Configuring File Rewriting On A Secure Access Device User Role (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation

Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure)

66
This chapter contains the following information about the access options using remote
mechanisms in NSM:
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 66
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
on page 69
Configuring Secure Application Manager on a Secure Access Device User Role (NSM
Procedure) on page 74
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
on page 79
Configuring Web Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 84
Configuring Telnet/SSH on a Secure Access Device User Role (NSM Procedure) on
page 90
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure) on
page 66
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
on page 69
A file resource profile controls access to resources on Windows server shares or UNIX
servers.
To configure file rewriting on a user role:
In the navigation tree, select Device Manager > Devices. Click the Device Tree tab,
1.
and then double-click the Secure Access device for which you want to configure a file
rewriting option.
Click the Configuration tab. Select Users > User Roles.
2.
Click the New button. The New dialog box appears.
3.
Add or modify settings as specified in Table 15 on page 66.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 15: User Role File Rewriting Configuration Details
Option
Files > File Bookmarks > Windows Bookmarks tab
Function
Copyright © 2010, Juniper Networks, Inc.
Your Action

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents