SlideShare a Scribd company logo
F5’s VMware Horizon View 
Reference Architecture 
Peter Silva 
Sr. Technical Marketing Manager
How Many? 
HOW MANY DEVICES 
DO YOU CARRY? 
The average person 
carries 2.9 devices* 
Companies Consolidating 
Devices 
People Accumulating Devices 
© F5 Networks, Inc 2
VDI – The Reasons Why 
Drivers for desktop/application virtualization, thin client, or blade PC 
technologies? 
10% 
16% 
14% 
11% 
23% 
22% 
21% 
21% 
20% 
27% 
48% 
48% 
45% 
46% 
43% 
53% 
51% 
55% 
55% 
0% 
38% 
36% 
Q3 2012 
Q3 2011 
Supporting employees to work from 
anywhere 
Increasing manageability, patching 
Lowering costs 
Providing flexible remote access 
Disaster Recovery 
Better security 
Improving compliance 
Reducing PC energy consumption 
Supporting access for tablets 
BYOPC Programs 
Enable Apple Mac computers 
Base: 981 (2011) & (2012) North American and European IT decision-makers 
Source: Enterprise and SMB Hardware Survey, North America and Europe, Q3 2011 & Q3 2012 
© F5 Networks, Inc 3
© F5 Networks, Inc 4
© F5 Networks, Inc 5
© F5 Networks, Inc 6
Horizon View 
Complete desktop and application virtualization 
Horizon View Horizon Mirage Horizon Workspace 
Centralized layered image 
management for local deployment 
+ HORIZON SUITE 
Intelligent Services Framework 
Secure • Fast • Available 
Multi-device workspace 
VM 
VDI 
Horizon View 
Horizon Mirage 
Horizon 
Workspace 
for IT services 
Complete desktop and 
application virtualization 
Anywhere, any service, any device Intelligent Dynamic, agile, adaptive 
Support for VMware validated solutions 
• Mobile Secure Desktop 
• Business Process Desktop 
• AlwaysOn Desktop 
• Branch Office Desktop 
Intelligent traffic management and 
security 
• Local and global traffic management 
• Multi-site and multi-pod deployments 
• Access management and data center 
firewall 
Unique F5 solutions 
• Single Namespace 
• Username Persistence 
• Native PCoIP Proxy 
• CAC Support 
© F5 Networks, Inc 7
Complex 
User devices VMware Horizon View 
Virtual desktops 
& apps 
Fragmented application access and policy management 
Load Balancer View Security 
Servers 
Firewall View 
Connection 
Servers 
User experience impacted 
by latency, lack of 
persistence, poor 
reliability 
Firewall 
© F5 Networks, Inc 8
Simple 
External View Clients 
VMware Horizon View 
• Secure VDI 
• Advanced AAA & Endpoint security 
• Traffic management 
• Scalable –200,000 concurrent users 
• Offload/replace Security Server 
BIG-IP Access Policy 
Manager 
APM 
TCP 443 
UDP 
4172 
Internal 
Connection 
Servers 
Desktops 
Logging/Reporting 
TCP 80 
TCP 80 TCP/UDP 4172 
DMZ 
SSL Decryption 
Authentication 
High Availability 
PCoIP Proxy 
APM 
Authentication Internal View Clients 
Logging/Reporting 
INDUSTRY FIRST HARDENED SECURITY INCREASED SCALABILITY SIMPLIFY VIEW VDI 
© F5 Networks, Inc 9
Consolidate 
© F5 Networks, Inc 10
Easy 
iApp for VMware View 
Configure network for VMware View automatically 
• Admin answers simple, goal-based questions 
• iApp for VMware View configures network based on Admin’s input 
Benefits 
• Faster (minutes instead of days) 
• Reduces errors 
• Replicates to groups of servers easily 
BIG-IP 
Are You Using VMware 
View Security 
Servers? 
© F5 Networks, Inc 11
Efficient 
Desktop 
Laptop 
Smartphone 
Tablet 
© F5 Networks, Inc 12
Enabling 
Scenario Functionality Value 
L2TP SSL and VPN, AAA 
functionality 
Secure access to View servers over public 
networks. Replaces View Security Server and 
removes Windows from the DMZ. 
Load balancing, policy and 
global traffic management 
Scale View when multiple Connection Servers 
are required. 
Global Load Balancing Route View traffic globally. 
User Name Persistence Faster session login and restoration without re-opening 
applications. 
SECURITY & FIPS 
COMPLIANCE 
SYSTEM 
SCALABILITY 
MULTIPLE 
DATA CENTERS 
PERFORMANCE 
© F5 Networks, Inc 13
Why F5 for View? 
Increased 
Scalability 
Increased 
Availability 
Strengthened 
Security 
Simpler Architecture to 
Manage 
Engineered Specifically 
for View 
Easier for 
End Users 
© F5 Networks, Inc 14
Options 
Description List Price 
per unit 
24x7 
Support 
Throughput Concurrent 
SSL VPN 
Users 
Concurrent 
VDI "Access" 
Users 
BIG-IP Virtual Edition: View 
special APM (5M) 
$ 95 Self Service 5M 10 10 
BIG-IP Virtual Edition: View 
special APM (25M) 
$ 2,000 24% of list 25M 10 50 
BIG-IP Virtual Edition: View 
special APM (200M) 
$ 4,000 24% of list 200M 10 250 
BIG-IP Virtual Edition: 
View special APM (1G) 
$ 10,000 24% of list 1G 10 1,000 
© F5 Networks, Inc 15
Better Choice 
Solution Citrix Superior alternative 
Desktop Virtualization Citrix XenApp 
Citrix XenDesktop 
View 
Server Virtualization Citrix XenServer vSphere 
Datacenter Virtualization CloudPlatform vCenter 
vCloud Director 
Application Delivery Citrix NetScaler BIG-IP Local Traffic Manager (LTM) 
Web App Firewall Citrix NetScaler App Firewall BIG-IP Application Security Manager 
(ASM) 
SSL VPN Citrix NetScaler Gateway BIG-IP Access Policy Manager 
(APM) 
Edge Delivery Citrix Cloud Bridge BIG-IP Edge Gateway 
Datacenter HA NetScaler GSLB function BIG-IP Global Traffic Manager 
(GTM) 
Web Application Acceleration NetScaler Web 2.0 Application 
Optimization 
F5 AAM 
© F5 Networks, Inc 16
F5 BIG-IP is the Foundation for App Delivery 
F5 makes 
VDI better 
Proven choice for End 
User Computing 
Market leader in 
Application Delivery 
Optimize the User Experience 
Simplify Infrastructure 
Unify Security & Access Control 
Strengthen Availability 
Reduce Cost 
Positioned to meet end users’ needs 
© F5 Networks, Inc 17
F5’s VMware Horizon View Reference Architecture

More Related Content

What's hot

F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
F5 Networks
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Intergen
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
MarketingArrowECS_CZ
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
Cisco Canada
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
F5 Networks
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
Daron Walker
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
Murugesan Arumugam
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
Christina Hoh
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
solarisyougood
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
patmisasi
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
Patricio Campos
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
VMworld
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
F5 Networks
 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of future
MarketingArrowECS_CZ
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
F5 Networks
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
Peter Silva
 
Vmware view overview
Vmware view overviewVmware view overview
Vmware view overview
Manny Singh
 

What's hot (20)

F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
Automate and customise application services and deployment
Automate and customise application services and deploymentAutomate and customise application services and deployment
Automate and customise application services and deployment
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
XenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of futureXenDesktop and XenApp - 2015 summary & bit of future
XenDesktop and XenApp - 2015 summary & bit of future
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Vmware view overview
Vmware view overviewVmware view overview
Vmware view overview
 

Similar to F5’s VMware Horizon View Reference Architecture

Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
MarketingArrowECS_CZ
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
ITband
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lac Viet Computing Corporation
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
GrigoryShkolnik1
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
webhostingguy
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive Presentation
Calin Damian Tanase
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentation
solarisyourep
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
solarisyourep
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
xKinAnx
 
Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2
chenley
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
ncceconnect
 
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern ApplicationsVMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
Puppet
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
sflynn073
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your it
solarisyourep
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial Services
VMworld
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft Private Cloud
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
Lai Yoong Seng
 

Similar to F5’s VMware Horizon View Reference Architecture (20)

Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive Presentation
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentation
 
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
VMworld 2013: Moving Beyond Infrastructure: Meeting Demands on App Lifecycle ...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern ApplicationsVMware and Puppet: How to Plan, Deploy & Manage Modern Applications
VMware and Puppet: How to Plan, Deploy & Manage Modern Applications
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your it
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial Services
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 
TechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDITechInsight - Real World Implementation of VDI
TechInsight - Real World Implementation of VDI
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

F5’s VMware Horizon View Reference Architecture

  • 1. F5’s VMware Horizon View Reference Architecture Peter Silva Sr. Technical Marketing Manager
  • 2. How Many? HOW MANY DEVICES DO YOU CARRY? The average person carries 2.9 devices* Companies Consolidating Devices People Accumulating Devices © F5 Networks, Inc 2
  • 3. VDI – The Reasons Why Drivers for desktop/application virtualization, thin client, or blade PC technologies? 10% 16% 14% 11% 23% 22% 21% 21% 20% 27% 48% 48% 45% 46% 43% 53% 51% 55% 55% 0% 38% 36% Q3 2012 Q3 2011 Supporting employees to work from anywhere Increasing manageability, patching Lowering costs Providing flexible remote access Disaster Recovery Better security Improving compliance Reducing PC energy consumption Supporting access for tablets BYOPC Programs Enable Apple Mac computers Base: 981 (2011) & (2012) North American and European IT decision-makers Source: Enterprise and SMB Hardware Survey, North America and Europe, Q3 2011 & Q3 2012 © F5 Networks, Inc 3
  • 7. Horizon View Complete desktop and application virtualization Horizon View Horizon Mirage Horizon Workspace Centralized layered image management for local deployment + HORIZON SUITE Intelligent Services Framework Secure • Fast • Available Multi-device workspace VM VDI Horizon View Horizon Mirage Horizon Workspace for IT services Complete desktop and application virtualization Anywhere, any service, any device Intelligent Dynamic, agile, adaptive Support for VMware validated solutions • Mobile Secure Desktop • Business Process Desktop • AlwaysOn Desktop • Branch Office Desktop Intelligent traffic management and security • Local and global traffic management • Multi-site and multi-pod deployments • Access management and data center firewall Unique F5 solutions • Single Namespace • Username Persistence • Native PCoIP Proxy • CAC Support © F5 Networks, Inc 7
  • 8. Complex User devices VMware Horizon View Virtual desktops & apps Fragmented application access and policy management Load Balancer View Security Servers Firewall View Connection Servers User experience impacted by latency, lack of persistence, poor reliability Firewall © F5 Networks, Inc 8
  • 9. Simple External View Clients VMware Horizon View • Secure VDI • Advanced AAA & Endpoint security • Traffic management • Scalable –200,000 concurrent users • Offload/replace Security Server BIG-IP Access Policy Manager APM TCP 443 UDP 4172 Internal Connection Servers Desktops Logging/Reporting TCP 80 TCP 80 TCP/UDP 4172 DMZ SSL Decryption Authentication High Availability PCoIP Proxy APM Authentication Internal View Clients Logging/Reporting INDUSTRY FIRST HARDENED SECURITY INCREASED SCALABILITY SIMPLIFY VIEW VDI © F5 Networks, Inc 9
  • 10. Consolidate © F5 Networks, Inc 10
  • 11. Easy iApp for VMware View Configure network for VMware View automatically • Admin answers simple, goal-based questions • iApp for VMware View configures network based on Admin’s input Benefits • Faster (minutes instead of days) • Reduces errors • Replicates to groups of servers easily BIG-IP Are You Using VMware View Security Servers? © F5 Networks, Inc 11
  • 12. Efficient Desktop Laptop Smartphone Tablet © F5 Networks, Inc 12
  • 13. Enabling Scenario Functionality Value L2TP SSL and VPN, AAA functionality Secure access to View servers over public networks. Replaces View Security Server and removes Windows from the DMZ. Load balancing, policy and global traffic management Scale View when multiple Connection Servers are required. Global Load Balancing Route View traffic globally. User Name Persistence Faster session login and restoration without re-opening applications. SECURITY & FIPS COMPLIANCE SYSTEM SCALABILITY MULTIPLE DATA CENTERS PERFORMANCE © F5 Networks, Inc 13
  • 14. Why F5 for View? Increased Scalability Increased Availability Strengthened Security Simpler Architecture to Manage Engineered Specifically for View Easier for End Users © F5 Networks, Inc 14
  • 15. Options Description List Price per unit 24x7 Support Throughput Concurrent SSL VPN Users Concurrent VDI "Access" Users BIG-IP Virtual Edition: View special APM (5M) $ 95 Self Service 5M 10 10 BIG-IP Virtual Edition: View special APM (25M) $ 2,000 24% of list 25M 10 50 BIG-IP Virtual Edition: View special APM (200M) $ 4,000 24% of list 200M 10 250 BIG-IP Virtual Edition: View special APM (1G) $ 10,000 24% of list 1G 10 1,000 © F5 Networks, Inc 15
  • 16. Better Choice Solution Citrix Superior alternative Desktop Virtualization Citrix XenApp Citrix XenDesktop View Server Virtualization Citrix XenServer vSphere Datacenter Virtualization CloudPlatform vCenter vCloud Director Application Delivery Citrix NetScaler BIG-IP Local Traffic Manager (LTM) Web App Firewall Citrix NetScaler App Firewall BIG-IP Application Security Manager (ASM) SSL VPN Citrix NetScaler Gateway BIG-IP Access Policy Manager (APM) Edge Delivery Citrix Cloud Bridge BIG-IP Edge Gateway Datacenter HA NetScaler GSLB function BIG-IP Global Traffic Manager (GTM) Web Application Acceleration NetScaler Web 2.0 Application Optimization F5 AAM © F5 Networks, Inc 16
  • 17. F5 BIG-IP is the Foundation for App Delivery F5 makes VDI better Proven choice for End User Computing Market leader in Application Delivery Optimize the User Experience Simplify Infrastructure Unify Security & Access Control Strengthen Availability Reduce Cost Positioned to meet end users’ needs © F5 Networks, Inc 17

Editor's Notes

  1. A conflict emerges when people/consumers/employees are accumulating devices (average person carries 3) and want to use those for work while organizations are in the process of consolidating infrastructure and the amount of devices they need to manage. http://stevenduque.com/wp-content/uploads/2010/10/too-many-devices.jpg http://media.scmagazine.com/images/2013/03/14/device101_354590.gif http://www.fedtechmagazine.com/sites/default/files/imagecache/articlelarge/data-center-consolidation-gov.png
  2. As you can see, providing employees with anywhere, anytime access is the top reason for VDI interest. Other important areas include the ability to centrally manage desktops to boost efficiency, reduce the cost in upgrading or purchasing desktop computers, the ability to automate and have a robust disaster recovery plan, providing enhanced control over data security along with no limitation on end point devices. http://blogs.forrester.com/david_johnson/13-04-01-has_vdi_peaked_a_change_in_the_adoption_drivers_sheds_new_light_and_new_life
  3. While F5 supports the whole range of the Horizon Suite, this reference architecture focuses on the Horizon View component of VMware’s overall End User Computing solutions. F5 APM VE, optimized for VMware Horizon View, delivers secure access, traffic management, and simplified deployment for VMware Horizon View clients. F5 is able to deliver several capabilities unique to the APM/Horizon View solution, including: • Single namespace, which reduces the burden on administrators of managing user access to a globally distributed VDI, while ensuring that users are always securely connected to their preferred desktop at the appropriate data center. • PCoIP proxy, simplifying Horizon View architectures, and delivering hardened security and increased scalability. (BTW, F5 was the first vendor to provide this functionality.) • Secure remote and local access, and integration with AAA services, and single sign-on (SSO) which streamlines the user experience, while improving both security and productivity.
  4. Operational Complexities of VMware View
  5. There are a number of benefits customers will enjoy with a Horizon View optimized F5 APM VE, deployed with Horizon View, including: • Enhanced cost-efficiency and flexibility – The new APM/Horizon View solution will help organizations build virtual desktop environments more cost-efficiently, enabling them to deploy joint solutions at a variety of price points, thereby enabling a broader range of customers access to industry-leading access and security technology, regardless if they are just starting a VDI deployment, or scaling globally to tens of thousands of desktops. • Technology leadership – By aligning efforts, F5 and VMware offerings are easier to manage and configure for optimum results.
  6. The F5 BIG-IP Virtual Edition (VE) secure appliance acts as a full proxy between the client and all of the View components. Authentication connections and PCoIP traffic (from external clients) are all terminated on the appliance before being proxied to the relevant internal component. The BIG-IP authenticates the View client’s identity with the Microsoft® Active Directory® service before passing the username and password to the View Connection server. The BIG-IP provides high availability and load balancing services for the Connection Servers. The BIG-IP can provide SSL offload for the client authentication traffic, saving CPU resources on the View Connection Servers by forwarding traffic to the Connection Server unencrypted. The BIG-IP replaces the PCoIP proxy functions of the View Security Server role, eliminating a layer of infrastructure and simplifying management of the solution. The VMware Horizon View specific configuration is performed using an F5 supplied iApp® template, which creates all the configuration items required to manage the View application traffic. The created configuration follows the tested best practice design and dramatically reduces the time to deploy the solution. FYI: You’ll notice that there are multiple pods in these diagrams – this is the full solution. In this View RA specfic solution, there would probably only be 1 pod.
  7. Deploying LTM, GTM and APM for View requires thoughtful consideration to the different configuration options. For someone who is not familiar with View or BIG-IP, the process can take longer than necessary. How do you provide all the functionality of a BIG-IP to power users, but take out the configuration complexity that would otherwise slow down deployment? In order to solve this, F5 uses iApps. iApps are pre-configured packages of settings designed for specific applications that enable very rapid deployment of BIG-IP in optimal settings. F5 has invested significant time, effort and joint testing work with VMware to design and maintain an iApp for VMware View that saves significant time when deploying F5’s application delivery services for View. Additionally, by leveraging the iApp wizard-like environment, manual mistakes are avoided – saving both, time and money. F5 iApp for VMware View can reduce the amount of time it takes to deploy application delivery services from days to less than 1 hour.
  8. Improved Experience/SSO/BYOD While VMware View supports all endpoint devices (e.g. laptop, tablet, smartphone, etc.) natively, F5 provides hardened security.
  9. Lets take a look at the Products that Citrix have… now lets look at the closest competitor in each category… Now lets look at which of these technologies Citrix developed themselves… They only get credit for XenApp (AKA Metaframe) Citrix have a very powerful Marketing engine where they change product names faster than they change their underwear… Citrix offer “good” but not “great” solutions in each category F5 has technical superiority over Citrix F5 has market share over Citrix F5 / VMware Ecosystem is extremely strong Helps give customers confidence to virtualize mission critical apps. Removes performance issues caused by the Network. We are already selling to the same customers thru the same channel Citrix are afraid that we might compare notes… THEY SHOULD BE
  10. View requires SSL for its connections, and is normally handled by letting the connection servers terminate SSL. However as is well known in the networking world, having generic CPUs perform SSL termination is not the most cost effective way to handle large volumes of SSL. Function-specific devices with SSL cards are much faster at this, for a fraction of the cost. As such, offloading SSL encryption/decryption from VMware View Connection Servers (which have generic CPUs) and asking LTM to perform that function instead (using its SSL ASICs instead) allows you to run much higher SSL volumes though a relatively small and inexpensive server infrastructure. This in turn means that you have much higher virtual desktop density on your View connection servers. It’s all about economics here. Hardware and Virtual Edition both provide unique value to customers; we are in a unique position to help customers migrate to the cloud
  11. Comply with Strict Security Corporate Policies View Security Server can scale to 2000 users. It is tied in a 1:1 relationship with the Connection Server in the internal security zone. In order to scale beyond 2000 users there is a requirement to place a load balancer in front of multiple View Security Servers which are each tied in a 1:1 relationship with their own Connection Servers in the internal security zone.