![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 81](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862081.webp)
Table 14: Terminal Services User Experience
(continued)
Your Action
Options
Ensure that you have uploaded a Windows client to the device through the terminal services
resource profile. If the Windows client is not present on the user’s machine (for instance, because
it was deleted or because the user does not have the proper privileges to install it), the device
uses the uploaded Java applet to launch the session.
As part of the installation, the device prompts you whether if the you want to always use the Java
client or only for this session. The device then stores the user’s preference as a persistent cookie.
Once the Java client is installed, the client initiates the user’s terminal services session and the
proxy intermediates the session traffic.
The proxy tries to invoke the
Java client
NOTE:
The following options in the New Terminal Services Sessions window
do not apply to remote desktops launched in the following order:
•
Client port
•
Authentication settings
•
Start application settings
•
Connect Devices settings
•
Display Settings
Related
Documentation
•
Terminal Services User Experience on page 61
•
Configuring Terminal Services on a Secure Access Device User Role (NSM Procedure)
on page 52
63
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Configuring Terminal Services Using Remote Access Mechanism
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...