|
Sales office LAN hardware, 539
SAN (storage area network) devices, 6, 24–25
SBC architecture components, 23–28
SBC costs and savings spreadsheet model, 686–699
SBC data center. See Data center
SBC deployment process, planning, 288–289
SBC environment. See also SBC
applications in, 396
compelling vision of, 287
disaster recovery/business continuity, 625–639
expanding, 292
future direction of, 329
keeping the end state in mind, 397
monitoring progress, 292
ongoing administration of, 653–667
postproduction management of, 328–330
publicizing early successes, 292
remote office in, 11
software distribution in, 262
steps in planning, 108
troubleshooting, 662–666
SBC lab, establishing, 330
SBC market prediction, 32
SBC migration project. See Project
SBC model, 4
SBC momentum, building, 290–291
SBC (server-based computing). See also Enterprise SBC; SBC environment
building enthusiasm for, 113
business continuity design, 629–630
communicating about to all stakeholders, 290
concerns and myths about, 20–23
cost estimates, 696
economic justification for, 4, 6–13
encryption for, 234
environmental benefits of, 18
establishing a need for implementing, 287
flexibility and low cost of, 5
handling objections to, 312–313
vs. mainframe computing, 5
major business benefits of, 13–18
measuring benefits of, 329
migrating to, 130
network design for, 147–192
vs. PC-based computing, 5
political considerations of, 113–114
regulatory compliance benefits of, 18
removing obstacles to, 290–291
savings estimates, 696
software distribution and, 205
solution to business continuity, 629
strategic benefits of, 4
system management environment for, 250–266
SBC steering committee, 329
SBC-enabled opportunities, preparing for, 292–293
Scalability, network design for, 150
Scheduled maintenance activities, 654–657
Scope creep (project), 116
Scripting, 346–347
SD (ScrewDrivers), triCerat, 620
SDSL (Symmetric DSL), 173
Seamless Windows feature, 84, 456
Secure access center, 484, 522–523
Secure access center deployments, 484, 522–523
Secure Access Manager. See MSAM
Secure Gateway deployment, 485–490
benefits of, 488
installation of, 490–529
required Citrix components, 489
requirements of, 491
user connection to, 489–490
Secure Gateway deployment diagrams, 97, 486–487
Secure Gateway Diagnosis, 517
Secure Gateway Management Console, 517
Secure Gateway for MetaFrame, 79, 96, 235, 484
configuration settings, 515
configuring, 514–516
ICA Win32 clients with, 448–450
installing, 513–514
Secure Gateway server
FQDNs for, 492
SSL certificate for, 492–495
Securing client access, 483–529
Security, 16, 25, 215–239
application, 419
areas of exposure, 223, 226–228
as cumulative, 216
changes in Windows Server 2003, 238–239
CME requirements for, 546–547
desktop, 113, 202–204, 264, 476
Internet MSAM deployment requirements for, 527–528
definitions of, 216
file, 60–61
on the ICA client, 447–456
nature of, 216–219
Security alert within an SME, 253
Security concepts, 546–547
Security design, 129, 158, 223
Security design technical considerations, 223
Security environment, 122
Security hierarchy, 546
Security management, 252
Security management hardware and software, 547
Security measures
administrative, 222
physical, 222
technical, 223, 228–239
Security methodologies, 218–219
Security model vs. user impact (graph), 219
Security paradigms, 222
Security policy, 218–219
common requirements, 222–223
developing, 219–239
Security policy definition, 222–223
Security posture assessment, 220–221
Security process, 219
Security proxy server, 447–448
Security threats categorized by source, 221
Security weaknesses, sources of, 221
Security Wheel (Cisco), 220
Seismic activity, data center and, 140
Serial number and license number, 388
Server backbone, 25
Server certificate
installed on the STA, 495
obtaining from CA, 492–495
Server farm
architecture design, 124
event and performance monitoring, 271
fail-over, 18
single point access to multiple points, 14
wireless tablet device accessing, 213
Server hardening, 237–238
Server reboot, 655
Server-based vs. distributed network usage, 148–149
Server-side network settings (CME), 583–586
Server-side print drivers, 614–615
Service level views into problems, 261
Services, SLAs for, 242–244
Services design, 154–156
Session connections, 41–42
Session disconnection, 43–44
Session layer (OSI model), 674
Session reconnection, 44
Session Shadowing, 9, 98–100, 264
Session state, checking for, 656
SessionID, 34
Sessions (dumb terminal), 32
SessionSpace, 34, 37, 41
Shadow key, 59
Shadow key propagation, 401
Shadow pipe, 50
Shadowed session, 50
Shadowing, 98–101, 320, 258, 664
Sharing your experiences, 330
Shrink wrap method of MetaFrame licensing, 102
Simple hybrid clients, 196, 201
Simplicity, as a goal, 20
Simplify Printing v2, 620
Single point access to multiple server farms, 14
Single point of failure, 21
Single-session applications in multisession environment, 56
Site surveys, importance of accurate, 328
16-bit application optimization, 398–400
SLAs (service level agreements), 242–244, 318
for an enterprise backup service, 243–244
establishing, 307
expanding, 319
using within the SME, 254–255
SLR (SpeedScreen Latency Reduction) manager, 81
Small business network design, 186
Smart card logon, enabling, 453–454
SME (System Management Environment) for SBC, 121, 126–127, 250–266
architecture, 255–266
basic requirements, 250–251
objectives, 250
security alert within, 253
three Ps of, 242, 250
using SLAs within, 254–255
SME tools, 266–277
SMS agent, 269
SMS (MS System Management Server), 262, 268–270
vs. Group Policy, 269–270
in Microsoft BackOffice suite, 269
SMS version 2.0 enhanced features, 269
SNMP agent, 245
SNMP communities, 247–248
SNMP management station, 245
SNMP MIB structure (MIB II), 248
SNMP (Simple Network Management Protocol), 246–248
advantages of, 247
limitations of, 248
UDP ports, 257
SNMP traps, 245
SNMP versions, 246
SNMP-based network management, 245
SOCKS proxy server, 447
Soft cost estimates, 695
Soft cost figures, 692
Soft savings estimates, 699
Softricity SoftGrid for Terminal Servers, 403–404
Softricity SystemGuard virtual environment, 404
Software distribution, 261–263
automation of, 205
in a distributed network, 263
in SBC environment, 205, 262
Software distribution applications, 205
Software metering, 263–264
Software products, cited as five 9s, 532
Solaris, installing MetaFrame on, 378–381
Solution KnowledgeBase (Citrix), 376
SONET (Synchronous Optical Network), 172
Speed (network), 150, 443
SpeedScreen, 81
Browser Acceleration, 442–443
Latency Protection, 444–446
Latency Reduction Manager, 444
Latency Threshold, 446
Latency utility, 445
link performance and, 82
Splash screens, eliminating, 476
Spooler service (printing), 618
Spreadsheet model, 686–699
SPU (System Preparation Utility) for Windows NT, 348
SQL authentication mode, setting the default, 360
SQL database servers, 25
SQL Datastore, troubleshooting, 664–665
SQL Server Authentication, 363
SQL Server 2000
creating the Data Store on, 360–364
Enterprise Manager, 360–362
installation and setup, 359–360
latest service pack for, 360
SSL certificate, obtaining from CA, 492–495
SSL ICA clients, configuring, 450–451
SSL Relay service, 448
SSL (Secure Socket Layer) public key, 232
SSL/TLS, system requirements for, 448
STA
configuring, 513
installing, 512–513
STA configuration settings, changing, 513
STA server, certificate installed on, 495
Staffing. See IT staff
Standard edition (Windows 2003), 38
Standard naming practices, 253–254
Standardization, centralized, 113
Starting and stopping MetaFrame for UNIX, 381
Status reporting, 307
Storage cost estimates, 694
STP (Spanning Tree Protocol), 154
StressTest, 349
Subscription Advantage (MetaFrame licensing), 102
Subscription billing model, 701–706
Sullivan, Ray, 6
Sunset period to phase out systems, 146
Support personnel, 129
Support structure and processes, 121
Survey databases, 321
Surveys, 301–303
SUS (Software Update Service), 262
Switch configuration
Catalyst 6509, 572–573
Cisco 3550–12G, 573
CME Corp core, 580–583
LAN access/distribution, 578–579
Symantec Ghost Corporate Edition v 7.5, 348–349
Sysprep version 1.1, 348
System global object, 61
System implementation time limit, 323
System Management Environment. See SME
System management tools, 266–277
System metrics graphs, 267
System testing, 407–408
|