Best practices to configure NLB for Secure Gateway and Web access

Hi team,

I'm vworksapce the facility and looking for guidance on best practices on NLB with webaccess and secure gateway. My hosted environment is Hyper-v 2012R2

My first request is it must be configure NLB, firstly that the role of set up or vice versa.

do we not have any document of best practice to configure NLB with 2 node web access server.

Hello

This video series has been created for 7.5 and 2008r2 but must still be valid for what you are doing today:

https://support.software.Dell.com/vWorkspace/KB/87780

Thank you, Andrew.

Tags: Dell Tech

Similar Questions

  • A CS5/6 on the Mac at work, and then re-released a Windows laptop (which I have personal licenses for CS4 design and web), trying to find or decompress files of decent download to make a few changes

    A CS5/6 on the Mac at work, and then re-released a Windows laptop (which I have personal licenses for CS4 design and web), trying to find or decompress files of decent download to make a few changes... anyone got a ferrule or all links on where to go to decompress? The laptop Windows is for personal use and workload to work is too intense and also Mac licenses so no need for the House.

    It is not not clear from your post what you are looking for, but here's a general link for downloads for older versions of Adobe software.

    Other downloads

  • Beginner looking for best practices in configuration in AE CS4 (MacPro 8core)

    Hello

    I am a video editor familiar with FCP and motion, moving in AE CS4 because it's more power in a 3D space. I installed the program and started my basic training of Lynda, but I want to make sure I got the installer so as not to cause problems on the road of.

    For example, in FCP, I use a second drive for makes etc., and a RAID array for FCP files and various media (both imported and exported) organized by project and by type. I intend to do the same for EI, but looking at the AE prefs, I see I can assign memory per CPU etc, and I just want to be sure that I use the Procs and RAM effectively. The machine is a machine of 8-Core MacPro with 12 GB of RAM. The program sees 16 processor cores, so I should split the 10 GB hosting AE to use during these carrots (using the pref multiprocessing tab), or simply let AE understand?

    In addition, I am confused about the overflow Volumes option. What gets put there, when and why?

    Finally, if there is a newsletter along the lines of the Larry Jordan FCP (larryjordan.biz) site I'd reference.

    Thanks for your help.

    -C

    Concerning the use of RAM and processor, see the following page:"Performance Tip: don't starve to death your software of RAM '. Following the guidelines there for 12 GB your computer, would you let 2 GB for other applications, perhaps a couple of GB for the trial leading to hold executives preview RAM - leaving you with 2 GB each of four background rendering process.

    Also, don't be fooled. 8-core computer is just an 8-core in After Effects is. The so-called doubling of processor cores created by hyperthreading is not relevant for simultaneous rendering of several images of multiprocessing.

    Regarding overflow volumes, see the following page: "of the volume of overflow and segment settings"

    If you are new, please start here. Pretty please?

  • work around the internal security gateway and the same url for web access external and internal

    role of the broker 1 quest
    1 security with the roles of web access gateway
    1 Server terminal server

    I configured the default gateway with the parameter security rule: "vworkspace security gateway".
    I created a custom with the 172.16.1.177 value rule (it's my client internal windows7).
    When I navigate to the internal url (fqdn's secure gateway server) I bypassed (tsdebug shows no sslgateway).

    But now I want to use 1 internal and external URL to type the same URL.
    Now when I navigate to an external URL of the machine internal with above ip I always get through security gateway, I see a SSLGateway

    Hi Erik,

    I think that this has been fixed in our latest version 8.5 - documents.software.dell.com/DOC252107

    Please download and upgrade your farm and let us know if you still see this problem.

    If you do, it may be best to save a service request so that we can see exactly what is happening.

    Thanks, Sam

  • PCoIP Tunneling for secure gateway

    Connection to the Server - 5.3.0 - 1427931

    Security Server - 5.3.0 - 1427931

    We are running a trial of VMware View First Horizon, and I have problems with PCoIP tunneling. According to our technical sales representative, tunnels always security server, and the connection to the server can create a tunnel if you turn it on ('Use PCoIP Secure Gateway for PCoIP connection on the desktop' under connect to server > edit). However, our experience is in contradiction with it. With the default, PCoIP connections and external internal configuration (for the connection to the server) (for Security Server) try to connect on PCoIP directly on the comments/VM/office. However, if I enable 'PCoIP Secure Gateway' on the login server, then the security server and the login server begin to tunnel traffic PCoIP well as them.

    The goal is to tunnel from the outside, all with connections directly to VM guests from inside, but the only way I can understand how to do this is to stand additional connection (replica) servers. I have read the documentation (Installation / Adminisstration guides), googling and watch videos of training like mad, but no one seems to be able to explain it.

    Your help is very appreciated.

    OK, you need another broker.

    Linjo

  • best practices to configure or detect the size of the screen?

    Hi all

    Try to determine a best practice for setting or the detection of the size of the screen. Playbook and iOS, I can put them. But for Android, the number of devices is too big, so I would rather to detect. My first choice is to use the stage.stageWidth, stage.stageHeight. It works fine if I put my stage with standard metadata properties:

    [SWF (height ="320"width ="480"frameRate ="64", backgroundColor = "" "#010101")]

    However, if I use the application descriptor file to set the dimensions of the stage (like the one proposed by Christian Cantrell here http://www.adobe.com/devnet/flash/articles/authoring_for_multiple_screen_sizes.html()

    <initialWindow>

    <>aspectRatiolandscape< /aspectRatio>

    <>autoOrientsfalse< /autoOrients>

    <>width320< /width>

    <>height480< /> height

    <full screen>true< /> fullscreen

    < /initialWindow>

    Then the stage.stageWidth, stage.stageHeight are not the correct numbers when my main class is added to the stage. Shortly after the main class is added to the scene, these figures are very well. Is there an event that I can wait to know the stage.stageWidth, stage.stageHeight are correct?

    Thanks in advance!

    I'm struggling to think of what the problem might be with stageWidth/height not set correctly during the test with IE, but who was a flex project, I noticed a strange behavior before (width/height is not correct until the preloader ran)

    It has intrigued me, so I can grab the google project and test, but it may be some days I'm a bit busy at the mo.

    WAG - erg is nice idea btw

  • Best practices Check - Configuration of the Communication Service

    So, we have the following here the use case...

    Background:

    We have a FMS instance that has several teams using multiple applications, air conditioned and have their own specific communication needs. Teams of infrastructure, such as the database or Server team are also included on this FMS. We have services configured around applications and their dependencies, so a single object will exist in several services.

    To work around the lack of granularity configuration and horrible the service-based E-mail in the form, I created an event rule that queries for FSMServices affected for a given event and iterates over all the unique services, pulling on the notification settings through our way of soil and trigger Actions from the command line or appropriate accordingly EmailActions... we use of the-d in the field of shortDesc service options.

    Example:

    (You can ask for a detailed explanation of what do the settings, if you wish, or that the levels called - but they are just an additive representation of the levels of severity in foglight)

    Here's our new problem:

    We have teams who want notification on certain rules of certain severities (such as criticism), but not others. This has created the need for a 'white list' or the 'black list' of the original names of rule for the event to determine whether an event should be communicated to our NOC or paged on our teams.

    My solution of thought:


    We will create a new cartridge (FoglightCommunication) that contains a custom dashboard and the definition of the topology for a FSMServiceConfig object. This object contains a white list or black list for some rules should be provided for each service. This TopologyObject would also resume functionality which serve as my current shortDesc variables... Essentially, it would contain all THE information relevant to its corresponding FSMService object configuration. We have experience in creating modules advanced both in the creation of Foglight cartridge/agents/topology definitions.

    The dashboard would exist to facilitate the configuration of this new object and to facilitate the visualization of the current communication service. This would also allow our team to allow the teams less educated with Foglight feature more easily and completely configure their own communication service. Empowering the team owner is always a good thing

    My Question:

    Did someone in the quest (it's such a name cooler than Dell) sees a problem with this? My only concern is that we could lose all our configuration information to uninstall the cartridge for a upgrade problem. He might consider a work around with an option to export/import... but it's a messy solution and a non-human evidence. Is there a way to specify the data to be persisted, even if the cartridge that has defined this topology definition is uninstalled?

    I'd appreciate any comments or thoughts. Thank you!

    Hi Adam.

    This looks like a very useful customization. I don't see why your team should not move forward with that.

    I also like the idea of building an import/export feature in your cartridge in order to preserve the configurations in case you need to uninstall the cartridge. Note that even in this case, type of custom topology that was written to the repository data Foglight will always be there (i.e. it will not be served unless you specifically request this) - so you can be able to get Foglight to save the configuration information important for you.

    I encourage you to update the community on your progress on this and send questions, screencaps, etc., as needed.

    Thank you!

    Robert Statsinger

  • Best practices to create diagrams for mounting of the EMP

    Hi all

    What is advised to create patterns for EMP installation and configuration if you use Oracle for EMP data.

    1. create the dedicated tablespace and table Temp space dedicated for each schema

    or

    2. create a dedicate tablespace and dedicates space temporary table for all schemas and another separate for HFM schema.

    or

    3. just use default tablespace and a tablespace temp.

    Kind regards

    Dattatray Mate

    It's like I said products like FM, FDMEE, DRM and perhaps RAF depending on what happens to be stored should be considered for there own tablespace, other products, not so and can be combined in say a tablespace.

    These are all just guidelines and there is no good answer.

    See you soon

    John

  • Set up the RSA only for security server and not internally?

    Greetings,

    In the view Configuration > servers > Edit View connection servers > authentication, you can enable the RSA. However, I would like to use RSA for people who connect through the Security Server and not those who log internally.

    Does this mean that my only option is to add another view connection server and point the Security Server on this connection to the server on which I have activate the RSA?

    If so is not necessarily a problem, but it would mean, I have 3 servers of connection and server 1 safety for an environment of view rather small.

    Ideally, I was balancing these aswell which would mean 4 servers connection and 2 security servers. It is perhaps a little exaggerated, heh.

    Anyone know of an alternative solution?

    Thanks in advance!

    The way you describe it is the way to do it. The Security server is always associated with a connection to the server, so no way around it.

  • Disabled for security reasons, and more

    Someone is obviously trying to hack my account because I am now forced to reset my password several times a week. He maintains have turned off for security reasons. It is ridiculous to keep having to change my password (which is very, very strong every time - I use 1Password to generate passwords 24 characters) and then log back in to several different devices (phone samsung and tablet, for example, as well as icloud and in system preferences). So is there a way around this? Change my email apple address solve the problem? If I have to keep changing my password 3 or 4 times a week, I'll give up apple because there is no need to deal with the hassle. Apple made everything to thwart it?

    Download and run etrecheck: etrecheck.com

    It produced a list, at the top left is a 'Share' button, use 'copy to clipboard', then start your answer here and paste it into.

    Lex

  • CUPS, Jabber IM for iPhone, Mobile and external access

    Hello world

    How do you provide external secure access for email Instant Jabber for iPhone client and the Cisco Mobile customer on an iPhone?

    There are so-called security SSL for Jabber Instant Messaging, but is unable to find all the information on how. The Cisco Mobile client appears to the needs of the AnyConnect VPN client and encourage users to connect via VPN, first...

    After a bit of bumping into a wall your head wondering why there was no documentation for external access to Cisco Jabber for iPhone, I realized that Cisco Jabber IM for iPhone is an entirely different product and Jabber for iPhone seems to be the new name of Cisco Mobile customers. Yet, the only documentation I can find for the Jabber Instant Messaging is that I can "security by using the Secure Sockets Layer (SSL) encryption" but no information on implimenting it with CUPS.

    On top of that, the Jabber IM for iPhone can not make calls but rather calls Cisco Mobile, which raises the question of providing external access to this too, and the only solution I've ever found is to use the AnyConnect VPN client on the device also. Suddenly, it seems to offer a solution of Cisco Unified Communications on an iPhone, I need three different and is applications is no longer quite as unified.

    Thank you

    Mark

    Conclusions you drew on the product names are correct. They are transitioning to Jabber like a brand name, but it did not in the iOS VoIP client yet. The most recent Cisco Jabber for Android is the first to include Secure Connect (remote access protected or ensure access transparent, aka). The BU seems characteristic knocking out on a single platform and then replicating them on others before moving on to the next batch of features. I don't have a specific timetable to share but expect customers to iOS updated in the coming months with Secure Connect.

    With regard to the separate clients: I can see both sides of this room. The more I use them more, I agree with the decision to keep them separated and cross-launch when necessary. If you think it is consistent with the way the user interacts already with their phone: voice and texting are two separate applications. I suspect that the developers also get some benefits by keeping things more targeted (e.g. less than test whenever they change something). The only downside to this approach is that each app consumes its own tunnel AnyConnect on the SAA.

  • A / B testing and reports industry for e-mail and Web site reference

    Is there any report of the industry in Eloqua for email and Web site?

    Arnaud - did you use the functionality of Eloqua dashboard? in Eloqua9, you can click on the black drop-down arrow next to the name of an e-mail and view the dashboard. You can also do this for groups of emails as well. There is a gauge out there that will give you an indication of how you compare to industry benchmarks.

  • What are the best practices to install drivers for Windows 7-64 bit?

    I have HP Pavilion dv6-1115e laptop, which Windows Vista was the original OS. Recently I upgraded to Windows 7-64 bit version, but I still use pilots who originallay came for Windows Vista (no problem at all for the moment). Now I have thoughts of installing drivers that are specifically for Windows 7 64 bit to improve performance. So what I need to first uninstall each software driver and then install the new versions OR I can install them without deleting the previous versions? It would lead to a kind of shock?

    Hello:

    Normally you can just update the drivers without uninstalling existing, unless the installation instructions will tell you to do.

    Some driver packages will automatically uninstall the old drivers before installing new.

    More simply install on the current criteria. I rarely uninstall drivers before updating them.

    After you update a driver, you must always check the tab driver in the Device Manager for the device that you updated to ensure that the new driver installed. You can check this tab before update and then after you updated to note the date/version of the pilot before and the driver date and version later.

    If for some reason, there was no change, then I uninstall the current driver and try reinstalling the newest one.

    Others may have different opinions.

    Paul

  • Best practices: set a language for an InDesign document

    Comment please let me know if I'm doing this wrong.

    1. I inherited an English identity document, and when I tried the spell check ran into a problem that has been updated in 'Language' 'Spanish '. The dictionary has already been updated with English.
    2. So, I chose the cursor of the object, so that nothing in the document has been selected and then clicked on Type > character and set the language to English.
    3. In vain, spell check always for the same reason.
    4. So, I chose the cursor of the object, Cttrl + A to select the entire document and then clicked Type > character and set the language to English. Subsequently, the spell worked.

    This last step, 4, what do you expect to be necessary to set the language of a document, or step 2 should have it? Thoughts on the definition of popular document language. BTW, ID online help... bloody useless.

    Language is a character attribute, so it must be set for text. It has nothing to do with dictionaries in the preferences of your choice.

    If you are sure that there are no words that should not be attributed to English, you can use find/replace to change the language, or redefine styles. or both.

  • Beginner question: best way to add users for Secure Login Page ADF

    Hi all

    I developed a custom Login Page and created two users "abc" and "def". I am successfully able to connect, make redirects and disconnection. Now my question is, if I have to add users to applications, should I add in JAZN-"Data.xml". in Jdeveloper. Assuming that I have to add users in JAZN-"Data.xml", here are my questions

    1 it will be through Jdeveloper?. If Yes, what I have to redeploy the application every time I add users.

    2 how the Admins can add users once the development done?

    Please let me know if I understand the concept.

    Thank you

    You can use:
    -DefaultAuthenticator to directly create users on Weblogic,
    -Authenticator SQL or authenticator read-only SQL to retrieve users from DB
    -LDAP or a provider of Windows NT authentication users to retrieve different LDAP or Active Directory MS servers
    or you can combine several authenticators :)

    What you choose depends on your use case.

    Dario

Maybe you are looking for