Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.

Slides:



Advertisements
Similar presentations
SLAC Remote Access and Citrix XPe Brian Scott SLAC May 2004.
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Welcome to Middleware Joseph Amrithraj
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Windows NT server and workstation Name: Li Shen Course: COCS541 Instructor: Mort Anvari.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Saving Money by Recycling Existing Computers with LTSP Peter Billson Linux Terminal Server Project (LTSP.org) Linux User Group in Princeton LUG/IP July.
Jeff Patton & Doug Whiteley It Service Group IT Roundtable July 15 th, 2009 Thin Clients & Terminal Services.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
Technical Architectures
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
The Architecture of Transaction Processing Systems
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Terminal Server © N. Ganesan, Ph.D.. Reference Thin-Client Concept Thin-Client concept tutorial.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
TS Licensing RDP Terminal Server TSV Session BrokerTS Gateway Client TS Web Access The terminal server runs applications locally and displays them.
Remote Networking Architectures
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
CSIT 320 (Blum)1 Client-Server Interaction Based on Appendix 1 in Computer Networks and Internets, Comer.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Course 201 – Administration, Content Inspection and SSL VPN
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Barracuda Load Balancer Server Availability and Scalability.
Chapter 7: Using Windows Servers to Share Information.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Access Gateway Operation
Software Licensing, Made Simple SELECT Server XM Edition
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Jetro Platforms – Corporate Introduction What Do We Do? How Do We Do It? Why Choose Jetro CockpIT™ Technical Demonstration Agenda.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Enabling Embedded Systems to access Internet Resources.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
3-Dec-1998 Stanford Linear Accelerator Center Patrick R. Hancox
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Shai Tirosh Windows Server Regional Director artNET Experts.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Desktop Virtualization
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Introduction TO Network Administration
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Tuesday, February 23, 2016 RACHEL Service Description Nedeljko DRAGOJEVIĆ – Service Manager Margarida ABECASIS – Head of Unit DIGIT.C.3 - CITIS.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Citrix On Demand Services. Agenda About Citrix & the “on-demand” access infrastructure Traditional client/server via Citrix Access Infrastructure –Scalable,
Windows Server 2003 Terminal Server: Overview And Deployment Haim Inger CTO Malam Group.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
Linux Virtual Desktop Infrastructure (VDI) Access Bringing Linux virtualization to the enterprise Presenter: James Lui Director of Technical Services,
Chapter 7: Using Windows Servers
VNC
Netscape Application Server
Remote Access Lecture 2.
Cryptography and Network Security Chapter 16
Chapter 3: Windows7 Part 4.
Chapter 3: Windows7 Part 1.
Networks Software.
File Transfer Issues with TCP Acceleration with FileCatalyst
APACHE WEB SERVER.
Chapter 3 – Operating Systems
Presentation transcript:

Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665

Methods of Remote Access  Virtual Network Computing (VNC  Microsoft Terminal Services  Citrix Presentation Server

Virtual Network Computing  Open Source Desktop Sharing Solution  Uses RFB Protocol (Remote FrameBuffer)  Server side and Client Side Software  Software available for multiple OS platforms  Not a Secure Platform  Typically run on TCP ports 5900 to 5906

Microsoft Terminal Services  Remote Desktop Protocol (RDP)  Provides remote access to the full desktop only  Based on T.120 family of protocols T.120  As a server, can provide for single desktop or multi-session applications  Typically run on TCP port 3389

Microsoft Terminal Services (cont.)  Requires separate licensing  Integrated to all version of the Windows Server software  Client software shipped as component of all 32 bit Microsoft Desktop OS  Other OS client software available

Citrix History  Originally broke off from IBM and their OS/2 development in 1989  Partnered with Microsoft to create Microsoft Windows 3.51 Terminal Services Edition  With Microsoft Windows NT Server 4.0 split the product into its own third party entity  December 2003, aquired Expertcity (GoToMyPC)

Citrix Implementation  Requires Microsoft Terminal Services to be running and fully licensed  Software provides a timeshared multi-user environment for UNIX and Windows Servers  Operates it’s own proprietary protocol known as Independent Computing Architecture Protocol (ICA)  Recent versions operate on TCP port 2598 with “session reliability” (reconnects automatically after disconnect)

Citrix Implementation (cont.)  Requires little bandwidth (10 kb to 20 kb per session)  Client operates as a “Thin Client” to the Server. All processing takes place Server- side  Capable of operating over the Internet via “Citrix Secure Gateway”  Capable of utilizing Secure Socket Layer (SSL) communication

Citrix Secure Gateway

Citrix Secure Gateway (cont.)   Citrix MetaFrame Presentation Server Access:   1. The client utilizes the Web Interface for MetaFrame Presentation Server or the Citrix ICA client to initiate a launch of an Internet browser published application   2. The Secure Gateway for MetaFrame Presentation Server processes this request and establishes a connection to the MetaFrame Presentation Servers, both Unix and Windows supported. Please note that the ICA traffic back through the WAN is not illustrated separately. The Secure Gateway allows the user to connect securely using SSL or TSL.

Citrix Secure Gateway (cont.)   3. When the published browser makes a request of the browser application, this is routed through the internal network only, from the browser session running on the MetaFrame Presentation Servers to the internal (or external) web servers   4. When a server-side processing request is made, the web server may hand off the request the business application servers   5. The business application servers will access the database layer/servers as required   6. Internal clients, both terminals and workstations, can access applications seamlessly and quickly without the additional IT cost of deploying and maintaining applications to the local desktops

ICA is not HTTP (ICA/SSL is not HTTPS)

Benefits of Citrix over Terminal Services Alone  Ability to publish a single application instead of a full desktop  Lightweight protocol (very fast performance)  Wide variety of management tools  More robust printing facilities  Multi-Server Load balancing  Web Interface with SSL

Problems with Citrix  Very Expensive (additional cost over and above Terminal Server licensing)  New release of Windows will replace 90% of Citrix functionality (supposedly)  Best run on dedicated servers (additional hardware required)