7.0
Table Of Contents
- Deploying and Configuring Access Point
- Contents
- Deploying and Configuring Access Point
- Introduction to Access Point
- System Requirements and Deployment
- Configuring Access Point
- Collecting Logs from the Access Point Appliance
- Setting Up Smart Card Authentication
- Setting Up Two-Factor Authentication
- Index
Figure 1‑1. View Components and Protocols with Access Point
Client Devices
RDP
Client
Access Point Appliance
View Secure
Protocol Handlers
View Connection Server
View
Agent
View desktop virtual machine or RDS host
HTTP(S)HTTP(S)PColP
Horizon
Client
Blast
HTTP(S)
View
Administrator
HTTP(S)
vCenter
Server
SOAP
View Secure GW Server &
PColP Secure GW
View
Messaging
View Broker &
Admin Server
View
LDAP
Blast
RDP, Framework, MMR, CDR...
PColP
Firewall policy strictly controls inbound communications from DMZ services, which greatly reduces the risk
of compromising your internal network.
The following figure shows an example of a configuration that includes front-end and back-end firewalls.
Chapter 1 Introduction to Access Point
VMware, Inc. 9