Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 262

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
244
Table 67: Configuring Host Checker Customized Requirements Using
Custom Rules Details (continued)
Option
Function
Settings tab
NetBIOS
(Windows only, does not include
Rules
Windows Mobile)—Use this rule
type to check the NetBIOS name
of the client machine before the
user can access the Secure
Access device.
MAC
(Windows only)—Use this rule
Address
type to check the MAC addresses
Rules
of the client machine before the
user can access the Secure
Access device.
Machine
(Windows only)—Use this rule
Certificate
type to check that the client
Rules
machine is permitted access by
validating the machine certificate
stored on the client machine.
Patch Assessment Rules
Your Action
1.
Enter the rule name.
2. Select the Required option to require that
NETBIOS name of the client machine
matches or does not match any one of the
names you specify.
3. Enter a a comma-delimited list (without
spaces) of NetBIOS names. The name can
be up to 15 characters in length. You can
use wildcard characters in the name and it
is not case-sensitive. For example:
md*, m*xp and *xp all match MDXP.
4. Click OK.
1.
Enter the Rule Name.
2. Select the Required option to require that
a MAC address of the client machine
matches or does not match any of the
addresses you specify.
3. Enter a comma-delimited list (without
spaces) of MAC addresses in the form
XX:XX:XX:XX:XX:XX where the X's are
hexadecimal numbers. For example:
00:0e:1b:04:40:29.
4. Click OK.
1.
Enter the rule name.
2. From the Select Issuer Certificate list, select
the certificate that you want to retrieve from
the user's machine and validate. Or, select
Any Certificate to skip the issuer check and
only validate the machine certificate based
on the optional criteria that you specify
below.
3. Enterany additional criteria that Host
Checker should use when verifying the
machine certificate in the Certificate field
and Expected value box.
4. Click OK.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents