5.0
Table Of Contents
- VMware View Architecture Planning
- Contents
- VMware View Architecture Planning
- Introduction to VMware View
- Planning a Rich User Experience
- Feature Support Matrix
- Choosing a Display Protocol
- Using View Persona Management to Retain User Data and Settings
- Benefits of Using View Desktops in Local Mode
- Accessing USB Devices Connected to a Local Computer
- Printing from a View Desktop
- Streaming Multimedia to a View Desktop
- Using Single Sign-On for Logging In to a View Desktop
- Using Multiple Monitors with a View Desktop
- Managing Desktop Pools from a Central Location
- Architecture Design Elements and Planning Guidelines
- Virtual Machine Requirements
- VMware View ESX/ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- vCenter and View Composer Virtual Machine Configuration and Desktop Pool Maximums
- View Connection Server Maximums and Virtual Machine Configuration
- View Transfer Server Virtual Machine Configuration and Storage
- vSphere Clusters
- VMware View Building Blocks
- VMware View Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting View Desktop Access
- Using Group Policy Settings to Secure View Desktops
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding VMware View Communications Protocols
- Overview of Steps to Setting Up a VMware View Environment
- Index
Index
Symbols
.vmdk files 35
A
Active Directory 9, 29, 54
ADM template files 57
Administration Server 66
administrator roles 58
Adobe Flash 25
agent, View 12
AJP13 protocol 62, 63
application virtualization and provisioning 27, 28
architectural design elements 31
B
back-end firewall
configuring 61
rules 62
bandwidth 47, 48
base image for virtual desktops 26
Business Intelligence software 13
C
check list for setting up VMware View 69
client connections
direct 53
PCoIP Secure Gateway 52, 58, 66
tunnel 52
client systems, best practices for securing 58
clones, linked 12, 27
cluster, vSphere 44
communication protocols, understanding 63
connection types
client 51
direct 53
external client 58
PCoIP Secure Gateway 52, 58, 66
tunnel 52
cores, virtual machines density 35
CPU estimates 35, 41
credentials, user 55
D
database sizing 42
database types 45
datastores 26
dedicated-assignment desktop pools 25, 26
delegated administration 58
demilitarized zone 58, 59, 61, 66
desktop as a managed service (DaaS) 7
desktop pools 12, 25, 26, 37
desktop sources 25
diagram of a View deployment 9
direct client connections 43, 53
disk space allocation for virtual desktops 35, 41
display protocols
defined 17
Microsoft RDP 15, 17, 53
PCoIP 53, 58
View PCoIP 9, 15, 17
Distributed Resource Scheduler (DRS) 44
DMZ 10, 58, 59, 61, 66
dual-firewall topology 61
E
encryption
of user credentials 55
supported by Microsoft RDP 17
supported with PCoIP 17
entitlements, restricted 56
ESX/ESXi hosts 36
F
feature support matrix 15
Fibre Channel SAN arrays 26
firewall rules
Active Directory 68
View Agent 67
View Client with Local Mode 68
View Connection Server 67
firewalls
back-end 61
front-end 61
rules 62
floating-assignment desktop pools 25
front-end firewall
configuring 61
rules 62
VMware, Inc. 71