Procedure); Configuring Host Checker Customized Requirements Using Custom Rules; Configuring Host Checker Customized Requirements Using Custom Rules (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Configuring Host Checker Customized Requirements Using Custom Rules (NSM

Procedure)

Copyright © 2010, Juniper Networks, Inc.
Table 66: Configuring the Remote IMV Server Details (continued)
Option
Function
Remote IMV > Remote IMVs
Name
Specifies the name of the IMV.
Description
Describes the IMV.
IMV Name
Specifies the IMV name that matches
the "human readable name" in the
IMV's well-known registry key on the
remote IMV server.
Primary Server
Specifies the primary remote IMV
server where the IMV is installed.
Secondary
Specifies the secondary remote IMV
Server
server where the IMV is installed.
NOTE: The secondary server acts as
a failover in case the primary server
becomes unavailable.
Configuring Host Checker Customized Requirements Using Custom Rules (NSM
Procedure) on page 241
Configuring a Secure Application Manager Resource Policy (NSM Procedure) on page 144
You can create custom rules within a Host Checker policy to define requirements that
users' computers must meet. And creating these custom rules happens only if the
predefined client-side policies and rules do not meet the needs.
To configure customized requirements using custom rules:
In the navigation tree, select Device Manager > Devices.
1.
Click the Device Tree tab, and then double-click the Secure Access device for which
2.
you want to configure customized requirements using custom rules.
Click the Configuration tab and select Authentication > Endpoint Security > Host
3.
Checker. The corresponding workspace appears.
Create a new policy or click an existing policy in the Policies section of the page.
4.
Click the tab that corresponds to the operating system for which you want to specify
5.
Host Checker options—Windows, Mac, Linux, Solaris, or Windows Mobile. In the
same policy, you can specify different Host Checker requirements for each operating
system.
Chapter 15: Configuring Secure Access Host Checker Policies
Your Action
Enter the name for the remote IMVs.
Enter a brief description about the IMV.
Enter a name for the IMV.
Select the primary remote IMV server
from the drop-down list.
Select the secondary remote IMV
server from the drop-down list.
241

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents