Index_I


I

IBM NetStation, 207

ICA client environment, 82–85

ICA client for hybrids, 205–206

ICA client for MacOS, 206, 441–442

ICA client options for application access, 422–442

ICA client printer configuration, 603

ICA client settings (Web Interface), 505–510

ICA client 7.00 for Windows, 198

ICA client for UNIX and Linux, 383–384, 441

ICA Client Update Configuration utility, 456

ICA clients

configuring for SSL and TLS, 450–451

distribution of, 205

local drive and COM port mapping, 455

locking down, 455

on a PC vs. a Windows terminal, 209

performance optimization of, 442–447

published to the Desktop, 202

vs. RDP clients, 431–432

security on, 447–456

ICA COM and LPT port redirection, 206

ICA compression, 446

ICA connectivity, 82–83, 442–447

ICA desktop, 82–84

ICA (Independent Computing Architecture), 79–85

ICA Java Client packages, 508

ICA Passthrough client, 202, 375

ICA Presentation Services protocol, 80–81

ICA sessions, managing from the CMC, 661

ICA Win32 clients

ICA Win32 Web client

installing, 427–428

vs. minimal installation, 429

with Secure Gateway, 448–450

silent user installation, 427

ICMP messages, 684

ICMP types and codes, 683

Idle session, 41

Idle session numbers, increasing, 42

IDS (Intrusion Detection System), 158, 236

IETF (Internet Engineering Taskforce), 448

IIS, cache-control HTTP header, 447

IM (Installation Manager), 89, 412–418

IM Packager, 417

IMA (Independent Management Architecture), 87, 665–666

IMA data store, 87

IMA protocol, 87

IMA service, 87

Image display, 45

Imaging (cloning), 345–346

Imaging software, 348–349, 413

Implementation cost vs. risk (graph), 221

Implementation phase (migration), 644

Implementation teams (migration), 325–326

Inactivity timeouts, 50–51

Incremental rules (load evaluator), 91

Industry trends, and On-Demand Enterprise, 18–20

Information security, 18

Infrastructure assessment, 118–122, 294, 315–317

Infrastructure design (network), 159–185

connecting modules, 168–185

media selection, 168–175

Infrastructure upgrades, 303–305

Install Scripts, 403

Intellectual property theft, preventing, 15

Intelligent encoding, 45

Interconnectivity in the enterprise, 148

Internal application support, 120

Internal cost of capital, 689

Internal network addressing scheme, 550

Internal network routing protocols, 549–550

Internal SLAs, 243

Internet, as a redundant network, 143–144

Internet access, remote user, 167–168

Internet access module, CME Corp, 567–573

Internet access security exposures, 227

Internet bandwidth, data center, 166

Internet connection bandwidth management, 544

Internet Connector License, 64

Internet MSAM deployment security requirements, 527–528

Internet Packeteer settings, 572

Internet router configuration, 564–565, 567

Internet services access module (data center), 167

Internetworking basics, 671–684

Inventory of hardware and software, 255–256

IP address allocations, 678

IP address classes, 679

IP address management, 252–254

IP address survey, 302

IP addressing, 678–680

IP addressing mask, 679–680

IP addressing scheme, 253, 320

IP application layer, 676

IP (Internet Protocol), 676–684

IP link layer, 678

IP network layer, 677

IP protocol stack, 676–678

IP protocols and ports, 680–684

IP subnetting, 154

IP transport layer, 677

IPSec (Internet Protocol Security), 164, 233

IPSec overhead of VPN connectivity, 164

ISDN BRI, 173–174

ISDN (Integrated Services Digital Network), 172–173

ISDN PRI, 172, 174

ISP (Internet Service Provider) NOC, 250

ISVs (independent software vendors), 22

IT (information technology) department

budgetary concerns, 292

complexity of, 19

consolidation of, 19

cost of, 6

flexibility of, 17

perception of central, 291–292

IT management, treated as a business entity, 666

IT plan for business continuity, 633–639

IT service quality, SLAs and, 255

IT staff

as part of pilot program, 111

assessment of, 288–289

requirements for SBC, 113–114

salaries of, 114

savings from reductions in, 698

sharing information with users and management, 264

skill levels of, 289

threat of job loss, 290

training, 289

user support from, 666

ITU T.120 protocol, 33




Citrix Metaframe Access Suite for Windows Server 2003(c) The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net