VMware VIEW 4.5 - ARCHITECTURE PLANNING EN-000350-00 Manual page 57

View architecture planning guide
Table of Contents

Advertisement

Chapter 5 Planning for Security Features
Figure 5-2. Load-Balanced Security Servers in a DMZ
remote
View Client
external network
DMZ
load balancing
View
Security
Servers
View
Connection
Servers
Microsoft
vCenter
Active Directory
Management Server
ESX hosts running
Virtual Desktop
virtual machines
When remote users connect to a security server, they must successfully authenticate before they can access
View desktops. With appropriate firewall rules on both sides of the DMZ, this topology is suitable for accessing
View desktops from client devices located on the Internet.
You can connect multiple security servers to each instance of View Connection Server. You can also combine
a DMZ deployment with a standard deployment to offer access for internal users and external users.
The topology illustrated in
Figure 5-3
shows an environment where four instances of View Connection Server
act as one group. The instances in the internal network are dedicated to users of the internal network, and the
instances in the external network are dedicated to users of the external network. If the View Connection Server
instances paired with the security servers are enabled for RSA SecurID authentication, all external network
users are required to authenticate by using RSA SecurID tokens.
VMware, Inc.
57

Advertisement

Table of Contents
loading

This manual is also suitable for:

View manager 4.5View composer 2.5

Table of Contents