![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 145](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862145.webp)
Table 28: Configuring Windows Terminal Services Resource Profile
Details
(continued)
Your Action
Function
Option
Enter the path.
For example, you might specify that
Microsoft Word should save files to the
following directory by default:
C:\Documents and
Settings\username\My Documents
.
Specifies where the terminal server
should place working files for the
application in the Working directory
box.
Working
directory
Select the
Auto-launch
check box to
enable this option.
Allows you to automatically launch
this Terminal Service session
bookmark when users sign into the
Secure Access device.
Auto-launch
Select the
Connect drives
check box to
enable this option.
Allows you to connect the user’s local
drive to the terminal server, enabling
the user to copy information from the
terminal server to his local client
directories.
Connect
drives
Select the
Connect printers
check box
to enable this option.
Allows you to connect the user’s local
printers to the terminal server,
enabling the user to print information
from the terminal server to his local
printer.
Connect
printers
Select the
Connect COM Ports
check
box to enable this option.
Allows you to connect the user’s COM
ports to the terminal server, allowing
communication between the terminal
server and the devices on his serial
ports.
Connect COM
Ports
Select the
Allow Clipboard Sharing
check box to enable this option.
Allows the contents of the clipboard
to be shared between the user’s host
computer and the terminal server.
Allow
Clipboard
Sharing
Select the
Connect smart cards
check
box to enable this option.
Allows users to use smart cards to
authenticate their remote desktop
sessions.
Connect
smart cards
Select one of the following options:
•
Disable Sound Options
—Disables
the sound option.
•
Bring to this computer
— Redirects
audio to the local computer.
•
Leave at remote computer
—Plays
the audio only at the server.
Allows sound during the remote
session.
Sound
Options
127
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Secure Access Resource Profiles
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...