Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Configuring a Citrix Listed Application Resource Profile (NSM Procedure) . . . . . 104
Configuring Citrix Web Applications Resource Profile (NSM Procedure) . . . . . . . 110
Configuring Custom Web Applications Resource Profile (NSM Procedure) . . . . . 112
Configuring File Rewriting Resource Profiles (NSM Procedure) . . . . . . . . . . . . . . 120
Configuring Windows Terminal Services (NSM Procedure) . . . . . . . . . . . . . . . . . 124
Configuring a Telnet/SSH Resource Profile (NSM Procedure) . . . . . . . . . . . . . . . 129
Configuring WSAM Resource Profile (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . 131
Configuring Bookmarks for Virtual Desktop Resource Profiles (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Chapter 10
Configuring Secure Access Resource Policies . . . . . . . . . . . . . . . . . . . . . . . . 137
Configuring a File Rewriting Resource Policy (NSM Procedure) . . . . . . . . . . . . . . 137
Configuring a Secure Application Manager Resource Policy (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure) . . . . . 146
Configuring a Terminal Service Resource Policy (NSM Procedure) . . . . . . . . . . . 149
Configuring Web Rewriting Resource Policies (NSM Procedure) . . . . . . . . . . . . . 151
Configuring a Network Connect Connection Profile Resource Policy (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Defining Network Connect Split Tunneling Policies (NSM Procedure) . . . . . . . . 159
Chapter 11
Configuring Authentication and Directory Servers . . . . . . . . . . . . . . . . . . . . . 161
Configuring a Secure Access ACE Server Instance (NSM Procedure) . . . . . . . . . . 161
Creating a Custom Expression for an Authentication Server (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Configuring a Secure Access Local Authentication Server Instance (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Configuring a Secure Access LDAP Server Instance (NSM Procedure) . . . . . . . . 167
Configuring a Secure Access RADIUS Server Instance (NSM Procedure) . . . . . . . 171
Configuring a Secure Access Anonymous Server Instance (NSM Procedure) . . . 174
Configuring a Secure Access eTrust SiteMinder Server Instance (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Configuring a Secure Access Certificate Server Instance (NSM Procedure) . . . . 184
Configuring a Secure Access Manual CA Certificate (NSM Procedure) . . . . . . . . 185
Configuring a Secure Access SAML Server Instance (NSM Procedure) . . . . . . . . 188
Configuring a Secure Access Active Directory or NT Domain Instance (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Configuring a Secure Access NIS Server Instance (NSM Procedure) . . . . . . . . . . 193
Chapter 12
Configuring Authentication Realms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Configuring Secure Access Authentication Realms (NSM Procedure) . . . . . . . . 195
Configuring Secure Access Authentication Policies (NSM Procedure) . . . . . . . . 198
Configuring Secure Access Role Mapping Rules (NSM Procedure) . . . . . . . . . . . 203
Chapter 13
Configuring Sign-in Policies and Sign-in Pages . . . . . . . . . . . . . . . . . . . . . . 207
Configuring Secure Access Sign-In Policies (NSM Procedure) . . . . . . . . . . . . . . 207
Creating Authorization-Only Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Creating User or Administrator URLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
ix
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...