Deployment Guide Sept-2014 rev. a. Load Balancing Windows Terminal Server with Session Directory Using Array APV Series ADCs



Similar documents
Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Deployment Guide Mar-2016 rev. a. Integrating the Array Standalone Client with RSA Token Automation

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers for Microsoft Lync Server 2013

Deployment Guide July-2015 rev. A. Deploying Array Networks APV Series Application Delivery Controllers with VMware Horizon View

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

Deployment Guide Jan-2016 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Acceleration Performance Tests for IBM Rational ClearTeam Explorer

Global Server Load Balancing

Remote Desktop Services Overview. Prerequisites. Additional References

Application Delivery as an Infrastructure Service Guaranteed Performance in Shared Environments

Array Networks & Microsoft Exchange Server 2010

Cloud Agility with Performance

Deployment Guide May-2015 rev. A. Deploying Array Networks APV Series Application Delivery Controllers with Microsoft Exchange 2013

DesktopDirect. White Paper. Tablet Access to Business Applications

Deployment Guide AX Series with Microsoft Windows Server 2008 Terminal Services

Load Balancing Microsoft Terminal Services. Deployment Guide

How To Use Netscaler As An Afs Proxy

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

2X HTML5 Gateway v10.6

White Paper. Augmenting Remote Access for Company-Wide Business Continuity Array Business Continuity Planning

Get Control of Your Data Center. Application Delivery Controllers

Microsoft Terminal Services & Coyote Point Systems Equalizer

This ADC is JUST Right

Application Note. Active Directory Federation Services deployment guide

Aqua Connect Load Balancer User Manual (Mac)

TESTING & INTEGRATION GROUP SOLUTION GUIDE

Scaling Next-Generation Firewalls with Citrix NetScaler

安 瑞 科 技 物 聯 網 對 應 用 交 付 器 (ADC) 的 需 求 及 應 用 實 例 徐 乃 丁 博 士 研 發 副 總 裁 / 技 術 長

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

How To - Implement Clientless Single Sign On Authentication with Active Directory

Configuring and Implementing A10

Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

KEMP LoadMaster Support for Windows Terminal Services

OpenText Secure MFT Network and Firewall Requirements

Redefining ADCs for Software-as-a-Service

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Configuring Citrix NetScaler for IBM WebSphere Application Services

Terminal Services Tools and Settings - Terminal Services: %PRODUCT%

Deploying NetScaler Gateway in ICA Proxy Mode

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services

2X ApplicationServer & LoadBalancer Manual

Technical Overview of Terminal Services

Network Load Balancing

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

SAML 2.0 SSO Deployment with Okta

Load Balancing Microsoft Remote Desktop Services. Deployment Guide

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365

Application Note. Onsight Connect Network Requirements v6.3

M2M Series Routers. Port Forwarding / DMZ Setup

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Load Balancing 101: Firewall Sandwiches

AAM Kerberos Relay Integration with SharePoint

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

Firewall Load Balancing

Remote Access Procedure. e-governance

SaaS Optimized Application Delivery Bridging the Gap Between DevOps and Network Planning

Secure remote access to your applications and data. Secure Application Access

Deployment Guide AX Series with Citrix XenApp 6.5

Security. TestOut Modules

VMware View 5.0 and Horizon View 6.0 DEPLOYMENT GUIDE

2X ApplicationServer & LoadBalancer Manual

How To Create A Virtual Private Cloud On Amazon.Com

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

How To Plan A Desktop Workspace Infrastructure

Application Delivery Networking

Defender EAP Agent Installation and Configuration Guide

Citrix Access Gateway

Assignment # 1 (Cloud Computing Security)

Deploying F5 with Microsoft Remote Desktop Services

Guideline for setting up a functional VPN

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

Copyright Giritech A/S. Secure Mobile Access

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

Remote Vendor Monitoring

Server Installation Manual 4.4.1

Load Balancing Trend Micro InterScan Web Gateway

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Load Balancing Microsoft AD FS. Deployment Guide

Strong Authentication for Microsoft TS Web / RD Web

icrosoft TMG Replacement with NetScaler

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January Enterprise Threat Protection

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

Load Balancing Barracuda Web Filter. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

How to Make the Client IP Address Available to the Back-end Server

Deploying F5 to Replace Microsoft TMG or ISA Server

A Guide to New Features in Propalms OneGate 4.0

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

White Paper. ThinRDP Load Balancing

Transcription:

Deployment Guide Sept-2014 rev. a Load Balancing Windows Terminal Server with Session Directory Using Array APV Series ADCs

Table of Contents 1 Introduction... 2 1.1 Connecting to a Terminal Server Farm... 2 2 Array APV Integration... 3 2.1 Scenario 1: Real Server IP Addresses are Visible to Clients... 3 2.2 Scenario 2: Real Server IP Addresses Are Not Visible to Clients... 4 2.3 APV Series Configuration Commands... 5 2.4 APV Series Configuration Samples... 6 2.4.1 Sample 1... 6 2.4.2 Sample 2... 6 2.4.3 Sample 3... 6 2.5 Summary... 6 1

1 Introduction Terminal Services is a technology that enables users to run applications on a remote Windows Server 2003 or 2008-based computer. In a terminal server-based computing environment, all application execution and data processing occurs on the server. In a load-balanced environment, a farm of terminal servers has incoming session connections distributed in a balanced manner across the servers in the farm. Terminal Services Session Directory maintains a list of sessions that are indexed by user name, and allows a user to reconnect to the terminal server where their disconnected session resides and to resume that session. 1.1 Connecting to a Terminal Server Farm When a user authenticates with a terminal server in the farm, the terminal server queries the Session Directory database with the user name. If a session with the same user name exists on one of the terminal servers in the farm, Session Directory will instruct the initial server, upon which user has landed, to redirect the user to actual server where the user session still exists. This enables a user to disconnect a session with applications running, whether intentionally or because of a network failure, and then reconnect at a later time to the same session, with the same applications running. 2

2 Array APV Integration Array APV Series application delivery controllers provide session persistence by load-balancing terminal session traffic across a terminal server farm using Terminal Services Session Directory Service (TSDS). This enables a user to disconnect a session with applications running, whether intentionally or because of a network failure, and then reconnect at a later time to the same session, with the same application. Terminal Services Session Directory Service is a database that keeps track of sessions on terminal servers in a load-balanced farm. The database maintains a list of the user names that are associated with the session IDs that are connected to the servers in a load-balanced terminal server farm. It can either reside on a server that is separate from the terminal servers in the farm, or be hosted on a member of the terminal server farm. 2.1 Scenario 1: Real Server IP Addresses are Visible to Clients If the real terminal server IP address is visible to the client, the client data stream is redirected from a virtual IP address to a specific real server. Figure 1: Scenario 1 Process Flows The process flows in this scenario (see Figure 1) are as follows: 1. A client connects to a virtual IP address. 2. The APV Series redirects the client connection to a specific real terminal server, for example TS1. 3

3. The client receives the logon screen and the user enters a user name and password. The TS1 server validates the user name and password, and then queries the Session Directory server TSDS with the user name. 4. TSDS identifies that the user name is associated with a session already active on TS3, and passes this information to TS1. 5. TS1 passes the encrypted authentication information to the client. The loadbalancing packet contains the IP address of TS3 that the client will use to connect to TS3 directly. 6. TS3 performs a look-up on the user name against the disconnected sessions that are running on the server. TS3 then reconnects the user to the disconnected session that is associated with the user name. 2.2 Scenario 2: Real Server IP Addresses Are Not Visible to Clients When terminal server IP addresses are not visible to clients, the Session Directory will pass a routing token to the client with logon information and the correct server IP address embedded and encrypted, and the client presents this routing token to the APV Series. The APV Series then deciphers the token and sends the client to the correct terminal server, together with the logon credentials. Figure 2: Scenario 2 Process Flows The process flows in this scenario (see Figure 2) are as follows: 1. A client connects to a virtual IP address. 2. The APV Series redirects the client connection to a specific real terminal server, for example TS1. 4

3. The client receives the logon screen and the user enters a user name and password. The TS1 server validates the user name and password, and then queries the Session Directory server TSDS with the user name. 4. TSDS identifies that the user name is associated with a session on TS3, and passes this information to TS1. 5. The server tells the client computer to reconnect to the same cluster IP address as it did initially, but it also tells the client to send a "routing token" at a certain offset in its first packet sent to the server. TS1 then drops the connection with the client. 6. The client connects to the same virtual IP, and this time it provides the routing token. 7. The APV Series looks at this routing token, which contains information about the IP address and port number to which to redirect the client (which are the correct IP address and port number for TS3), sets up the correct internal mapping, and the user successfully logs on to their existing session on TS3. 2.3 APV Series Configuration Commands ArrayOS APV 8.x and TM 6.x have a Remote Desktop Protocol application proxy built-in to support RDP client-server session persistency. By using the built-in proxy, no special or custom rule needs to be developed. Following are the SLB CLI commands that are used for basic RDP processing. slb real rdp <real_name> <ip> [port] [maxconn] [tcp icmp] [hc_up] [hc_down] This command is used to create an RDP real service. The default port number for RDP is 3389. slb virtual rdp <virtual_name> <ip> [port] [arp noarp] [maxconn] This command allows users to create a RDP virtual service. The default port number for RDP is 3389. slb group method <name> rdprt [rr sr lc] This command creates an rdprt group with the given group name. The [rr sr lc] argument can be called the first choice method, and it defaults to rr. 5

2.4 APV Series Configuration Samples 2.4.1 Sample 1 slb real rdp "rdp_rs1" 172.16.69.190 3389 1000 icmp 3 3 slb real rdp "rdp_rs2" 172.16.69.190 3389 1000 icmp 3 3 slb group method "rdp_group" rdprt rr slb group member "rdp_group" "rdp_rs1" slb group member "rdp_group" "rdp_rs2" slb virtual rdp "rdp_vs1" 172.16.69.171 3389 arp 0 slb policy default "rdp_vs1" "rdp_group" 2.4.2 Sample 2 slb real rdp "rdp_rs1" 172.16.69.190 3389 1000 icmp 3 3 slb real rdp "rdp_rs2" 172.16.69.190 3389 1000 icmp 3 3 slb group method "rdp_group" rdprt lc slb group member "rdp_group" "rdp_rs1" slb group member "rdp_group" "rdp_rs2" slb virtual rdp "rdp_vs1" 172.16.69.171 3389 arp 0 slb policy default "rdp_vs1" "rdp_group" 2.4.3 Sample 3 slb real rdp "rdp_rs1" 172.16.69.190 3389 1000 icmp 3 3 slb real rdp "rdp_rs2" 172.16.69.190 3389 1000 icmp 3 3 slb group method "rdp_group" rdprt sr slb group member "rdp_group" "rdp_rs1" slb group member "rdp_group" "rdp_rs2" slb virtual rdp "rdp_vs1" 172.16.69.171 3389 arp 0 slb policy default "rdp_vs1" "rdp_group" 2.5 Summary Array APV Series application delivery controllers provide session persistence by load-balancing terminal session traffic across the terminal server farm using Terminal Services Session Directory Service (TSDS). This persistence enables a user to disconnect a from session, even with applications running, then reconnect at a later time to the same session, with the same application(s) in the same state as they were when the previous session ended. 6

About Array Networks Array Networks is a global leader in application delivery networking with over 5000 worldwide customer deployments. Powered by award-winning SpeedCore software, Array application delivery, WAN optimization and secure access solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance and total value of ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, IDC and Frost & Sullivan have recognized Array Networks for its technical innovation, operational excellence and market opportunity. Corporate Headquarters info@arraynetworks.com 408-240-8700 1 866 MY-ARRAY www.arraynetworks.com EMEA rschmit@arraynetworks.com +32 2 6336382 China support@arraynetworks.com.cn +010-84446688 France and North Africa infosfrance@arraynetworks.com +33 6 07 511 868 India isales@arraynetworks.com +91-080-41329296 Japan sales-japan@ arraynetworks.com +81-45-664-6116 To purchase Array Networks Solutions, please contact your Array Networks representative at 1-866-MY-ARRAY (692-7729) or authorized reseller Sept-2014 rev. a 2014 Array Networks, Inc. All rights reserved. Array Networks and the Array Networks logo are trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Array Networks assumes no responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 7