Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 115

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 22: Citrix Terminal Services (Custom ICA) Resource Profile
Configuration Details (continued)
Option
Applet HTML
Type
Citrix using Custom ICA > Settings tab
Custom ICA File
Custom ICA Filename
Citrix using Custom ICA > Autopolicy: Terminal Services Access control > Rules tab
Name
Action
Resources
Citrix using Custom ICA > Bookmarks
Name
Description
Username
Chapter 9: Configuring Secure Access Resource Profiles
Function
Specifies the HTML page
definition that includes
references to your Java applets.
Allows you to specify the
terminal service.
Specifies the ICA file that
contains the session parameters
that you want use.
Specifies the unique name for
the custom ICA file.
Specifies the name of a policy
that allows or denies users
access to the resource profile.
Enables you to allow or deny
user access to resource.
Specifies the metaframe servers
to which you want to enable
access.
Specifies the name of the
session bookmark.
Describes the resource profile.
Specifies the username that the
Secure Access device should
pass to the terminal server.
Your Action
Enter the HTML page
definition.
NOTE: The maximum size
of the HTML that can be
specified is 25KB.
Select Citrix using Custom
ICA option to configure a
citrix resource profile that
uses a custom ICA file.
Click the Browse button to
select an ICA file.
Enter the name.
Enter a name.
Select either Allow or Deny
from the Action drop–down
list.
Enter the metaframe server.
Enter the name.
Enter a description.
Enter the username.
97

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents