|
AAA (authentication authorization and access), 158, 234
AAA servers, 168
ABM Industries case study, 8
access infrastructure schematic, 30
data migration procedures, 320
facilitating growth, 16
on-demand enterprise implementation, 29–30
user survey form, 118
ACE Cost Analyzer (Citrix), 686
Access (application), 419
Access for external users, limited, 95
Access infrastructure (Citrix enterprise), 4
Access layer (network design), 153, 161–168
security exposures, 226
switches, 161
Access to local resources, limiting, 477–480
Access to SBC resources
designing, 156–158
methods, 157–158
Access switch configuration (plant floor), 563
ACCESS-DMZ switch configuration (Cisco 3550–12G), 573
Account change fees, 704–705
Accounting (audit trails of data access), 217
ACE Cost Analyzer, 686
ACLcheck utility, 95
Active Directory, 79, 155
design, 125
User Manager, 93
Users & Computers print settings, 614
Active Directory domain, 55
Active Directory OU for MetaFrame XP servers, 469–470
Active session timeout, 50
ActiveX control, 46
Add/Remove Programs, 401
Addressing scheme, 548, 550
Administration of SBC environment, 8, 653–667
Administrative security measures, 222
Administrator-created rules (MOM 2000), 271
Administrators (network)
need for skilled, 114
remote connect to server console, 65
ADSL (Asymmetric DSL), 173
Agent monitoring, 256–258
ALE client, 210
Alerting, 252, 271
Allow Drive Access Properties dialog, 478–479
Analysis phase (migration), 643
Anecdotal testing, 408
Anonymous user accounts, 93
App Config Add program syntax and parameters, 384
Application installation and configuration, 395–419
Appliance-based bandwidth managers, 179–185
Application access, 419
ICA client options for, 422–442
managing, 661–662
Application addressing, 92
Application Compatibility Scripts, 58, 402–403
Application COM/DCOM objects, 61
Application data, user-specific, 60
Application Data redirection, 475
Application environment, 119–120
Application Execution Shell, 96
Application failure in multiuser environment, 57
Application gateways, 230–231
Application installation, 59
checklist, 402
methodology, 397
tips, 404–406
Application layer (IP), 676
Application layer (OSI model), 674
Application licensing, 419
Application list, managing, 407
Application navigation, 92
Application optimization, 398–400
Application packaging, 120, 413–414
Application portal, 79
Application QoS (Quality-of-Service), 255
Application rollout cost estimates, 692
Application Server mode (Terminal Server), 64
Application servers, 25
Application set, defined, 84
Application Set Settings, 450, 454
Application strategies, 397–400
Application survey, 302
Application testing procedure, 407–408
Application updates and hotfixes methodology, 397
Applications, 56–62, 120, 396
adding/removing users, 662
architectural design of, 123
controlling availability of, 481
deployment of, 13–15, 410–419
during beta, 317
eliminating features of, 476–477
features and requirements, 397–398
installing and configuring, 400–406
limiting users to published, 94–95
locking down, 419
for pilot program, 308–310, 312
postinstallation changes to, 402–403
publishing, 92–96
requirements of, 120
selecting, 397–398
AppSense, 6, 15, 204, 344
Asset tracking system, 303
AT&T, for SBC data center hosting, 136
ATM (Asynchronous Transfer Mode), 170–172
ATM cell loss probability (CLP) bit, 178
ATM data center connected to frame relay, 173
Auditability, network design for, 152
Auditing, 236, 252
Authentication, 156, 217
Authorization, 217
Auto Update feature (MetaFrame), 209
Auto-Creation Settings dialog (printing), 606
Autologin, 209
Automated systems with dependent applications, 145–146
Automatic Activation (licensing), 63
Automation design, 125
Autoupdate, 456
Availability, in SLA, 243
|