 Introduction to Mobile Access
 Check Point Remote Access Solutions
 Getting Started with Mobile Access
 Applications for Clientless Access
 Protection Levels
 Web Applications
 Web Applications of a Specific Type
 Configuring Web Applications
 Web Application — General Properties Page
 Web Application — Authorized Locations Page
 Web Application — Link in Portal Page
 Web Application — Protection Level Page
 Web Application — Link Translation Page
 Using the Login Name of the Currently Logged in User
 Completing the Configuration of the Web Application
 Configuring a Proxy per Web Application
 Configuring Mobile Access to Forward Customized HTTP Headers
 Link Translation
 Link Translation Domain
 Web Application Features
 File Shares
 Citrix Services
 Web Mail Services
 Native Applications
 DNS Names
 Single Sign On
 Native Applications for Client-Based Access
 Exchange Mail Applications for Smartphones and Tablets
 Mobile Access for Smartphones and Tablets
 User Authentication in Mobile Access
 Endpoint Security On Demand
 Advanced Password Management Settings
 Mobile Access Blade Configuration and Settings
 Troubleshooting Mobile Access
 Mobile Access Commands
 Index
|