Configuring Access Options Using Remote Access Mechanisms; Configuring Access Options Using Remote Access Mechanisms Overview; Configuring File Rewriting On A Secure Access Device User Role (Nsm - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 8
Configuring Access Options using Remote
Access Mechanisms

Configuring Access Options using Remote Access Mechanisms Overview

Copyright © 2010, Juniper Networks, Inc.
This chapter contains the following information about configuring access in NSM to
various applications, servers, and other resources using remote access mechanisms..
When you enable an access feature, make sure to create corresponding resource policies.
To enable access features See "Configuring Secure Access Device User Roles (NSM
Procedure)."
For instance, if you want to secure access to Microsoft Outlook, you can use the Secure
Application Manager (SAM). The Secure Application Manager intermediates traffic to
client/server applications including Microsoft Outlook, Lotus Notes, and Citrix. Or, if you
want to secure access to your company Intranet, you can use the Web rewriting feature.
This feature uses the Secure Access devices Content Intermediation Engine to
intermediate traffic to Web-based applications and Web pages.
However, you can only access features through a user role if you are licensed for the
feature. For instance, if you are using an SA-700 appliance and have not purchased a
Core Clientless Access upgrade license, you cannot enable Web rewriting for a user role.
65

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager

Table of Contents