SlideShare una empresa de Scribd logo
1 de 85
Descargar para leer sin conexión
Branch Repeater 6.0
A Technical Introduction
Oded Nahum – Branch Repeater Product Specialist
September 2011
Agenda
• Introducing Branch Repeater 6.0
• Initial Configuration – Exercise 1
  •   Licensing
  •   Configuring Links
  •   Management Access
  •   Monitoring Mode

• Quality of Service – Exercise 2
  •   Links
  •   Application Classifiers
  •   Traffic Shaping Policies
  •   Service Classes

• CIFS Acceleration – Exercise 3
  • CIFS (SMB and Signed SMB) Traffic

• MultiStream ICA – Exercise 4
  • Enabling and testing


• Reporting and Monitoring – Exercise 5
  • Monitoring Links, Applications and Service Classes
                                                         Citrix Confidential - Do Not Distribute
  • Customizing and Generating Reports
Introducing Branch Repeater 6.0
Branch Repeater 6.0
General Availability: RTW June 27th

                    The next generation of Branch Repeater Technology
                    Advanced traffic classification, prioritization, shaping and
                    reporting
                    Improved XenDesktop and XenApp acceleration
                    Clustering via NetScaler
                    SMB 2, Encrypted MAPI and Outlook/Exchange 2010
                    Acceleration
                    Centralized licensing – Citrix License Server
WAN
                               Optimization




  Adaptive                      Adaptive
                   Adaptive                     Smart
    TCP                         Protocol
                 Compression                  Acceleration
Flow Control                   Acceleration




                           WAN
   Branch Repeater                            Repeater
Smart
Service-centric WAN Optimization                                                  Acceleration
… Not just network-centric WAN optimization
                         Assess


                                                       • Assess and identify all services
                                                       • Classify 500+ services out-of-the-box
                                                       • Control bandwidth allocation,
                                                         compression, shaping and enforcement
   Remediate                                Classify   • Monitor services delivery and report
                                                       • Sense network conditions, remediate
                                                         and respond; minimize help desk calls


               Monitor            Control
SmartAcceleration for Deeper Visibility and Granular Control


                      XenApp
                                   • Visibility for 500+ apps and protocols out-of-
                                     the-box, + more custom
                    Voice, Video
    100010100001110 000111000      • Prioritize XenDesktop, multimedia, web and
    0011100011101001110111000        Windows apps, custom services
                     XenDesktop
    1001100110011101000011000      • Auto-detect and auto-configure XenDesktop;
                                     no changes to network or XenDesktop
                   MicrosoftApps
                                   • Prioritize by app, branch or user location,
                     File, Print     app type, protocol, traffic direction, more
Smarter, Granular Prioritization Policies

       Global                             Datacenter



                      SF         NY        London        Beijing    Partner Office
       Branch        Lo pri     Med pri    Med pri       Hi pri        Med pri



    Service Class               Video                  XenDesktop
                                Med pri                   Hi pri



     Sub-class      Citrix TV   YouTube                Exec XDs     Employee XDs
                     Hi pri      Lo pri                  Hi pri        Lo pri
User-centric XenDesktop Prioritization

    Branch Office                  XenApp                        Data Center

   Sales       Product          Voice, Video
                         100010100001110 000111000
                         0011100011101001110111000
                                XenDesktop
                         1001100110011101000011000
                                MicrosoftApps

       Executive                  File, Print



                                                         Prioritize different types of
                         Prioritize published apps and
                                                         traffic (mouse, print, etc)
                         desktops by user groups
                                                         across user sessions
Faster Encrypted Email and File Transfers

     Branch Office                                             Data Center


                         100010100001110 000111000
                         0011100011101001110111000
                         1001100110011101000011000




                        Microsoft email (Encrypted MAPI      Microsoft file servers
Layer 7 optimizations        and Exchange 2010)           (SMBv2, Signed SMB v1/v2)
Platform Support and Upgrades
• Initial Branch Repeater 6.0 release is intended for Linux-based
  appliances and VPX appliances on XenServer and VMWare.
• The same update file downloaded from MyCitrix will work for
  both platforms.
• The Repeater Plug-In 6.0 release will follow soon after the
  Capri release.
• The Branch Repeater with Windows Server will be updated
  with the BR 6.0 technology in a subsequent release.
Branch Repeater Product Family
Flexibility to Meet All Your Needs




                                                              Branch Repeater VPX
    Repeater      Branch Repeater with                         – Virtual Appliance
                                         Repeater Plug-in –
   Appliances       Windows Server                                   Software
                                          Software Client



    BR 6.0             Coming                Coming                BR 6.0
     Initial           Later…                Soon…                  Initial
    Release                                                        Release
Initial Configuration
First things first…
                                                              apA1         apA2

• Branch Repeater 6.0 needs to know
  where the LAN and WAN are.
• Determine and remember which
  accelerated pair port is connected to
  the WAN and which to the LAN.
                                          •Switch                                    •Router
  (inline mode)                           •DSL Modem
                                                            Straight
                                                         Through Cable
                                                                         Crossover
                                                                           Cable     •Direct to Server
                                          •Cable Modem                               •Direct to Client

• Either port can be connected to
  either side using the proper cables.

                  apA1       apA2                apA1         apA2
New Quick Installation Page
• Click the Quick Installation node in
  the Command menu.
• This page is a collection of all the
  configuration steps condensed into
  one simple form.
New Quick Installation Page
• The Quick Installation is intended
  for simple Branch Repeater
  deployments.
• If any of the following are needed, a
  manual configuration is required;
 •   Virtual Inline Mode
 •   WCCP Deployment Mode
 •   Group Mode
 •   High Availability
 •   SSL Acceleration
 •   Repeater Plugin Support
 •   Hardboost Bandwidth Mode
 •   Encrypted SMB or MAPI Support
New Quick Installation Page
• Enter all the required information
  and click the Install button.
• Once completed, the appliance will
  reboot and then you should see
  successful traffic flow in the
  Dashboard.
Branch Repeater Licensing
• Click the Licensing node in the
  Configuration menu.
• Chose the License Server tab if
  your license requires using a
  stand alone Citrix License
  server.
 • Retail (Appliance, Plug-in, Crypto)
 • XenDesktop Platinum Entitlement

• Chose the Local Licenses tab if
  your license type required local
  installation.
 • Evaluation License
 • Not for Re-sale
 • Express
Must configure the default apA links
• Click on the Links node in the
  Configuration menu.
• Click the Edit button for the first pre-
  defined apA link.
• Configure the link according to
  network it is connected to;
 •   Link Type (LAN of WAN side)
 •   Bandwidth In
 •   Bandwidth Out
 •   Descriptive Link Name (optional)

• Click Save.
• Repeat this configuration on both the
  apA1 and apA2 links.
Branch Repeater Features page

• Traffic Processing
 • Master enable/disable switch. When disabled, all features of the Appliance are disabled and all
   traffic passes through without modification or traffic shaping

• Traffic Acceleration
 • enables and disables the acceleration engine

• Traffic Shaping
 • enables and disables the traffic-shaping engine

• Traffic Bridging (VPX Only)
 • Enable / Disable the software bridge, default for new installs is disabled



                                         Citrix Confidential - Do Not Distribute
Traffic Processing and Acceleration
• Branch Repeater can ne
  installed in a “monitoring-only”
  mode
• No compression, flow control
  or traffic shaping will be used,
  however full traffic visibility will
  be available.
• Use the Features node in the
  Command Menu to disable;
    • Traffic Acceleration
    • Traffic Shaping

.
Bandwidth Management

• Link level In / Out - Regulates all traffic, accelerated as well as non-
  accelerated
• Bandwidth Management – Regulate only accelerated traffic, effects
  inbound traffic only
• Recommended configuration – Use local WAN link sizing




                               Citrix Confidential - Do Not Distribute
Today’s Lab Environments
                           Your student work
                             environment
                               (WinXP)
Complete Exercise 1
Quality of Service
Quality of Service in v5.7 and prior releases
• Five queues (Named “A” though “E”.
  Names can be changed)

• All traffic is assigned to Queue A by
  default                                                  Service Classes

• Each Service Class can be assigned to a
  one traffic queue.
                                            ICA Packet                       Bandwidth
• Each queue determines the minimum          Priorities
                                                             QoS Queues
                                                                             Allocations
  bandwidth allocation when bandwidth
  contention with a higher queue occurs.

• ICA Packet priorities are mapped to
                                                          Acceleration
  quality of service (QoS) queues.
                                                          Engine
Quality of Service – The Basics of Traffic Shaping
• All WAN traffic is subject to traffic shaping
  •   Accelerated connections, non-accelerated connections, non-TCP traffic such
      as UDP flows, GRE streams, etc.

• The algorithm used is weighted fair queuing
  •   Every connection is assigned a weight based on the appliance’s policies
      between 1 and 256.
  •   Traffic shaping is applied to the WAN in both inbound and outbound after the
      compression engine
  •   Weighted priorities are applied during bandwidth contention to both ingress and
      egress traffic even when the other side of the link is not equipped with QoS.

• DSCP Is fully supported both as a classifier and an
  enforcer
• More information in Branch Repeater Traffic Shaping
  technology can be found here
  http://www.citrix.com/skb/articles/RDY4005
Quality of Service in v6.0 - Configuration
• Quality of Service is applied using 4 mechanisms.
  • Links: Tells the traffic shaper which WAN link the packet is using. In a site with
     multiple link, each link has its own bandwidth limits and is managed independently.
  • Application Classifiers: Identify and determines which protocol or application
     class traffic belongs to.
  • Traffic Shaping Policies: Tell the traffic shaper weighted priority and bandwidth
     limits to assign to which traffic type (application classifier).
  • Service Classes: Map applications to acceleration decisions, traffic filters and
     traffic-shaping policies.
Quality of Service
                                                                                  Data Center 1
Link Definition
• Links : Physical or Logical                        XenApp Traffic Link
  •   WAN connections between remote sites.
  •   WAN links between datacenters and branches.
  •   WAN links between cities or countries.
  •   WAN data paths between branches and specific
      servers or server farms.

                                                                                  Data Center 2
            Branch 1
                                                         Streaming Traffic Link
                             DC1 Link




                              DC2 Link
Quality of Service
Link Definition
• Define Links
   •   By Accelerated Port
   •   By Source or Destination Network
   •   By WCCP Service Group
   •   By Source or Destination MAC Address
   •   By VLAN Tag

• By default link definitions are automatically
  created for each adapter port.

• The number of supported links are limited
  by Branch Repeater model:
   •   83xx, 85xx = 5 links
   •   88xx = 10 links
   •   VPX = up to 5 links

• If Links are misconfigured there will be
  compression values less than 1:1.
Quality of Service
Traffic Shaping Policies
• By default there are 10 pre-configured traffic
  shaping policies. (subject to change)
   •   VOIP Traffic
   •   High Priority Traffic
   •   Medium Priority Traffic
   •   Low Priority Traffic
   •   Default QoS
   •   ICA Priorities

• Each traffic shaping policy has a weighted
  priority value associated with it.

• The maximum number of traffic shaping
  policies supported is 50 per appliance.
Quality of Service
Traffic Shaping Policies
• Weighted Priority is used to
  determine traffic precedence
  when calculating send and
  receive rates.
• And.. Or…
Bandwidth limits can also now used
 to control allocation.
  •   Percentage of Link Bandwidth
  •   Absolute Fixed Date Rate.

• Even within an SSL tunnel !!*



                                     *Citrix Patent Pending
Quality of Service
Application Classifiers
• Application classifiers are used by
  service classes to distinguish between
  application traffic types.
• Applications are classified by:
  •   Ethertype  not all competitors can do this
  •   IP Classification (TCP, GRE, L2TP, etc)
  •   TCP Port
  •   UDP Port
  •   Web URL
  •   ICA Published App  not all competitors can do this

• Application classifiers are categorized
  into 1 of 25 Application Groups
Quality of Service
Application Classifiers
• Custom application classifiers can be
  created.
• The maximum number of classifiers
  supported is 600 per appliance.
• The classification parameters entered
  cannot conflict with an existing classifier.
Quality of Service
Application Classifiers – XenApp and XenDesktop
• ICA Published Applications or
  Desktops groups can be manually
  created or auto-discovered.
• Once discovered, they will appear in
  the application classifier list as well as
  in all reports and monitoring pages.
• Temporarily enabling and then
  disabling auto discovery can be used
  to prepopulate the online applications
  list for editing or exporting at a later
  time.
Quality of Service
Service Classes in v5.7 and prior
• Service Classes in Branch Repeater
  5.7 and prior releases identified
  traffic two possible ways:
  •   IP address/range (client or server)
  •   TCP port number

• Service Classes were evaluated in
  order with mirrored policies required
  on all appliances.
• If Service Classes did not match on
  both appliances with an acceleration
  pair, those connections would pass
  through un-accelerated (UR Code 6).
Quality of Service
Service Classes in v6.0
• Service Classes are the main
  QoS mechanism, bringing
  together:
  •   Traffic Shaping Policies
  •   Application Classifiers
  •   Link Configurations

• Service Classes are evaluated
  in order with policies higher in
  the list having priority over ones
  lower.
• Service classes need to exist
  but not be mirrored on all
  appliances; will result in lowest
  common setting being used.
Quality of Service
Service Classes
• Service Classes are still used to
  enforce bandwidth priority among
  traffic types however now map to
  Traffic Shaping Policies instead of
  QoS Queues.
• Traffic Shaping Policies within a
  Service Class can be applied by:
  •   Single Traffic Shaping Policy per Single
      Service Class
  •   Per-link Traffic Shaping Policies per Single
      Service Class

• The maximum number of
  supported Service Classes is 64
  per appliance.
Quality of Service
Service Classes
• Service classes can use AND rules
  as well as OR rules.
• Rules can include any and all of
  the following filters:
  •   Application Name
  •   Source IP
  •   IP sync/direction                AND
  •   Destination IP
  •   VLAN Tag
  •   DiffServ bit




                                             OR
  •   SSL Profile

• The maximum number of Service
  Class Filter Rules supported is 10
  per Service Class.
Complete Exercise 2
Signed SMB / Secure Partner
configuration
SMB Support in v5.7

• Branch Repeater 5.7 and earlier
  supported compression and
  acceleration of unsigned SMB1
  traffic only.
• If enabled, Signed SMB had to be
  turned off on servers and clients via
  group policy to enable acceleration.
• Connections from Vista and Win7
  clients had SMB2 connections
  rolled back to SMB1.


                                    Citrix Confidential - Do Not Distribute
SMB Acceleration in v6.0

• There are three SMB acceleration
  scenarios you may observe when
  monitoring SMB CIFS connections.
 • Unaccelerated SMB 1 or 2 Connections
 • Accelerated SMB 1 or 2 Connections
 • Accelerated Signed SMB 1 or 2 Connections




                                         Citrix Confidential - Do Not Distribute
SMB Acceleration Requirements

• There are three SMB acceleration
  scenarios you may observe when                             Connection            Secure    Windows   NTLMv1
  monitoring SMB CIFS connections.                             Type                Partner   Domain    Required
                                                                                             Member
 • Unaccelerated SMB 1 or 2 Connections
 • Accelerated SMB 1 or 2 Connections                    SMB 1                       No        No        No
 • Accelerated Signed SMB 1 or 2 Connections
                                                         SMB 2                       No        No        No

                                                         Signed SMB 1               Yes        Yes       Yes

                                                         Signed SMB 2               Yes        Yes       Yes




                                         Citrix Confidential - Do Not Distribute
SMB Acceleration Requirements
• Domain membership is only required on
  the server-side Branch Repeater.
• Once joined, the appliance or VPX
  should now have a machine account in
  the specified domain.
• NOTE: Signed SMB is not enabled yet!
SMB Acceleration Requirements
• A secure connection must be
  established between Branch
  Repeaters (secure partners).
• SSL credentials (cert and key) are
  used for authentication and trust
  between Branch Repeaters.
• The SSL Key Store must be enabled
  to hold the SSL credentials used by
  the Branch Repeaters.
• A Crypto license is required to enable
  the SSL feature set.

                                   Citrix Confidential - Do Not Distribute
SMB Acceleration Requirements

• SSL Support must be enabled by
  clicking the SSL Encryption node
  under Configuration.
• Trusted SSL credentials must be
  installed and used to authenticate all
  Branch Repeaters and create a
  secure data channel between them.




                                   Citrix Confidential - Do Not Distribute
SMB Acceleration Requirements

• The Secure Partner connection is
  configured on a per appliance basis.
• A signaling mechanism is used to
  provide discovery and communication
  between trusted appliances.




                                  Citrix Confidential - Do Not Distribute
Complete Exercise 3
MultiStream ICA (MSI)
ICA Review – Virtual Channels
What is an ICA Virtual Channel?
 A Citrix Independent Computing Architecture (ICA) virtual
 channel is a bidirectional connection for the exchange of
 generalized packet data between a Citrix XenApp Server and
 a ICA compliant client.

 Virtual channels correspond to virtual drivers; each
 providing a specific function. Some are required for normal
 operation, and others are optional.

 Virtual drivers operate at the presentation layer protocol
 level. There can be a number of these protocols active at any
 given time by multiplexing channels.

 There are a total of 32 virtual channels in the ICA protocol.
 However for most user sessions, between 8 -12 are usually
 utilized.
ICA Priority Packet Tagging




• ICA Priority Tagging consists of a two bit tag within each ICA packet header.

• These tags can be evaluated on the fly and the application activity determined.

• Earlier versions of MetaFrame use a framing header that does not contain the two priority bits.
Channel Name   Default Priority                   Description                Virtual Driver
                   CTXTW                  0         Remote Session Screen Update (THINWIRE)    vdtw30n.dll

Virtual Channels   CTXTWI
                   CTXTWN
                                          0
                                          0
                                                   Seamless Windows Screen Update (THINWIRE)
                                                   Winstation
                                                                                               vdtwin.dll
                                                                                               wfica32.exe
                   CTXEUEM                0        End User Experience Monitoring              vdeuemn.dll
                   CTXZLFK                0        Local Text Echo and Keyboard Feedback       vdzlcn.dll
                   CTXZLC                 0        Speed Screen Latency Reduction - Screen     vdzlcn.dll
                   CTXZLFK                0        Speed Screen Latency Reduction - Fonts      vdfon30n.dll
                   CTXCTL                 0        ICA Session Control                         vdctln.dll
                   CTXFLSH                1        Multimedia - Flash                          vdflash.dll
                   CTXGUSB                1        USB Redirection                             vdgusbn.dll
                   CTXMM                  1        Multimedia - Streaming                      vdmmn.dll
                   CTXCLIP                1        Client Clipboard Mapping                    vdclipn.dll
                   CTXCAM                 1        Client Audio Mapping                        vdcamN.dll
                   CTXLIC                 1        License Management                          wfica32.exe
                   CTXVFM                 1        Video Server – (no longer used)             n/a
                   CTXPN                  1        Program Neighborhood                        vdpnn.dll
                   CTXCCM                 2        Client COM Port Mapping                     vdcom30N.dll
                   CTXCDM                 2        Client Drive Mapping                        vdcdm30n.dll
                   CTXPASS                2        Transparent Key Pass-Through                vdkbhook.dll
                   CTXCPM                 3        Printer Mapping for Spooling Clients        vdcpm30N.dll
                   CTXCM                  3        Client Management (Auto-Update)             vdcmN.dll
                   CTXLPT1                3        Legacy LP1 Port Mapping                     wfica32.exe
                   CTXLPT2                3        Legacy LPT2 Port Mapping                    wfica32.exe
                   CTXCOM1                3        Legacy COM1 Port Mapping                    wfica32.exe
                   CTXCOM2                3        Legacy COM2 Port Mapping                    wfica32.exe
ICA QoS in BR 5.7
 ICA Priority Packet Tagging allows
 prioritization of ICA sessions based
 on the virtual channel data being
 transmitted. (what the user is doing within the
 app/session)


 This is done by associating each
 virtual channel’s two-bit priority to a
 packet priority.

 The two priority bits combine to form
 four priority values:
       00 (0) - High Priority
       01 (1) - Medium Priority
       10 (2) - Low Priority
       11 (3) - Background Priority

 These priority bits can then be assigned
 to Branch Repeater Quality of Service
 queues to allow dynamic QoS.
ICA QoS in BR 6.0 (Single Stream)
  ICA Priority Packet Tagging allows
  prioritization of ICA sessions based
  on the virtual channel data being
  transmitted. (what the user is doing within the
  app/session)


  This is done by associating each
  virtual channel’s two-bit priority to a
  packet priority.

  The two priority bits combine to form
  four priority values:
        00 (0) - High Priority
        01 (1) - Medium Priority
        10 (2) - Low Priority
        11 (3) - Background Priority

  These priority bits can then be assigned
  to Branch Repeater Quality of Service
  queues to allow dynamic QoS.
The Single Stream ICA Problem

                            compressed and encrypted ICA data




                    •The user creates an ICA session.
                    •User interface traffic is tagged with a
                    priority bit of zero (thin wire).
                    •Branch Repeater identifies the priority
                    tags in real time and applies QoS
                    appropriately.


Session Bandwidth
The Single Stream ICA Problem

                             compressed and encrypted ICA data




                    •The user then starts a print job within
                    the ICA session.
                    •Print traffic is tagged with a priority bit
                    of three (real time).
                    •Branch Repeater identifies the new
                    priority tags in real time and applies
                    QoS appropriately.

Session Bandwidth
The Single Stream ICA Problem

                             compressed and encrypted ICA data




                    •The user then either returns to the app’s user
                    interface or starts a second application. (thin wire)
                    •The new observed priority bits of the session
                    cause the session to be QoS’ed as a priority zero.
                    •Prioritization of printing traffic is now lost.



Session Bandwidth
Enter Multi-Stream ICA
Channel Name   Default Priority                   Description                Virtual Driver
                   CTXTW                  0         Remote Session Screen Update (THINWIRE)    vdtw30n.dll

Virtual Channels   CTXTWI
                   CTXTWN
                                          0
                                          0
                                                   Seamless Windows Screen Update (THINWIRE)
                                                   Winstation
                                                                                               vdtwin.dll
                                                                                               wfica32.exe
                   CTXEUEM                0        End User Experience Monitoring              vdeuemn.dll
                   CTXZLFK                0        Local Text Echo and Keyboard Feedback       vdzlcn.dll
                   CTXZLC                 0        Speed Screen Latency Reduction - Screen     vdzlcn.dll
                   CTXZLFK                0        Speed Screen Latency Reduction - Fonts      vdfon30n.dll
                   CTXCTL                 0        ICA Session Control                         vdctln.dll
                   CTXFLSH                1        Multimedia - Flash                          vdflash.dll
  ICA Stream #1    CTXGUSB                1        USB Redirection                             vdgusbn.dll
                   CTXMM                  1        Multimedia - Streaming                      vdmmn.dll
                   CTXCLIP                1        Client Clipboard Mapping                    vdclipn.dll
  ICA Stream #2
                   CTXCAM                 1        Client Audio Mapping                        vdcamN.dll
                   CTXLIC                 1        License Management                          wfica32.exe
  ICA Stream #3    CTXVFM                 1        Video Server – (no longer used)             n/a
                   CTXPN                  1        Program Neighborhood                        vdpnn.dll
                   CTXCCM                 2        Client COM Port Mapping                     vdcom30N.dll
  ICA Stream #4    CTXCDM                 2        Client Drive Mapping                        vdcdm30n.dll
                   CTXPASS                2        Transparent Key Pass-Through                vdkbhook.dll
                   CTXCPM                 3        Printer Mapping for Spooling Clients        vdcpm30N.dll
                   CTXCM                  3        Client Management (Auto-Update)             vdcmN.dll
                   CTXLPT1                3        Legacy LP1 Port Mapping                     wfica32.exe
                   CTXLPT2                3        Legacy LPT2 Port Mapping                    wfica32.exe
                   CTXCOM1                3        Legacy COM1 Port Mapping                    wfica32.exe
                   CTXCOM2                3        Legacy COM2 Port Mapping                    wfica32.exe
Multi-Stream ICA Terminology

• Single-port, Multi-stream ICA (MSI Default)
 • 4 random ports at client, 1 primary port on server
 • Automatically enabled on ICA server by Branch Repeater 6.0.

• Multi-port, Multi-stream ICA
 • 4 random ports at client, 1 primary and up to 3 secondary ports on server
 • Most common deployment if used without Branch Repeater

• Single-port, Single-stream ICA
 • 1 random port at client, 1 primary port on server
 • The pre-MSI default connection type
 • If any Branch Repeater on the link vetos MSI, or old versions used
                                 Citrix Confidential - Do Not Distribute
Enable MSI on ICA Server




                    Citrix Confidential - Do Not Distribute
Enable MSI on Branch Repeater




           For backward compatibility, MSI is disabled by default on
           Branch Repeater, XenDesktop and XenApp

                             Citrix Confidential - Do Not Distribute
Up to 4 TCP connections for a single ICA application




              This is the first view that MSI is working as expected


                              Citrix Confidential - Do Not Distribute
How MSI streams are identified




                                                        Under Monitoring  Citrix (ICA/CGP) 
                                                        ICA Statistics  ICA Session Count

                                                        If MSI is active and connected, Multi Stream
                                                        counter will be non-zero



                     Citrix Confidential - Do Not Distribute
What is the competitive advantage

• Only Branch Repeater can parse a single port/multi-stream
  ICA connection and apply QoS appropriately.
• The benefits:
 • Lower overhead on the network and server infrastructure
 • Works on standard ICA (CGP) ports, does not require Firewalls reconfiguration
 • Hassle-free, automated IT administration

• In all other cases, you get multi-server port MSI or single-
  stream ICA
                                 Citrix Confidential - Do Not Distribute
Multi-Stream ICA in Action

                                 compressed and encrypted ICA data




                      •Application UI performance level is maintained.
                      •Printing traffic does not adversely affect this or
                      any other WAN users.




Session 1 GUI   Session 1 Printing   Session 2 GUI
Complete Exercise 4
Reporting, Monitoring
and Statistics
The New Dashboard
• The Branch Repeater Admin
  Console now has a landing
  page called Dashboard.
• The Dashboard can be
  automatically refreshed as well
  as manually refreshed by
  clicking the Refresh button.
• The sections that are displayed
  and the refresh rate can be
  customized also buy clicking
  the Customize button.


                                    Citrix Confidential - Do Not Distribute
The New Graphs and Tables
• Branch Repeater has a new
  graphing and statistics
  rendering engine.
• Graphing options include
 •   Pie Charts
 •   Stacked Area Graphs
 •   Line Graphs
 •   Dynamic bar graphs

• Data and statistics can be
  displayed in tables with
  hyperlinked cells for data drill
  down.
The New Graphs and Tables
• Branch Repeater has a new
  graphing and statistics
  rendering engine.
• Graphing options include
 •   Pie Charts
 •   Stacked Area Graphs
 •   Line Graphs
 •   Dynamic bar graphs

• Data and statistics can be
  displayed in tables with
  hyperlinked cells for data drill
  down.
The New PDF Reports with Historical Data
• Generating reports now
  produces a multi-page PDF
  document that can be saved
  or printed.
• Graphs displayed in reports
  are determined by the graph
  display settings within the
  Admin console.
• Reports can include
  historical data as well as
  can be run as a aggregate
  or drill down report.
 • (more on this later)
The Monitoring Pages
• The Monitoring pages are now
  listed in a collapsible Monitoring
  node, and listed alphabetically.
• Changes, enhancements or
  additions have been made to the
  following monitoring pages:
 •   Connections
 •   Filesystem (CIFS/SMB)
 •   Citrix (ICA/CGP)
 •   Secure Partners




                                       Citrix Confidential - Do Not Distribute
Monitoring Changes
• The Connections page now used
  a tabular interface with separate
  tabs for Accelerated and non-
  accelerated connections.
• Connection filtering can now be
  done by Service Class.
• The connections lists now have
  customizable columns.
UR:0    NONE                       "internal (accelerated)"
                                                                                                       UR:21      OUT_OF_SOCKETS               "too many proxy connections: failed to allocate a socket"
UR:1    UNKNOWN                    "unknown"
UR:2    NO_ORBITAL                 "no partner unit detected"
                                   "routing asymmetry detected: not all packets are going through this UR:22      NO_HANDSHAKE_SEEN            "no initial TCP handshake seen"
UR:3    NO_SYN_SEEN
                                   unit"
                                                                                                                                               "a different member of the appliance group accelerates this
                                   "routing asymmetry detected, not all packets are going through this UR:23      GROUP
                                                                                                                                               connection"
UR:4    NO_SYN_ACK_SEEN
                                   unit, (no SYN-ACK seen)"
                                   "not enough room left in the TCP packet header to append unit          UR:24   NO_AUTO_DISCOVERY            "auto-discovery disabled"
UR:5    NO_SPACE_FOR_OPTIONS
                                   specific options"
UR:6    POLICY                     "service policy rule"                                                  UR:25   GROUP_PASSTHROUGH            "acceleration disabled in group mode"
UR:7    PORT_EXCLUDE               "acceleration port include or exclude list"
UR:8    IP_EXCLUDE                 "acceleration ip address include or exclude list"
                                                                                                                  EDGE_CONNECTION_WITH_ "appliance received an Citrix Acceleration Plug-in connection
                                   "one unit is configured with softboost mode and the other with         UR:26
UR:9    MODE_MISMATCH                                                                                             BAD_VIP               with wrong destination VIP"
                                   hardboost mode"

UR:10   MAX_CONNECTIONS_LIMIT "maximum number of accelerated connection reached"                                  NO_CONNECTION_TO_APPLI
                                                                                                          UR:27                          "no connection to appliance"
                                                                                                                  ANCE
        MAX_SYN_TRIES_EXCEED "could not connect to the destination when unit specific options             UR:28   INCORRECT_MODE               "Transparent connection at an appliance in redirector mode"
UR:11
        ED                   were appended to the tcp packet"

                                   "could not connect to the destination when unit specific options       UR:29   CLIENT_RULES                 "client rules disallow acceleration"
UR:12   DONT_PROBE                 were appended to the tcp packet, but connection without such
                                   options succeeded"                                                             NO_SIGNALING_CONN_TO_C
                                                                                                          UR:30                          "no signaling connection to client"
                                                                                                                  LIENT
UR:13   ORBS_ON_BOTH_SIDES         "this unit is between two other units and daisy-chaining is enabled"           ISA_CACHED_LOCAL_CONNE
                                                                                                          UR:31                          "ISA cached local connection"
                                                                                                                  CTION
UR:14   MAX_FAST_FLOWS_LIMIT "maximum number of simultaneous partner units reached"                               ISA_NAT_INITIATED_LOCAL_
                                                                                                          UR:32                            "ISA NAT local connection"
                                                                                                                  CONNECTION
UR:15   BAD_LOCAL_SRC_IP           "no proxy entry for source IP address is configured"                           MAX_ACTIVE_CONNECTIONS
                                                                                                          UR:33                          "maximum number of active accelerated connection reached"
                                                                                                                  _LIMIT
UR:16   SIMULATION_MODE            "unit runs in simulation mode"
                                                                                                                  SYN_ACK_WITHOUT_OPTION
                                                                                                          UR:34                          "a syn-ack was received without options"
                                   "connections with this TCP port are not allowed to be accelerated              S
UR:17   PORT_LIMIT_LICENSE
                                   by the license"                                                                SSL_VPN_CONNECTION_REF "an ssl VPN is causing packets to transverse the Acceleration
                                                                                                          UR:35
                                                                                                                  LECTING_TRAFFIC        Plug-in multiple times"
UR:18   BAD_PROXY_CONFIG           "bad proxy configuration detected on the partner unit"
                                                                                                          UR:36   APPLIANCE_IS_ON_LAN          "Appliance/Client are on the same LAN",
                                   "bad proxy configuration detected, acceleration for connections
UR:19   PROXY_EXLUDED_PORT         with this source or destination TCP port is disabled by port include           APPLIANCE_SIGNALING_CON
                                   or exclude list"                                                       UR:37                           "Signaling connection to partner appliance"
                                                                                                                  NECTION
                                                                                                                  CACHED_LOCAL_CONNECTI
UR:20   PROXY_LOOP                 "bad proxy configuration detected: there is a loop"                    UR:38                         "HTTP Cached Local Connection"
                                                                                                                  ON
The Reporting Pages
Admin console reporting has been re
written and organized into the Reports
node.
The aggregate reports available are:
 •   Compression
 •   LAN vs. WAN Traffic
 •   Link Usage
 •   Service Classes
 •   Top Applications
 •   Traffic Shaping

• Within each of these aggregate report
  views, several drill down reports are
  available in addition to all PDF reports.
Report Creation Example
• The Top Applications report breaks out total
  throughput and relative bandwidth usage by
  application and optionally by link for both send
  and receive traffic.
• Report windows range from the last minute to
  last month, as well as since last appliance
  restart.
• Up to 10 applications can be reported on at a
  time, while being displayed in either line
  graphs or stacked area graphs.
• Click Customize allows you to select specific
  links as well as the number of applications to
  report on.
Report Creation Example
• Clicking on the Active Applications tab
  displays a list of all identified
  application and service traffic (TCP
  and UDP) at the current moment.
• Clicking Customize allows the
  specifying if configured Links to report
  on.
• Then clicking an application name
  hyperlink displays application specific
  link usage for send and receive traffic.
Report Creation Example
• Clicking on the Active Applications tab
  displays a list of all identified
  application and service traffic (TCP
  and UDP) at the current moment.
• Clicking Customize allows the
  specifying if configured Links to report
  on.
• Then clicking an application name
  hyperlink displays application specific
  link usage for send and receive traffic.
Report Creation Example
• Click the PDF Report
  button to generate a
  report isolating that
  application only.
Configuration – Refresh and Clear
• Clicking on the Administrator Interface
  node under Configuration accesses all
  GUI access and display related
  settings.
• Enabling and disabling of graphs,
  graph combinations, and refresh rates
  are all controlled here.
• Clicking on the Clear Statistics node
  under System Maintenance accesses
  the clearing of link, application, traffic
  shaping and service class statistics.
Complete Exercise 5
The “Ask me anything…” slide
        oded.nahum@citrix.com
Oded nahum branch repeater 6 technical introduction

Más contenido relacionado

La actualidad más candente

Avaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAvaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAMTELCO
 
Conect Comm Sales Presentation
Conect Comm Sales PresentationConect Comm Sales Presentation
Conect Comm Sales Presentationconectcomm
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Centerdavidzucker
 
BONAPS Wireless Digital Signage Presentation v 250616
BONAPS Wireless Digital Signage Presentation v 250616BONAPS Wireless Digital Signage Presentation v 250616
BONAPS Wireless Digital Signage Presentation v 250616Senthil Murugesan
 
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...Mauricio Arango
 
Nathan Winters What’s New And Cool In Ocs 2007 R2
Nathan Winters   What’s New And Cool In Ocs 2007 R2Nathan Winters   What’s New And Cool In Ocs 2007 R2
Nathan Winters What’s New And Cool In Ocs 2007 R2Nathan Winters
 
Get More. Give Less. Get Ahead.
Get More. Give Less. Get Ahead.Get More. Give Less. Get Ahead.
Get More. Give Less. Get Ahead.webhostingguy
 
Managed Services Seminar Presentation
Managed Services Seminar PresentationManaged Services Seminar Presentation
Managed Services Seminar Presentationgerrymark
 
One Communications Product Portfolio
One Communications Product PortfolioOne Communications Product Portfolio
One Communications Product PortfolioDavid Santos
 
