Index_S


S

Sales office LAN hardware, 539

SAN (storage area network) devices, 6, 24–25

SBC architecture components, 23–28

SBC costs and savings spreadsheet model, 686–699

SBC data center. See Data center

SBC deployment process, planning, 288–289

SBC environment. See also SBC

applications in, 396

compelling vision of, 287

disaster recovery/business continuity, 625–639

expanding, 292

future direction of, 329

keeping the end state in mind, 397

monitoring progress, 292

ongoing administration of, 653–667

postproduction management of, 328–330

publicizing early successes, 292

remote office in, 11

software distribution in, 262

steps in planning, 108

troubleshooting, 662–666

SBC lab, establishing, 330

SBC market prediction, 32

SBC migration project. See Project

SBC model, 4

SBC momentum, building, 290–291

SBC (server-based computing). See also Enterprise SBC; SBC environment

building enthusiasm for, 113

business continuity design, 629–630

communicating about to all stakeholders, 290

concerns and myths about, 20–23

cost estimates, 696

economic justification for, 4, 6–13

encryption for, 234

environmental benefits of, 18

establishing a need for implementing, 287

flexibility and low cost of, 5

handling objections to, 312–313

vs. mainframe computing, 5

major business benefits of, 13–18

measuring benefits of, 329

migrating to, 130

network design for, 147–192

vs. PC-based computing, 5

political considerations of, 113–114

regulatory compliance benefits of, 18

removing obstacles to, 290–291

savings estimates, 696

software distribution and, 205

solution to business continuity, 629

strategic benefits of, 4

system management environment for, 250–266

SBC steering committee, 329

SBC-enabled opportunities, preparing for, 292–293

Scalability, network design for, 150

Scheduled maintenance activities, 654–657

Scope creep (project), 116

Scripting, 346–347

SD (ScrewDrivers), triCerat, 620

SDSL (Symmetric DSL), 173

Seamless Windows feature, 84, 456

Secure access center, 484, 522–523

Secure access center deployments, 484, 522–523

Secure Access Manager. See MSAM

Secure Gateway deployment, 485–490

benefits of, 488

installation of, 490–529

required Citrix components, 489

requirements of, 491

user connection to, 489–490

Secure Gateway deployment diagrams, 97, 486–487

Secure Gateway Diagnosis, 517

Secure Gateway Management Console, 517

Secure Gateway for MetaFrame, 79, 96, 235, 484

configuration settings, 515

configuring, 514–516

ICA Win32 clients with, 448–450

installing, 513–514

Secure Gateway server

FQDNs for, 492

SSL certificate for, 492–495

Securing client access, 483–529

Security, 16, 25, 215–239

application, 419

areas of exposure, 223, 226–228

as cumulative, 216

changes in Windows Server 2003, 238–239

CME requirements for, 546–547

desktop, 113, 202–204, 264, 476

Internet MSAM deployment requirements for, 527–528

definitions of, 216

file, 60–61

on the ICA client, 447–456

nature of, 216–219

Security alert within an SME, 253

Security concepts, 546–547

Security design, 129, 158, 223

Security design technical considerations, 223

Security environment, 122

Security hierarchy, 546

Security management, 252

Security management hardware and software, 547

Security measures

administrative, 222

physical, 222

technical, 223, 228–239

Security methodologies, 218–219

Security model vs. user impact (graph), 219

Security paradigms, 222

Security policy, 218–219

common requirements, 222–223

developing, 219–239

Security policy definition, 222–223

Security posture assessment, 220–221

Security process, 219

Security proxy server, 447–448

Security threats categorized by source, 221

Security weaknesses, sources of, 221

Security Wheel (Cisco), 220

Seismic activity, data center and, 140

Serial number and license number, 388

Server backbone, 25

Server certificate

installed on the STA, 495

obtaining from CA, 492–495

Server farm

architecture design, 124

event and performance monitoring, 271

fail-over, 18

single point access to multiple points, 14

wireless tablet device accessing, 213

Server hardening, 237–238

Server reboot, 655

Server-based vs. distributed network usage, 148–149

Server-side network settings (CME), 583–586

Server-side print drivers, 614–615

Service level views into problems, 261

Services, SLAs for, 242–244

Services design, 154–156

Session connections, 41–42

Session disconnection, 43–44

Session layer (OSI model), 674

Session reconnection, 44

Session Shadowing, 9, 98–100, 264

Session state, checking for, 656

SessionID, 34

Sessions (dumb terminal), 32

SessionSpace, 34, 37, 41

Shadow key, 59

Shadow key propagation, 401

Shadow pipe, 50

Shadowed session, 50

Shadowing, 98–101, 320, 258, 664

Sharing your experiences, 330

Shrink wrap method of MetaFrame licensing, 102

Simple hybrid clients, 196, 201

Simplicity, as a goal, 20

Simplify Printing v2, 620

Single point access to multiple server farms, 14

Single point of failure, 21

Single-session applications in multisession environment, 56

Site surveys, importance of accurate, 328

16-bit application optimization, 398–400

SLAs (service level agreements), 242–244, 318

for an enterprise backup service, 243–244

establishing, 307

expanding, 319

using within the SME, 254–255

SLR (SpeedScreen Latency Reduction) manager, 81

Small business network design, 186

Smart card logon, enabling, 453–454

SME (System Management Environment) for SBC, 121, 126–127, 250–266

architecture, 255–266

basic requirements, 250–251

objectives, 250

security alert within, 253

three Ps of, 242, 250

using SLAs within, 254–255

SME tools, 266–277

SMS agent, 269

SMS (MS System Management Server), 262, 268–270

vs. Group Policy, 269–270

in Microsoft BackOffice suite, 269

SMS version 2.0 enhanced features, 269

SNMP agent, 245

SNMP communities, 247–248

SNMP management station, 245

SNMP MIB structure (MIB II), 248

SNMP (Simple Network Management Protocol), 246–248

advantages of, 247

limitations of, 248

UDP ports, 257

SNMP traps, 245

SNMP versions, 246

SNMP-based network management, 245

SOCKS proxy server, 447

Soft cost estimates, 695

Soft cost figures, 692

Soft savings estimates, 699

Softricity SoftGrid for Terminal Servers, 403–404

Softricity SystemGuard virtual environment, 404

Software distribution, 261–263

automation of, 205

in a distributed network, 263

in SBC environment, 205, 262

Software distribution applications, 205

Software metering, 263–264

Software products, cited as five 9s, 532

Solaris, installing MetaFrame on, 378–381

Solution KnowledgeBase (Citrix), 376

SONET (Synchronous Optical Network), 172

Speed (network), 150, 443

SpeedScreen, 81

Browser Acceleration, 442–443

Latency Protection, 444–446

Latency Reduction Manager, 444

Latency Threshold, 446

Latency utility, 445

link performance and, 82

Splash screens, eliminating, 476

Spooler service (printing), 618

Spreadsheet model, 686–699

SPU (System Preparation Utility) for Windows NT, 348

SQL authentication mode, setting the default, 360

SQL database servers, 25

SQL Datastore, troubleshooting, 664–665

SQL Server Authentication, 363

SQL Server 2000

creating the Data Store on, 360–364

Enterprise Manager, 360–362

installation and setup, 359–360

latest service pack for, 360

SSL certificate, obtaining from CA, 492–495

SSL ICA clients, configuring, 450–451

SSL Relay service, 448

SSL (Secure Socket Layer) public key, 232

SSL/TLS, system requirements for, 448

STA

configuring, 513

installing, 512–513

STA configuration settings, changing, 513

STA server, certificate installed on, 495

Staffing. See IT staff

Standard edition (Windows 2003), 38

Standard naming practices, 253–254

Standardization, centralized, 113

Starting and stopping MetaFrame for UNIX, 381

Status reporting, 307

Storage cost estimates, 694

STP (Spanning Tree Protocol), 154

StressTest, 349

Subscription Advantage (MetaFrame licensing), 102

Subscription billing model, 701–706

Sullivan, Ray, 6

Sunset period to phase out systems, 146

Support personnel, 129

Support structure and processes, 121

Survey databases, 321

Surveys, 301–303

SUS (Software Update Service), 262

Switch configuration

Catalyst 6509, 572–573

Cisco 3550–12G, 573

CME Corp core, 580–583

LAN access/distribution, 578–579

Symantec Ghost Corporate Edition v 7.5, 348–349

Sysprep version 1.1, 348

System global object, 61

System implementation time limit, 323

System Management Environment. See SME

System management tools, 266–277

System metrics graphs, 267

System testing, 407–408




Citrix Metaframe Access Suite for Windows Server 2003(c) The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net