Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 89

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 16: User Role Network Connect Configuration Details (continued)
Option
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Function
Your Action
Select one of the following
options from the drop-down
list:
Disable Split
Tunneling—When Network
Connect successfully
establishes a connection to
the Secure Access device,
the device removes any
predefined local (client)
subnet and host-to-host
routes that might cause
split-tunneling behavior. If
any changes are made to
the client's route table
during an active Network
Connect session, the Secure
Access device terminates
the session.
Allow access to local
subnet—The Secure Access
device preserves the route
on the client, retaining
access to local resources
such as printers. If needed,
you can add entries to the
client's route table during
the Network Connect
session. The Secure Access
device does not terminate
the session. This is the
default option.
Enable Split
Tunneling—This option
activates split-tunneling and
requires you to specify the
network IP
address/netmask
combinations. For the
specified network IP
address/netmask
combinations, the Secure
Access device handles
traffic passed between the
remote client and the
corporate intranet.
Enable Split Tunneling with
route change monitor—
This option retains access
to local resources such as
printers.
Enable Split Tunneling with
allowed access to local
subnet—This option
activates split-tunneling and
71

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents