Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing Server-Based Computing and the On-Demand Enterprise
Figure 1-1: SBC combines flexibility with low costs.
Figure 1-2: A typical remote office in a PC-based computing environment
Figure 1-3: A typical office utilizing enterprise server-based computing
Figure 1-4: A typical on-demand enterprise data center
Figure 1-5: A Wyse WinTerm Windows terminal
Figure 1-6: ABM Industries' on-demand enterprise infrastructure
Chapter 2: Windows Terminal Services
Figure 2-1: Execution of a multiuser Windows application
Figure 2-2: An RDP session
Figure 2-3: The connection process in an RDP session
Figure 2-4: The Terminal Services Manager application showing a disconnected session
Figure 2-5: The disconnection process in an RDP session
Figure 2-6: Remote Desktop Client remote control process
Figure 2-7: Setting timeout values for RDP sessions
Chapter 3: Citrix MetaFrame Access Suite
Figure 3-1: ICA presentation services
Figure 3-2: How SpeedScreen improves link performance
Figure 3-3: ICA's connectivity options
Figure 3-4: MetaFrame Secure Gateway example deployment
Figure 3-5: MSAM portal page screenshot
Chapter 4: Preparing Your Organization for an On-Demand Enterprise Implementation
Figure 4-1: ABM's user survey form
Chapter 5: Server-Based Computing Data Center Architecture
Figure 5-1: Legacy systems located near MetaFrame servers
Chapter 6: Designing Your Network for Server-Based Computing
Figure 6-1: Distributed vs. server-based network usage
Figure 6-2: Network design logical symbols
Figure 6-3: Typical LAN access module
Figure 6-4: Typical WLAN access module
Figure 6-5: Typical branch office WAN access module (dedicated media)
Figure 6-6: Typical branch office WAN access module (VPN router)
Figure 6-7: Typical branch office WAN access module (VPN hardware)
Figure 6-8: Typical branch office WAN access module (VPN firewall)
Figure 6-9: Typical data center VPN termination module
Figure 6-10: Typical data center Internet services access module
Figure 6-11: Typical data center RAS module
Figure 6-12: Frame relay vs. T1/E1 point-to-point connections
Figure 6-13: ATM data center network connected to frame relay
Figure 6-14: ISDN BRI and PRI structure
Figure 6-15: Network with a Packeteer PacketShaper
Figure 6-16: Denied session request
Figure 6-17: Bandwidth partitioning
Figure 6-18: Bandwidth prioritization
Figure 6-19: Packeteer analysis report
Figure 6-20: A small business network example
Figure 6-21: A medium-sized business network example (dedicated media)
Figure 6-22: A medium-sized business network example (Internet/VPN media)
Figure 6-23: A medium-sized business network example (Core)
Figure 6-24: A large business network example (distribution/core layer)
Figure 6-25: Large business distribution and core components
Chapter 7: The Client Environment
Figure 7-1: A Windows terminal with various embedded programs
Figure 7-2: The Web Interface application publishing architecture
Figure 7-3: A wireless tablet device accessing a Citrix MetaFrame server farm
Chapter 8: Security
Figure 8-1: Security model vs. user impact
Figure 8-2: Cisco Systems' Security Wheel
Figure 8-3: Implementation cost vs. risk
Figure 8-4: A distributed network in which each regional work site has its own resident file server
Figure 8-5: A centralized network in which the load-balanced file servers reside all in one place
Figure 8-6: Classic firewall system
Figure 8-7: The basic enterprise firewall system
Figure 8-8: MetaFrame Secure Gateway
Chapter 9: Network Management
Figure 9-1: The MIB hierarchy
Figure 9-2: SNMP communities
Figure 9-3: A security alert within an SME
Figure 9-4: Network discovery
Figure 9-5: Agent monitoring
Figure 9-6: Multisite network monitoring
Figure 9-7: Event correlation
Figure 9-8: Software distribution in an SBC environment
Figure 9-9: Software distribution in a distributed network
Figure 9-10: A daily report or hot sheet
Figure 9-11: RM architecture
Figure 9-12: The MOM Administrator Console
Part III: Implementing an On-Demand Server-Based Computing Environment
Figure 10-1: The Clinical Medical Equipment (CME) network schematic
Figure 10-2: The CME Corporate Campus topology
Chapter 10: Project Managing and Deploying an Enterprise SBC Environment
Figure 10-3: Organizational chart method of a work breakdown structure
Figure 10-4: Outline method of a work breakdown structure
Figure 10-5: Accessing legacy servers across the WAN
Figure 10-6: ABM's data migration procedure guidelines
Chapter 11: Server Configuration: Windows Terminal Services
Figure 11-1: Imaging
Figure 11-2: Scripting
Chapter 13: Application Installation and Configuration
Figure 13-1: Shadow key propagation
Figure 13-2: Deploying an application to a few servers
Figure 13-3: The conceptual design of a package-building process
Figure 13-4: The IM job creation process
Figure 13-5: Installation Manager server configurations
Chapter 14: Client Configuration and Deployment
Figure 14-1: The MetaFrame Web Interface site
Figure 14-2: A Terminal Server Advanced Client site
Figure 14-3: The SpeedScreen Browser Acceleration properties page
Figure 14-4: The SpeedScreen Latency utility
Chapter 15: Profiles, Policies, and Procedures
Figure 15-1: The Terminal Server profile path
Figure 15-2: User Profile Path
Figure 15-3: Profile processing
Figure 15-4: The Group Policy Management Console policy scope
Figure 15-5: The Group Policy Management Console Group Policy results
Figure 15-6: Creating a separate OU for MetaFrame servers
Figure 15-7: Creating a new Group Policy
Figure 15-8: Applying the Group Policy to the Citrix users group
Figure 15-9: Denying the Group Policy to the Domain Admins group
Figure 15-10: Enabling Group Policy loopback processing
Figure 15-11: Setting loopback mode to Replace
Figure 15-12: Settings for Application Data redirection
Chapter 16: Securing Client Access
Figure 16-1: The CME secure gateway diagram
Figure 16-2: Citrix components required for Secure Gateway Deployment
Figure 16-3: MetaFrame Management Console's XML port identification tab
Figure 16-4: The Web Interface configuration page
Figure 16-5: A custom Web Interface page showing the contents of a Microsoft folder
Figure 16-6: CME's full Secure Access Center deployment with Web Interface, Secure Gateway, and MSAM
Chapter 17: Network Configuration
Figure 17-1: The layered security hierarchy
Figure 17-2: The CME host naming scheme (partial)
Figure 17-3: Typical Private WAN site network
Figure 17-4: The CME-TNG site network
Figure 17-5: Typical private WAN Packeteer settings
Figure 17-6: A typical VPN WAN site network
Figure 17-7: The CME-EUR network
Figure 17-8: The CME-MEX Network
Figure 17-9: The CME-WEST network
Figure 17-10: CME Corp Internet Packeteer settings
Figure 17-11: CME Corp Internet, Security Perimeter, and VPN/firewall configuration
Figure 17-12: The Private WAN Distribution module
Figure 17-13: CME Corp Private WAN PacketShaper settings
Figure 17-14: Campus LAN access/distribution topology
Figure 17-15: Campus LAN access/distribution (partial)
Figure 17-16: The Campus WLAN access/distribution topology
Figure 17-17: The dual core module
Figure 17-18: The FEC adapter team
Figure 17-19: The FEC member adapter (general)
Figure 17-20: The FEC member adapter (link settings)
Figure 17-21: The FEC member adapter (power management)
Chapter 18: Printing
Figure 18-1: The auto-creation process
Figure 18-2: A locally attached printer
Figure 18-3: Network printer ICA
Figure 18-4: Network printer
Figure 18-5: The Printer Management Properties window
Figure 18-6: The Drivers tab of CMC
Figure 18-7: Driver compatibility
Figure 18-8: Driver mapping
Figure 18-9: The Auto-Creation Settings dialog box
Figure 18-10: The Drivers tab in the Print Server Properties dialog box
Figure 18-11: The Replicate Driver console
Chapter 19: Disaster Recovery and Business Continuity in the SBC Environment
Figure 19-1: Recovery time objectives
Figure 19-2: CME's network infrastructure
Chapter 20: Migration to Windows 2003 and Citrix MetaFrame XP
Figure 20-1: The CCS migration methodology
Chapter 21: Ongoing Administration of the Server-Based Computing Environment
Figure 21-1: Sample reboot script
Appendix A: Internetworking Basics
Figure A-1: Data flow and the OSI model
Figure A-2: Data encapsulation in the OSI model
Figure A-3: Common protocol suites versus the OSI model
Appendix B: Creating an On-Demand Enterprise Financial Analysis Model
Figure B-1: Demographics section of a financial justification model
Figure B-2: Logistics section of a financial justification model
Figure B-3: Costs section of a financial justification model
Figure B-4: Report section of a financial justification model
Appendix C: Creating an On-Demand Enterprise Subscription Billing Model
Figure C-1: Detail from RM report
Previous page
Table of content
Next page
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
Steve Kaplan
,
Tim Reeser
,
Alan Wood
BUY ON AMAZON
CISSP Exam Cram 2
Introduction
Exam Prep Questions
Exam Prep Questions
Network Access Controls
Business Continuity Planning
Snort Cookbook
Logging in Binary
Logging to Email
Prioritizing Alerts
Generating Text-Based Log Analysis
Monitoring a Network Using Policy-Based IDS
The Complete Cisco VPN Configuration Guide
Adding Site-to-Site Connections
Summary
WebVPN
Summary
Summary
Visual C# 2005 How to Program (2nd Edition)
A Simple C# Application: Displaying a Line of Text
Increment and Decrement Operators
Summary
Classes File and Directory
Type Constraints
Cisco Voice Gateways and Gatekeepers
Introduction to MGCP
When to Use H.323
Troubleshooting Tools
Connecting to an IP WAN
Verifying and Troubleshooting MGCP Gateway Fallback
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Explorers and Inspectors Collections
Properties and Methods Common to Outlook Items
Introduction to the Actions Pane
Another Technique for Creating Data-Bound Spreadsheets
Advanced ADO.NET Data Binding: Looking Behind the Scenes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies