Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 123

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 24: Citrix Listed Application Resource Profile Configuration
Details (continued)
Option
Description
Java Support Options
Applet to use
Applet HTML
Type
Citrix Listed Applications > Settings tab
Chapter 9: Configuring Secure Access Resource Profiles
Function
Describes the resource profile.
Allows you to enable or disable
Java applet support.
Specifies the Java applet that
you want to associate with the
resource profile.
Specifies the HTML page
definition that includes
references to your Java applets.
Specifies the terminal service.
Your Action
Enter a description.
Select one of the following
options from the Java
Support Options drop-down
list:
Disable Java
Support—Disables a Java
support for Secure Access
device to intermediate
traffic.
Use Java applet as a
fallback
mechanism—Allows a
Secure Access device to
fall back to the applets
when other terminal
services clients are not
available on the user's
system.
Always use Java
applet—Allows a Secure
Access device to store
terminal services Java
clients directly on the
Secure Access device
without employing a
separate Web server to
host them. You can then
associate these Java
applets with the resource
profile and specify that the
Secure Access device
always use them to
intermediate traffic.
Select a Java applet from the
Applet to use drop–down
list.
Enter the HTML page
definition.
NOTE: The maximum size
of the HTML that can be
specified is 25 KB.
Select Citrix Listed
Applications option to
enable this feature.
105

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents