List of Figures


Chapter 1: Introducing Server-Based Computing and the On-Demand Enterprise

Figure 1-1: SBC combines flexibility with low costs.
Figure 1-2: A typical remote office in a PC-based computing environment
Figure 1-3: A typical office utilizing enterprise server-based computing
Figure 1-4: A typical on-demand enterprise data center
Figure 1-5: A Wyse WinTerm Windows terminal
Figure 1-6: ABM Industries' on-demand enterprise infrastructure

Chapter 2: Windows Terminal Services

Figure 2-1: Execution of a multiuser Windows application
Figure 2-2: An RDP session
Figure 2-3: The connection process in an RDP session
Figure 2-4: The Terminal Services Manager application showing a disconnected session
Figure 2-5: The disconnection process in an RDP session
Figure 2-6: Remote Desktop Client remote control process
Figure 2-7: Setting timeout values for RDP sessions

Chapter 3: Citrix MetaFrame Access Suite

Figure 3-1: ICA presentation services
Figure 3-2: How SpeedScreen improves link performance
Figure 3-3: ICA's connectivity options
Figure 3-4: MetaFrame Secure Gateway example deployment
Figure 3-5: MSAM portal page screenshot

Chapter 4: Preparing Your Organization for an On-Demand Enterprise Implementation

Figure 4-1: ABM's user survey form

Chapter 5: Server-Based Computing Data Center Architecture

Figure 5-1: Legacy systems located near MetaFrame servers

Chapter 6: Designing Your Network for Server-Based Computing

Figure 6-1: Distributed vs. server-based network usage
Figure 6-2: Network design logical symbols
Figure 6-3: Typical LAN access module
Figure 6-4: Typical WLAN access module
Figure 6-5: Typical branch office WAN access module (dedicated media)
Figure 6-6: Typical branch office WAN access module (VPN router)
Figure 6-7: Typical branch office WAN access module (VPN hardware)
Figure 6-8: Typical branch office WAN access module (VPN firewall)
Figure 6-9: Typical data center VPN termination module
Figure 6-10: Typical data center Internet services access module
Figure 6-11: Typical data center RAS module
Figure 6-12: Frame relay vs. T1/E1 point-to-point connections
Figure 6-13: ATM data center network connected to frame relay
Figure 6-14: ISDN BRI and PRI structure
Figure 6-15: Network with a Packeteer PacketShaper
Figure 6-16: Denied session request
Figure 6-17: Bandwidth partitioning
Figure 6-18: Bandwidth prioritization
Figure 6-19: Packeteer analysis report
Figure 6-20: A small business network example
Figure 6-21: A medium-sized business network example (dedicated media)
Figure 6-22: A medium-sized business network example (Internet/VPN media)
Figure 6-23: A medium-sized business network example (Core)
Figure 6-24: A large business network example (distribution/core layer)
Figure 6-25: Large business distribution and core components

Chapter 7: The Client Environment

Figure 7-1: A Windows terminal with various embedded programs
Figure 7-2: The Web Interface application publishing architecture
Figure 7-3: A wireless tablet device accessing a Citrix MetaFrame server farm

Chapter 8: Security

Figure 8-1: Security model vs. user impact
Figure 8-2: Cisco Systems' Security Wheel
Figure 8-3: Implementation cost vs. risk
Figure 8-4: A distributed network in which each regional work site has its own resident file server
Figure 8-5: A centralized network in which the load-balanced file servers reside all in one place
Figure 8-6: Classic firewall system
Figure 8-7: The basic enterprise firewall system
Figure 8-8: MetaFrame Secure Gateway

Chapter 9: Network Management

Figure 9-1: The MIB hierarchy
Figure 9-2: SNMP communities
Figure 9-3: A security alert within an SME
Figure 9-4: Network discovery
Figure 9-5: Agent monitoring
Figure 9-6: Multisite network monitoring
Figure 9-7: Event correlation
Figure 9-8: Software distribution in an SBC environment
Figure 9-9: Software distribution in a distributed network
Figure 9-10: A daily report or hot sheet
Figure 9-11: RM architecture
Figure 9-12: The MOM Administrator Console

Part III: Implementing an On-Demand Server-Based Computing Environment

Figure 10-1: The Clinical Medical Equipment (CME) network schematic
Figure 10-2: The CME Corporate Campus topology

Chapter 10: Project Managing and Deploying an Enterprise SBC Environment

Figure 10-3: Organizational chart method of a work breakdown structure
Figure 10-4: Outline method of a work breakdown structure
Figure 10-5: Accessing legacy servers across the WAN
Figure 10-6: ABM's data migration procedure guidelines

Chapter 11: Server Configuration: Windows Terminal Services

Figure 11-1: Imaging
Figure 11-2: Scripting

Chapter 13: Application Installation and Configuration

Figure 13-1: Shadow key propagation
Figure 13-2: Deploying an application to a few servers
Figure 13-3: The conceptual design of a package-building process
Figure 13-4: The IM job creation process
Figure 13-5: Installation Manager server configurations

Chapter 14: Client Configuration and Deployment

Figure 14-1: The MetaFrame Web Interface site
Figure 14-2: A Terminal Server Advanced Client site
Figure 14-3: The SpeedScreen Browser Acceleration properties page
Figure 14-4: The SpeedScreen Latency utility

Chapter 15: Profiles, Policies, and Procedures

Figure 15-1: The Terminal Server profile path
Figure 15-2: User Profile Path
Figure 15-3: Profile processing
Figure 15-4: The Group Policy Management Console policy scope
Figure 15-5: The Group Policy Management Console Group Policy results
Figure 15-6: Creating a separate OU for MetaFrame servers
Figure 15-7: Creating a new Group Policy
Figure 15-8: Applying the Group Policy to the Citrix users group
Figure 15-9: Denying the Group Policy to the Domain Admins group
Figure 15-10: Enabling Group Policy loopback processing
Figure 15-11: Setting loopback mode to Replace
Figure 15-12: Settings for Application Data redirection

Chapter 16: Securing Client Access

Figure 16-1: The CME secure gateway diagram
Figure 16-2: Citrix components required for Secure Gateway Deployment
Figure 16-3: MetaFrame Management Console's XML port identification tab
Figure 16-4: The Web Interface configuration page
Figure 16-5: A custom Web Interface page showing the contents of a Microsoft folder
Figure 16-6: CME's full Secure Access Center deployment with Web Interface, Secure Gateway, and MSAM

Chapter 17: Network Configuration

Figure 17-1: The layered security hierarchy
Figure 17-2: The CME host naming scheme (partial)
Figure 17-3: Typical Private WAN site network
Figure 17-4: The CME-TNG site network
Figure 17-5: Typical private WAN Packeteer settings
Figure 17-6: A typical VPN WAN site network
Figure 17-7: The CME-EUR network
Figure 17-8: The CME-MEX Network
Figure 17-9: The CME-WEST network
Figure 17-10: CME Corp Internet Packeteer settings
Figure 17-11: CME Corp Internet, Security Perimeter, and VPN/firewall configuration
Figure 17-12: The Private WAN Distribution module
Figure 17-13: CME Corp Private WAN PacketShaper settings
Figure 17-14: Campus LAN access/distribution topology
Figure 17-15: Campus LAN access/distribution (partial)
Figure 17-16: The Campus WLAN access/distribution topology
Figure 17-17: The dual core module
Figure 17-18: The FEC adapter team
Figure 17-19: The FEC member adapter (general)
Figure 17-20: The FEC member adapter (link settings)
Figure 17-21: The FEC member adapter (power management)

Chapter 18: Printing

Figure 18-1: The auto-creation process
Figure 18-2: A locally attached printer
Figure 18-3: Network printer ICA
Figure 18-4: Network printer
Figure 18-5: The Printer Management Properties window
Figure 18-6: The Drivers tab of CMC
Figure 18-7: Driver compatibility
Figure 18-8: Driver mapping
Figure 18-9: The Auto-Creation Settings dialog box
Figure 18-10: The Drivers tab in the Print Server Properties dialog box
Figure 18-11: The Replicate Driver console

Chapter 19: Disaster Recovery and Business Continuity in the SBC Environment

Figure 19-1: Recovery time objectives
Figure 19-2: CME's network infrastructure

Chapter 20: Migration to Windows 2003 and Citrix MetaFrame XP

Figure 20-1: The CCS migration methodology

Chapter 21: Ongoing Administration of the Server-Based Computing Environment

Figure 21-1: Sample reboot script

Appendix A: Internetworking Basics

Figure A-1: Data flow and the OSI model
Figure A-2: Data encapsulation in the OSI model
Figure A-3: Common protocol suites versus the OSI model

Appendix B: Creating an On-Demand Enterprise Financial Analysis Model

Figure B-1: Demographics section of a financial justification model
Figure B-2: Logistics section of a financial justification model
Figure B-3: Costs section of a financial justification model
Figure B-4: Report section of a financial justification model

Appendix C: Creating an On-Demand Enterprise Subscription Billing Model

Figure C-1: Detail from RM report




Citrix Metaframe Access Suite for Windows Server 2003(c) The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net