Chapter 4
Adding Secure Access Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Adding a Secure Access Cluster Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Adding a Secure Access Cluster with Imported Cluster Members . . . . . . . . . . . . . 24
Installing and Configuring the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Adding the Cluster in NSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Adding the Cluster Members in NSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuring and Activating the DMI Agent on the Cluster . . . . . . . . . . . . . . . . 27
Importing Cluster Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Chapter 5
Working with Secure Access Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Creating and Applying a Secure Access Device Template . . . . . . . . . . . . . . . . . . . 29
Creating the Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Applying the Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Promoting a Secure Access Device Configuration to a Template . . . . . . . . . . . . . . 31
Part 3
Configuring Secure Access Devices
Chapter 6
Configuring User Roles and Administrator Roles . . . . . . . . . . . . . . . . . . . . . . 35
Configuring Secure Access Device User Roles (NSM Procedure) . . . . . . . . . . . . . 35
Creating Secure Access Role-Based Source IP Alias (NSM Procedure) . . . . . . . . 38
Configuring Secure Access General Session Options (NSM Procedure) . . . . . . . . 39
Creating and Configuring Secure Access Device Administrator Roles (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Chapter 7
Configuring Terminal Services Using Remote Access Mechanism . . . . . . . . 51
Terminal Services Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuring Terminal Services on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Terminal Services User Experience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Terminal Services Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Chapter 8
Configuring Access Options using Remote Access Mechanisms . . . . . . . . 65
Configuring Access Options using Remote Access Mechanisms Overview . . . . . 65
Configuring File Rewriting on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Configuring Network Connect on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Configuring Secure Application Manager on a Secure Access Device User Role
(NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Configuring Secure Meeting on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Configuring Web Rewriting on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Configuring Telnet/SSH on a Secure Access Device User Role (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Chapter 9
Configuring Secure Access Resource Profiles . . . . . . . . . . . . . . . . . . . . . . . . . 93
Configuring a JSAM Resource Profile (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . 93
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Copyright © 2010, Juniper Networks, Inc.
viii
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...