Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 178

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Table 39: Configuring Network Connect Split Tunneling Policy Details (continued)
Options
Applies to Roles
Action
Roles Selection tab
Roles Selections
Detailed Rules tab
Name
Action
Related
Documentation
160
Your Action
Select one of the following options from the drop-down list:
ALL —To apply this policy to all users.
Selected—To apply this policy only to users who are mapped to roles in the
Selected roles list. Upon selecting this option, the Role Selections tab is enabled.
Except those selected—To apply this policy to all users except for those who
map to the roles in the Selected roles list.
Select one of the following options from the drop-down list:
Allow—This option allows the Network IP address/netmask combinations
specified in the Resources field to pass through the NC tunnel.
Detailed Rules —This option defines resource policy rules that put additional
restrictions on the specified resources. Upon selecting this option, the Detailed
Rules tab is enabled.
Deny—This option denies the Network IP address/netmask combinations specified
in the Resources field not to pass through the NC tunnel.
Select the members from the Members list. You can add or remove the members
to the Non-members list by selecting Add, Remove, Add All, or Remove All .
Enter the name for the rule.
Select Allow or deny from the drop-down list.
Enter the new resource name for the rule.
NOTE: On the Network Connect Split Tunneling Policies page, prioritize the
policies according to how you want the device to evaluate them. Once the
device matches the resource requested by the user to a resource that belongs
to a Resource list of a policy (or a detailed rule's), it performs the specified
action and stops processing policies.
Configuring a Network Connect Connection Profile Resource Policy (NSM Procedure)
on page 155
Configuring Web Rewriting Resource Policies (NSM Procedure) on page 151
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents