Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 86

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Related
Documentation
68
Table 15: User Role File Rewriting Configuration Details (continued)
Option
Appearance
Files > Windows network files options tab
User can browse network file
shares
Users can add bookmarks
Files > Unix network files options tab
User can browse network file
shares
User can add bookmarks
Allow automount shares
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
on page 69
Configuring Secure Application Manager on a Secure Access Device User Role (NSM
Procedure) on page 74
Function
Specifies the bookmark on a
user's welcome page and
when browsing network files.
Allows users to browse
network file shares.
Allows users to view and
create bookmarks to resources
on available Windows file
shares.
Allows users to view and
create bookmarks to resources
on available UNIX file shares.
Allows users to add and create
bookmarks to resources on
available UNIX file shares.
Allows users access to
automount shares specified
on an NIS server.
Copyright © 2010, Juniper Networks, Inc.
Your Action
Select an appearance option
from the drop–down list:
Appear as bookmark on
home and file
browsing—The bookmark
appears both on a user's
welcome page and when
browsing network files.
Appear in file browsing
only—The bookmark
appears only when browsing
network files.
Select the User can browse
network file shares check box
to enable this feature.
Select the Users can add
bookmarks check box to
enable this feature.
Select the User can browse
network file shares check box
to enable this feature.
Select the User can add
bookmarks check box to
enable this feature.
Select the Allow automount
shares check box to enable
this feature.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents