Citrix Systems 4.2 manual Basic Zone Network Traffic Types

Page 23

Basic Zone Network Traffic Types

type for each network vary depending on whether you are creating a zone with basic networking or advanced networking.

A physical network is the actual network hardware and wiring in a zone. A zone can have multiple physical networks. An administrator can:

Add/Remove/Update physical networks in a zone

Configure VLANs on the physical network

Configure a name so the network can be recognized by hypervisors

Configure the service providers (firewalls, load balancers, etc.) available on a physical network

Configure the IP addresses trunked to a physical network

Specify what type of traffic is carried on the physical network, as well as other properties like network speed

3.8.1. Basic Zone Network Traffic Types

When basic networking is used, there can be only one physical network in the zone. That physical network carries the following traffic types:

Guest. When end users run VMs, they generate guest traffic. The guest VMs communicate with each other over a network that can be referred to as the guest network. Each pod in a basic zone is a broadcast domain, and therefore each pod has a different IP range for the guest network. The administrator must configure the IP range for each pod.

Management. When CloudPlatform’s internal resources communicate with each other, they generate management traffic. This includes communication between hosts, system VMs (VMs used by CloudPlatform to perform various tasks in the cloud), and any other component that communicates directly with the CloudPlatform Management Server. You must configure the IP range for the system VMs to use.

Note

We strongly recommend the use of separate NICs for management traffic and guest traffic.

Public. Public traffic is generated when VMs in the cloud access the Internet. Publicly accessible IPs must be allocated for this purpose. End users can use the CloudPlatform UI to acquire these IPs

to implement NAT between their guest network and the public network, as described in Acquiring a New IP Address. Public traffic is generated only in EIP-enabled basic zones. For information on Elastic IP, see About Elastic IP in the Administration Guide.

Storage. Traffic such as VM templates and snapshots, which is sent between the secondary storage VM and secondary storage servers. CloudPlatform uses a separate Network Interface Controller (NIC) named storage NIC for storage network traffic. Use of a storage NIC that always operates on a high bandwidth network allows fast template and snapshot copying. You must configure the IP range to use for the storage network.

In a basic network, configuring the physical network is fairly straightforward. In most cases, you only need to configure one guest network to carry traffic that is generated by guest VMs. If you use a NetScaler load balancer and enable its elastic IP and elastic load balancing (EIP and ELB) features,

15

Image 23
Contents Page Page Concepts Upgrade InstructionsInstallation Getting More Information and HelpSteps to Provisioning Your Cloud Infrastructure Installing XenServer for CloudPlatform 101User Interface Bare Metal Installation 135 Installing KVM for CloudPlatform 111Installing VMware for CloudPlatform 117 Choosing a Deployment Architecture 157 Installing Oracle VM OVM for CloudPlatform 155Network Setup 161 Additional Installation Options 183 Amazon Web Service Interface 177Viii Chapter Getting More Information and HelpAdditional Documentation Available Citrix Knowledge Center Contacting SupportPage Multiple Hypervisor Support What Is CloudPlatform?Concepts What Can CloudPlatform Do?Deployment Architecture Overview Cloud Infrastructure Overview Management Server OverviewMore Information Networking OverviewFor more details, see , Network Setup Page About Zones Cloud Infrastructure ConceptsAbout Regions Cloud Infrastructure Concepts About Pods About Clusters About Primary Storage About HostsAbout Physical Networks About Secondary StorageBasic Zone Network Traffic Types Advanced Zone Guest IP Addresses Basic Zone Guest IP AddressesAdvanced Zone Network Traffic Types A zone that uses advanced networking Advanced Zone Public IP AddressesSystem Reserved IP Addresses All zonesPage Hypervisor Description Upgrade InstructionsUpgrade from 3.0.x to Systemvmtemplate-2013-06-12-master-kvm.qcow2.bz2 Upgrade from 3.0.x to # service cloud-usage stop Copy the *.rpmnew file to create a new file. For example Iii. Update the existing password with the encrypted one Vii. Confirm that the table is updated Start the agent XenServer or KVM Upgrade from 2.2.x to Hypervisor Description Systemvmtemplate-2013-06-12-master-kvm.qcow2.bz2 Upgrade Name=rhel63 Baseurl=url-of-your-rhel6.3-repo Upgrade the host operating system from Rhel 6.0 to Copy the *.rpmnew file to create a new file. For example Update the agent software Restart libvirtd XenServer or KVM Upgrading to a New XenServer Version Upgrade from 2.1.x toUpgrading and Hotfixing XenServer Hypervisor Hosts Upgrade Instructions Applying Hotfixes to a XenServer Cluster Command displays the Uuid of the update file Page Page Who Should Read This InstallationOverview of Installation Steps Host/Hypervisor System Requirements Minimum System RequirementsCloudPlatform Hypervisor Compatibility MatrixRhel Prepare the Operating System Management Server InstallationManagement Server Installation Overview Edit the NTP configuration file to point to your NTP server Install the Management Server on the First Host Install the Database on the Management Server Node Install and Configure the DatabaseRestart the MySQL service Install the Database on a Separate Node # yum install mysql-server # chkconfig --level 35 mysqld on About Password and Key Encryption Changing the Default Password Encryption Prepare NFS Shares Using a Separate NFS ServerUsing the Management Server As the NFS Server Edit the /etc/sysconfig/nfs file Perform the steps in .4.2, Prepare the Operating System Prepare and Start Additional Management ServersManagement Server Load Balancing Source Port Destination Port Protocol Persistence Required? Prepare the System VM TemplateAbout Configuration Parameters Setting Configuration ParametersInstallation Complete! Next Steps Field Value Granular Global Configuration Parameters Setting Global Configuration ParametersSetting Local Configuration Parameters Between 0 and 1, of allocated Allocators will disable that pool Field Value Page End Users UI Overview User InterfaceSupported Browsers Log In to the UILogging In as the Root Administrator Root Administrators UI OverviewCreating an Instance from a Template that Supports SSH Keys Using SSH Keys for AuthenticationChanging the Root Password Creating the SSH Keypair Output is something similar to what is given belowCreating an Instance Logging In Using the SSH KeypairResetting SSH Keys Page Overview of Provisioning Steps Steps to Provisioning Your Cloud InfrastructureAdding a Region First Region The Default RegionAdding Regions optional Adding Third and Subsequent Regions Deleting a Region Steps to Add a New Zone Adding a ZoneCreate a Secondary Storage Mount Point for the New Zone Network Offering Description Basic Zone ConfigurationPage Steps to Provisioning Your Cloud Infrastructure Advanced Zone Configuration Steps to Provisioning Your Cloud Infrastructure Page Steps to Provisioning Your Cloud Infrastructure NFS Vmfs Adding a PodAdd Cluster OVM Adding a ClusterAdd Cluster KVM or XenServer Adding a vSphere Cluster Add Cluster vSphereVMware Cluster Size Limit Page Steps to Provisioning Your Cloud Infrastructure Requirements for XenServer, KVM, and OVM Hosts Warning Adding a HostAdding a Host XenServer, KVM, or OVM KVM Host Additional Requirements Adding a XenServer, KVM, or OVM HostAdding a Host vSphere Adding Primary StorageAdding Secondary Storage Adding an NFS Secondary Staging Store for Each Zone Initialize and Test Page 100 System Requirements for XenServer Hosts Installing XenServer for CloudPlatformTime Synchronization XenServer Installation StepsConfigure XenServer dom0 Memory Username and Password Installing XenServer for CloudPlatformGetting and Deploying a License Install CloudPlatform XenServer Support Package CSPLicensing Primary Storage Setup for XenServer ISCSI Multipath Setup for XenServer Optional Configuring Multiple Guest Networks for XenServer Optional Physical Networking Setup for XenServerNIC Bonding for XenServer Optional Separate Storage Network for XenServer OptionalCreating a Public Bond on the First Host in the Cluster Management Network BondingCreating a Private Bond on the First Host in the Cluster Public Network BondingAdding More Hosts to the Cluster Complete the Bonding Setup Across the Cluster110 System Requirements for KVM Hosts Installing KVM for CloudPlatformSystem Requirements for KVM Hypervisor Hosts Supported Operating Systems for KVM HostsInstalling KVM for CloudPlatform Install and configure the AgentInstalling the CloudPlatform Agent on a KVM Host Physical Network Configuration for KVM Time Synchronization for KVM Hosts Primary Storage Setup for KVM OptionalPage 116 Hardware requirements Installing VMware for CloudPlatformSystem Requirements for vSphere Hosts Software requirementsOther requirements Installing VMware for CloudPlatformVCenter Server requirements VCenter Requirement Value Preparation Checklist for VMwareVCenter Checklist Networking Checklist for VMwarePhysical Host Networking VSphere Installation StepsESXi Host setup Configure Virtual SwitchIncreasing Ports Configure vCenter Management NetworkConfigure NIC Bonding for vSphere Prerequisites and Guidelines About Cisco Nexus 1000v Distributed Virtual SwitchNetwork Requirements Value Nexus 1000v Virtual Switch PreconfigurationPreparation Checklist Nexus vSwitch Requirements ValueCreating a Port Profile VSM Configuration Value Parameters Value NotesAdding Vlan Ranges Assigning Physical NIC AdaptersParameters Description Enabling Nexus Virtual Switch in CloudPlatformConfiguring Nexus 1000v Virtual Switch in CloudPlatform Prerequisites and Guidelines Removing Nexus Virtual SwitchAbout VMware Distributed Virtual Switch Preparation Checklist Fields Name Description Vmware.use.nexus.vswitch Enabling Virtual Distributed Switch in CloudPlatformVmware.use.dvswitch Parameters Configuring Distributed Virtual Switch in CloudPlatformAdd iSCSI target Enable iSCSI initiator for ESXi hostsStorage Preparation for vSphere iSCSI only Multipathing for vSphere Optional Add Hosts or Configure Clusters vSphereCreate an iSCSI datastore 134 Bare Metal Host System Requirements Bare Metal InstallationAbout Bare Metal Kickstart Installation Provisioning a Bare Metal Host with Kickstart Limitations of Kickstart Baremetal InstallationSet Up Ipmi Bare Metal InstallationInstall the PXE and Dhcp Servers Enable PXE on the Bare Metal HostSet Up a File Server Output should show the following services running Create a Bare Metal Compute Offering Create a Bare Metal ImageCreate a Bare Metal Network Offering Set Up the Security Group Agent OptionalFor example, if the RPMs are in the following directory Add a Bare Metal Zone Optional Set Bare Metal Configuration ParametersAdd a Bare Metal Host Add a Bare Metal ClusterAdd the PXE Server and Dhcp Server to Your Deployment Create a Bare Metal Template Example CentOS 6.x Kickstart File Test Bare Metal InstallationProvision a Bare Metal Instance Example Fedora 17 Kickstart File Example Ubuntu 12.04 Kickstart File 150 Registering a UCS Manager Using Cisco UCS as Bare Metal Host CloudPlatformAssociating a Profile with a UCS Blade Disassociating a Profile from a UCS Blade 154 System Requirements for OVM Hosts Installing Oracle VM OVM for CloudPlatformOVM Installation Overview Installing OVM on the HostsInstalling Oracle VM OVM for CloudPlatform Primary Storage Setup for OVMSet Up Hosts for System VMs Small-Scale Deployment Choosing a Deployment ArchitectureChoosing a Deployment Architecture Large-Scale Redundant SetupMulti-Site Deployment Separate Storage NetworkMulti-Node Management Server 160 Basic and Advanced Networking Network SetupNetworking Feature Basic Network Advanced Network Dell Example Hardware ConfigurationNetwork Setup Vlan Allocation ExampleCisco Layer-2 SwitchGeneric Firewall Provisions Hardware FirewallExternal Guest Firewall Integration for Juniper SRX Optional Ge-0/0/3 unit Guidelines External Guest Firewall Integration for Cisco Vnmc OptionalPrerequisites Adding a Vnmc Instance Using Cisco ASA 1000v ServicesAdding an ASA 1000v Instance Reusing ASA 1000v Appliance in new Guest Networks Creating a Network Offering Using Cisco ASAExternal Guest Load Balancer Integration Optional Runtime Internal Communications Requirements Topology RequirementsSecurity Requirements Guest Network Usage Integration for Traffic Sentinel Guest.vlan.bits Maximum Running VMs per Maximum Zone VLANs Setting Zone Vlan and Running VM Maximums176 Amazon Web Services EC2 Compatible Interface Amazon Web Service InterfaceAWS API User Registration AWS API User Setup Steps Soap OnlyAmazon Web Service Interface Supported AWS API Calls AWS API Command-Line Tools SetupEC2 command Soap / Rest call CloudPlatform API call Architecture, use Keys Pairs EC2 command Soap / Rest call CloudPlatform API call Steps to Install the Usage Server Additional Installation OptionsInstalling the Usage Server Optional Requirements for Installing the Usage ServerDatabase Replication Optional Additional Installation OptionsRestart MySQL Failover
Related manuals
Manual 6 pages 23.94 Kb Manual 272 pages 63.23 Kb

4.2 specifications

Citrix Systems, a leading provider of virtualization solutions and cloud computing technologies, released version 4.2 of its popular software, Citrix XenApp, which was previously known as Presentation Server. This version marked a significant evolution in providing users with remote access to applications and desktops, emphasizing simplicity, performance, and security.

One of the standout features of Citrix XenApp 4.2 is its improved application streaming capabilities. This technology allows applications to be delivered to users in real-time, reducing the need for extensive local installations and enhancing the user experience. With application streaming, administrators can efficiently manage applications on a central server while ensuring that users have immediate access to the necessary tools.

Another highlight of this version is the enhanced security measures put in place to protect sensitive data. Citrix XenApp 4.2 includes support for SSL encryption, providing a secure communication channel for data transmitted between the server and clients. This is particularly crucial for businesses that need to comply with strict data protection regulations. Additionally, the integration of endpoint security features ensures that unauthorized access to applications is minimized.

Performance enhancements are also a critical focus in this release. Citrix optimized the delivery of applications over various network conditions, ensuring that users experience minimal latency regardless of their location. This was achieved through the incorporation of SmartAccess and SmartControl technologies, which allow administrators to set policies based on user roles, device types, and network conditions. This level of granularity enables organization-wide security without compromising on usability.

The user experience was further improved with a revamped interface, making it easier for end-users to access their applications and data. Simplified menus, clear navigation paths, and the ability to customize user settings contributed to a more efficient workflow, allowing users to focus on their tasks rather than struggling with the software.

Finally, Citrix XenApp 4.2 was designed to be highly scalable. Organizations of all sizes could deploy this solution to deliver applications efficiently, adapting to their specific needs as their user base grows or changes. This flexibility is crucial for businesses looking to future-proof their IT investments while maintaining optimal performance.

In summary, Citrix XenApp 4.2 stands out with its enhanced application streaming, robust security features, improved performance under varying conditions, user-friendly interface, and scalability, making it an ideal choice for organizations seeking to leverage virtualization for remote access to applications and desktops.