Configuring Secure Access Devices - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

PART 3

Configuring Secure Access Devices

Copyright © 2010, Juniper Networks, Inc.
Configuring User Roles and Administrator Roles on page 35
Configuring Terminal Services Using Remote Access Mechanism on page 51
Configuring Access Options using Remote Access Mechanisms on page 65
Configuring Secure Access Resource Profiles on page 93
Configuring Secure Access Resource Policies on page 137
Configuring Authentication and Directory Servers on page 161
Configuring Authentication Realms on page 195
Configuring Sign-in Policies and Sign-in Pages on page 207
Configuring Single Sign-On on page 217
Configuring Secure Access Host Checker Policies on page 231
Configuring Secure Access Cache Cleaner on page 251
Configuring Secure Access System Management Features on page 257
Configuring Network Settings on page 271
Synchronizing User Records on page 277
Configuring IF-MAP Federation Settings on page 283
33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents