Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 226

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
208
Add or modify settings on the authorization-only policy as specified in Table 54 on
3.
page 208.
Click one:
4.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 54: Authorization-Only Policy Configuration Details
Option
Function
Virtual
Accesses the backend
Hostname
application and sends the
request to the original
requesting Web browser.
Backend URL
Allows the client to redirect
to this URL. The request
from the virtual hostname
gets transformed as a
request to this URL.
Description
Specifies the description of
the policy.
Authorization
Specifies the Netegrity
Server
SiteMinder server that
manages user
authentication and access.
Role Option
Specifies the user role.
Enable
Enables or disables the
individual policy.
Your Action
Enter a valid name that maps to the device's IP
address.
NOTE: The name must be unique among all the
virtual hostnames used in pass-through proxy's
hostname mode. Also, do not include the protocol
(for example, http:) in this option.
Enter a valid URL for the remote server.
NOTE: You must specify the protocol, hostname,
and port of the server. For example, enter
http://www.mydomain.com:8080/*.
Enter a description for the policy.
Select the corresponding Netegrity SiteMinder
server.
Select one of the user role options.
NOTE: Only the following user role options are
applicable for authorization-only policies.
Allow browsing un-trusted SSL (Users > User
Roles > RoleName > Web > Options ).
HTTP connection timeout (Users > User Roles
> RoleName > Web > Options).
Source IP restrictions (Users > User Roles >
RoleName > General > Restrictions).
Browser restrictions (Users > User Roles >
RoleName > General > Restrictions).
Select Authorization-Only Policies > Enable to
enable this option.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents