|
CA UniCenter TNG, 266
Cable management (data center), 144
Cable modem, 174–175
Cache file pointer, 60
Cache-control HTTP header in IIS, 447
CAL (Microsoft Client Access License), 62–63
Campus LAN access/distribution diagram, 578
Campus LAN access/distribution module, 577–579
Campus LAN access/distribution topology, 577
Campus WLAN access/distribution topology, 580
Capacity planning, 110, 150
Captaris RightFax, 16
CAs (Certificate Authorities), 452–453, 492
CATV (cable TV), 174
CBWFQ (class-based weighted fair queuing), 179
CCC (Citrix Connection Configuration), 614
migration methodology, 642–643
printer settings, 614
CCS (Citrix Consulting Services), 642
CDAs (content delivery agents), 98, 518–520, 529
CDDI (Copper Distributed Data Interface), 171
CD-ROM sharing, 316–317
Central data center, economic savings of, 6
Central IT, problems with perception of, 291–292
Centralization, economic savings of, 6
Centralized host architecture, 32
Centralized network diagram, 225
Centralized standards, 113
Certificate, obtaining from CA, 492–495
Certificate request documentation, 492–495
Certificate Revocation List, 451–452
Change control (pilot), 111
Change control (policies and profiles), 481
Change control process (project), 121, 296
Change control (project), 121, 295–297
Change management database, 321
Change management (SBC project), 117–118, 130, 321
Change user/install command, 401
CIM (Common Information Model), 269, 276
CIM Object Manager, 276
Cipher Strength value, 449
CIR (Committed Information Rate), 171
Circuit gateways, 230
Cisco hierarchical enterprise design, 153–154
Cisco Local Director, 168
Cisco NBAR, 179
Cisco Security Wheel, 220
Cisco Universal Gateway, 168
Citrix Business Alliance, 22
Citrix enterprise access infrastructure, 4
Citrix licensing, 386–394
Citrix MetaFrame. See MetaFrame
Citrix and Microsoft, 22–23
Citrix notification group, 273
Citrix policies, 467–468
Citrix policies printer settings, 613
Citrix resellers, categories of, 116
Citrix Retail and Flex software licensing, 387
Clark, Graham, 22
Classification (of network traffic), 177–178
Client access, securing, 483–529
Client application design, 129
Client caching, 49
Client categories, 196
Client classifications, 196–197
Client cost estimates, 694
Client decision matrix, 194, 197–200
Client deployment, four methods of, 425
Client design, 128–129
Client devices, 26–27
categories of, 196
PC vs. Windows Terminal, 209
types of, 7, 196, 212, 422
using thinnest, 194
Client environment, 122, 193–213
Client installations, 319
Client local mapping settings, 455
Client name, print settings and, 616
Client operating system upgrades, 322
Client operating systems, 128, 322
Client printer autocreation, 46, 590–602
Client printer mapping, 590–605
Client printers, 46, 589, 590–603
Client Printers dialog (CMC), 603
Client software updates, 209
Client Update Configuration utility, 456
Clients. See ICA clients
Client-side print drivers, 614
Client-to-Server Content Redirection, 432
Clipboard redirection, 46
Closed security paradigm, 222
CLP (Corporate License Program), 388
CMC (Citrix Management Console), 85, 658–659
adding/removing application users, 662
adding/removing a server, 662
Client Printers dialog, 603
controlling access to, 658–659
Drivers tab, 599
managing ICA sessions from, 661
server and application folders, 659
CME (Clinical Medical Equipment) Corp case study, 280–284
application access, 422, 425, 426–430
applications installation, 404–406
bandwidth management hardware, 545
bandwidth management requirements, 544–546
business continuity plan, 630–633
business model, 283–284
computing paradigm, 282–283
corporate campus topology, 282
full Secure Access Center deployment, 522–523
global structure, 280–282
host naming scheme, 548–549
IT plan for business continuity, 633–639
LAN requirements, 537–544
MSAM, 520–523
network configuration, 551–586
network infrastructure, 532–586
network infrastructure management, 547–548
network naming/addressing/routing, 548–551
network requirements definition, 532–551
network schematic, 281
network security requirements, 546–547
print environment, 622–623
private WAN bandwidth management, 545
private WAN sites, 551–555
routing protocols and methods, 549–551
SBC business case, 284
Secure Gateway deployment, 485–487
Secure Gateway installation, 490–529
server-side network settings, 583–586
using ICA clients, 431–432
WAN requirements, 532–537
CME Corp
Campus LAN module, 577–579
core module, 580–583
Internet access module, 567–573
Internet Packeteer settings, 572
LAN hardware, 541–543
network configuration, 566–586
network configuration diagram, 574
primary Internet connection, 544
private WAN module, 573–577
Private WAN PacketShaper settings, 576
WLAN access module, 579–580
WLAN hardware, 544
WLAN requirements, 542, 544
CME-EUR
bandwidth management, 546
LAN hardware, 540
network configuration, 557–558
network diagram, 558
Sales VPN WAN sites, 555–557
CME-MEX
bandwidth management, 546
LAN hardware, 539
network configuration, 558–563
network diagram, 559
CME-TNG site network diagram, 552
CME-WEST
bandwidth management, 545
LAN hardware, 540–541
network configuration, 563–566
network diagram, 564
Sales VPN WAN sites, 555–557
CMIP agent, 249
advantages of, 249
limitations of, 250
CMPM (Password Manager), 94, 358
CO (Central Office), 173
Code sharing, 36, 58
Collaboration, 14
Collision domain, 169
COM/DCOM objects, 61
Communication (corporate), 265, 290, 306
Communication lines (connectivity), 323
Compatibility scripts, 58
Complaints, handling, 306
Complex hybrid clients, 196, 201
Component testing, 407
Components, as functional building blocks, 154
Compression tools, 446
Computer Configuration Group Policy, 465
Concurrent remote users, 426
Conferencing, 9, 695, 698
Conferencing Manager (MetaFrame), 14, 100–101, 358
Configuration management system, 251–252
Configuration security lockout, 209
Configuration weaknesses (security), 221
Conflict resolution (project), 296–297
Connection licenses (MetaFrame), price list for, 101
Connection process in an RDP session, 42
Connection security, 209
Connections, troubleshooting, 662–664
Connectivity issues, 145
Connectivity options, ICA, 82–83
Console session (Windows NT), 35
Consultants, hiring for SBC project, 116
Contact information, 319
Content filtering, 236–237
Contra Costa County, 14
Cooling and humidity control (data center), 139–140
Copy On-Write Page Protection, 36
Core LAN switch configuration, 560–563, 566
Core layer (network design), 154, 160, 227–228
Core module, CME Corp, 580–583
Core switch configuration, CME Corp, 580–583
Corporate culture, SBC project and, 112
Corporate data, protection of, 217–218
Corporate licensing (of MetaFrame), 102
Corporate security policy, tasks to develop, 219–220
Corporate standards, embracing, 15
Corporation, political assessment of, 289
CoS tags, 178
Cost analysis, 30, 692–695
Cost of PCs vs. Windows Terminals, 194–195
Cost savings of SBC, 6–13, 692–695
Cost of SBC project, justifying, 114–115
Cost-effectiveness, network design for, 152
CPUs (central processing units), 334
CRM (Customer Resource Management), 14
CSR (Certificate Signing Request), 493
CSTK (Citrix Server Test Kit), 351–356
CSTK user-load simulation, 353–356
Ctxappcfg command (UNIX), 382–383
Ctxlicense command, 393
Ctxshutdown command (UNIX), 381–382
Ctxsrv command (UNIX), 381
Cultural assessment, 289
Custom application optimization, 400
Custom applications, and migration to SBC, 119
Customer assistance, 666
Customer care, 130, 306–307
during beta, 314
during the pilot, 311
Customer surveys, 667
CWC (Citrix Web Console), 85
|