7.0

Table Of Contents
Index
Symbols
.vmdk files 53
Numerics
3D graphics 30
A
Active Directory 10, 46, 82
ADM template files 85
Administration Server 95
administrator roles 86
Adobe Flash 35
agent, View 14
AJP13 protocol 90
App Volumes 46
application remoting 27
application pools, advantages 36
application virtualization and provisioning 43,
45, 46
architectural design elements 49
B
back-end firewall
configuring 89
rules 90
bandwidth 68, 72
base image for virtual desktops 37, 41
Blast Extreme 87, 96
Blast Secure Gateway 80
Blast Secure Gateway connection 96
Business Intelligence software 15
C
check list for setting up a View deployment 99
client connections
Blast Secure Gateway 96
direct 81
PCoIP Secure Gateway 80, 87, 96
tunnel 81
client systems, best practices for securing 86
clones, instant 45
clones, linked 15, 44
cloud pod architecture 75
cluster, vSphere 63
communication protocols, understanding 92
connection types
Blast Secure Gateway 96
client 79
direct 81
external client 87
PCoIP Secure Gateway 80, 87, 96
tunnel 81
cores, virtual machines density 53
CPU estimates 53, 59
credentials, user 84
D
database types 73
datastores 41
dedicated-assignment desktop pools 35, 41
delegated administration 86
demilitarized zone 87, 89, 96
desktop as a managed service (DaaS) 7
desktop configurations 50
desktop pools 15, 35, 41, 55
desktop sources 35
diagram of a View deployment 11
direct client connections 61, 81
disk space allocation for virtual desktops 53, 59
display protocols
defined 23
Microsoft RDP 21, 81
PCoIP 10, 81, 87
View PCoIP 21
Distributed Resource Scheduler (DRS) 63
DMZ 13, 87, 89, 96
dual-firewall topology 89
E
encryption, of user credentials 84
entitlements, restricted 84
ESX/ESXi hosts 54
F
feature support matrix 21
federated pod 75
Fibre Channel SAN arrays 37
FIPS mode 79
firewall rules
Active Directory 98
VMware, Inc. 101