![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 75](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862075.webp)
Table 12: User Role Terminal Services Configuration Details
(continued)
Your Action
Function
Option
Enter the hostname or IP
address.
Specifies the hostname or IP
address of the Metaframe
terminal server.
Host
Enter the client port.
Specify the client port on
which the user client
communicates to the terminal
server.
Client Port
Enter the server port.
Specifies the server port on
which the terminal server
listens to the user client.
Server Port
Select
Full Screen, 800x600,
1024x768,
or
1280x1024
from
the drop–down list.
Allows you to change the size
of the terminal services
window on the user’s
workstation. (By default, the
Secure Access device sets the
window size to full screen.)
Screen Size
Select
8-bit, 15-bit, 16-bit,
24-bit,
or
32-bit (True Color)
from the drop–down list.
Allows you to change the
color-depth of the terminal
session data. (By default, the
Secure Access device sets the
color depth to 8-bit.)
Color Depth
Terminal Services > Terminal Services Sessions > Type > Citrix using default ICA file >
Start Application tab
Enter the path.
Specifies where the
application’s executable file
resides on the terminal server.
Path to application
Enter the path.
Specifies where the terminal
server should place working
files for the application.
Working directory
Terminal Services > Terminal Services Sessions > Type > Citrix using default ICA file >
Session Reliability tab > Connect Devices tab
Select the
Connect drives
check box to enable this
feature.
Allows user to access local
drives through the terminal
session.
Connect drives
Select the
Connect printers
check box to enable this
feature.
Allows user to access local
printers through the terminal
session.
Connect printers
Select the
Connect COM Ports
check box to enable this
feature.
Allows user to access local
COM ports through the
terminal session.
Connect COM Ports
Terminal Services > Terminal Services Sessions > Type > Citrix using default ICA file >
Session Reliability tab
57
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Configuring Terminal Services Using Remote Access Mechanism
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...