Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 285

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Table 77: Configuring IDP Sensor Details (continued)
Option
Function
Replace user
Allows you to change the user role
role with this
applied to this user's profile with
role
this role.
NOTE: This option is enabled only
when you select Replace user role
from the Action to be taken
drop–down list.
Replace user
Allows you to make this role
role..
assignment.
NOTE: This option is enabled only
when you select Replace user role
from the Action to be taken
drop–down list.
Applies to Roles
Allows you to apply this policy to
all roles or only to the users
mapped or only to the users who
are not mapped to roles.
Role Selection
Allows you to select and map roles
to user.
Sensor Events tab
Name
Specify a name for the event.
Expressions
Specifies the expressions.
Configuring General Network Settings (NSM Procedure) on page 271
Configuring Global Security (NSM Procedure) on page 261
Chapter 17: Configuring Secure Access System Management Features
Your Action
Select a role from the drop-down list.
Select one of the following options from
the drop-down list:
Permanent—User remains in the
quarantined state across subsequent
logins until the administrator releases
the user from the quarantined state.
For this session only—Default. User
can log in to another session.
Select one of the following options from
the drop-down list:
All—Applies this policy to all users.
Selected—Applies this policy only to
users who are mapped to roles in the
Selected roles list. Make sure to add
roles to this list from the Available
roles list.
Except those selected—Applies this
policy to all users except for those who
are mapped to the roles in the
members list. Make sure to add roles
to this list from the Available roles list.
Select a role and click Add.
Enter the name.
Enter the expressions or select one or
more clauses from the expressions
dictionary and click insert expression.
For example, to check for all
critical/highest severity level attacks,
enter the following expression:
idp.severity >= 4
267

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents