List of Figures

Chapter 1: Introducing the Citrix Access Platform Alternative

Figure 1-1: On-demand access combines flexibility with low costs.
Figure 1-2: Typical remote office in a PC-based computing environment
Figure 1-3: Typical office in an enterprise on-demand access environment
Figure 1-4: A typical data center
Figure 1-5: Wireless Neoware Windows terminal
Figure 1-6: ABM Industries' Enterprise on-demand access platform

Chapter 2: Windows Server 2003 Terminal Services

Figure 2-1: The connection process in an RDP session
Figure 2-2: The Terminal Services Manager application showing a disconnected session
Figure 2-3: The disconnection process in an RDP session
Figure 2-4: Remote Desktop Client remote control process
Figure 2-5: Setting time-out values for RDP sessions

Chapter 3: Citrix Access Suite 4

Figure 3-1: Citrix ICA presentation services
Figure 3-2: How SpeedScreen improves link performance
Figure 3-3: Citrix connectivity options
Figure 3-4: Presentation Server Secure Gateway example deployment

Chapter 4: Preparing Your Organization for an On-Demand Access Implementation

Figure 4-1: ABM's user survey form

Chapter 5: Citrix Access Platform Data Center Architecture

Figure 5-1: Legacy systems located near Citrix servers

Chapter 6: Designing Your Network for On-Demand Access

Figure 6-1: Distributed vs. server-based network usage
Figure 6-2: Network design logical symbols
Figure 6-3: Typical LAN access module
Figure 6-4: Typical WLAN access module
Figure 6-5: Typical branch office WAN access module (dedicated media)
Figure 6-6: Typical branch office WAN access module (VPN router)
Figure 6-7: Typical branch office WAN Access Module (VPN hardware).
Figure 6-8: Typical branch office WAN access module (VPN firewall)
Figure 6-9: Typical data center VPN termination module
Figure 6-10: Typical data center Internet services access module
Figure 6-11: Typical data center RAS module
Figure 6-12: Frame relay vs. T-1/E-1 point-to-point connections
Figure 6-13: ATM data center network connected to frame relay
Figure 6-14: ISDN BRI and PRI structure
Figure 6-15: Network with a Packeteer PacketShaper
Figure 6-16: Denied session request
Figure 6-17: Bandwidth partitioning
Figure 6-18: Bandwidth prioritization
Figure 6-19: Packeteer analysis report
Figure 6-20: A small business network example
Figure 6-21: A medium- sized business network example (dedicated media)
Figure 6-22: A medium-sized business network example (Internet/VPN media)
Figure 6-23: A medium-sized business network example ( Core )
Figure 6-24: A large business network example (distribution/core layer)
Figure 6-25: Large business distribution and core components

Chapter 7: The Client Environment

Figure 7-1: A Windows terminal with various embedded programs
Figure 7-2: The Web Interface application publishing architecture
Figure 7-3: A wireless tablet device accessing a Citrix server farm

Chapter 8: Security

Figure 8-1: Security model vs. user impact
Figure 8-2: Cisco Systems' Security Wheel
Figure 8-3: Implementation cost vs. risk
Figure 8-4: A distributed network in which each regional work site has it own resident file server
Figure 8-5: A centralized network in which the load-balanced file servers reside all in one place
Figure 8-6: Classic firewall system
Figure 8-7: The basic enterprise firewall system
Figure 8-8: Secure Gateway of Citrix Presentation Server
Figure 8-9: Citrix Access Gateway

Chapter 9: Network Management

Figure 9-1: The MIB hierarchy
Figure 9-2: SNMP communities
Figure 9-3: A security alert within an SME
Figure 9-4: Network Discovery
Figure 9-5: Agent monitoring
Figure 9-6: Multisite network monitoring
Figure 9-7: Event correlation
Figure 9-8: Software distribution in a Citrix environment
Figure 9-9: Software distribution in a distributed network
Figure 9-10: A daily report or hot sheet
Figure 9-11: Presentation Server RM report
Figure 9-12: RM architecture
Figure 9-13: The MOM Administrator Console

Chapter 10: Project Managing and Deploying the Citrix Access Platform

Figure 10-1: Organizational chart method of work breakdown structure (WBS)
Figure 10-2: Outline method of work breakdown structure (WBS)
Figure 10-3: Accessing legacy servers across the WAN
Figure 10-4: ABM's data migration procedure guidelines

Case StudyImplementing an On-Demand Access Computing Environment

Figure cs-1: Clinical Medical Equipment (CME) network schematic
Figure cs-2: The CME corporate campus topology

Chapter 11: Server ConfigurationWindows Terminal Services

Figure 11-1: Imaging
Figure 11-2: Scripting

Chapter 13: Application Installation and Configuration in a Presentation Server Environment

Figure 13-1: Shadow key propagation
Figure 13-2: Deploying an application to a few servers
Figure 13-3: The conceptual design of a package-building process
Figure 13-4: The IM job creation process
Figure 13-5: Installation Manager server configurations

Chapter 14: Citrix Presentation Server 4 and Windows Terminal Services Client Configuration and Deployment

Figure 14-1: The Presentation Server Web Interface site
Figure 14-2: Remote Desktop Web Connection for Windows Server 2003
Figure 14-3: The SpeedScreen Browser Acceleration Properties page
Figure 14-4: The SpeedScreen Latency utility

Chapter 15: Profiles, Policies, and Procedures

Figure 15-1: Terminal Services Profile path (via Active Directory Users and Computers)
Figure 15-2: Terminal Services Profile path (via Active Directory Group Policy)
Figure 15-3: User Profile path
Figure 15-4: Profile processing
Figure 15-5: Terminal Services Home directory (via Active Directory Group Policy)
Figure 15-6: The Group Policy Management Console policy scope
Figure 15-7: The Group Policy Management Console Group Policy results
Figure 15-8: Creating a separate OU for Citrix Presentation Servers
Figure 15-9: Creating a new Group Policy
Figure 15-10: Applying the Group Policy to the Citrix users group
Figure 15-11: Denying the Group Policy to the Domain Admins group
Figure 15-12: Enabling Group Policy loopback processing
Figure 15-13: Setting loopback mode to Replace
Figure 15-14: Settings for Application Data redirection

Chapter 16: Securing Client Access with the Citrix Access Gateway

Figure 16-1: Citrix Access Gateway deployment scenarios
Figure 16-2: The CME secure gateway diagram
Figure 16-3: IIS Web Services Extensions
Figure 16-4: AAC component selection
Figure 16-5: Advanced Access Control configuration ( post-install )
Figure 16-6: Changing CAG control to AAC
Figure 16-7: AAC Access Suite Console
Figure 16-8: Configuring the Presentation Server XML service

Chapter 17: Network Configuration

Figure 17-1: The layered security hierarchy
Figure 17-2: The CME host naming scheme (partial)
Figure 17-3: Typical private WAN site network
Figure 17-4: The CME-TNG site network
Figure 17-5: Typical private WAN Packeteer settings
Figure 17-6: A typical VPN WAN site network
Figure 17-7: The CME-EUR network
Figure 17-8: The CME-MEX network
Figure 17-9: The CME-WEST network
Figure 17-10: CME-CORP Internet Packeteer settings
Figure 17-11: CME-CORP Internet, security perimeter, and VPN/firewall configuration
Figure 17-12: The private WAN distribution module
Figure 17-13: CME-CORP private WAN PacketShaper settings
Figure 17-14: Campus LAN access/distribution topology
Figure 17-15: Campus LAN access/distribution (partial)
Figure 17-16: The Campus WLAN access/distribution topology
Figure 17-17: The Dual Core module
Figure 17-18: The FEC adapter team
Figure 17-19: The FEC member adapter (general)
Figure 17-20: The FEC member adapter (link settings)
Figure 17-21: The FEC member adapter (power management)

Chapter 18: Printing

Figure 18-1: Revamped printing subsystem
Figure 18-2: Importing network print servers
Figure 18-3: The Drivers tab in the Print Server Properties dialog
Figure 18-4: Driver replication

Chapter 19: Disaster Recovery and Business Continuity in the On-Demand Access Environment

Figure 19-1: Recovery time objectives
Figure 19-2: CME's network infrastructure

Chapter 20: Ongoing Administration of the Citrix Access Suite

Figure 20-1: Enterprise Edition reboot scheduling
Figure 20-2: Enterprise Edition reboot options
Figure 20-3: Presentation Server License Management Console

Appendix A: Internetworking Basics

Figure A-1: Data flow and the OSI model
Figure A-2: Data encapsulation in the OSI model
Figure A-3: Common protocol suites versus the OSI model

Appendix B: Creating a Citrix Access Platform Financial Analysis Model

Figure B-1: Demographics section of a financial justification model
Figure B-2: Logistics section of a financial justification model
Figure B-3: Costs section of a financial justification model
Figure B-4: Report section of a financial justification model

Appendix C: Subscription Billing

Figure C-1: Detail from Resource Manager report


Citrix Access Suite 4 for Windows Server 2003. The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2004
Pages: 137

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net