SIMPLIFY, SCALE, AND SECURE YOUR PCoIP ARCHITECTURE FOR VMWARE HORIZON VIEW WITH F5 Marc Chisinevski, F5 Solution Engineer, VMware Alliance.

Slides:



Advertisements
Similar presentations
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Advertisements

The System Center Family Microsoft. Mobile Device Manager 2008.
Direct Access 2012 Chad Duffey and Tristan Kington Microsoft Premier Field Engineering WSV333.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Citrix NetScaler as part of a TMG replacement
F5 solution for Microsoft Exchange. 2 Exchange 2010 Architecture External SMTP servers Edge Transport Routing and AV/AS Phone system (PBX or VoIP) Client.
Module 3 Windows Server 2008 Branch Office Scenario.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
Citrix Partner Update The Citrix Delivery Centre.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Security and Policy Enforcement Mark Gibson Dave Northey
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Gavin Carius Architect Microsoft Services SVR311.
Clinic Security and Policy Enforcement in Windows Server 2008.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Barracuda Load Balancer Server Availability and Scalability.
Access Gateway Operation
Hands-On Microsoft Windows Server 2008
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
F5’S INTELLIGENT SERVICES FRAMEWORK FOR MICROSOFT APPLICATIONS Gary Newe Field Engineering Manager - UKISA.
Bringing Applications Everywhere Gert Jan Wolfis Field Service Engineer.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
CONFIDENTIAL TECHNOLOGY CENTRE IAPP FOR MICROSOFT EXCHANGE 2010 AND ANALYTICS.
Presented by: Philippe Bogaerts Sr. Channel Field Systems Engineer Benelux Building an agile IPv6 infrastructure.
F5 APM & Security Assertion Markup Language ‘sam-el’
Securing Access to Data Using IPsec Josh Jones Cosc352.
Windows Vista Configuration MCTS : Advanced Networking.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Basharat Institute of Higher Education
SteelHead 9.2 New Feature & Updates
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Server-to-Client Remote Access and DirectAccess
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Increase and Improve your PC management with Windows Intune
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Presentation transcript:

SIMPLIFY, SCALE, AND SECURE YOUR PCoIP ARCHITECTURE FOR VMWARE HORIZON VIEW WITH F5 Marc Chisinevski, F5 Solution Engineer, VMware Alliance

2© F5 Networks, Inc. Today’s Agenda Quick Introduction to Application Delivery Controllers (ADC) What’s new in APM v11.4 What is PC-over-IP (PCoIP) Proxy How F5 adds Value to VMware Horizon View Questions, answers, and Key Takeaways

3© F5 Networks, Inc. F5 Delivers an Intelligent Services Framework An integrated device with STRATEGIC AWARENESS Understands and adapts application resources based on user context and expected application behavior Full application state visibility and complete session inspection Provides total control of all user and application traffic in and out of the data center APPLICATION AWARENESS Provides real-time traffic management decisions based on application performance Assists with capacity planning Delivers true application delivery optimization without the need to rewrite applications RESOURCES AWARENESS Proxies and inspects 100% of inbound user traffic Determines user environment such as device type and location Applies application delivery policies based on real-time business needs USER AWARENESS

4© F5 Networks, Inc. Full Intelligence Requires a Full Proxy Network Session Application Physical OSI Stack IT = Complete Control Business = Reduced Delivery Costs Network Session Application Physical OSI Stack

5© F5 Networks, Inc. Centralized layered image management for local deployment Multi-device workspace for IT services HORIZON SUITE The platform for workforce mobility Horizon View Horizon Mirage Horizon Workspace Complete desktop and application virtualization NEW v5.2 NEW v4.0 NEW v1.0 F5 + HORIZON SUITE Support for VMware validated solutions  Mobile Secure Desktop  Business Process Desktop  AlwaysOn Desktop  Branch Office Desktop Unique F5 solutions  PCoIP Proxy  Single Namespace  Username Persistence Intelligent traffic management and security  Local and global traffic management  Multi-site and multi-pod deployments  Access management and data center firewall Horizon View Intelligent Services Framework Secure Fast Available Anywhere, any service, any device IntelligentDynamic, agile, adaptive Horizon Mirage Horizon Workspace VMVDI

6© F5 Networks, Inc. PC-over-IP (PCoIP) Overview What is PCoIP? How does it relate to other protocols? What is the PCoIP proxy?

7© F5 Networks, Inc. Three separate connections HTTPS 443 authHTTPS 443 auth SSL Negotiation, PCoIP Control Channel setupSSL Negotiation, PCoIP Control Channel setup PCoIP Session negotiation – 4172 TCPPCoIP Session negotiation – 4172 TCP PCoIP Session – 4172 UDPPCoIP Session – 4172 UDP

8© F5 Networks, Inc. View Authentication and PCoIP Protocol Client en- us Server ok ok a824b347-29a4-46a3-a d9e3837 kerberos USSJ- windows- password domain BD1 Client windows- password username ee domain BD1 password password

9© F5 Networks, Inc. Server ok S false 15 true Client RDP PCOIP Server ok 11A90FA2_0B36_4FB9_8976_E656585ADFA bd.f5.com:443 4 SHA-1 be:ba:ca:d4:6e:c9:83:48:57:46:81:17:40:ae:20:ba:00:f6:a3:38 ok CN=ussj-pod1- finance,OU=Applications,DC=vdi,DC=vmware,DC=int Finance in Pod 1 in San Jose sticky disconnected BD1\dd(cn=s aa902dee2b79,ou=servers,dc=vdi,dc=vmware,dc=i

10© F5 Networks, Inc. PCoIP protocols PCoIP Session negotiation – 4172 TCPPCoIP Session negotiation – 4172 TCP Client:Client: Using the DNS name, Desktop Name, Connection- id, and Certificate thumbprint on 4172 TCPUsing the DNS name, Desktop Name, Connection- id, and Certificate thumbprint on 4172 TCP Server:Server: Performs secret layer of Teradici security mechanismsPerforms secret layer of Teradici security mechanisms Sends client instructions on how to connect to desktopSends client instructions on how to connect to desktop PCoIP External URL which is IP.PCoIP External URL which is IP. PCoIP Session – 4172 UDPPCoIP Session – 4172 UDP Client:Client: Established third connection using PCoIP Ext URL.Established third connection using PCoIP Ext URL.

11© F5 Networks, Inc.

12© F5 Networks, Inc. VMware Horizon View Value Adds Marc Chisinevski, Solution Engineer, VMware Alliance

13© F5 Networks, Inc. PCoIP Proxy – Simplify Your Architecture F5 Access Policy Manager (APM) offers full proxy support for PCoIP Removes Security Servers Unified global access to all allowed applications and network locations Before After

14© F5 Networks, Inc. PCoIP Proxy – Simplify Your Architecture Reduce Windows Licensing CostsReduce Windows Licensing Costs Reduce Operational CostsReduce Operational Costs Initial Security Hardening TasksInitial Security Hardening Tasks Maintenance/PatchingMaintenance/Patching SSL Cert ManagementSSL Cert Management Reduced set of FW Rules / ACLs / NATsReduced set of FW Rules / ACLs / NATs Conserve ResourcesConserve Resources Public IP AddressesPublic IP Addresses

15© F5 Networks, Inc. Three separate connections HTTPS 443 authHTTPS 443 auth SSL Negotiation, PCoIP Control Channel setupSSL Negotiation, PCoIP Control Channel setup PCoIP Session negotiation – 4172 TCPPCoIP Session negotiation – 4172 TCP PCoIP Session – 4172 UDPPCoIP Session – 4172 UDP 443 TCP

16© F5 Networks, Inc. Hardened Security for VMware Horizon View BIG-IP Advanced Firewall Manager (AFM) Protect with a full-proxy firewall Simplify security architecture Ensure application availability

17© F5 Networks, Inc. Username Persistence Use Case Username Persistence is a Solution.Username Persistence is a Solution. Active/Active Multi-Data Center View solutionActive/Active Multi-Data Center View solution Enhances VMware’s “AlwaysOn” SolutionEnhances VMware’s “AlwaysOn” Solution Co-engineering effort with VMware Field and PSOCo-engineering effort with VMware Field and PSO Uptake in Hospitals, and Large EnterpriseUptake in Hospitals, and Large Enterprise

18© F5 Networks, Inc. User view.company.com view.company.com Desktop

19© F5 Networks, Inc. User Desktop BIG-IP Global Traffic Manager DNS Query: view.company.com DNS Query: view.company.com

20© F5 Networks, Inc. User Desktop BIG-IP Global Traffic Manager iQuery Health Check to Both Pods: East & West iQuery Health Check to Both Pods: East & West EAST Pod WEST Pod

21© F5 Networks, Inc. User Desktop BIG-IP Global Traffic Manager User has lowest latency to West Pod. DNS Answer: “view.company.com. IN A ” DNS Answer: “view.company.com. IN A ” WEST Pod

22© F5 Networks, Inc. BIG-IP LTM APM User Desktop WEST Pod User NameCurrent Pod? Bob SmithWest Fran KellyEast Jim AdamsNone etc… Writes data to internal table View Events Database LTM uses OOB method to query View Events DBs.

23© F5 Networks, Inc. BIG-IP LTM APM User Desktop Password is cached using 256 bit encryption WEST Pod PW

24© F5 Networks, Inc. User Desktop WEST Pod BIG-IP LTM APM User NameCurrent Pod? Bob SmithWest Fran KellyEast Jim AdamsNone etc… LTM looks up User. LTM looks up User.

25© F5 Networks, Inc. User Desktop WEST Pod BIG-IP LTM APM APM queries Active Directory. APM queries Active Directory. UN PW AD User’s Group Membership AD User’s Group Membership APM Obtains User’s Current Pod & Pool Member Username & Password are sent to AD. Active Directory

26© F5 Networks, Inc. BIG-IP LTM APM WEST Pod User Desktop Based on the Pod & Pool info in AD, LTM sends the user to the correct View server View Servers

27© F5 Networks, Inc. BIG-IP LTM APM User Desktop The View Server replies with a user token. View Servers WEST Pod Client uses that token to automatically reconnect directly to the View server.

28© F5 Networks, Inc. Questions, Answers, and Key Takeaways APM offers full proxy support for PC-over-IP Simplifies VMware Horizon View architectures Delivers hardened security and increased scalability Username Persistence is the only multi-pod, Multi- Data Center View solution F5 is the first and only to provide this functionality

29© F5 Networks, Inc. Where to Find More info… F5 Documentation:F5 Documentation: VMware Documentation:VMware Documentation: Third Party Documentation:Third Party Documentation:

30© F5 Networks, Inc. devcentral.f5.com facebook.com/f5networksinc linkedin.com/companies/f5-networks twitter.com/f5networks youtube.com/f5networksinc