Resource Policy
Details (continued)
Option
Function
IP based
The Secure Access device
matching for
compares the IP to its cached list
Hostname
of IP addresses to determine if a
based policy
hostname matches an IP address.
resources
If there is a match, then the Secure
Access device accepts the match
as a policy match and applies the
action specified for the resource
policy.
Configuring Web Rewriting Resource Policies (NSM Procedure) on page 151
Configuring a Secure Access ACE Server Instance (NSM Procedure) on page 161
Web access resource policies control which Web resources users can access in order to
connect to the Internet, intranet, or extranet. You can deny or allow access to Web
resources by URL or IP address range. For URLs, you can use the "*" and "?" wildcards
to efficiently specify multiple hostnames and paths. For resources that you specify by
hostname, you can also choose either HTTP, HTTPS, or both protocols.
To configure Web rewriting resource policy:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a
Web rewriting resource policy.
Click the Configuration tab. Select Users > Resource Policies > Web.
2.
Select a policy that you want to configure, and then enter the name, the description,
3.
and the resources for the policy.
In the Applies to roles list, select one:
4.
All—Applies the policy to all users.
Selected—Applies the policy only to users who are mapped to roles in the Role
Selection section.
Except those selected—Applies this policy to all users except for those who map
to the roles in the role selection section.
In the Action or the Authentication Type list, select any option from the drop-down
5.
list for the policy.
Select the role, and click Add to move the roles from the Non-members to Members
6.
list.
Chapter 10: Configuring Secure Access Resource Policies
Your Action
Select Options > IP based matching for
Hostname based policy resources to
enable this feature.
151

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents