Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 93

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 17: User Role SAM Configuration Details (continued)
Option
Localhost IP
Client Port
Allow Secure Application
Manager to dynamically select
an available port if the
specified client port is taken
Type > Citrix NFuse
Maximum Citrix Sessions
New Allowed Citrix Ports
Type > Microsoft Outlook/Exchange
New Application Servers
Type > NetBIOS file browsing
New Application Servers
SAM > WSAM Applications tab
Name
Description
Applications
Chapter 8: Configuring Access Options using Remote Access Mechanisms
Function
Specifies a static address for
JSAM to listen on loopback
address for client requests to
network application servers.
Specifies the port on which
JSAM should listen for client
application connections.
Allows JSAM to select an
available port when the client
port you specify is taken.
Specifies the maximum
number of client sessions.
Specifies the ports on which
the Metaframe servers listen.
Specifies the application
servers for client application
connections.
Specifies the application
servers for client application
connections.
Displays the application name
in the Client Application
Sessions area of the Secure
Access device end-user home
page.
Displays the description in the
Client Application Sessions
area of the Secure Access
device end-user home page.
Specifies the applications for
which WSAM secures traffic.
Your Action
Enter a static loopback
address.
Enter the port number.
Select the Allow Secure
Application Manager to
dynamically select an
available port if the specified
client port is taken check box
to enable this feature.
Enter the number.
Enter the port number.
Enter the server name.
Enter the server name.
Enter the name of the
application.
Enter the description.
Select one of the following
option Citrix, Lotus Notes,
Microsoft Outlook/Exchange,
NetBIOS file browsing or
Custom from the Applications
drop–down list.
75

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents