Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing the Citrix Access Platform Alternative
Figure 1-1: On-demand access combines flexibility with low costs.
Figure 1-2: Typical remote office in a PC-based computing environment
Figure 1-3: Typical office in an enterprise on-demand access environment
Figure 1-4: A typical data center
Figure 1-5: Wireless Neoware Windows terminal
Figure 1-6: ABM Industries' Enterprise on-demand access platform
Chapter 2: Windows Server 2003 Terminal Services
Figure 2-1: The connection process in an RDP session
Figure 2-2: The Terminal Services Manager application showing a disconnected session
Figure 2-3: The disconnection process in an RDP session
Figure 2-4: Remote Desktop Client remote control process
Figure 2-5: Setting time-out values for RDP sessions
Chapter 3: Citrix Access Suite 4
Figure 3-1: Citrix ICA presentation services
Figure 3-2: How SpeedScreen improves link performance
Figure 3-3: Citrix connectivity options
Figure 3-4: Presentation Server Secure Gateway example deployment
Chapter 4: Preparing Your Organization for an On-Demand Access Implementation
Figure 4-1: ABM's user survey form
Chapter 5: Citrix Access Platform Data Center Architecture
Figure 5-1: Legacy systems located near Citrix servers
Chapter 6: Designing Your Network for On-Demand Access
Figure 6-1: Distributed vs. server-based network usage
Figure 6-2: Network design logical symbols
Figure 6-3: Typical LAN access module
Figure 6-4: Typical WLAN access module
Figure 6-5: Typical branch office WAN access module (dedicated media)
Figure 6-6: Typical branch office WAN access module (VPN router)
Figure 6-7: Typical branch office WAN Access Module (VPN hardware).
Figure 6-8: Typical branch office WAN access module (VPN firewall)
Figure 6-9: Typical data center VPN termination module
Figure 6-10: Typical data center Internet services access module
Figure 6-11: Typical data center RAS module
Figure 6-12: Frame relay vs. T-1/E-1 point-to-point connections
Figure 6-13: ATM data center network connected to frame relay
Figure 6-14: ISDN BRI and PRI structure
Figure 6-15: Network with a Packeteer PacketShaper
Figure 6-16: Denied session request
Figure 6-17: Bandwidth partitioning
Figure 6-18: Bandwidth prioritization
Figure 6-19: Packeteer analysis report
Figure 6-20: A small business network example
Figure 6-21: A medium- sized business network example (dedicated media)
Figure 6-22: A medium-sized business network example (Internet/VPN media)
Figure 6-23: A medium-sized business network example ( Core )
Figure 6-24: A large business network example (distribution/core layer)
Figure 6-25: Large business distribution and core components
Chapter 7: The Client Environment
Figure 7-1: A Windows terminal with various embedded programs
Figure 7-2: The Web Interface application publishing architecture
Figure 7-3: A wireless tablet device accessing a Citrix server farm
Chapter 8: Security
Figure 8-1: Security model vs. user impact
Figure 8-2: Cisco Systems' Security Wheel
Figure 8-3: Implementation cost vs. risk
Figure 8-4: A distributed network in which each regional work site has it own resident file server
Figure 8-5: A centralized network in which the load-balanced file servers reside all in one place
Figure 8-6: Classic firewall system
Figure 8-7: The basic enterprise firewall system
Figure 8-8: Secure Gateway of Citrix Presentation Server
Figure 8-9: Citrix Access Gateway
Chapter 9: Network Management
Figure 9-1: The MIB hierarchy
Figure 9-2: SNMP communities
Figure 9-3: A security alert within an SME
Figure 9-4: Network Discovery
Figure 9-5: Agent monitoring
Figure 9-6: Multisite network monitoring
Figure 9-7: Event correlation
Figure 9-8: Software distribution in a Citrix environment
Figure 9-9: Software distribution in a distributed network
Figure 9-10: A daily report or hot sheet
Figure 9-11: Presentation Server RM report
Figure 9-12: RM architecture
Figure 9-13: The MOM Administrator Console
Chapter 10: Project Managing and Deploying the Citrix Access Platform
Figure 10-1: Organizational chart method of work breakdown structure (WBS)
Figure 10-2: Outline method of work breakdown structure (WBS)
Figure 10-3: Accessing legacy servers across the WAN
Figure 10-4: ABM's data migration procedure guidelines
Case StudyImplementing an On-Demand Access Computing Environment
Figure cs-1: Clinical Medical Equipment (CME) network schematic
Figure cs-2: The CME corporate campus topology
Chapter 11: Server ConfigurationWindows Terminal Services
Figure 11-1: Imaging
Figure 11-2: Scripting
Chapter 13: Application Installation and Configuration in a Presentation Server Environment
Figure 13-1: Shadow key propagation
Figure 13-2: Deploying an application to a few servers
Figure 13-3: The conceptual design of a package-building process
Figure 13-4: The IM job creation process
Figure 13-5: Installation Manager server configurations
Chapter 14: Citrix Presentation Server 4 and Windows Terminal Services Client Configuration and Deployment
Figure 14-1: The Presentation Server Web Interface site
Figure 14-2: Remote Desktop Web Connection for Windows Server 2003
Figure 14-3: The SpeedScreen Browser Acceleration Properties page
Figure 14-4: The SpeedScreen Latency utility
Chapter 15: Profiles, Policies, and Procedures
Figure 15-1: Terminal Services Profile path (via Active Directory Users and Computers)
Figure 15-2: Terminal Services Profile path (via Active Directory Group Policy)
Figure 15-3: User Profile path
Figure 15-4: Profile processing
Figure 15-5: Terminal Services Home directory (via Active Directory Group Policy)
Figure 15-6: The Group Policy Management Console policy scope
Figure 15-7: The Group Policy Management Console Group Policy results
Figure 15-8: Creating a separate OU for Citrix Presentation Servers
Figure 15-9: Creating a new Group Policy
Figure 15-10: Applying the Group Policy to the Citrix users group
Figure 15-11: Denying the Group Policy to the Domain Admins group
Figure 15-12: Enabling Group Policy loopback processing
Figure 15-13: Setting loopback mode to Replace
Figure 15-14: Settings for Application Data redirection
Chapter 16: Securing Client Access with the Citrix Access Gateway
Figure 16-1: Citrix Access Gateway deployment scenarios
Figure 16-2: The CME secure gateway diagram
Figure 16-3: IIS Web Services Extensions
Figure 16-4: AAC component selection
Figure 16-5: Advanced Access Control configuration ( post-install )
Figure 16-6: Changing CAG control to AAC
Figure 16-7: AAC Access Suite Console
Figure 16-8: Configuring the Presentation Server XML service
Chapter 17: Network Configuration
Figure 17-1: The layered security hierarchy
Figure 17-2: The CME host naming scheme (partial)
Figure 17-3: Typical private WAN site network
Figure 17-4: The CME-TNG site network
Figure 17-5: Typical private WAN Packeteer settings
Figure 17-6: A typical VPN WAN site network
Figure 17-7: The CME-EUR network
Figure 17-8: The CME-MEX network
Figure 17-9: The CME-WEST network
Figure 17-10: CME-CORP Internet Packeteer settings
Figure 17-11: CME-CORP Internet, security perimeter, and VPN/firewall configuration
Figure 17-12: The private WAN distribution module
Figure 17-13: CME-CORP private WAN PacketShaper settings
Figure 17-14: Campus LAN access/distribution topology
Figure 17-15: Campus LAN access/distribution (partial)
Figure 17-16: The Campus WLAN access/distribution topology
Figure 17-17: The Dual Core module
Figure 17-18: The FEC adapter team
Figure 17-19: The FEC member adapter (general)
Figure 17-20: The FEC member adapter (link settings)
Figure 17-21: The FEC member adapter (power management)
Chapter 18: Printing
Figure 18-1: Revamped printing subsystem
Figure 18-2: Importing network print servers
Figure 18-3: The Drivers tab in the Print Server Properties dialog
Figure 18-4: Driver replication
Chapter 19: Disaster Recovery and Business Continuity in the On-Demand Access Environment
Figure 19-1: Recovery time objectives
Figure 19-2: CME's network infrastructure
Chapter 20: Ongoing Administration of the Citrix Access Suite
Figure 20-1: Enterprise Edition reboot scheduling
Figure 20-2: Enterprise Edition reboot options
Figure 20-3: Presentation Server License Management Console
Appendix A: Internetworking Basics
Figure A-1: Data flow and the OSI model
Figure A-2: Data encapsulation in the OSI model
Figure A-3: Common protocol suites versus the OSI model
Appendix B: Creating a Citrix Access Platform Financial Analysis Model
Figure B-1: Demographics section of a financial justification model
Figure B-2: Logistics section of a financial justification model
Figure B-3: Costs section of a financial justification model
Figure B-4: Report section of a financial justification model
Appendix C: Subscription Billing
Figure C-1: Detail from Resource Manager report
Previous page
Table of content
Next page
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2004
Pages: 137
Authors:
Steve Kaplan
,
Tim Reeser
,
Alan Wood
BUY ON AMAZON
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 3 Preventive Maintenance
Domain 4 Motherboard/Processors/Memory
Domain 5 Printers
Domain 1 Operating System Fundamentals
SQL Hacks
Hack 9. Filter on Indexed Columns
Hack 12. Simplify Complicated Updates
Hack 35. Tally Results into a Chart
Organizing Data
Hack 50. Combine Tables Containing Different Data
Data Structures and Algorithms in Java
Encapsulation
Problems
Thinking Recursively
Vocabulary
A.10. Coding Conventions
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Exam Prep Questions
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
FileMaker 8 Functions and Scripts Desk Reference
Get(TotalRecordCount)
GetAsTimestamp()
WeekOfYear()
FileMaker XML and XSLT Namespaces
Web Programming
Python Standard Library (Nutshell Handbooks) with
The stat Module
The errno Module
The urlparse Module
The telnetlib Module
Data Storage
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies