![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 111](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862111.webp)
CHAPTER 9
Configuring Secure Access Resource
Profiles
•
Configuring a JSAM Resource Profile (NSM Procedure) on page 93
•
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM
Procedure) on page 95
•
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM
Procedure) on page 99
•
Configuring a Citrix Listed Application Resource Profile (NSM Procedure) on page 104
•
Configuring Citrix Web Applications Resource Profile (NSM Procedure) on page 110
•
Configuring Custom Web Applications Resource Profile (NSM Procedure) on page 112
•
Configuring File Rewriting Resource Profiles (NSM Procedure) on page 120
•
Configuring Windows Terminal Services (NSM Procedure) on page 124
•
Configuring a Telnet/SSH Resource Profile (NSM Procedure) on page 129
•
Configuring WSAM Resource Profile (NSM Procedure) on page 131
•
Configuring Bookmarks for Virtual Desktop Resource Profiles (NSM
Procedure) on page 134
Configuring a JSAM Resource Profile (NSM Procedure)
A JSAM resource profile configures JSAM to secure traffic to a client/server application.
When you create a JSAM application resource profile, the JSAM client tunnels network
traffic generated by the specified client applications to servers in your internal network.
To create a JSAM application resource profile:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to configure
JSAM application resource profile.
2.
Click the
Configuration
tab, and select
Users
>
Resource Profiles
>
SAM
>
Client
Applications
. The corresponding workspace appears.
3.
Click the
New
button and the New dialog box appears.
93
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...