Architecture Planning
Table Of Contents
- View Architecture Planning
- Contents
- View Architecture Planning
- Introduction to View
- Planning a Rich User Experience
- Feature Support Matrix for View Agent
- Choosing a Display Protocol
- Using Hosted Applications
- Using View Persona Management to Retain User Data and Settings
- Using USB Devices with Remote Desktops and Applications
- Using the Real-Time Audio-Video Feature for Webcams and Microphones
- Using 3D Graphics Applications
- Streaming Multimedia to a Remote Desktop
- Printing from a Remote Desktop
- Using Single Sign-On for Logging In to a Remote Desktop
- Using Multiple Monitors
- Managing Desktop and Application Pools from a Central Location
- Architecture Design Elements and Planning Guidelines for Remote Desktop Deployments
- Virtual Machine Requirements for Remote Desktops
- View ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- RDS Host Virtual Machine Configuration
- vCenter Server and View Composer Virtual Machine Configuration
- View Connection Server Maximums and Virtual Machine Configuration
- vSphere Clusters
- Storage and Bandwidth Requirements
- View Building Blocks
- View Pods
- Advantages of Using Multiple vCenter Servers in a Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting Remote Desktop Access
- Using Group Policy Settings to Secure Remote Desktops and Applications
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding View Communications Protocols
- Overview of Steps to Setting Up a View Environment
- Index
Figure 5‑5. View Components and Protocols Without a Security Server
View
Administrator
View
Messaging
View Broker &
Admin Server
View Agent
Horizon
Client
client device
View
Connection
Server
View desktop
virtual machine
View Manager
LDAP
HTTP(S)
HTTP(S)
JMS
RDP
PCoIP
PCoIP
vCenter
Server
SOAP
RDP
View Secure
GW Server & PCoIP
Secure GW
RDP
Client
NOTE This figure shows direct connections for clients using either PCoIP or RDP. The default setting,
however, is to have direct connections for PCoIP and tunnel connections for RDP.
See Table 5-3 for the default ports that are used for each protocol.
Figure 5-6 illustrates the protocols that each component uses for communication when a security server is
configured. This configuration might be used in a typical WAN deployment.
Chapter 5 Planning for Security Features
VMware, Inc. 87