Table of Contents

About This Guide
Objectives
Audience
Document Conventions
List of Technical Publications
Requesting Technical Support
Getting Started
Understanding Secure Access Device Configuration
NSM and Secure Access Device Management Overview
Communication Between a Secure Access Device and NSM Overview
Secure Access Device Services and Device Configurations Supported in NSM
Secure Access Device and NSM Installation Overview
Secure Access Device Installation Overview
NSM Installation Overview
Integrating Secure Access Devices
Adding Secure Access Devices
Importing a Secure Access Device
Installing and Configuring a Secure Access Device
Adding a Secure Access Device Through NSM
Configuring and Activating the NSM agent on the Secure Access Device
Confirming Connectivity and Importing the Secure Access Device Configuration
Requirements for Importing a Secure Access Device into NSM Through a Reachable Workflow
Adding a Secure Access Device Through a Reachable Workflow
Importing Multiple Secure Access Devices
Creating the CSV File
Validating the CSV File
Adding and Importing Multiple Secure Access Devices
Verifying Imported Device Configurations
Using Device Monitor
Using Device Manager
Using Job Manager
Using Configuration Summaries
Adding Secure Access Clusters
Adding a Secure Access Cluster Overview
Adding a Secure Access Cluster with Imported Cluster Members
Installing and Configuring the Cluster
Adding the Cluster in NSM
Adding the Cluster Members in NSM
Configuring and Activating the DMI Agent on the Cluster
Importing Cluster Configuration
Working with Secure Access Templates
Creating and Applying a Secure Access Device Template
Creating the Template
Applying the Template
Promoting a Secure Access Device Configuration to a Template
Configuring Secure Access Devices
Configuring User Roles and Administrator Roles
Configuring Secure Access Device User Roles (NSM Procedure)
Creating Secure Access Role-Based Source IP Alias (NSM Procedure)
Configuring Secure Access General Session Options (NSM Procedure)
Creating and Configuring Secure Access Device Administrator Roles (NSM Procedure)
Configuring Terminal Services Using Remote Access Mechanism
Terminal Services Overview
Configuring Terminal Services on a Secure Access Device User Role (NSM Procedure)
Terminal Services User Experience
Terminal Services Execution
Configuring Access Options using Remote Access Mechanisms
Configuring Access Options using Remote Access Mechanisms Overview
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure)
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
Configuring Secure Application Manager on a Secure Access Device User Role (NSM Procedure)
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
Configuring Web Rewriting on a Secure Access Device User Role (NSM Procedure)
Configuring Telnet/SSH on a Secure Access Device User Role (NSM Procedure)
Configuring Secure Access Resource Profiles
Configuring a JSAM Resource Profile (NSM Procedure)
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM Procedure)
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM Procedure)
Configuring a Citrix Listed Application Resource Profile (NSM Procedure)
Configuring Citrix Web Applications Resource Profile (NSM Procedure)
Configuring Custom Web Applications Resource Profile (NSM Procedure)
Configuring File Rewriting Resource Profiles (NSM Procedure)
Configuring Windows Terminal Services (NSM Procedure)
Configuring a Telnet/SSH Resource Profile (NSM Procedure)
Configuring WSAM Resource Profile (NSM Procedure)
Configuring Bookmarks for Virtual Desktop Resource Profiles (NSM Procedure)
Configuring Secure Access Resource Policies
Configuring a File Rewriting Resource Policy (NSM Procedure)
Configuring a Secure Application Manager Resource Policy (NSM Procedure)
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure)
Configuring a Terminal Service Resource Policy (NSM Procedure)
Configuring Web Rewriting Resource Policies (NSM Procedure)
Configuring a Network Connect Connection Profile Resource Policy (NSM Procedure)
Defining Network Connect Split Tunneling Policies (NSM Procedure)
Configuring Authentication and Directory Servers
Configuring a Secure Access ACE Server Instance (NSM Procedure)
Creating a Custom Expression for an Authentication Server (NSM Procedure)
Configuring a Secure Access Local Authentication Server Instance (NSM Procedure)
Configuring a Secure Access LDAP Server Instance (NSM Procedure)
Configuring a Secure Access RADIUS Server Instance (NSM Procedure)
Configuring a Secure Access Anonymous Server Instance (NSM Procedure)
Configuring a Secure Access eTrust SiteMinder Server Instance (NSM Procedure)
Configuring a Secure Access Certificate Server Instance (NSM Procedure)
Configuring a Secure Access Manual CA Certificate (NSM Procedure)
Configuring a Secure Access SAML Server Instance (NSM Procedure)
Configuring a Secure Access Active Directory or NT Domain Instance (NSM Procedure)
Configuring a Secure Access NIS Server Instance (NSM Procedure)
Configuring Authentication Realms
Configuring Secure Access Authentication Realms (NSM Procedure)
Configuring Secure Access Authentication Policies (NSM Procedure)
Configuring Secure Access Role Mapping Rules (NSM Procedure)
Configuring Sign-in Policies and Sign-in Pages
Configuring Secure Access Sign-In Policies (NSM Procedure)
Creating Authorization-Only Policies
Creating User or Administrator URLs
Creating Meeting URLs
Configuring Secure Access Sign-In Pages (NSM Procedure)
Creating Users/Administrator Sign-in Pages
Creating Meeting Sign-in Pages
Configuring Single Sign-On
Defining Basic, NTLM, and Kerberos Resources
Configuring Basic, NTLM, and Kerberos Resources (NSM Procedure)
Defining a Basic Authentication, NTLM, or Kerberos Intermediation Resource Policy (NSM Procedure)
Configuring a SAML Access Control Resource Policy (NSM Procedure)
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure)
Configuring Secure Access Host Checker Policies
Setting Up Secure Access Device Host Checker Options (NSM Procedure)
Configuring General Host Checker Remediation (NSM Procedure)
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM Procedure)
Configuring the Remote Integrity Measurement Verifier Server (NSM Procedure)
Configuring Host Checker Customized Requirements Using Custom Rules (NSM Procedure)
Enabling Advanced Endpoint Defense (NSM Procedure)
Enabling Predefined Client-Side Policies for Windows Only (NSM Procedure)
Enabling Connection Control Policies
Configuring Virus Signature Version Monitoring (NSM Procedure)
Importing Virus Signature Version Monitoring or Patch Management Version Monitoring List (NSM Procedure)
Assigning a Proxy Server an Auto-Update Server (NSM Procedure)
Configuring Secure Access Cache Cleaner
Configuring Global Cache Cleaner Options (NSM Procedure)
Configuring Cache Cleaner Restrictions (NSM Procedure)
Configuring Secure Access System Management Features
Configuring the Network Communications Protocol (NSM Procedure)
Configuring Secure Meetings (NSM Procedure)
Configuring Global Security (NSM Procedure)
Configuring Sensors (NSM Procedure)
Creating a Custom Expression for Sensor Settings (NSM Procedure)
Configuring Network Settings
Configuring General Network Settings (NSM Procedure)
Configuring Internal Ports (NSM Procedure)
Configuring Hosts (NSM Procedure)
Configuring Internet Protocol Filters (NSM Procedure)
Synchronizing User Records
Enabling User Record Synchronization (NSM Procedure)
Configuring the Authentication Server (NSM Procedure)
Configuring the User Record Synchronization Server (NSM Procedure)
Configuring the Client (NSM Procedure)
Configuring the Database (NSM Procedure)
Configuring IF-MAP Federation Settings
Configuring IF-MAP Servers (NSM Procedure)
Configuring IF-MAP Client Settings on the Secure Access Device (NSM Procedure)
Configuring IF-MAP Session Export Policy on the Secure Access Device (NSM Procedure)
Configuring IF-MAP Session Import Policy on the Secure Access Device (NSM Procedure)
Configuring IF-MAP Server Replicas (NSM Procedure)
Managing Secure Access Devices
Managing Secure Access Devices
Managing Large Binary Data Files (NSM Procedure)
Removing a Secure Access Device from NSM Management (NSM Procedure)
Archiving Secure Meetings (NSM Procedure)
Managing Secure Access Node from a Cluster
Troubleshooting Secure Access Device Federated Networks
Troubleshooting the IF-MAP Federation Network (NSM Procedure)
Monitoring Secure Access Devices
Configuring Logs in Secure Access Devices
Configuring User Access, Admin Access, Events and Sensors (NSM Procedure)
Configuring Custom Filters and Formats for Log Files (NSM Procedure)
Configuring Client-Side Logs (NSM Procedure)
Configuring Custom Log Filters (NSM Procedure)
Viewing Logs in Secure Access Devices
Viewing Device Status
Viewing Device Monitor Alarm Status
Monitoring the Secure Access as an SNMP Agent (NSM Procedure)
Index
Index