Secure Mobile Access 12.4 Deployment Guide

How Will Users Access Your Resources?

Users can access VPN resources secured by the appliance using a variety of agents and clients. Your deployment options can range anywhere from “managed” desktops controlled by your IT department, to systems outside of your control, including employees’ home computers, partner desktops, and other systems such as kiosks or hand-held devices.

How users gain access to your network resources depends on what those resources are. The Connect Tunnel client, for example, is installed on the user’s device and provides the broadest network access and support, and greatest ease of administration. The OnDemand agent also provides broad cross-platform support, but does not handle bi-directional applications like VoIP.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden