Branch Repeater 6.0 is the next generation of Citrix's Branch Repeater technology for WAN optimization. It provides advanced traffic classification, prioritization, shaping, and reporting. Key features include improved acceleration of XenDesktop and XenApp, clustering via NetScaler, support for SMB 2 and encrypted protocols, and centralized licensing. The document outlines the initial configuration process, including licensing, link configuration, enabling features, and setting the appliance to monitoring-only mode. Quality of service, CIFS acceleration, multi-stream ICA, reporting, and platform support are also briefly discussed.
When a global Telecommunications firm's comprehensive virtualization strategy required visibility into thousands of virtual servers spread across 5 U.S. data centers, they turned to Net Optics and its Phantom solutions.The Telco faced the challenge of supporting numerous VoIP call centers for compliance, security and call quality. This virtualized architecture encompasses more than 150 VMware ESX servers and 1600+ virtual servers. The Telco chose Net Optics Phantom™ HD, working in conjunction with the Net Optics Phantom Virtual Tap, to fulfill this complex demand. Only the Phantom solution delivers the necessary robustness to process extremely high data bandwidths.
In this webinar from Net Optics you will learn:
Presented by Net Optics' Senior Solutions Engineer, David Pham, this webinar will walk through a specific deployment scenario of Net Optics' innovative Phantom Virtual Tap and the recently introduced Phantom HD High-Throughput Tunneling Appliance
Advantages of gaining visibility into your virtualized network infrastructure
How to eliminate visibility challenges in the virtual network
Financial benefits of traffic monitoring and inspection
When a global Telecommunications firm's comprehensive virtualization strategy required visibility into thousands of virtual servers spread across 5 U.S. data centers, they turned to Net Optics and its Phantom solutions.The Telco faced the challenge of supporting numerous VoIP call centers for compliance, security and call quality. This virtualized architecture encompasses more than 150 VMware ESX servers and 1600+ virtual servers. The Telco chose Net Optics Phantom™ HD, working in conjunction with the Net Optics Phantom Virtual Tap, to fulfill this complex demand. Only the Phantom solution delivers the necessary robustness to process extremely high data bandwidths.
In this webinar from Net Optics you will learn:
Presented by Net Optics' Senior Solutions Engineer, David Pham, this webinar will walk through a specific deployment scenario of Net Optics' innovative Phantom Virtual Tap and the recently introduced Phantom HD High-Throughput Tunneling Appliance
Advantages of gaining visibility into your virtualized network infrastructure
How to eliminate visibility challenges in the virtual network
Financial benefits of traffic monitoring and inspection
These Application Notes describe the configuration steps required for Amtelco Infinity Version 5.50.05 to successfully interoperate with Avaya Communication Manager 5.0 using PRI QSIG.
Information in these Application Notes was obtained through compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab.
SVS; Reviewed:
Aura 7.0—What’s New? Avaya Aura 7.0 became available in August 2015 and we’re still getting to know the enhancements to the platform. From what David Lover has seen, those enhancements are beneficial to both the users and the administrators. In this presentation, David will provide his insight on the platform—covering what he sees as the biggest and most useful enhancements and how you can apply them in your environment to cut costs and increase support.
Get a Pretested, Validated Infrastructure
Cisco and NetApp have collaborated to create FlexPod, a prevalidated data center solution built on a flexible, shared infrastructure. This predesigned base configuration can:
Scale easily
Be optimized for a variety of mixed application workloads
Be configured for virtual desktop or server infrastructure, secure multi-tenancy, or cloud environments
These Application Notes describe the configuration steps required for Amtelco Infinity Version 5.50.05 to successfully interoperate with Avaya Communication Manager 5.0 using PRI QSIG.
Information in these Application Notes was obtained through compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab.
SVS; Reviewed:
Aura 7.0—What’s New? Avaya Aura 7.0 became available in August 2015 and we’re still getting to know the enhancements to the platform. From what David Lover has seen, those enhancements are beneficial to both the users and the administrators. In this presentation, David will provide his insight on the platform—covering what he sees as the biggest and most useful enhancements and how you can apply them in your environment to cut costs and increase support.
Get a Pretested, Validated Infrastructure
Cisco and NetApp have collaborated to create FlexPod, a prevalidated data center solution built on a flexible, shared infrastructure. This predesigned base configuration can:
Scale easily
Be optimized for a variety of mixed application workloads
Be configured for virtual desktop or server infrastructure, secure multi-tenancy, or cloud environments
Citrix Event "From Data Centre to Delivery Centre" at Kensington Roof Gardens on 11th August 2009.
12:15 - 12:45 More Applications, More Security, More Availability
This September, Eric Inch presented on behalf of Microsoft at the Heartland Technology Summit.
View the slide deck for an overview of Lync, its client, modalities, architecture, phones, peripherals, and more.
And for further information on this or other Lync topics, visit our blog at www.cdhtalkstech.com.
Apresentações | Jantar Exclusivo Cisco e Netapp | 27 de Junho de 2012 | Spett...Softcorp
A Softcorp, em parceria com a NetApp e a Cisco, realizou um jantar especial sobre a tecnologia FlexPod™.
Durante o evento foi possível conhecer os benefícios da solução e tirar dúvidas técnicas, operacionais e consultivas com os especialistas das três empresas.
O momento também foi oportuno para trocar experiências com outros profissionais do setor.
Para descontrair, tivemos uma palestra com boas dicas sobre cortes de carne e os segredos do bom churrasqueiro para garantir o sucesso do churrasco.
MVTS Pro is a high performance class 4 softswitch with SBC functionality - a carrier-grade solution for efficient VoIP traffic management and wholesale peering.
This presentation will help you better understand:
- The Oracle Embedded Value Proposition
- The Oracle Service Bus (OSB) Value Proposition
- The Challenge Of The Extended Enterprise
- Introducing the OSB Appliance (OSBA)
Faced with the dual threats of rising operating costs and declining revenues, network service providers are increasingly turning to network functions virtualization (NFV) to help them keep up with constantly changing market conditions.
In a virtualized Telco environment, service providers can deploy and deliver new network functions, services and capacity on demand—reducing normal rollout time from months and weeks to just hours.
Leveraging the principles of cloud computing, network service providers can deliver a level of responsiveness never before available, easily scaling capacity up or down to meet the evolving needs of their subscribers.
The result is a highly agile system that allows new revenue-generating services to be quickly developed, exhaustively tested and selectively rolled out to targeted groups in a fraction of the time and at a much lower cost than previously thought possible.
In this session, the speaker will present how the solution from Juniper networks look like and how it can be deployed by service provider to improve their agility in delivering services to their customers.
Team-Based Approach to Deploying VDI in Learning EnvironmentsJeremy Anderson
A presentation delivered at the 2013 NERCOMP annual conference. Main focus revolves around building teams to deconstruct silos within IS, academic schools, and between IS and clients.
Anuta Networks at Networking Field Day 14Kiran Sirupa
Anuta NCX is designed to offer multi-vendor network orchestration across a variety of deployments, including campus, data centers, and carrier networks. Case Studies include branch automation with a Tier 1 MSP, enterprise connectivity in a managed data center, and a real world deployment with Telstra Managed Services. Anuta NCX uses a layered model driven architecture that allows for it users to work with services across multiple network vendors. NCX is built to model all of these and reconcile any differences completely autonomously, without the customer having to intervene. Any SLAs or other configuration can be done, as NCX has support standard YANG based orchestration.
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
Agil ist ein Buzzword, viele wissen aber nicht, was wirklich dahintersteckt. In diesem Vortrag erfahren Sie, warum es weder hilft, mal schnell Scrum einzuführen, die Inneneinrichtung eines Büros zu verändern oder einen Tischkicker aufzustellen. Sehen Sie, warum wir uns in der VUCA-Welt anders bewegen müssen und warum Themen wie Kreativität, Haltung und ein geänderter Mindset die Grundvoraussetzung für agiles Arbeiten sind.
Christian Botta war 15 Jahre als Projektmanager und Führungskraft in der IT beschäftigt. 2015 gründete er gemeinsam mit Daniel Reinold die Firma Visual Braindump, mit dem Ziel, die Themen Visualisierung und Management näher zusammenzubringen. Mit Visual Braindump verheiratete er seine beiden Leidenschaften: Zeichnen und Projektmanagement. Heute ist er als Trainer, Coach und Speaker für Projektmanagement, Design Thinking und visuelles Denken unterwegs – sowohl in Präsenztrainings für Digicomp als auch in Videotrainings bei LinkedIn. Ein weiteres Standbein ist die visuelle Begleitung von Veranstaltungen mit Hilfe von Graphic Facilitation bzw. Graphic Recording. Botta schreibt darüber hinaus regelmässig auf dem Visual Braindump Blog und für das Projektmagazin und Capterra.
Sein Buch: Business Visualisierung - ein Reiseführer für Neugierige und Visionäre
https://digicomp.ch/landingpages/personalswiss
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
Die Implementierung mit IPv6 in Container Plattformen wie Docker, Kubernets oder OpenShift bietet einige Möglichkeiten, aber auch Herausforderungen. In seinem Vortrag erklärt Aarno Aukia den aktuellen Stand der IPv6-Implementierung dieser Technologien.
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
Die 7 Phasen des Digital Business Modelling
Wie schaffe ich den digitalen Wandel im Business-Modell? Im Referat zeigt Roger Basler anhand von 7 Phasen, wie der Wandel erfolgreich vollzogen werden kann.
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
Work Smarter Not Harder
Meetup: Work Smart – Digital Collaboration im Unternehmen
Lernen Sie das Potenzial mit der Verwendung von möglichen Smart-Work-Tools innerhalb Ihres Unternehmens kennen und seien Sie für die wichtigsten Anwendungsfälle gerüstet, um den Kulturwandel innerhalb Ihrer Organisation voranzutreiben.
Professor Richard H. Thaler hat Ende 2017 den Wirtschaftsnobelpreis für seine Forschung unter dem Begriff «Nudge - die psychologischen Faktoren, die hinter wirtschaftlichen Entscheidungen stehen» erhalten.
Der Kommunikations- und Marketingexperte Maurice Codourey der Neurokommunikationsagentur UNIT X zeigt eigene Experimente im Spitalwesen und internationale Best Practices.
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
Experte Artur Tomczak zeigte anhand von Praxisbeispielen der verschiedenen responsiven Frameworks auf, wie die nächsten Schritte Richtung Holacracy konkret aussehen könnten.
IPv6-Experte Joe Klein gab uns einen Überblick über den aktuellen Status der IPv6-Sicherheit, typische IPv6-Angriffspunkte, Auswirkungen von Technologien wie Cloud und Blockchain sowie Herausforderungen für effektive IoT-Sicherheitsmassnahmen (Internet of Things). Vor allem im Internet der Dinge, wenn es um Gesundheitsversorgung, selbstfahrende Autos, Flugzeugcockpits, Dämme, Kernkraftwerke und ähnliche kritische Infrastrukturen geht, ist es von entscheidender Bedeutung, dass Sicherheit gewährleistet werden kann.
Kein Command & Control, sondern Servant-Leadership. Flache Hierarchien, intrinsische Motivation, Kundenfokus – jede Firma möchte heutzutage agil sein. Offen bleibt jedoch meistens folgende Frage: «Was bedeutet das für unsere Führungskräfte?»
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
Sachliche Argumente funktionieren im Alltag oft nicht. Erst wer einmal erkannt hat, dass und wie er auf der irrationalen Ebene punkten muss, dem eröffnen sich neue Möglichkeiten bei seinen Mitmenschen
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
Kreatives Chaos ist Quatsch. Kreativität kann hoch systematisch sein und dabei maximal originell. Querdenken macht gute Laune und holt selbst die Neue-Ideen-Belächler, Kreativitätsbekämpfer und Ideen-Kopierer bei ihrer produktiven Laune ab.
Am vergangenen XING Expertendialog zeigte Referent Jiri Scherer von Denkmotor, wie das Ausbrechen aus Denkmustern funktioniert und warum jede Kreativitätsmethode einen roten Punkt hat.
Die digitale Transformation wirkt sich nicht nur auf Prozesse, sondern insbesondere auch auf ganze Geschäftsmodelle von Unternehmen aus.
Roger Basler zeigt in seinem Referat auf, was ein digitales Geschäftsmodell ist und welche Schritte ein Unternehmen tätigen muss, um sich dorthin zu entwickeln. Zentral dabei ist, dass nicht einfach ein bestehendes Geschäftsmodell digitalisiert wird, sondern Unternehmen anfangen im neuen Kundennutzen und Kundenverhalten zu denken.
Gerne stellen wir Ihnen die Slides von Roger Basler zur Verfügung:
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
Die monatlichen Anlässe in Zusammenarbeit mit dem Swiss IPv6 Council behandeln verschiedene technische Themenbereiche von IPv6.
Ist Dual-Stack ein guter Weg? Was sind Erfahrungen mit reinen IPv6-Netzwerken? Viele Unternehmen kämpfen mit diesen Fragen. Genau aus diesem Grund hat Cisco in San Jose einen reinen IPv6-Campus eingerichtet und sucht Antworten auf solche Fragen.
In seinem Referat präsentierte Khalid Jawaid die Bemühungen zur Einführung von IPv6 in einem einzelnen Campusgebäude und die Hürden, die dies mit sich bringt. Im Weiteren sprach er über die Herausforderungen, die sich aus der Erstellung des Business Case im Jahr 2010 und der Bereitstellung von mehr als 400 Remote-Standorten und den daraus gezogenen Lehren ergaben.
Die Inputs von Khalid Jawaid haben bei vielen Teilnehmern neue Perspektiven und Ideen für die Einführung von IPv6 geweckt.
Gerne stellen wir Ihnen die Slides von Manuel Schweizer zur Verfügung:
Vielleicht haben Sie schon einmal ein Zugbillett mit der SBB-App gekauft, per Smartphone eine Doodle-Umfrage verschickt oder in Google Docs eine Textdatei erstellt. Haben Sie sich dabei jemals gefragt, was diese Apps so erfolgreich macht?
Simon Raess, Gründer & Design Strategist bei Ginetta, weiss es. Er war massgeblich an der Kreation genau dieser Produkte beteiligt. Mit seiner Digitalagentur hat er zahlreichen Firmen – darunter Swisscom, Twint und Helsana – zum Erfolg in der digitalen Geschäftswelt verholfen.
In seiner Präsentation am Xing LearningZ vom 4. Juli 2017 zeigte Simon Raess, wie gutes UX Design nicht nur dafür sorgt, dass Webistes und Apps schön aussehen, sondern wie es digitale Produkte auch nachhaltig erfolgreich macht. Sehr spannend war auch der Einblick in die systematische Arbeitsweise, welche zu benutzerfreundlichem Design führt.
Design Thinking ist in aller Munde. Aber was ist Design Thinking denn nun genau? Lernen Sie in dieser Session die agile Innovationsmethode der Stanford University anhand eines kleinen Praxisbeispiels kennen. Tauchen Sie ein in die Welt der Kunden, generieren Sie Lösungsansätze und Prototypen. Ein interaktiver Kurzworkshop mit vielen Erkenntnissen.
Dieser Event des Swiss IPv6 Council befasste sich mit dem spannenden Case der ETH Zürich. Dort sind die IPV4-Adressen schon seit Jahren knapp.
Derk Valenkamp, Gruppenleiter der ID-Datennetze der ETH Zürich, zeigte auf, was er und sein Team seit 2007 unternommen haben. So mussten und müssen daher immer mehr NAT/PAT-Lösungen implementiert werden, die aus betrieblicher und Sicherheitssicht grosse Anforderungen an das Logging stellen. Damit die Netzwerkanforderungen auch langfristig das Wachstum der ETH Zürich und deren IT erfüllen können, wird schon seit Jahren auf IPv6 gesetzt. Besonders spannend für die engagierten Teilnehmer waren auch die Stolpersteine und Hürden, welche Derk Valenkamp aufgezeigt hat.
Gerne stellen wir Ihnen die Slides von Derk Valenkamp zur Verfügung.
Berät Sie bald ein Bot über die neusten Winterschuhe, weil Ihr Handy festgestellt hat, dass Sie zu kalte Zehen haben, wonach eine Drohne das Schuhwerk an Ihren über GPS georteten Standort fliegt?
Roger Basler ging in seinem Referat vom 2. Mai 2017 auf Trends und einige bereits existierende Pilot-Versuche ein. Seine Einschätzung der Wahrscheinlichkeit des Impacts dieser Trends auf unser Online-Shopping-Verhalten soll nicht in erster Linie die Wahrheit widerspiegeln, sondern die Basis für eine gute Diskussion und den Erfahrungsaustausch untereinander legen.
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
Zahlen & Fakten zur Entwicklung des Werbemarkts Schweiz: Michael Göldi (Digital Focus) & Michel Bächtiger (Media Focus) kreuzen die Klinge und klären die Frage aller Fragen: klassische Werbung oder Online-Werbung? Mögen die besseren Daten-Fakten gewinnen!
Zeit für ein Privacy-Programm. Datenschutz-Entwicklung in Europa (GDPR) und das neue Datenschutzgesetz in der Schweiz: Was bedeutet das für mein Unternehmen?
In diesem Referat zeigten wir Ihnen auf, was die Entwicklung des Datenschutzes in Europa für uns bedeutet und was auf die Schweiz zukommt.
Im Mai 2018 tritt die EU Datenschutz-Grundverordnung (GDPR – general data protection regulation) in Kraft. Über die enthaltenen Neuerungen wurden bereits in verschiedenen Veranstaltungen berichtet. An diesem Referat gaben wir Ihnen als Erstes eine kurze Zusammenfassung der Geschehnisse zur Orientierung.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
4. Branch Repeater 6.0
General Availability: RTW June 27th
The next generation of Branch Repeater Technology
Advanced traffic classification, prioritization, shaping and
reporting
Improved XenDesktop and XenApp acceleration
Clustering via NetScaler
SMB 2, Encrypted MAPI and Outlook/Exchange 2010
Acceleration
Centralized licensing – Citrix License Server
5. WAN
Optimization
Adaptive Adaptive
Adaptive Smart
TCP Protocol
Compression Acceleration
Flow Control Acceleration
WAN
Branch Repeater Repeater
6. Smart
Service-centric WAN Optimization Acceleration
… Not just network-centric WAN optimization
Assess
• Assess and identify all services
• Classify 500+ services out-of-the-box
• Control bandwidth allocation,
compression, shaping and enforcement
Remediate Classify • Monitor services delivery and report
• Sense network conditions, remediate
and respond; minimize help desk calls
Monitor Control
7. SmartAcceleration for Deeper Visibility and Granular Control
XenApp
• Visibility for 500+ apps and protocols out-of-
the-box, + more custom
Voice, Video
100010100001110 000111000 • Prioritize XenDesktop, multimedia, web and
0011100011101001110111000 Windows apps, custom services
XenDesktop
1001100110011101000011000 • Auto-detect and auto-configure XenDesktop;
no changes to network or XenDesktop
MicrosoftApps
• Prioritize by app, branch or user location,
File, Print app type, protocol, traffic direction, more
8. Smarter, Granular Prioritization Policies
Global Datacenter
SF NY London Beijing Partner Office
Branch Lo pri Med pri Med pri Hi pri Med pri
Service Class Video XenDesktop
Med pri Hi pri
Sub-class Citrix TV YouTube Exec XDs Employee XDs
Hi pri Lo pri Hi pri Lo pri
9. User-centric XenDesktop Prioritization
Branch Office XenApp Data Center
Sales Product Voice, Video
100010100001110 000111000
0011100011101001110111000
XenDesktop
1001100110011101000011000
MicrosoftApps
Executive File, Print
Prioritize different types of
Prioritize published apps and
traffic (mouse, print, etc)
desktops by user groups
across user sessions
10. Faster Encrypted Email and File Transfers
Branch Office Data Center
100010100001110 000111000
0011100011101001110111000
1001100110011101000011000
Microsoft email (Encrypted MAPI Microsoft file servers
Layer 7 optimizations and Exchange 2010) (SMBv2, Signed SMB v1/v2)
11. Platform Support and Upgrades
• Initial Branch Repeater 6.0 release is intended for Linux-based
appliances and VPX appliances on XenServer and VMWare.
• The same update file downloaded from MyCitrix will work for
both platforms.
• The Repeater Plug-In 6.0 release will follow soon after the
Capri release.
• The Branch Repeater with Windows Server will be updated
with the BR 6.0 technology in a subsequent release.
12. Branch Repeater Product Family
Flexibility to Meet All Your Needs
Branch Repeater VPX
Repeater Branch Repeater with – Virtual Appliance
Repeater Plug-in –
Appliances Windows Server Software
Software Client
BR 6.0 Coming Coming BR 6.0
Initial Later… Soon… Initial
Release Release
14. First things first…
apA1 apA2
• Branch Repeater 6.0 needs to know
where the LAN and WAN are.
• Determine and remember which
accelerated pair port is connected to
the WAN and which to the LAN.
•Switch •Router
(inline mode) •DSL Modem
Straight
Through Cable
Crossover
Cable •Direct to Server
•Cable Modem •Direct to Client
• Either port can be connected to
either side using the proper cables.
apA1 apA2 apA1 apA2
15. New Quick Installation Page
• Click the Quick Installation node in
the Command menu.
• This page is a collection of all the
configuration steps condensed into
one simple form.
16. New Quick Installation Page
• The Quick Installation is intended
for simple Branch Repeater
deployments.
• If any of the following are needed, a
manual configuration is required;
• Virtual Inline Mode
• WCCP Deployment Mode
• Group Mode
• High Availability
• SSL Acceleration
• Repeater Plugin Support
• Hardboost Bandwidth Mode
• Encrypted SMB or MAPI Support
17. New Quick Installation Page
• Enter all the required information
and click the Install button.
• Once completed, the appliance will
reboot and then you should see
successful traffic flow in the
Dashboard.
18. Branch Repeater Licensing
• Click the Licensing node in the
Configuration menu.
• Chose the License Server tab if
your license requires using a
stand alone Citrix License
server.
• Retail (Appliance, Plug-in, Crypto)
• XenDesktop Platinum Entitlement
• Chose the Local Licenses tab if
your license type required local
installation.
• Evaluation License
• Not for Re-sale
• Express
19. Must configure the default apA links
• Click on the Links node in the
Configuration menu.
• Click the Edit button for the first pre-
defined apA link.
• Configure the link according to
network it is connected to;
• Link Type (LAN of WAN side)
• Bandwidth In
• Bandwidth Out
• Descriptive Link Name (optional)
• Click Save.
• Repeat this configuration on both the
apA1 and apA2 links.
20. Branch Repeater Features page
• Traffic Processing
• Master enable/disable switch. When disabled, all features of the Appliance are disabled and all
traffic passes through without modification or traffic shaping
• Traffic Acceleration
• enables and disables the acceleration engine
• Traffic Shaping
• enables and disables the traffic-shaping engine
• Traffic Bridging (VPX Only)
• Enable / Disable the software bridge, default for new installs is disabled
Citrix Confidential - Do Not Distribute
21. Traffic Processing and Acceleration
• Branch Repeater can ne
installed in a “monitoring-only”
mode
• No compression, flow control
or traffic shaping will be used,
however full traffic visibility will
be available.
• Use the Features node in the
Command Menu to disable;
• Traffic Acceleration
• Traffic Shaping
.
22. Bandwidth Management
• Link level In / Out - Regulates all traffic, accelerated as well as non-
accelerated
• Bandwidth Management – Regulate only accelerated traffic, effects
inbound traffic only
• Recommended configuration – Use local WAN link sizing
Citrix Confidential - Do Not Distribute
26. Quality of Service in v5.7 and prior releases
• Five queues (Named “A” though “E”.
Names can be changed)
• All traffic is assigned to Queue A by
default Service Classes
• Each Service Class can be assigned to a
one traffic queue.
ICA Packet Bandwidth
• Each queue determines the minimum Priorities
QoS Queues
Allocations
bandwidth allocation when bandwidth
contention with a higher queue occurs.
• ICA Packet priorities are mapped to
Acceleration
quality of service (QoS) queues.
Engine
27. Quality of Service – The Basics of Traffic Shaping
• All WAN traffic is subject to traffic shaping
• Accelerated connections, non-accelerated connections, non-TCP traffic such
as UDP flows, GRE streams, etc.
• The algorithm used is weighted fair queuing
• Every connection is assigned a weight based on the appliance’s policies
between 1 and 256.
• Traffic shaping is applied to the WAN in both inbound and outbound after the
compression engine
• Weighted priorities are applied during bandwidth contention to both ingress and
egress traffic even when the other side of the link is not equipped with QoS.
• DSCP Is fully supported both as a classifier and an
enforcer
• More information in Branch Repeater Traffic Shaping
technology can be found here
http://www.citrix.com/skb/articles/RDY4005
28. Quality of Service in v6.0 - Configuration
• Quality of Service is applied using 4 mechanisms.
• Links: Tells the traffic shaper which WAN link the packet is using. In a site with
multiple link, each link has its own bandwidth limits and is managed independently.
• Application Classifiers: Identify and determines which protocol or application
class traffic belongs to.
• Traffic Shaping Policies: Tell the traffic shaper weighted priority and bandwidth
limits to assign to which traffic type (application classifier).
• Service Classes: Map applications to acceleration decisions, traffic filters and
traffic-shaping policies.
29. Quality of Service
Data Center 1
Link Definition
• Links : Physical or Logical XenApp Traffic Link
• WAN connections between remote sites.
• WAN links between datacenters and branches.
• WAN links between cities or countries.
• WAN data paths between branches and specific
servers or server farms.
Data Center 2
Branch 1
Streaming Traffic Link
DC1 Link
DC2 Link
30. Quality of Service
Link Definition
• Define Links
• By Accelerated Port
• By Source or Destination Network
• By WCCP Service Group
• By Source or Destination MAC Address
• By VLAN Tag
• By default link definitions are automatically
created for each adapter port.
• The number of supported links are limited
by Branch Repeater model:
• 83xx, 85xx = 5 links
• 88xx = 10 links
• VPX = up to 5 links
• If Links are misconfigured there will be
compression values less than 1:1.
31. Quality of Service
Traffic Shaping Policies
• By default there are 10 pre-configured traffic
shaping policies. (subject to change)
• VOIP Traffic
• High Priority Traffic
• Medium Priority Traffic
• Low Priority Traffic
• Default QoS
• ICA Priorities
• Each traffic shaping policy has a weighted
priority value associated with it.
• The maximum number of traffic shaping
policies supported is 50 per appliance.
32. Quality of Service
Traffic Shaping Policies
• Weighted Priority is used to
determine traffic precedence
when calculating send and
receive rates.
• And.. Or…
Bandwidth limits can also now used
to control allocation.
• Percentage of Link Bandwidth
• Absolute Fixed Date Rate.
• Even within an SSL tunnel !!*
*Citrix Patent Pending
33. Quality of Service
Application Classifiers
• Application classifiers are used by
service classes to distinguish between
application traffic types.
• Applications are classified by:
• Ethertype not all competitors can do this
• IP Classification (TCP, GRE, L2TP, etc)
• TCP Port
• UDP Port
• Web URL
• ICA Published App not all competitors can do this
• Application classifiers are categorized
into 1 of 25 Application Groups
34. Quality of Service
Application Classifiers
• Custom application classifiers can be
created.
• The maximum number of classifiers
supported is 600 per appliance.
• The classification parameters entered
cannot conflict with an existing classifier.
35. Quality of Service
Application Classifiers – XenApp and XenDesktop
• ICA Published Applications or
Desktops groups can be manually
created or auto-discovered.
• Once discovered, they will appear in
the application classifier list as well as
in all reports and monitoring pages.
• Temporarily enabling and then
disabling auto discovery can be used
to prepopulate the online applications
list for editing or exporting at a later
time.
36. Quality of Service
Service Classes in v5.7 and prior
• Service Classes in Branch Repeater
5.7 and prior releases identified
traffic two possible ways:
• IP address/range (client or server)
• TCP port number
• Service Classes were evaluated in
order with mirrored policies required
on all appliances.
• If Service Classes did not match on
both appliances with an acceleration
pair, those connections would pass
through un-accelerated (UR Code 6).
37. Quality of Service
Service Classes in v6.0
• Service Classes are the main
QoS mechanism, bringing
together:
• Traffic Shaping Policies
• Application Classifiers
• Link Configurations
• Service Classes are evaluated
in order with policies higher in
the list having priority over ones
lower.
• Service classes need to exist
but not be mirrored on all
appliances; will result in lowest
common setting being used.
38. Quality of Service
Service Classes
• Service Classes are still used to
enforce bandwidth priority among
traffic types however now map to
Traffic Shaping Policies instead of
QoS Queues.
• Traffic Shaping Policies within a
Service Class can be applied by:
• Single Traffic Shaping Policy per Single
Service Class
• Per-link Traffic Shaping Policies per Single
Service Class
• The maximum number of
supported Service Classes is 64
per appliance.
39. Quality of Service
Service Classes
• Service classes can use AND rules
as well as OR rules.
• Rules can include any and all of
the following filters:
• Application Name
• Source IP
• IP sync/direction AND
• Destination IP
• VLAN Tag
• DiffServ bit
OR
• SSL Profile
• The maximum number of Service
Class Filter Rules supported is 10
per Service Class.
42. SMB Support in v5.7
• Branch Repeater 5.7 and earlier
supported compression and
acceleration of unsigned SMB1
traffic only.
• If enabled, Signed SMB had to be
turned off on servers and clients via
group policy to enable acceleration.
• Connections from Vista and Win7
clients had SMB2 connections
rolled back to SMB1.
Citrix Confidential - Do Not Distribute
43. SMB Acceleration in v6.0
• There are three SMB acceleration
scenarios you may observe when
monitoring SMB CIFS connections.
• Unaccelerated SMB 1 or 2 Connections
• Accelerated SMB 1 or 2 Connections
• Accelerated Signed SMB 1 or 2 Connections
Citrix Confidential - Do Not Distribute
44. SMB Acceleration Requirements
• There are three SMB acceleration
scenarios you may observe when Connection Secure Windows NTLMv1
monitoring SMB CIFS connections. Type Partner Domain Required
Member
• Unaccelerated SMB 1 or 2 Connections
• Accelerated SMB 1 or 2 Connections SMB 1 No No No
• Accelerated Signed SMB 1 or 2 Connections
SMB 2 No No No
Signed SMB 1 Yes Yes Yes
Signed SMB 2 Yes Yes Yes
Citrix Confidential - Do Not Distribute
45. SMB Acceleration Requirements
• Domain membership is only required on
the server-side Branch Repeater.
• Once joined, the appliance or VPX
should now have a machine account in
the specified domain.
• NOTE: Signed SMB is not enabled yet!
46. SMB Acceleration Requirements
• A secure connection must be
established between Branch
Repeaters (secure partners).
• SSL credentials (cert and key) are
used for authentication and trust
between Branch Repeaters.
• The SSL Key Store must be enabled
to hold the SSL credentials used by
the Branch Repeaters.
• A Crypto license is required to enable
the SSL feature set.
Citrix Confidential - Do Not Distribute
47. SMB Acceleration Requirements
• SSL Support must be enabled by
clicking the SSL Encryption node
under Configuration.
• Trusted SSL credentials must be
installed and used to authenticate all
Branch Repeaters and create a
secure data channel between them.
Citrix Confidential - Do Not Distribute
48. SMB Acceleration Requirements
• The Secure Partner connection is
configured on a per appliance basis.
• A signaling mechanism is used to
provide discovery and communication
between trusted appliances.
Citrix Confidential - Do Not Distribute
51. ICA Review – Virtual Channels
What is an ICA Virtual Channel?
A Citrix Independent Computing Architecture (ICA) virtual
channel is a bidirectional connection for the exchange of
generalized packet data between a Citrix XenApp Server and
a ICA compliant client.
Virtual channels correspond to virtual drivers; each
providing a specific function. Some are required for normal
operation, and others are optional.
Virtual drivers operate at the presentation layer protocol
level. There can be a number of these protocols active at any
given time by multiplexing channels.
There are a total of 32 virtual channels in the ICA protocol.
However for most user sessions, between 8 -12 are usually
utilized.
52. ICA Priority Packet Tagging
• ICA Priority Tagging consists of a two bit tag within each ICA packet header.
• These tags can be evaluated on the fly and the application activity determined.
• Earlier versions of MetaFrame use a framing header that does not contain the two priority bits.
53. Channel Name Default Priority Description Virtual Driver
CTXTW 0 Remote Session Screen Update (THINWIRE) vdtw30n.dll
Virtual Channels CTXTWI
CTXTWN
0
0
Seamless Windows Screen Update (THINWIRE)
Winstation
vdtwin.dll
wfica32.exe
CTXEUEM 0 End User Experience Monitoring vdeuemn.dll
CTXZLFK 0 Local Text Echo and Keyboard Feedback vdzlcn.dll
CTXZLC 0 Speed Screen Latency Reduction - Screen vdzlcn.dll
CTXZLFK 0 Speed Screen Latency Reduction - Fonts vdfon30n.dll
CTXCTL 0 ICA Session Control vdctln.dll
CTXFLSH 1 Multimedia - Flash vdflash.dll
CTXGUSB 1 USB Redirection vdgusbn.dll
CTXMM 1 Multimedia - Streaming vdmmn.dll
CTXCLIP 1 Client Clipboard Mapping vdclipn.dll
CTXCAM 1 Client Audio Mapping vdcamN.dll
CTXLIC 1 License Management wfica32.exe
CTXVFM 1 Video Server – (no longer used) n/a
CTXPN 1 Program Neighborhood vdpnn.dll
CTXCCM 2 Client COM Port Mapping vdcom30N.dll
CTXCDM 2 Client Drive Mapping vdcdm30n.dll
CTXPASS 2 Transparent Key Pass-Through vdkbhook.dll
CTXCPM 3 Printer Mapping for Spooling Clients vdcpm30N.dll
CTXCM 3 Client Management (Auto-Update) vdcmN.dll
CTXLPT1 3 Legacy LP1 Port Mapping wfica32.exe
CTXLPT2 3 Legacy LPT2 Port Mapping wfica32.exe
CTXCOM1 3 Legacy COM1 Port Mapping wfica32.exe
CTXCOM2 3 Legacy COM2 Port Mapping wfica32.exe
54. ICA QoS in BR 5.7
ICA Priority Packet Tagging allows
prioritization of ICA sessions based
on the virtual channel data being
transmitted. (what the user is doing within the
app/session)
This is done by associating each
virtual channel’s two-bit priority to a
packet priority.
The two priority bits combine to form
four priority values:
00 (0) - High Priority
01 (1) - Medium Priority
10 (2) - Low Priority
11 (3) - Background Priority
These priority bits can then be assigned
to Branch Repeater Quality of Service
queues to allow dynamic QoS.
55. ICA QoS in BR 6.0 (Single Stream)
ICA Priority Packet Tagging allows
prioritization of ICA sessions based
on the virtual channel data being
transmitted. (what the user is doing within the
app/session)
This is done by associating each
virtual channel’s two-bit priority to a
packet priority.
The two priority bits combine to form
four priority values:
00 (0) - High Priority
01 (1) - Medium Priority
10 (2) - Low Priority
11 (3) - Background Priority
These priority bits can then be assigned
to Branch Repeater Quality of Service
queues to allow dynamic QoS.
56. The Single Stream ICA Problem
compressed and encrypted ICA data
•The user creates an ICA session.
•User interface traffic is tagged with a
priority bit of zero (thin wire).
•Branch Repeater identifies the priority
tags in real time and applies QoS
appropriately.
Session Bandwidth
57. The Single Stream ICA Problem
compressed and encrypted ICA data
•The user then starts a print job within
the ICA session.
•Print traffic is tagged with a priority bit
of three (real time).
•Branch Repeater identifies the new
priority tags in real time and applies
QoS appropriately.
Session Bandwidth
58. The Single Stream ICA Problem
compressed and encrypted ICA data
•The user then either returns to the app’s user
interface or starts a second application. (thin wire)
•The new observed priority bits of the session
cause the session to be QoS’ed as a priority zero.
•Prioritization of printing traffic is now lost.
Session Bandwidth
60. Channel Name Default Priority Description Virtual Driver
CTXTW 0 Remote Session Screen Update (THINWIRE) vdtw30n.dll
Virtual Channels CTXTWI
CTXTWN
0
0
Seamless Windows Screen Update (THINWIRE)
Winstation
vdtwin.dll
wfica32.exe
CTXEUEM 0 End User Experience Monitoring vdeuemn.dll
CTXZLFK 0 Local Text Echo and Keyboard Feedback vdzlcn.dll
CTXZLC 0 Speed Screen Latency Reduction - Screen vdzlcn.dll
CTXZLFK 0 Speed Screen Latency Reduction - Fonts vdfon30n.dll
CTXCTL 0 ICA Session Control vdctln.dll
CTXFLSH 1 Multimedia - Flash vdflash.dll
ICA Stream #1 CTXGUSB 1 USB Redirection vdgusbn.dll
CTXMM 1 Multimedia - Streaming vdmmn.dll
CTXCLIP 1 Client Clipboard Mapping vdclipn.dll
ICA Stream #2
CTXCAM 1 Client Audio Mapping vdcamN.dll
CTXLIC 1 License Management wfica32.exe
ICA Stream #3 CTXVFM 1 Video Server – (no longer used) n/a
CTXPN 1 Program Neighborhood vdpnn.dll
CTXCCM 2 Client COM Port Mapping vdcom30N.dll
ICA Stream #4 CTXCDM 2 Client Drive Mapping vdcdm30n.dll
CTXPASS 2 Transparent Key Pass-Through vdkbhook.dll
CTXCPM 3 Printer Mapping for Spooling Clients vdcpm30N.dll
CTXCM 3 Client Management (Auto-Update) vdcmN.dll
CTXLPT1 3 Legacy LP1 Port Mapping wfica32.exe
CTXLPT2 3 Legacy LPT2 Port Mapping wfica32.exe
CTXCOM1 3 Legacy COM1 Port Mapping wfica32.exe
CTXCOM2 3 Legacy COM2 Port Mapping wfica32.exe
61. Multi-Stream ICA Terminology
• Single-port, Multi-stream ICA (MSI Default)
• 4 random ports at client, 1 primary port on server
• Automatically enabled on ICA server by Branch Repeater 6.0.
• Multi-port, Multi-stream ICA
• 4 random ports at client, 1 primary and up to 3 secondary ports on server
• Most common deployment if used without Branch Repeater
• Single-port, Single-stream ICA
• 1 random port at client, 1 primary port on server
• The pre-MSI default connection type
• If any Branch Repeater on the link vetos MSI, or old versions used
Citrix Confidential - Do Not Distribute
62. Enable MSI on ICA Server
Citrix Confidential - Do Not Distribute
63. Enable MSI on Branch Repeater
For backward compatibility, MSI is disabled by default on
Branch Repeater, XenDesktop and XenApp
Citrix Confidential - Do Not Distribute
64. Up to 4 TCP connections for a single ICA application
This is the first view that MSI is working as expected
Citrix Confidential - Do Not Distribute
65. How MSI streams are identified
Under Monitoring Citrix (ICA/CGP)
ICA Statistics ICA Session Count
If MSI is active and connected, Multi Stream
counter will be non-zero
Citrix Confidential - Do Not Distribute
66. What is the competitive advantage
• Only Branch Repeater can parse a single port/multi-stream
ICA connection and apply QoS appropriately.
• The benefits:
• Lower overhead on the network and server infrastructure
• Works on standard ICA (CGP) ports, does not require Firewalls reconfiguration
• Hassle-free, automated IT administration
• In all other cases, you get multi-server port MSI or single-
stream ICA
Citrix Confidential - Do Not Distribute
67. Multi-Stream ICA in Action
compressed and encrypted ICA data
•Application UI performance level is maintained.
•Printing traffic does not adversely affect this or
any other WAN users.
Session 1 GUI Session 1 Printing Session 2 GUI
70. The New Dashboard
• The Branch Repeater Admin
Console now has a landing
page called Dashboard.
• The Dashboard can be
automatically refreshed as well
as manually refreshed by
clicking the Refresh button.
• The sections that are displayed
and the refresh rate can be
customized also buy clicking
the Customize button.
Citrix Confidential - Do Not Distribute
71. The New Graphs and Tables
• Branch Repeater has a new
graphing and statistics
rendering engine.
• Graphing options include
• Pie Charts
• Stacked Area Graphs
• Line Graphs
• Dynamic bar graphs
• Data and statistics can be
displayed in tables with
hyperlinked cells for data drill
down.
72. The New Graphs and Tables
• Branch Repeater has a new
graphing and statistics
rendering engine.
• Graphing options include
• Pie Charts
• Stacked Area Graphs
• Line Graphs
• Dynamic bar graphs
• Data and statistics can be
displayed in tables with
hyperlinked cells for data drill
down.
73. The New PDF Reports with Historical Data
• Generating reports now
produces a multi-page PDF
document that can be saved
or printed.
• Graphs displayed in reports
are determined by the graph
display settings within the
Admin console.
• Reports can include
historical data as well as
can be run as a aggregate
or drill down report.
• (more on this later)
74. The Monitoring Pages
• The Monitoring pages are now
listed in a collapsible Monitoring
node, and listed alphabetically.
• Changes, enhancements or
additions have been made to the
following monitoring pages:
• Connections
• Filesystem (CIFS/SMB)
• Citrix (ICA/CGP)
• Secure Partners
Citrix Confidential - Do Not Distribute
75. Monitoring Changes
• The Connections page now used
a tabular interface with separate
tabs for Accelerated and non-
accelerated connections.
• Connection filtering can now be
done by Service Class.
• The connections lists now have
customizable columns.
76. UR:0 NONE "internal (accelerated)"
UR:21 OUT_OF_SOCKETS "too many proxy connections: failed to allocate a socket"
UR:1 UNKNOWN "unknown"
UR:2 NO_ORBITAL "no partner unit detected"
"routing asymmetry detected: not all packets are going through this UR:22 NO_HANDSHAKE_SEEN "no initial TCP handshake seen"
UR:3 NO_SYN_SEEN
unit"
"a different member of the appliance group accelerates this
"routing asymmetry detected, not all packets are going through this UR:23 GROUP
connection"
UR:4 NO_SYN_ACK_SEEN
unit, (no SYN-ACK seen)"
"not enough room left in the TCP packet header to append unit UR:24 NO_AUTO_DISCOVERY "auto-discovery disabled"
UR:5 NO_SPACE_FOR_OPTIONS
specific options"
UR:6 POLICY "service policy rule" UR:25 GROUP_PASSTHROUGH "acceleration disabled in group mode"
UR:7 PORT_EXCLUDE "acceleration port include or exclude list"
UR:8 IP_EXCLUDE "acceleration ip address include or exclude list"
EDGE_CONNECTION_WITH_ "appliance received an Citrix Acceleration Plug-in connection
"one unit is configured with softboost mode and the other with UR:26
UR:9 MODE_MISMATCH BAD_VIP with wrong destination VIP"
hardboost mode"
UR:10 MAX_CONNECTIONS_LIMIT "maximum number of accelerated connection reached" NO_CONNECTION_TO_APPLI
UR:27 "no connection to appliance"
ANCE
MAX_SYN_TRIES_EXCEED "could not connect to the destination when unit specific options UR:28 INCORRECT_MODE "Transparent connection at an appliance in redirector mode"
UR:11
ED were appended to the tcp packet"
"could not connect to the destination when unit specific options UR:29 CLIENT_RULES "client rules disallow acceleration"
UR:12 DONT_PROBE were appended to the tcp packet, but connection without such
options succeeded" NO_SIGNALING_CONN_TO_C
UR:30 "no signaling connection to client"
LIENT
UR:13 ORBS_ON_BOTH_SIDES "this unit is between two other units and daisy-chaining is enabled" ISA_CACHED_LOCAL_CONNE
UR:31 "ISA cached local connection"
CTION
UR:14 MAX_FAST_FLOWS_LIMIT "maximum number of simultaneous partner units reached" ISA_NAT_INITIATED_LOCAL_
UR:32 "ISA NAT local connection"
CONNECTION
UR:15 BAD_LOCAL_SRC_IP "no proxy entry for source IP address is configured" MAX_ACTIVE_CONNECTIONS
UR:33 "maximum number of active accelerated connection reached"
_LIMIT
UR:16 SIMULATION_MODE "unit runs in simulation mode"
SYN_ACK_WITHOUT_OPTION
UR:34 "a syn-ack was received without options"
"connections with this TCP port are not allowed to be accelerated S
UR:17 PORT_LIMIT_LICENSE
by the license" SSL_VPN_CONNECTION_REF "an ssl VPN is causing packets to transverse the Acceleration
UR:35
LECTING_TRAFFIC Plug-in multiple times"
UR:18 BAD_PROXY_CONFIG "bad proxy configuration detected on the partner unit"
UR:36 APPLIANCE_IS_ON_LAN "Appliance/Client are on the same LAN",
"bad proxy configuration detected, acceleration for connections
UR:19 PROXY_EXLUDED_PORT with this source or destination TCP port is disabled by port include APPLIANCE_SIGNALING_CON
or exclude list" UR:37 "Signaling connection to partner appliance"
NECTION
CACHED_LOCAL_CONNECTI
UR:20 PROXY_LOOP "bad proxy configuration detected: there is a loop" UR:38 "HTTP Cached Local Connection"
ON
77. The Reporting Pages
Admin console reporting has been re
written and organized into the Reports
node.
The aggregate reports available are:
• Compression
• LAN vs. WAN Traffic
• Link Usage
• Service Classes
• Top Applications
• Traffic Shaping
• Within each of these aggregate report
views, several drill down reports are
available in addition to all PDF reports.
78. Report Creation Example
• The Top Applications report breaks out total
throughput and relative bandwidth usage by
application and optionally by link for both send
and receive traffic.
• Report windows range from the last minute to
last month, as well as since last appliance
restart.
• Up to 10 applications can be reported on at a
time, while being displayed in either line
graphs or stacked area graphs.
• Click Customize allows you to select specific
links as well as the number of applications to
report on.
79. Report Creation Example
• Clicking on the Active Applications tab
displays a list of all identified
application and service traffic (TCP
and UDP) at the current moment.
• Clicking Customize allows the
specifying if configured Links to report
on.
• Then clicking an application name
hyperlink displays application specific
link usage for send and receive traffic.
80. Report Creation Example
• Clicking on the Active Applications tab
displays a list of all identified
application and service traffic (TCP
and UDP) at the current moment.
• Clicking Customize allows the
specifying if configured Links to report
on.
• Then clicking an application name
hyperlink displays application specific
link usage for send and receive traffic.
81. Report Creation Example
• Click the PDF Report
button to generate a
report isolating that
application only.
82. Configuration – Refresh and Clear
• Clicking on the Administrator Interface
node under Configuration accesses all
GUI access and display related
settings.
• Enabling and disabling of graphs,
graph combinations, and refresh rates
are all controlled here.
• Clicking on the Clear Statistics node
under System Maintenance accesses
the clearing of link, application, traffic
shaping and service class statistics.