Contents Software components All users in one location:

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

Welcome to Middleware Joseph Amrithraj
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Remote User Authentication in Digital Libraries
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Module 5: Configuring Access to Internal Resources.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
The future of client networks. Virtualization developed 59 years ago as a software solution to the hardware limitation Used in server environments to.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Networking Architectures
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
OnBase Module Deployment
Page Copyright Giritech A/S an – Excitor company.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Web Based Applications
Chapter 7: Using Windows Servers to Share Information.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Securing Microsoft® Exchange Server 2010
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Chapter 9: Novell NetWare
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
An Introduction to IBM Systems Director
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Remote Controller & Presenter Make education more efficiently
Integrating and Troubleshooting Citrix Access Gateway.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Seamless Virtual Desktop & Application Delivery 2X RAS v14 – What’s New?
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Structured Software Systems Ltd (3SL) Suite 2, 22a Duke Street Barrow-in-Furness Cumbria LA14 1HH, UK Tel: +44 (0) Fax: +44 (0)
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Virtual Private Network Access for Remote Networks
Chapter 7: Using Windows Servers
Chapter 5 Electronic Commerce | Security Threats - Solution
Stop Those Prying Eyes Getting to Your Data
A Network Operating System
Self-service enrollment for Windows desktops
System Architecture & Hardware Configurations
File System Implementation
N-Tier Architecture.
FORTINET Network Security NSE8 Dumps - 100% Success
Securing the Network Perimeter with ISA 2004
Principles of Network Applications
Chapter 5 Electronic Commerce | Security Threats - Solution
MCSA VCE
What does “Zero Client” means?
Implementing TMG Server Publishing
NERC CIP Implementation – Lessons Learned and Path Forward
Unit 27: Network Operating Systems
Azure AD Application Proxy
Simplified Development Toolkit
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Cradle Installation Deployment Options RR021/02: August 2016

Contents Software components All users in one location: Single-user installation Local network – local clients Local network – centralized clients Some users in other locations – remote users: Remote users – remote clients Remote users – centralized clients Web browser access: Direct web connections Using proxy servers This is also available as video: RC07301 in our website and in our YouTube channel The URL for video RC07301 is: http://youtu.be/1sTGji-V3K8

Software Components 1 The software components used in a Cradle system are: CDS CWS Cradle Databases Desktop Tools Document Loader Load documents and other data WorkBench Create and manage project information Document Publisher Publish project documentation Project Manager Manage databases and Cradle servers Web UI Use Cradle from web browser, no need to install Cradle Cradle client component Cradle server component Non-Cradle component

Single-User Installation 2 All software components are installed on, and viewed on, one computer: Do this by: Install all of Cradle on: the user’s computer Videos: RC06401 During installation, select: Standalone Mode and: RC06501 CDS CWS The URL for video RC06401 is: http://youtu.be/Xw6QYNWeJMY The URL for video RC06501 is: http://youtu.be/fBbBM4rnQpw

Local Network – Local Clients 3 Cradle servers installed on Cradle Server, Cradle clients installed on users’ computers: Cradle Server CDS CWS

Local Network – Local Clients: 2 Do this by: Install Cradle servers on: Cradle Server Video: RC06701 Install Cradle clients on: every user’s computer Video: RC06601 During installation, enter Cradle Server hostname/IP address Automatically creates CRADLE_CDS_HOST environment variable Cradle clients authenticate through Cradle or LDAP (such as Active Directory) Performance: GOOD Advantages: Simple installation process Minimum effect on existing hardware Disadvantage: Multiple Cradle installations to maintain The URL for video RC06601 is: http://youtu.be/Eug3thtuS2Q The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0

Local Network – Centralized Clients 4 Cradle servers installed on Cradle Server, Cradle clients installed on Application Server and viewed on users’ computers: Cradle communications Virtual desktop (VDI) communications Cradle Server CDS CWS Application Server

Local Network – Centralized Clients: 2 Do this by: Install Cradle servers on: Cradle Server Video: RC06701 Install Cradle clients (once) on: Application Server Video: RC06601 Runs Cradle clients for all users, many processes running simultaneously Users either: Login to remote desktop on Application Server (eg Microsoft RDC) or: Publish Cradle clients to users’ local desktops by: 2X, Ericom, Citrix (or other virtual desktop infrastructure – VDI) Cradle Server and Application Server can be the same machine Cradle clients authenticate through Cradle or LDAP (such as Active Directory) Performance: GOOD Advantages: Simple maintenance, only 1 or 2 Cradle installations Only need desktop applications (Office etc) on Application Server Disadvantage: May need new or upgraded hardware for the server(s) The URL for video RC06601 is: http://youtu.be/Eug3thtuS2Q The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0

Remote Users – Remote Clients 5 Cradle servers installed on Cradle Server, Cradle clients installed on users’ computers: Cradle communications VPN communications Cradle Server CDS CWS Firewall

Remote Users – Remote Clients: 2 Do this by: Install the Cradle servers on: Cradle Server Video: RC06701 Install the Cradle clients on: every user’s computer Video: RC06601 During installation, enter Cradle Server hostname/IP address Automatically creates CRADLE_CDS_HOST environment variable Open ports in firewall for Cradle communications, use NAT between firewall (external IP) and Cradle Server, or Use VPN for Cradle communications, so Cradle uses existing VPN hole in firewall Cradle clients authenticate through Cradle or LDAP (such as Active Directory) May need port in firewall for LDAP authentication Performance: MAY BE POOR: Depends on delay between user and CDS CDS does server-side processing automatically Advantage: Minimum effect on existing hardware Disadvantage: Multiple Cradle installations to maintain The URL for video RC06601 is: http://youtu.be/Eug3thtuS2Q The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0

Remote Users – Centralized Clients 6 Cradle servers installed on Cradle Server, Cradle clients installed on Application Server and viewed on users’ computers: Cradle communications Virtual desktop (VDI) communications VPN communications Cradle Server CDS CWS Application Server

Remote Users – Centralized Clients: 2 Do this by: Install the Cradle servers on: Cradle Server Video: RC06701 Install the Cradle clients (once) on: Application Server Video: RC06601 Runs Cradle clients for all users, many processes running simultaneously Users either: Login to remote desktop on Application Server (eg Microsoft RDC) or: Publish Cradle clients to users’ local desktops by: 2X, Ericom, Citrix (or other virtual desktop infrastructure – VDI) Open port in firewall for VDI, use NAT from firewall (external IP) to Application Server Or use VPN for VDI, so VDI uses existing VPN hole in firewall Cradle Server and Application Server can be the same machine Cradle clients authenticate through Cradle or LDAP (such as Active Directory) Performance: GOOD Advantages: Simple maintenance, only 1 or 2 Cradle installations Only need desktop applications (Office etc) on Application Server Disadvantage: May need new or upgraded hardware for the server(s) The URL for video RC06601 is: http://youtu.be/Eug3thtuS2Q The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0

Direct Web Connections 7 Web browser on users’ computers connect through firewall to CWS on Cradle Server: HTTP or HTTPS communications VPN communications Cradle Server CDS CWS

Direct Web Connections: 2 Do this by: Install the Cradle servers on: Cradle Server Video: RC06701 Cradle web UIs are zero thickness, no local plug-ins / add-ons needed Remote users connect over HTTP or HTTPS through company firewall Open ports in firewall for HTTP or HTTPS, use NAT between firewall (external IP) and Cradle Server, or Use VPN for web connection, tunnel HTTP or HTTPS through VPN hole in firewall CWS authenticates web users through Cradle or LDAP (such as Active Directory) Performance: GOOD Advantage: Simplest installation for web users Disadvantages: Cannot easily implement single-sign-on for web users Blocking of invalid remote IPs more difficult The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0

Using Proxy Servers 8 Web browser on users’ computers connect through firewall to proxy server that relays to CWS on Cradle Server: HTTP or HTTPS communications VPN communications Proxy Server Cradle Server CDS CWS

Direct Web Connections: 2 Do this by: Install the Cradle servers on: Cradle Server Video: RC06701 Cradle web UIs are zero thickness, no local plug-ins / add-ons needed Remote users connect over HTTP or HTTPS through company firewall Open ports in firewall for HTTP or HTTPS, use NAT between firewall (external IP) and Proxy Server, or Use VPN for web connection, tunnel HTTP or HTTPS through VPN hole in firewall Configure Proxy Server to only relay to CWS from allowed external IPs Configure CWS to only accept connections from Proxy Server CWS authenticates web users through Cradle or LDAP (such as Active Directory) Performance: GOOD Advantages: Can implement single-sign-on for web users Simple to block invalid remote IPs Disadvantages: Installation more complex Needs proxy server (but may already exist for other uses) The URL for video RC06701 is: http://youtu.be/rg64dFHXSr0