Configuring A Citrix Terminal Services (Custom Ica) Resource Profile - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM Procedure)
Copyright © 2010, Juniper Networks, Inc.
Table 21: Configuring JSAM Rosource Profile details (continued)
Option
Function
Settings > Microsoft Outlook/Exchange
New Application
Specifies the hostname for the MS
Servers
Exchange server.
Create an access
Enables user to access the server
control policy allowing
specified in the previous step,
SAM access to these
application servers (enabled by
servers
default).
Settings tab > NetBIOS File Browsing
New Application
Specifies the fully qualified
Servers
hostname for your application
servers.
Create an access
Allows user access the server
control policy allowing
specified in the previous step,
SAM access to these
application servers (enabled by
servers
default).
Settings > Roles tab
Roles Selections
Specifies the roles to which the
resource profile applies.
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM Procedure)
on page 95
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM Procedure)
on page 99
Use this type of resource profile to enable a terminal session on a Citrix Metaframe server
using settings that you specify in a customized ICA file.
To configure a Citrix resource profile that uses a custom ICA file:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to configure
a Citrix terminal services resource profile that uses custom ICA settings.
Click the Configuration tab, and select Users > Resource Profiles > Terminal Services.
2.
The corresponding workspace appears.
Click the New button and the New dialog box appears.
3.
Add or modify settings as specified in Table 22 on page 96.
4.
Click one:
5.
Chapter 9: Configuring Secure Access Resource Profiles
Your Action
Enter the hostname
Select the Create an access
control policy allowing SAM
access to these servers check
box to enable this option.
Enter the hostname.
Select the Create an access
control policy allowing SAM
access to these servers check
box to enable this option.
Select the role and, then click
Add to move the role from the
Non-members to the Members
list.
95

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents