6.1
Table Of Contents
- View Architecture Planning
- Contents
- View Architecture Planning
- Introduction to View
- Planning a Rich User Experience
- Feature Support Matrix for View Agent
- Choosing a Display Protocol
- Using Hosted Applications
- Using View Persona Management to Retain User Data and Settings
- Using USB Devices with Remote Desktops and Applications
- Using the Real-Time Audio-Video Feature for Webcams and Microphones
- Using 3D Graphics Applications
- Streaming Multimedia to a Remote Desktop
- Printing from a Remote Desktop
- Using Single Sign-On for Logging In to a Remote Desktop
- Using Multiple Monitors
- Managing Desktop and Application Pools from a Central Location
- Architecture Design Elements and Planning Guidelines for Remote Desktop Deployments
- Virtual Machine Requirements for Remote Desktops
- View ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- RDS Host Virtual Machine Configuration
- vCenter Server and View Composer Virtual Machine Configuration
- View Connection Server Maximums and Virtual Machine Configuration
- vSphere Clusters
- Storage and Bandwidth Requirements
- View Building Blocks
- View Pods
- Advantages of Using Multiple vCenter Servers in a Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting Remote Desktop Access
- Using Group Policy Settings to Secure Remote Desktops and Applications
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding View Communications Protocols
- Overview of Steps to Setting Up a View Environment
- Index
Index
Symbols
.vmdk files 45
Numerics
3D graphics 26
A
Active Directory 9, 38, 72
ADM template files 75
Administration Server 84
administrator roles 75
Adobe Flash 29
agent, View 14
AJP13 protocol 79, 81
application remoting 23
application pools, advantages 30
application virtualization and provisioning 36–38
architectural design elements 41
B
back-end firewall
configuring 78
rules 79
bandwidth 59, 63
base image for virtual desktops 31, 35
Business Intelligence software 15
C
check list for setting up a View deployment 89
client connections
direct 71
PCoIP Secure Gateway 70, 76, 84
tunnel 70
client systems, best practices for securing 75
clones, linked 14, 37
cloud pod architecture 66
cluster, vSphere 54
communication protocols, understanding 81
connection types
client 69
direct 71
external client 76
PCoIP Secure Gateway 70, 76, 84
tunnel 70
cores, virtual machines density 45
CPU estimates 45, 50
credentials, user 73
D
database types 64
datastores 35
dedicated-assignment desktop pools 29, 35
delegated administration 75
demilitarized zone 76, 78, 84
desktop as a managed service (DaaS) 7
desktop configurations 42
desktop pools 14, 29, 35, 47
desktop sources 29
diagram of a View deployment 11
direct client connections 53, 71
disk space allocation for virtual desktops 45, 50
display protocols
defined 21
Microsoft RDP 19, 71
PCoIP 9, 71, 76
View PCoIP 19
Distributed Resource Scheduler (DRS) 54
DMZ 13, 76, 78, 84
dual-firewall topology 78
E
encryption, of user credentials 73
entitlements, restricted 74
ESX/ESXi hosts 46
F
feature support matrix 19
federated pod 66
Fibre Channel SAN arrays 31
firewall rules
Active Directory 87
View Agent 86
View Connection Server 85
firewalls
back-end 78
front-end 78
rules 79
Flash URL Redirection 15
floating-assignment desktop pools 29
VMware, Inc.
91