Configuring Windows Terminal Services (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide

Configuring Windows Terminal Services (NSM Procedure)

124
Windows terminal services resource profile enables access to a Windows terminal server
using an RDP client.
To configure a windows terminal service resource profile:
In the NSM navigation tree, select Device Manager > Devices. Click the Device Tree
1.
tab, and then double-click the Secure Access device for which you want to windows
terminal service resource profile.
Click the Configuration tab, and select Users > Resource Profiles > Terminal Services.
2.
The corresponding workspace appears.
Click the New button and the New dialog box appears.
3.
Add or modify settings as specified in Table 28 on page 124.
4.
Click one:
5.
OK—Saves the changes.
Cancel—Cancels the modifications.
Table 28: Configuring Windows Terminal Services Resource Profile Details
Option
Function
Settings tab
Name
Specifies the name for the resource
profile that becomes the default
session bookmark's name.
Description
Describes the bookmark.
Java Support
Allows you to enable or disable Java
Options
applet support.
Your Action
Enter the name.
Enter the description.
Select one of the following option:
Disable Java Support—Disables Java
Support to intermediate traffic.
Use Java applet as a fallback
mechanism—Enables the Secure
Access device to fall back to the
applets when other terminal services
clients are not available on the user's
system.
Always use Java applet—Stores
terminal services Java clients directly
on the Secure Access device without
employing a separate Web server to
host them. You can then associate
these Java applets with the resource
profile and specify that the Secure
Access device always use them to
intermediate traffic.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents