7.0
Table Of Contents
- View Architecture Planning
- Contents
- View Architecture Planning
- Introduction to View
- Planning a Rich User Experience
- Feature Support Matrix for Horizon Agent
- Choosing a Display Protocol
- Using Hosted Applications
- Using View Persona Management to Retain User Data and Settings
- Using USB Devices with Remote Desktops and Applications
- Using the Real-Time Audio-Video Feature for Webcams and Microphones
- Using 3D Graphics Applications
- Streaming Multimedia to a Remote Desktop
- Printing from a Remote Desktop
- Using Single Sign-On for Logging In
- Monitors and Screen Resolution
- Managing Desktop and Application Pools from a Central Location
- Advantages of Desktop Pools
- Advantages of Application Pools
- Reducing and Managing Storage Requirements
- Application Provisioning
- Deploying Individual Applications Using an RDS Host
- Deploying Applications and System Updates with View Composer
- Deploying Applications and System Updates with Instant Clones
- Managing VMware ThinApp Applications in View Administrator
- Deploying and Managing Applications Using App Volumes
- Using Existing Processes or VMware Mirage for Application Provisioning
- Using Active Directory GPOs to Manage Users and Desktops
- Architecture Design Elements and Planning Guidelines for Remote Desktop Deployments
- Virtual Machine Requirements for Remote Desktops
- View ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- RDS Host Virtual Machine Configuration
- vCenter Server and View Composer Virtual Machine Configuration
- View Connection Server Maximums and Virtual Machine Configuration
- vSphere Clusters
- Storage and Bandwidth Requirements
- View Building Blocks
- View Pods
- Advantages of Using Multiple vCenter Servers in a Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting Remote Desktop Access
- Using Group Policy Settings to Secure Remote Desktops and Applications
- Using Smart Policies
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding View Communications Protocols
- Overview of Steps to Setting Up a View Environment
- Index
View Secure Gateway Server is also responsible for forwarding other Web traffic, including user
authentication and desktop and application selection traffic, from clients to the View Broker component.
View Secure Gateway Server also passes View Administrator client Web traffic to the Administration Server
component.
Blast Secure Gateway
Security servers and Access Point appliances include a Blast Secure Gateway component. When the Blast
Secure Gateway is enabled, after authentication, clients that use Blast Extreme or HTML Access can make
another secure connection to a security server or Access Point appliance. This connection allows clients to
access remote desktops and applications from the Internet.
When you enable the Blast Secure Gateway component, Blast Extreme traffic is forwarded by a security
server or Access Point appliance to remote desktops and applications. If clients that use Blast Extreme also
use the USB redirection feature or multimedia redirection (MMR) acceleration, you can enable the View
Secure Gateway component in order to forward that data.
When you configure direct client connections, Blast Extreme traffic and other traffic goes directly from a
client to a remote desktop or application.
When end users such as home or mobile workers access desktops from the Internet, security servers or
Access Point appliances provide the required level of security and connectivity so that a VPN connection is
not necessary. The Blast Secure Gateway component ensures that the only remote traffic that can enter the
corporate data center is traffic on behalf of a strongly authenticated user. End users can access only the
resources that they are authorized to access.
PCoIP Secure Gateway
Security servers and Access Point appliances include a PCoIP Secure Gateway component. When the PCoIP
Secure Gateway is enabled, after authentication, clients that use PCoIP can make another secure connection
to a security server or Access Point appliance. This connection allows clients to access remote desktops and
applications from the Internet.
When you enable the PCoIP Secure Gateway component, PCoIP traffic is forwarded by a security server or
Access Point appliance to remote desktops and applications. If clients that use PCoIP also use the USB
redirection feature or multimedia redirection (MMR) acceleration, you can enable the View Secure Gateway
component in order to forward that data.
When you configure direct client connections, PCoIP traffic and other traffic goes directly from a client to a
remote desktop or application.
When end users such as home or mobile workers access desktops from the Internet, security servers or
Access Point appliances provide the required level of security and connectivity so that a VPN connection is
not necessary. The PCoIP Secure Gateway component ensures that the only remote traffic that can enter the
corporate data center is traffic on behalf of a strongly authenticated user. End users can access only the
resources that they are authorized to access.
View LDAP
View LDAP is an embedded LDAP directory in View Connection Server and is the configuration repository
for all View configuration data.
View LDAP contains entries that represent each remote desktop and application, each accessible remote
desktop, multiple remote desktops that are managed together, and View component configuration settings.
View LDAP also includes a set of View plug-in DLLs to provide automation and notification services for
other View components.
View Architecture Planning
96 VMware, Inc.