Copyright © 2010, Juniper Networks, Inc.
Table 37: Configuring Web Rewriting Resource Policy Details (continued)
Option
Function
Name
Specifies the name to identify the
data of the value box.
Value
Specifies the value to post to the
form for the specified name.
User Modifiable
Allows you to enable user to change
the information in the value box.
SSO Cookies/Headers > General tab
Headers and
Specifies the text for the Secure
Values> Header
Access device to send as header
name
data.
Headers and
Specifies the value for the specified
Values> Value
header.
Caching > Options tab
Client should
Specifies the size of the image.
cache all images
Images are cached if it is less than
less than (in KB):
the specified size.
Selective Rewriting > General tab
Rewrite As
Allows Secure Access device to
rewrite the content as if it were the
file type.
Passthrough Proxy.
Application
Specifies the application name.
Description
Describes the application.
URL
Specifies the application server
hostname and the port used to
access the application internally.
Use virtual
Allows you to specify a host name
hostname
alias for the application server.
Use IVE port
Allows Secure Access device to
listen for client requests to the
application server on the specified
Secure Access device port.
Chapter 10: Configuring Secure Access Resource Policies
Your Action
Enter the name.
NOTE: The back-end application
should expect this name.
Enter the value.
NOTE: You can enter static data, a
system variable or Secure Access
device session variables containing
username and password values.
Select any of the values from the
drop-down list.
Enter the text.
Enter the value.
Enter the size in KB.
Select any one value from the
drop-down list.
Enter the name.
Enter the description.
Enter the server hostname and the
port.
NOTE: Note that you cannot enter
a path in this field.
Enter the hostname name alias.
Specify a unique Secure Access
device port in the range
11000-11099.
153
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?