Server 2012 essentials
Server 2012 essentialsServer 2012 essentials
Server 2012 essentialsSteven Teiger
 
Shinde qos-mpls-tutorial
Shinde qos-mpls-tutorialShinde qos-mpls-tutorial
Shinde qos-mpls-tutorialadvojoy
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12James Sutter
 
Proactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersProactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersPerficient, Inc.
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCentergrudolphi
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Khazret Sapenov
 
Flex Pod Modern Networks
Flex Pod Modern NetworksFlex Pod Modern Networks
Flex Pod Modern Networksmaxmelville
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environmentnicolasotira
 
Kx ncv200 brochure
Kx ncv200 brochureKx ncv200 brochure
Kx ncv200 brochureiscoretech
 

La actualidad más candente (20)

Avaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notesAvaya AMTELCO Infinity Operator Console integration notes
Avaya AMTELCO Infinity Operator Console integration notes
 
Conect Comm Sales Presentation
Conect Comm Sales PresentationConect Comm Sales Presentation
Conect Comm Sales Presentation
 
E crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutionsE crm m sc - warwick uni - crm solutions
E crm m sc - warwick uni - crm solutions
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Center
 
BONAPS Wireless Digital Signage Presentation v 250616
BONAPS Wireless Digital Signage Presentation v 250616BONAPS Wireless Digital Signage Presentation v 250616
BONAPS Wireless Digital Signage Presentation v 250616
 
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...
Providing End-to-End Network QoS via Overlay Networks and Bandwidth On-demand...
 
Nathan Winters What’s New And Cool In Ocs 2007 R2
Nathan Winters   What’s New And Cool In Ocs 2007 R2Nathan Winters   What’s New And Cool In Ocs 2007 R2
Nathan Winters What’s New And Cool In Ocs 2007 R2
 
Get More. Give Less. Get Ahead.
Get More. Give Less. Get Ahead.Get More. Give Less. Get Ahead.
Get More. Give Less. Get Ahead.
 
Managed Services Seminar Presentation
Managed Services Seminar PresentationManaged Services Seminar Presentation
Managed Services Seminar Presentation
 
One Communications Product Portfolio
One Communications Product PortfolioOne Communications Product Portfolio
One Communications Product Portfolio
 
Server 2012 essentials
Server 2012 essentialsServer 2012 essentials
Server 2012 essentials
 
Shinde qos-mpls-tutorial
Shinde qos-mpls-tutorialShinde qos-mpls-tutorial
Shinde qos-mpls-tutorial
 
Peer group itsm presentation 6.12
Peer group itsm presentation 6.12Peer group itsm presentation 6.12
Peer group itsm presentation 6.12
 
Avaya Aura 7.0 - What's New Webinar Slides
Avaya Aura 7.0 - What's New Webinar SlidesAvaya Aura 7.0 - What's New Webinar Slides
Avaya Aura 7.0 - What's New Webinar Slides
 
Proactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call CentersProactive Performance Monitoring for Genesys Call Centers
Proactive Performance Monitoring for Genesys Call Centers
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCenter
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...
 
Flex Pod Modern Networks
Flex Pod Modern NetworksFlex Pod Modern Networks
Flex Pod Modern Networks
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environment
 
Kx ncv200 brochure
Kx ncv200 brochureKx ncv200 brochure
Kx ncv200 brochure
 

Similar a Oded nahum branch repeater 6 technical introduction

17 dani künzli citrix repeater 4
17 dani künzli citrix repeater 417 dani künzli citrix repeater 4
17 dani künzli citrix repeater 4Digicomp Academy AG
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerF5 Networks
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availabilitydataplex systems limited
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetNuno Alves
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...Softcorp
 
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksOVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksNAIM Networks, Inc.
 
CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impactsthirion
 
Citrix Netscaler Intro
Citrix Netscaler IntroCitrix Netscaler Intro
Citrix Netscaler IntroRui Lopes
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad IrzanIndonesia Network Operators Group
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 OverviewTudor Damian
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewITCamp
 
Team-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsTeam-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsJeremy Anderson
 
Anuta Networks at Networking Field Day 14
Anuta  Networks at Networking Field Day 14Anuta  Networks at Networking Field Day 14
Anuta Networks at Networking Field Day 14Kiran Sirupa
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseSheryl Zhang
 
Cvc2009 Moscow Xd3 Fabian Kienle Final
Cvc2009 Moscow Xd3  Fabian Kienle FinalCvc2009 Moscow Xd3  Fabian Kienle Final
Cvc2009 Moscow Xd3 Fabian Kienle FinalLiudmila Li
 

Similar a Oded nahum branch repeater 6 technical introduction (20)

17 dani künzli citrix repeater 4
17 dani künzli citrix repeater 417 dani künzli citrix repeater 4
17 dani künzli citrix repeater 4
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement Manager
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availability
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater Datasheet
 
Why Lync 2010
Why Lync 2010Why Lync 2010
Why Lync 2010
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...
 
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider NetworksOVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
OVNC 2015-Enabling Software-Defined Transformation of Service Provider Networks
 
MVTS PRO
MVTS PROMVTS PRO
MVTS PRO
 
CEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features ImpactCEC XenApp 6.5 New Features Impact
CEC XenApp 6.5 New Features Impact
 
Layer 7 and Oracle -
Layer 7 and Oracle - Layer 7 and Oracle -
Layer 7 and Oracle -
 
Citrix Netscaler Intro
Citrix Netscaler IntroCitrix Netscaler Intro
Citrix Netscaler Intro
 
Servicedesk Plus 8
Servicedesk Plus 8Servicedesk Plus 8
Servicedesk Plus 8
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 Overview
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overview
 
Team-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning EnvironmentsTeam-Based Approach to Deploying VDI in Learning Environments
Team-Based Approach to Deploying VDI in Learning Environments
 
Anuta Networks at Networking Field Day 14
Anuta  Networks at Networking Field Day 14Anuta  Networks at Networking Field Day 14
Anuta Networks at Networking Field Day 14
 
Carrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-caseCarrier-grade-virtual-platform-use-case
Carrier-grade-virtual-platform-use-case
 
Cvc2009 Moscow Xd3 Fabian Kienle Final
Cvc2009 Moscow Xd3  Fabian Kienle FinalCvc2009 Moscow Xd3  Fabian Kienle Final
Cvc2009 Moscow Xd3 Fabian Kienle Final
 

Más de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Más de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Último

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Último (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Oded nahum branch repeater 6 technical introduction

  • 1. Branch Repeater 6.0 A Technical Introduction Oded Nahum – Branch Repeater Product Specialist September 2011
  • 2. Agenda • Introducing Branch Repeater 6.0 • Initial Configuration – Exercise 1 • Licensing • Configuring Links • Management Access • Monitoring Mode • Quality of Service – Exercise 2 • Links • Application Classifiers • Traffic Shaping Policies • Service Classes • CIFS Acceleration – Exercise 3 • CIFS (SMB and Signed SMB) Traffic • MultiStream ICA – Exercise 4 • Enabling and testing • Reporting and Monitoring – Exercise 5 • Monitoring Links, Applications and Service Classes Citrix Confidential - Do Not Distribute • Customizing and Generating Reports
  • 4. Branch Repeater 6.0 General Availability: RTW June 27th The next generation of Branch Repeater Technology Advanced traffic classification, prioritization, shaping and reporting Improved XenDesktop and XenApp acceleration Clustering via NetScaler SMB 2, Encrypted MAPI and Outlook/Exchange 2010 Acceleration Centralized licensing – Citrix License Server
  • 5. WAN Optimization Adaptive Adaptive Adaptive Smart TCP Protocol Compression Acceleration Flow Control Acceleration WAN Branch Repeater Repeater
  • 6. Smart Service-centric WAN Optimization Acceleration … Not just network-centric WAN optimization Assess • Assess and identify all services • Classify 500+ services out-of-the-box • Control bandwidth allocation, compression, shaping and enforcement Remediate Classify • Monitor services delivery and report • Sense network conditions, remediate and respond; minimize help desk calls Monitor Control
  • 7. SmartAcceleration for Deeper Visibility and Granular Control XenApp • Visibility for 500+ apps and protocols out-of- the-box, + more custom Voice, Video 100010100001110 000111000 • Prioritize XenDesktop, multimedia, web and 0011100011101001110111000 Windows apps, custom services XenDesktop 1001100110011101000011000 • Auto-detect and auto-configure XenDesktop; no changes to network or XenDesktop MicrosoftApps • Prioritize by app, branch or user location, File, Print app type, protocol, traffic direction, more
  • 8. Smarter, Granular Prioritization Policies Global Datacenter SF NY London Beijing Partner Office Branch Lo pri Med pri Med pri Hi pri Med pri Service Class Video XenDesktop Med pri Hi pri Sub-class Citrix TV YouTube Exec XDs Employee XDs Hi pri Lo pri Hi pri Lo pri
  • 9. User-centric XenDesktop Prioritization Branch Office XenApp Data Center Sales Product Voice, Video 100010100001110 000111000 0011100011101001110111000 XenDesktop 1001100110011101000011000 MicrosoftApps Executive File, Print Prioritize different types of Prioritize published apps and traffic (mouse, print, etc) desktops by user groups across user sessions
  • 10. Faster Encrypted Email and File Transfers Branch Office Data Center 100010100001110 000111000 0011100011101001110111000 1001100110011101000011000 Microsoft email (Encrypted MAPI Microsoft file servers Layer 7 optimizations and Exchange 2010) (SMBv2, Signed SMB v1/v2)
  • 11. Platform Support and Upgrades • Initial Branch Repeater 6.0 release is intended for Linux-based appliances and VPX appliances on XenServer and VMWare. • The same update file downloaded from MyCitrix will work for both platforms. • The Repeater Plug-In 6.0 release will follow soon after the Capri release. • The Branch Repeater with Windows Server will be updated with the BR 6.0 technology in a subsequent release.
  • 12. Branch Repeater Product Family Flexibility to Meet All Your Needs Branch Repeater VPX Repeater Branch Repeater with – Virtual Appliance Repeater Plug-in – Appliances Windows Server Software Software Client BR 6.0 Coming Coming BR 6.0 Initial Later… Soon… Initial Release Release
  • 14. First things first… apA1 apA2 • Branch Repeater 6.0 needs to know where the LAN and WAN are. • Determine and remember which accelerated pair port is connected to the WAN and which to the LAN. •Switch •Router (inline mode) •DSL Modem Straight Through Cable Crossover Cable •Direct to Server •Cable Modem •Direct to Client • Either port can be connected to either side using the proper cables. apA1 apA2 apA1 apA2
  • 15. New Quick Installation Page • Click the Quick Installation node in the Command menu. • This page is a collection of all the configuration steps condensed into one simple form.
  • 16. New Quick Installation Page • The Quick Installation is intended for simple Branch Repeater deployments. • If any of the following are needed, a manual configuration is required; • Virtual Inline Mode • WCCP Deployment Mode • Group Mode • High Availability • SSL Acceleration • Repeater Plugin Support • Hardboost Bandwidth Mode • Encrypted SMB or MAPI Support
  • 17. New Quick Installation Page • Enter all the required information and click the Install button. • Once completed, the appliance will reboot and then you should see successful traffic flow in the Dashboard.
  • 18. Branch Repeater Licensing • Click the Licensing node in the Configuration menu. • Chose the License Server tab if your license requires using a stand alone Citrix License server. • Retail (Appliance, Plug-in, Crypto) • XenDesktop Platinum Entitlement • Chose the Local Licenses tab if your license type required local installation. • Evaluation License • Not for Re-sale • Express
  • 19. Must configure the default apA links • Click on the Links node in the Configuration menu. • Click the Edit button for the first pre- defined apA link. • Configure the link according to network it is connected to; • Link Type (LAN of WAN side) • Bandwidth In • Bandwidth Out • Descriptive Link Name (optional) • Click Save. • Repeat this configuration on both the apA1 and apA2 links.
  • 20. Branch Repeater Features page • Traffic Processing • Master enable/disable switch. When disabled, all features of the Appliance are disabled and all traffic passes through without modification or traffic shaping • Traffic Acceleration • enables and disables the acceleration engine • Traffic Shaping • enables and disables the traffic-shaping engine • Traffic Bridging (VPX Only) • Enable / Disable the software bridge, default for new installs is disabled Citrix Confidential - Do Not Distribute
  • 21. Traffic Processing and Acceleration • Branch Repeater can ne installed in a “monitoring-only” mode • No compression, flow control or traffic shaping will be used, however full traffic visibility will be available. • Use the Features node in the Command Menu to disable; • Traffic Acceleration • Traffic Shaping .
  • 22. Bandwidth Management • Link level In / Out - Regulates all traffic, accelerated as well as non- accelerated • Bandwidth Management – Regulate only accelerated traffic, effects inbound traffic only • Recommended configuration – Use local WAN link sizing Citrix Confidential - Do Not Distribute
  • 23. Today’s Lab Environments Your student work environment (WinXP)
  • 26. Quality of Service in v5.7 and prior releases • Five queues (Named “A” though “E”. Names can be changed) • All traffic is assigned to Queue A by default Service Classes • Each Service Class can be assigned to a one traffic queue. ICA Packet Bandwidth • Each queue determines the minimum Priorities QoS Queues Allocations bandwidth allocation when bandwidth contention with a higher queue occurs. • ICA Packet priorities are mapped to Acceleration quality of service (QoS) queues. Engine
  • 27. Quality of Service – The Basics of Traffic Shaping • All WAN traffic is subject to traffic shaping • Accelerated connections, non-accelerated connections, non-TCP traffic such as UDP flows, GRE streams, etc. • The algorithm used is weighted fair queuing • Every connection is assigned a weight based on the appliance’s policies between 1 and 256. • Traffic shaping is applied to the WAN in both inbound and outbound after the compression engine • Weighted priorities are applied during bandwidth contention to both ingress and egress traffic even when the other side of the link is not equipped with QoS. • DSCP Is fully supported both as a classifier and an enforcer • More information in Branch Repeater Traffic Shaping technology can be found here http://www.citrix.com/skb/articles/RDY4005
  • 28. Quality of Service in v6.0 - Configuration • Quality of Service is applied using 4 mechanisms. • Links: Tells the traffic shaper which WAN link the packet is using. In a site with multiple link, each link has its own bandwidth limits and is managed independently. • Application Classifiers: Identify and determines which protocol or application class traffic belongs to. • Traffic Shaping Policies: Tell the traffic shaper weighted priority and bandwidth limits to assign to which traffic type (application classifier). • Service Classes: Map applications to acceleration decisions, traffic filters and traffic-shaping policies.
  • 29. Quality of Service Data Center 1 Link Definition • Links : Physical or Logical XenApp Traffic Link • WAN connections between remote sites. • WAN links between datacenters and branches. • WAN links between cities or countries. • WAN data paths between branches and specific servers or server farms. Data Center 2 Branch 1 Streaming Traffic Link DC1 Link DC2 Link
  • 30. Quality of Service Link Definition • Define Links • By Accelerated Port • By Source or Destination Network • By WCCP Service Group • By Source or Destination MAC Address • By VLAN Tag • By default link definitions are automatically created for each adapter port. • The number of supported links are limited by Branch Repeater model: • 83xx, 85xx = 5 links • 88xx = 10 links • VPX = up to 5 links • If Links are misconfigured there will be compression values less than 1:1.
  • 31. Quality of Service Traffic Shaping Policies • By default there are 10 pre-configured traffic shaping policies. (subject to change) • VOIP Traffic • High Priority Traffic • Medium Priority Traffic • Low Priority Traffic • Default QoS • ICA Priorities • Each traffic shaping policy has a weighted priority value associated with it. • The maximum number of traffic shaping policies supported is 50 per appliance.
  • 32. Quality of Service Traffic Shaping Policies • Weighted Priority is used to determine traffic precedence when calculating send and receive rates. • And.. Or… Bandwidth limits can also now used to control allocation. • Percentage of Link Bandwidth • Absolute Fixed Date Rate. • Even within an SSL tunnel !!* *Citrix Patent Pending
  • 33. Quality of Service Application Classifiers • Application classifiers are used by service classes to distinguish between application traffic types. • Applications are classified by: • Ethertype  not all competitors can do this • IP Classification (TCP, GRE, L2TP, etc) • TCP Port • UDP Port • Web URL • ICA Published App  not all competitors can do this • Application classifiers are categorized into 1 of 25 Application Groups
  • 34. Quality of Service Application Classifiers • Custom application classifiers can be created. • The maximum number of classifiers supported is 600 per appliance. • The classification parameters entered cannot conflict with an existing classifier.
  • 35. Quality of Service Application Classifiers – XenApp and XenDesktop • ICA Published Applications or Desktops groups can be manually created or auto-discovered. • Once discovered, they will appear in the application classifier list as well as in all reports and monitoring pages. • Temporarily enabling and then disabling auto discovery can be used to prepopulate the online applications list for editing or exporting at a later time.
  • 36. Quality of Service Service Classes in v5.7 and prior • Service Classes in Branch Repeater 5.7 and prior releases identified traffic two possible ways: • IP address/range (client or server) • TCP port number • Service Classes were evaluated in order with mirrored policies required on all appliances. • If Service Classes did not match on both appliances with an acceleration pair, those connections would pass through un-accelerated (UR Code 6).
  • 37. Quality of Service Service Classes in v6.0 • Service Classes are the main QoS mechanism, bringing together: • Traffic Shaping Policies • Application Classifiers • Link Configurations • Service Classes are evaluated in order with policies higher in the list having priority over ones lower. • Service classes need to exist but not be mirrored on all appliances; will result in lowest common setting being used.
  • 38. Quality of Service Service Classes • Service Classes are still used to enforce bandwidth priority among traffic types however now map to Traffic Shaping Policies instead of QoS Queues. • Traffic Shaping Policies within a Service Class can be applied by: • Single Traffic Shaping Policy per Single Service Class • Per-link Traffic Shaping Policies per Single Service Class • The maximum number of supported Service Classes is 64 per appliance.
  • 39. Quality of Service Service Classes • Service classes can use AND rules as well as OR rules. • Rules can include any and all of the following filters: • Application Name • Source IP • IP sync/direction AND • Destination IP • VLAN Tag • DiffServ bit OR • SSL Profile • The maximum number of Service Class Filter Rules supported is 10 per Service Class.
  • 41. Signed SMB / Secure Partner configuration
  • 42. SMB Support in v5.7 • Branch Repeater 5.7 and earlier supported compression and acceleration of unsigned SMB1 traffic only. • If enabled, Signed SMB had to be turned off on servers and clients via group policy to enable acceleration. • Connections from Vista and Win7 clients had SMB2 connections rolled back to SMB1. Citrix Confidential - Do Not Distribute
  • 43. SMB Acceleration in v6.0 • There are three SMB acceleration scenarios you may observe when monitoring SMB CIFS connections. • Unaccelerated SMB 1 or 2 Connections • Accelerated SMB 1 or 2 Connections • Accelerated Signed SMB 1 or 2 Connections Citrix Confidential - Do Not Distribute
  • 44. SMB Acceleration Requirements • There are three SMB acceleration scenarios you may observe when Connection Secure Windows NTLMv1 monitoring SMB CIFS connections. Type Partner Domain Required Member • Unaccelerated SMB 1 or 2 Connections • Accelerated SMB 1 or 2 Connections SMB 1 No No No • Accelerated Signed SMB 1 or 2 Connections SMB 2 No No No Signed SMB 1 Yes Yes Yes Signed SMB 2 Yes Yes Yes Citrix Confidential - Do Not Distribute
  • 45. SMB Acceleration Requirements • Domain membership is only required on the server-side Branch Repeater. • Once joined, the appliance or VPX should now have a machine account in the specified domain. • NOTE: Signed SMB is not enabled yet!
  • 46. SMB Acceleration Requirements • A secure connection must be established between Branch Repeaters (secure partners). • SSL credentials (cert and key) are used for authentication and trust between Branch Repeaters. • The SSL Key Store must be enabled to hold the SSL credentials used by the Branch Repeaters. • A Crypto license is required to enable the SSL feature set. Citrix Confidential - Do Not Distribute
  • 47. SMB Acceleration Requirements • SSL Support must be enabled by clicking the SSL Encryption node under Configuration. • Trusted SSL credentials must be installed and used to authenticate all Branch Repeaters and create a secure data channel between them. Citrix Confidential - Do Not Distribute
  • 48. SMB Acceleration Requirements • The Secure Partner connection is configured on a per appliance basis. • A signaling mechanism is used to provide discovery and communication between trusted appliances. Citrix Confidential - Do Not Distribute
  • 51. ICA Review – Virtual Channels What is an ICA Virtual Channel? A Citrix Independent Computing Architecture (ICA) virtual channel is a bidirectional connection for the exchange of generalized packet data between a Citrix XenApp Server and a ICA compliant client. Virtual channels correspond to virtual drivers; each providing a specific function. Some are required for normal operation, and others are optional. Virtual drivers operate at the presentation layer protocol level. There can be a number of these protocols active at any given time by multiplexing channels. There are a total of 32 virtual channels in the ICA protocol. However for most user sessions, between 8 -12 are usually utilized.
  • 52. ICA Priority Packet Tagging • ICA Priority Tagging consists of a two bit tag within each ICA packet header. • These tags can be evaluated on the fly and the application activity determined. • Earlier versions of MetaFrame use a framing header that does not contain the two priority bits.
  • 53. Channel Name Default Priority Description Virtual Driver CTXTW 0 Remote Session Screen Update (THINWIRE) vdtw30n.dll Virtual Channels CTXTWI CTXTWN 0 0 Seamless Windows Screen Update (THINWIRE) Winstation vdtwin.dll wfica32.exe CTXEUEM 0 End User Experience Monitoring vdeuemn.dll CTXZLFK 0 Local Text Echo and Keyboard Feedback vdzlcn.dll CTXZLC 0 Speed Screen Latency Reduction - Screen vdzlcn.dll CTXZLFK 0 Speed Screen Latency Reduction - Fonts vdfon30n.dll CTXCTL 0 ICA Session Control vdctln.dll CTXFLSH 1 Multimedia - Flash vdflash.dll CTXGUSB 1 USB Redirection vdgusbn.dll CTXMM 1 Multimedia - Streaming vdmmn.dll CTXCLIP 1 Client Clipboard Mapping vdclipn.dll CTXCAM 1 Client Audio Mapping vdcamN.dll CTXLIC 1 License Management wfica32.exe CTXVFM 1 Video Server – (no longer used) n/a CTXPN 1 Program Neighborhood vdpnn.dll CTXCCM 2 Client COM Port Mapping vdcom30N.dll CTXCDM 2 Client Drive Mapping vdcdm30n.dll CTXPASS 2 Transparent Key Pass-Through vdkbhook.dll CTXCPM 3 Printer Mapping for Spooling Clients vdcpm30N.dll CTXCM 3 Client Management (Auto-Update) vdcmN.dll CTXLPT1 3 Legacy LP1 Port Mapping wfica32.exe CTXLPT2 3 Legacy LPT2 Port Mapping wfica32.exe CTXCOM1 3 Legacy COM1 Port Mapping wfica32.exe CTXCOM2 3 Legacy COM2 Port Mapping wfica32.exe
  • 54. ICA QoS in BR 5.7 ICA Priority Packet Tagging allows prioritization of ICA sessions based on the virtual channel data being transmitted. (what the user is doing within the app/session) This is done by associating each virtual channel’s two-bit priority to a packet priority. The two priority bits combine to form four priority values: 00 (0) - High Priority 01 (1) - Medium Priority 10 (2) - Low Priority 11 (3) - Background Priority These priority bits can then be assigned to Branch Repeater Quality of Service queues to allow dynamic QoS.
  • 55. ICA QoS in BR 6.0 (Single Stream) ICA Priority Packet Tagging allows prioritization of ICA sessions based on the virtual channel data being transmitted. (what the user is doing within the app/session) This is done by associating each virtual channel’s two-bit priority to a packet priority. The two priority bits combine to form four priority values: 00 (0) - High Priority 01 (1) - Medium Priority 10 (2) - Low Priority 11 (3) - Background Priority These priority bits can then be assigned to Branch Repeater Quality of Service queues to allow dynamic QoS.
  • 56. The Single Stream ICA Problem compressed and encrypted ICA data •The user creates an ICA session. •User interface traffic is tagged with a priority bit of zero (thin wire). •Branch Repeater identifies the priority tags in real time and applies QoS appropriately. Session Bandwidth
  • 57. The Single Stream ICA Problem compressed and encrypted ICA data •The user then starts a print job within the ICA session. •Print traffic is tagged with a priority bit of three (real time). •Branch Repeater identifies the new priority tags in real time and applies QoS appropriately. Session Bandwidth
  • 58. The Single Stream ICA Problem compressed and encrypted ICA data •The user then either returns to the app’s user interface or starts a second application. (thin wire) •The new observed priority bits of the session cause the session to be QoS’ed as a priority zero. •Prioritization of printing traffic is now lost. Session Bandwidth
  • 60. Channel Name Default Priority Description Virtual Driver CTXTW 0 Remote Session Screen Update (THINWIRE) vdtw30n.dll Virtual Channels CTXTWI CTXTWN 0 0 Seamless Windows Screen Update (THINWIRE) Winstation vdtwin.dll wfica32.exe CTXEUEM 0 End User Experience Monitoring vdeuemn.dll CTXZLFK 0 Local Text Echo and Keyboard Feedback vdzlcn.dll CTXZLC 0 Speed Screen Latency Reduction - Screen vdzlcn.dll CTXZLFK 0 Speed Screen Latency Reduction - Fonts vdfon30n.dll CTXCTL 0 ICA Session Control vdctln.dll CTXFLSH 1 Multimedia - Flash vdflash.dll ICA Stream #1 CTXGUSB 1 USB Redirection vdgusbn.dll CTXMM 1 Multimedia - Streaming vdmmn.dll CTXCLIP 1 Client Clipboard Mapping vdclipn.dll ICA Stream #2 CTXCAM 1 Client Audio Mapping vdcamN.dll CTXLIC 1 License Management wfica32.exe ICA Stream #3 CTXVFM 1 Video Server – (no longer used) n/a CTXPN 1 Program Neighborhood vdpnn.dll CTXCCM 2 Client COM Port Mapping vdcom30N.dll ICA Stream #4 CTXCDM 2 Client Drive Mapping vdcdm30n.dll CTXPASS 2 Transparent Key Pass-Through vdkbhook.dll CTXCPM 3 Printer Mapping for Spooling Clients vdcpm30N.dll CTXCM 3 Client Management (Auto-Update) vdcmN.dll CTXLPT1 3 Legacy LP1 Port Mapping wfica32.exe CTXLPT2 3 Legacy LPT2 Port Mapping wfica32.exe CTXCOM1 3 Legacy COM1 Port Mapping wfica32.exe CTXCOM2 3 Legacy COM2 Port Mapping wfica32.exe
  • 61. Multi-Stream ICA Terminology • Single-port, Multi-stream ICA (MSI Default) • 4 random ports at client, 1 primary port on server • Automatically enabled on ICA server by Branch Repeater 6.0. • Multi-port, Multi-stream ICA • 4 random ports at client, 1 primary and up to 3 secondary ports on server • Most common deployment if used without Branch Repeater • Single-port, Single-stream ICA • 1 random port at client, 1 primary port on server • The pre-MSI default connection type • If any Branch Repeater on the link vetos MSI, or old versions used Citrix Confidential - Do Not Distribute
  • 62. Enable MSI on ICA Server Citrix Confidential - Do Not Distribute
  • 63. Enable MSI on Branch Repeater For backward compatibility, MSI is disabled by default on Branch Repeater, XenDesktop and XenApp Citrix Confidential - Do Not Distribute
  • 64. Up to 4 TCP connections for a single ICA application This is the first view that MSI is working as expected Citrix Confidential - Do Not Distribute
  • 65. How MSI streams are identified Under Monitoring  Citrix (ICA/CGP)  ICA Statistics  ICA Session Count If MSI is active and connected, Multi Stream counter will be non-zero Citrix Confidential - Do Not Distribute
  • 66. What is the competitive advantage • Only Branch Repeater can parse a single port/multi-stream ICA connection and apply QoS appropriately. • The benefits: • Lower overhead on the network and server infrastructure • Works on standard ICA (CGP) ports, does not require Firewalls reconfiguration • Hassle-free, automated IT administration • In all other cases, you get multi-server port MSI or single- stream ICA Citrix Confidential - Do Not Distribute
  • 67. Multi-Stream ICA in Action compressed and encrypted ICA data •Application UI performance level is maintained. •Printing traffic does not adversely affect this or any other WAN users. Session 1 GUI Session 1 Printing Session 2 GUI
  • 70. The New Dashboard • The Branch Repeater Admin Console now has a landing page called Dashboard. • The Dashboard can be automatically refreshed as well as manually refreshed by clicking the Refresh button. • The sections that are displayed and the refresh rate can be customized also buy clicking the Customize button. Citrix Confidential - Do Not Distribute
  • 71. The New Graphs and Tables • Branch Repeater has a new graphing and statistics rendering engine. • Graphing options include • Pie Charts • Stacked Area Graphs • Line Graphs • Dynamic bar graphs • Data and statistics can be displayed in tables with hyperlinked cells for data drill down.
  • 72. The New Graphs and Tables • Branch Repeater has a new graphing and statistics rendering engine. • Graphing options include • Pie Charts • Stacked Area Graphs • Line Graphs • Dynamic bar graphs • Data and statistics can be displayed in tables with hyperlinked cells for data drill down.
  • 73. The New PDF Reports with Historical Data • Generating reports now produces a multi-page PDF document that can be saved or printed. • Graphs displayed in reports are determined by the graph display settings within the Admin console. • Reports can include historical data as well as can be run as a aggregate or drill down report. • (more on this later)
  • 74. The Monitoring Pages • The Monitoring pages are now listed in a collapsible Monitoring node, and listed alphabetically. • Changes, enhancements or additions have been made to the following monitoring pages: • Connections • Filesystem (CIFS/SMB) • Citrix (ICA/CGP) • Secure Partners Citrix Confidential - Do Not Distribute
  • 75. Monitoring Changes • The Connections page now used a tabular interface with separate tabs for Accelerated and non- accelerated connections. • Connection filtering can now be done by Service Class. • The connections lists now have customizable columns.
  • 76. UR:0 NONE "internal (accelerated)" UR:21 OUT_OF_SOCKETS "too many proxy connections: failed to allocate a socket" UR:1 UNKNOWN "unknown" UR:2 NO_ORBITAL "no partner unit detected" "routing asymmetry detected: not all packets are going through this UR:22 NO_HANDSHAKE_SEEN "no initial TCP handshake seen" UR:3 NO_SYN_SEEN unit" "a different member of the appliance group accelerates this "routing asymmetry detected, not all packets are going through this UR:23 GROUP connection" UR:4 NO_SYN_ACK_SEEN unit, (no SYN-ACK seen)" "not enough room left in the TCP packet header to append unit UR:24 NO_AUTO_DISCOVERY "auto-discovery disabled" UR:5 NO_SPACE_FOR_OPTIONS specific options" UR:6 POLICY "service policy rule" UR:25 GROUP_PASSTHROUGH "acceleration disabled in group mode" UR:7 PORT_EXCLUDE "acceleration port include or exclude list" UR:8 IP_EXCLUDE "acceleration ip address include or exclude list" EDGE_CONNECTION_WITH_ "appliance received an Citrix Acceleration Plug-in connection "one unit is configured with softboost mode and the other with UR:26 UR:9 MODE_MISMATCH BAD_VIP with wrong destination VIP" hardboost mode" UR:10 MAX_CONNECTIONS_LIMIT "maximum number of accelerated connection reached" NO_CONNECTION_TO_APPLI UR:27 "no connection to appliance" ANCE MAX_SYN_TRIES_EXCEED "could not connect to the destination when unit specific options UR:28 INCORRECT_MODE "Transparent connection at an appliance in redirector mode" UR:11 ED were appended to the tcp packet" "could not connect to the destination when unit specific options UR:29 CLIENT_RULES "client rules disallow acceleration" UR:12 DONT_PROBE were appended to the tcp packet, but connection without such options succeeded" NO_SIGNALING_CONN_TO_C UR:30 "no signaling connection to client" LIENT UR:13 ORBS_ON_BOTH_SIDES "this unit is between two other units and daisy-chaining is enabled" ISA_CACHED_LOCAL_CONNE UR:31 "ISA cached local connection" CTION UR:14 MAX_FAST_FLOWS_LIMIT "maximum number of simultaneous partner units reached" ISA_NAT_INITIATED_LOCAL_ UR:32 "ISA NAT local connection" CONNECTION UR:15 BAD_LOCAL_SRC_IP "no proxy entry for source IP address is configured" MAX_ACTIVE_CONNECTIONS UR:33 "maximum number of active accelerated connection reached" _LIMIT UR:16 SIMULATION_MODE "unit runs in simulation mode" SYN_ACK_WITHOUT_OPTION UR:34 "a syn-ack was received without options" "connections with this TCP port are not allowed to be accelerated S UR:17 PORT_LIMIT_LICENSE by the license" SSL_VPN_CONNECTION_REF "an ssl VPN is causing packets to transverse the Acceleration UR:35 LECTING_TRAFFIC Plug-in multiple times" UR:18 BAD_PROXY_CONFIG "bad proxy configuration detected on the partner unit" UR:36 APPLIANCE_IS_ON_LAN "Appliance/Client are on the same LAN", "bad proxy configuration detected, acceleration for connections UR:19 PROXY_EXLUDED_PORT with this source or destination TCP port is disabled by port include APPLIANCE_SIGNALING_CON or exclude list" UR:37 "Signaling connection to partner appliance" NECTION CACHED_LOCAL_CONNECTI UR:20 PROXY_LOOP "bad proxy configuration detected: there is a loop" UR:38 "HTTP Cached Local Connection" ON
  • 77. The Reporting Pages Admin console reporting has been re written and organized into the Reports node. The aggregate reports available are: • Compression • LAN vs. WAN Traffic • Link Usage • Service Classes • Top Applications • Traffic Shaping • Within each of these aggregate report views, several drill down reports are available in addition to all PDF reports.
  • 78. Report Creation Example • The Top Applications report breaks out total throughput and relative bandwidth usage by application and optionally by link for both send and receive traffic. • Report windows range from the last minute to last month, as well as since last appliance restart. • Up to 10 applications can be reported on at a time, while being displayed in either line graphs or stacked area graphs. • Click Customize allows you to select specific links as well as the number of applications to report on.
  • 79. Report Creation Example • Clicking on the Active Applications tab displays a list of all identified application and service traffic (TCP and UDP) at the current moment. • Clicking Customize allows the specifying if configured Links to report on. • Then clicking an application name hyperlink displays application specific link usage for send and receive traffic.
  • 80. Report Creation Example • Clicking on the Active Applications tab displays a list of all identified application and service traffic (TCP and UDP) at the current moment. • Clicking Customize allows the specifying if configured Links to report on. • Then clicking an application name hyperlink displays application specific link usage for send and receive traffic.
  • 81. Report Creation Example • Click the PDF Report button to generate a report isolating that application only.
  • 82. Configuration – Refresh and Clear • Clicking on the Administrator Interface node under Configuration accesses all GUI access and display related settings. • Enabling and disabling of graphs, graph combinations, and refresh rates are all controlled here. • Clicking on the Clear Statistics node under System Maintenance accesses the clearing of link, application, traffic shaping and service class statistics.
  • 84. The “Ask me anything…” slide oded.nahum@citrix.com