Prompta volumus denique eam ei, mel autem

Similar documents
Enhancing VMware Horizon View with F5 Solutions

Improving VDI with Scalable Infrastructure

Deploying the BIG-IP LTM with IBM QRadar Logging

Archived. Configuring a single-tenant BIG-IP Virtual Edition in the Cloud. Deployment Guide Document Version: 1.0. What is F5 iapp?

Deploying the BIG-IP System v11 with DNS Servers

Deploying the BIG-IP System with CA SiteMinder

Prompta volumus denique eam ei, mel autem

The Programmable Network

Archived. Deploying the BIG-IP LTM with IBM Cognos Insight. Deployment Guide Document version 1.0. What s inside: 2 Products and versions tested

Deploying a Next-Generation IPS Infrastructure

Meeting the Challenges of an HA Architecture for IBM WebSphere SIP

Deploying the BIG-IP System with Oracle Hyperion Applications

Large FSI DDoS Protection Reference Architecture

Deploying a Next-Generation IPS Infrastructure

Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System

Archived. h h Health monitoring of the Guardium S-TAP Collectors to ensure traffic is sent to a Collector that is actually up and available,

Optimizing NetApp SnapMirror Data Replication with F5 BIG-IP WAN Optimization Manager

F5 and Nuage Networks Partnership Overview for Enterprises

Enabling Long Distance Live Migration with F5 and VMware vmotion

Complying with PCI DSS 3.0

Managing BIG-IP Devices with HP and Microsoft Network Management Solutions

Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems

WHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN

VMware vcenter Site Recovery Manager

DESIGN GUIDE. VMware NSX for vsphere (NSX-v) and F5 BIG-IP Design Guide

Load Balancing 101: Nuts and Bolts

Optimize and Accelerate Your Mission- Critical Applications across the WAN

Geolocation and Application Delivery

Server Virtualization Incentive Program

F5 iapps: Moving Application Delivery Beyond the Network

Cookies, Sessions, and Persistence

Load Balancing 101: Nuts and Bolts

F5 icontrol. In this white paper, get an introduction to F5 icontrol service-enabled management API. F5 White Paper

Providing Security and Acceleration for Remote Users

Citrix Federated Authentication Service Integration with APM

Resource Provisioning Hardware Virtualization, Your Way

Unified Application Delivery

Multi-Tenancy Designs for the F5 High-Performance Services Fabric

F5 in AWS Part 3 Advanced Topologies and More on Highly Available Services

Secure Mobile Access to Corporate Applications

Data Center Virtualization Q&A

APM Cookbook: Single Sign On (SSO) using Kerberos

The F5 Application Services Reference Architecture

Automating the Data Center

Securing the Cloud. White Paper by Peter Silva

Deploying the BIG-IP LTM with Oracle JD Edwards EnterpriseOne

Distributing Applications for Disaster Planning and Availability

Addressing Security Loopholes of Third Party Browser Plug ins UPDATED FEBRUARY 2017

Document version: 1.0 What's inside: Products and versions tested Important:

Archived. Deploying the BIG-IP LTM with IBM Lotus inotes BIG-IP LTM , 10.1, 11.2, IBM Lotus inotes 8.5 (applies to 8.5.

SOA Infrastructure Reference Architecture: Defining the Key Elements of a Successful SOA Infrastructure Deployment

F5 Reference Architecture for Cisco ACI

Deploying the BIG-IP LTM and APM with VMware View 4.6

Archived. For more information of IBM Maximo Asset Management system see:

Converting a Cisco ACE configuration file to F5 BIG IP Format

Session Initiated Protocol (SIP): A Five-Function Protocol

v.10 - Working the GTM Command Line Interface

Simplifying Security for Mobile Networks

The F5 Intelligent DNS Scale Reference Architecture

SNMP: Simplified. White Paper by F5

Cisco HyperFlex and the F5 BIG-IP Platform Accelerate Infrastructure and Application Deployments

One Time Passwords via an SMS Gateway with BIG IP Access Policy Manager

Managing the Migration to IPv6 Throughout the Service Provider Network White Paper

BIG IQ Reporting for Subscription and ELA Programs

Protecting Against Online Banking Fraud with F5

Vulnerability Assessment with Application Security

Maintain Your F5 Solution with Fast, Reliable Support

Creating a Hybrid ADN Architecture with both Virtual and Physical ADCs

VMware Horizon View Deployment

Network Functions Virtualization - Everything Old Is New Again

Webshells. Webshell Examples. How does a webshell attack work? Nir Zigler,

Global Distributed Service in the Cloud with F5 and VMware

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Unified Access and Optimization with F5 BIG-IP Edge Gateway

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

DEPLOYMENT GUIDE. Load Balancing VMware Unified Access Gateway

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

BIG-IP Global Traffic Manager

NGIPS Recommended Practices

Myths of Bandwidth Optimization

Deploying F5 with VMware View and Horizon View

BIG IP APM: Max Sessions Per User Enable users to terminate a specified session

Deploying F5 with VMware View and Horizon View

How to Future-Proof Application Delivery

Deploying the BIG-IP LTM v11 with Microsoft Lync Server 2010 and 2013

Deploying BIG-IP LTM with Microsoft Lync Server 2010 and 2013

Deploy F5 Application Delivery and Security Services in Private, Public, and Hybrid IT Cloud Environments

The Dynamic DNS Infrastructure

Deploying the BIG-IP Data Center Firewall

Protect Against Evolving DDoS Threats: The Case for Hybrid

Deploying the BIG-IP LTM with Microsoft Skype for Business

SOA: Challenges and Solutions

Software-Defined Hardware: Enabling Performance and Agility with the BIG-IP iseries Architecture

Configuring Smart Card Authentication to BIG IP Management Interface

Control and Optimize Your 4G LTE Network with Diameter

Enabling Flexibility with Intelligent File Virtualization

F5 and Infoblox DNS Integrated Architecture: Offering a Complete Scalable, Secure DNS Solution

Considerations for VoLTE Implementation

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Agility 2018 Hands-on Lab Guide. VDI the F5 Way. F5 Networks, Inc.

Transcription:

VMware Utroque Democritum Horizon View Aeterno Nostro Optimized Aperiam Secure Usu Access Prompta volumus denique eam ei, mel autem The F5 BIG-IP platform optimizes the VMware View user experience and ensures maximum performance, availability, scalability, and security. Technical White Paper by Lori MacVittie White Paper by Simon Hamilton-Wilkes Principal Solution Engineer VMware Alliance

Contents Contents 2 Introduction 3 VMware User Computing 3 Performance, Scalability, and Security 4 Enhancing Security and Access Control 4 Conclusion 5 Additional Resources 6 2

Introduction Desktop and endpoint device management has long been a challenge for IT organizations. Users demand flexibility, multiple access options, and desktop customization, while business units often require multiple desktop types based on business and technical requirements, with different RAM, display, and software configurations for each. This kind of multi-level matrix can be a major management headache on its own. Add in support for all the different desktop needs, plus remote support for those on laptops, and desktop management can all but consume an IT organization s budget and time. VMware User Computing VMware Horizon View part of VMware s Horizon Suite of products alleviates two major management headaches: location and standardization. To solve the location problem, virtual desktop infrastructure (VDI) deployments virtualize user desktops by delivering them to individual clients over the network from a central location. Those desktops are stored and run in the data center, rather than having individual desktop and laptop machines in the field running localized operating systems. This seamless virtualization goes undetected by users. To solve the standardization problem, VMware enables business groups with specific desktop needs to be clustered together in the data center and managed as a unit. For example, when all the Windows machines need a new service pack, it can be installed to the master image in the data center, which is delivered to users the next morning when they log in. Because IT staff no longer have to visit each local system or push software installations down through remote tools, users aren t forced to reboot during the business day. In addition to these location and standardization concerns, the user experience is consistently cited by organizations as critical to the success of virtual desktop deployments. Performance has to compare favorably to a conventional desktop while availability and security need to be even greater. F5 offers a variety of solutions to help organizations maximize the success of these critical elements in their View desktop deployments. Together F5 and VMware have thoroughly tested and documented the benefits of using F5 Application Delivery Networking (ADN) solutions with VMware View to address needs for secure access, a single namespace, load balancing, server health monitoring, and more. To ensure that the core offering is compelling, F5 has released optimized packages to cost-effectively support secure remote access to View deployments of various sizes. These packages include the basic functionality and a streamlined configuration option to make their use simple and straightforward. 3

Performance, Scalability, and Security The larger the VMware Horizon View deployment, the more View Connection Servers are needed to handle the concurrent desktop connections. VMware Horizon View Optimized Secure Access & Traffic Management by F5 provides valuable load balancing and health monitoring, resulting in higher system availability and greater scalability and ultimately, a better user experience. Additionally, an F5 iapps Template makes configuration straightforward, simplifying setup by providing the recommended settings and helping to prevent human error. VMware View client connectivity utilizes multiple ports and protocols that must be directed at the same View Connection Server for a successful session. While PC over IP (PCoIP), the View desktop streaming protocol is UDP-based, but SSL-encrypted TCP connections are utilized for authentication and USB tunneling. Administrators can save capacity on the View Connection Servers by offloading this encryption to an F5 BIG-IP ADC. Enhancing Security and Access Control Ensuring secure remote access is critical to protecting corporate information and often required in certain regulatory situations. To route incoming Horizon View connections to the internal network, a PCoIP proxy is needed in an organization s DMZ. BIG-IP Access Policy Manager (APM) fulfills this function in a secure and scalable way. Placing BIG-IP APM in the DMZ avoids the need to expose sensitive Windows servers, Active Directory domain-joined servers, or View Connection Servers to the DMZ. It also eliminates the requirement for VMware Security Gateway servers in the DMZ. The BIG-IP APM appliance proxies the PCoIP connection, passing it internally to any available Connection Server within the View pod, which then interprets the connection as a normal internal PCoIP session. This provides the scalability benefits of a BIG-IP appliance and gives BIG-IP APM and BIG-IP Local Traffic Manager (LTM) visibility into the PCoIP traffic, enabling more advanced access management decisions. F5 has recently created four new optimized products micro, small, medium, and large to deliver a faster return on investment (ROI), extend functionality beyond any competitive offering, and ensure the investment in BIG-IP APM is appropriate for the size of the deployment. A streamlined iapps Template is also included to ease deployment. This custom iapp presents fewer configuration options than the full iapp for View, which can be used instead if advanced functions are required. Either iapp yields a configuration that can be modified as needed to address specific business and technical requirements. 4

These new F5 product options were developed in conjunction with VMware, which recognizes the additional capabilities BIG-IP APM brings to View and the limitations of the Security Server as a PCoIP proxy. The enhanced joint solution is easy for customers to deploy and support. Further options, including additional advanced traffic management options, a single namespace, and username persistence, are available when BIG-IP LTM is added to APM. (See the Resources section at the end of this document for more information.) Virtual Infrastructure DMZ Internal External View Clients VMware Horizon View TCP 443 UDP 4172 SSL Decryption Authentication High Availability PCoIP Proxy APM TCP 80 Connection Servers Desktops TCP 443 TCP/UDP 4172 Authentication Internal View Clients Logging/Reporting BIG-IP Access Policy Manager Figure 1: The F5 BIG-IP system and VMware Horizon View topology Conclusion There s no doubting the advantages of deploying a virtualized desktop solution like VMware Horizon View throughout the enterprise. By deploying the F5 BIG-IP system alongside it, organizations can achieve higher security, availability, and scalability while improving the user experience. With the straightforward deployment options delivered by proven iapps Templates and support for PCoIP proxy services, BIG-IP APM represents the best solution for secure remote access. In addition, new and optimized product offerings reduce both cost and deployment complexity to ensure a BIG-IP ADC becomes a standard View component. Furthermore, taking advantage of other BIG-IP modules such as BIG-IP LTM 5

and BIG-IP Global Traffic Manager (GTM) empowers IT staff to integrate multiple VMware View pods or physical sites for source desktops, all without disrupting users. By enabling users to reconnect to their existing persistent desktop source when required and providing a dynamic and agile infrastructure that can adapt to planned and unplanned events, the BIG-IP system becomes key to successful VMware View deployments. Additional Resources Deployment Guide for VMware View including Horizon View Enable Single Namespace for VMware View Deployments Username Persistence for VMware View Deployments F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com F5 Networks, Inc. Corporate Headquarters info@f5.com F5 Networks Asia-Pacific apacinfo@f5.com F5 Networks Ltd. Europe/Middle-East/Africa emeainfo@f5.com F5 Networks Japan K.K. f5j-info@f5.com Solutions for an application world. 2014 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 02/14 WP-AVAIL-16557-vdi