Configuring And Installing Provision Networks VAS |
Thursday, 10 January 2008
by Michel Roth
|
With all the buzz about Provision Networks (them being acquired by Quest ) and all the Application Delivery celebrities they are hiring (Jeff Pitch and Patrick Rouse), a recently published article by Patrick Rouse comes in handy when you want to get to know Provision Networks flagship product: the Provision Networks Virtual Access Suite (VAS).
In this article Patrick explains how to install and configure each of the components of VAS Enterprise Edition. In this article Patrick also details some of the features of the Provision Networks Virtual Access Suite (Enterprise Edition):
Modules:
VAS Enterprise Edition consists of all of the following
modules from VAS Standard Edition:
-
Block-IT (application and network server
access control)
-
Manage-IT (session/desktop configuration and
lockdown)
-
Max-IT (CPU and Virtual Memory
Optimization)
-
MetaProfiles-IT (user profile
management)
-
Print-IT (EMF and PDF universal print driver
for client printers, network printers and WAN Printing)
-
Redirect-IT (per-user file and registry
redirection)
-
TimeZones-IT (per-session time zone
assignment)
-
USB-IT (Redirection of USB-connected
Blackberry, Palm and Pocket PC handheld devices)
-
VIP-IT (per-session IP Address
assignment)
VAS Enterprise Edition also adds the following
features (not included in VAS Standard Edition):
-
Provision-IT
-
Application, Desktop and Content
Publishing
-
Integration with Microsoft Softricity
SoftGrid
-
Application and Terminal Server Load
Balancing
-
Seamless Windows
-
Session Sharing
-
Screen Resolution up to 4096 x 2048
pixels
-
Multi-Monitor Support
-
Credentials Pass-through
-
Kerberos-based authentication and
pass-through
-
Smartcard Authentication
-
Windows, Windows CE, Linux, Java and
ThinStall Clients
-
Web-IT (Web Portal)
-
Multi-Farm Application Set Aggregation
-
Credentials pass-through
-
Two-factor authentication (RSA, Secure
Computing and RADIUS)
-
Client auto-detection and download
-
Application Auto-launch
-
Remote Password Reset
-
Load Balancing via Microsoft NLBS or 3rd
party load balancer
-
Client location identification (redirects
users through SSL Gateway based upon IP Address Rules)
-
Secure-IT (SSL
Gateway)
-
Secure single point of access to
firewall-protected Terminal Server farm and managed desktops (VAS
Infrastructure)
-
Uses SSL, so clients do not need to be able
to communicate over a non-standard port.
-
Typically deployed in the DMZ so SSL traffic
is not terminated in the private network
-
Proxy-IT
Patrick's article -or rather set of (future) articles- will also detail best practices on where each component should be
deployed in a typical deployment.
Read Patrick article here.
|