Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 9

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Chapter 10
Chapter 11
Chapter 12
Chapter 13
Copyright © 2010, Juniper Networks, Inc.
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Configuring Windows Terminal Services (NSM Procedure) . . . . . . . . . . . . . . . . . 124
Configuring WSAM Resource Profile (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . 131
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Configuring Secure Access Resource Policies . . . . . . . . . . . . . . . . . . . . . . . . 137
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Configuring Authentication and Directory Servers . . . . . . . . . . . . . . . . . . . . . 161
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Configuring Authentication Realms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Configuring Sign-in Policies and Sign-in Pages . . . . . . . . . . . . . . . . . . . . . . 207
Creating Authorization-Only Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Creating User or Administrator URLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Table of Contents
ix

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager

Table of Contents