
CHAPTER 9
Configuring Secure Access Resource
Profiles
•
Configuring a JSAM Resource Profile (NSM Procedure) on page 93
•
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM
Procedure) on page 95
•
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM
Procedure) on page 99
•
Configuring a Citrix Listed Application Resource Profile (NSM Procedure) on page 104
•
Configuring Citrix Web Applications Resource Profile (NSM Procedure) on page 110
•
Configuring Custom Web Applications Resource Profile (NSM Procedure) on page 112
•
Configuring File Rewriting Resource Profiles (NSM Procedure) on page 120
•
Configuring Windows Terminal Services (NSM Procedure) on page 124
•
Configuring a Telnet/SSH Resource Profile (NSM Procedure) on page 129
•
Configuring WSAM Resource Profile (NSM Procedure) on page 131
•
Configuring Bookmarks for Virtual Desktop Resource Profiles (NSM
Procedure) on page 134
Configuring a JSAM Resource Profile (NSM Procedure)
A JSAM resource profile configures JSAM to secure traffic to a client/server application.
When you create a JSAM application resource profile, the JSAM client tunnels network
traffic generated by the specified client applications to servers in your internal network.
To create a JSAM application resource profile:
1.
In the NSM navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to configure
JSAM application resource profile.
2.
Click the
Configuration
tab, and select
Users
>
Resource Profiles
>
SAM
>
Client
Applications
. The corresponding workspace appears.
3.
Click the
New
button and the New dialog box appears.
93
Copyright © 2010, Juniper Networks, Inc.
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...