Secure Computing ADMINGUIDEREVA Betriebsanweisung Seite 74

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 80
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 73
Customizing the user worksheet
5-6 Deploying Soft-PK to Your End Users
Specifying security policy instructions
Figure 5-5 shows the text in the initial UserWorksheet.doc file that
pertains to the Soft-PK security policy. The default text covers a basic
instructions for importing a security policy from a disk you provide.
Change this text according to how you want users to set up the
security policy.
Figure 5-5. Sample text
for importing the
security policy
Specifying basic connection information
Figure 5-6 shows the text in the initial UserWorksheet.doc file that
pertains to starting the VPN. The default text covers basic activation of
a security policy.
Figure 5-6. Sample text
for starting the VPN
Seitenansicht 73
1 2 ... 69 70 71 72 73 74 75 76 77 78 79 80

Kommentare zu diesen Handbüchern

Keine Kommentare