SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Citrix BranchRepeater
Daniel Künzli, Systems Engineer ANG
Citrix Systems GmbH, Switzerland
Branch Offices Across WAN Present Obstacles

• Inefficient use and bandwidth-
  hungry applications
• Tradeoffs between data center
  consolidation and branch user
  experience
• High cost of branch office IT
Network costs are a key part of desktop virtualization


                                                        Servers
                                        Storage          20%
                                         30%

                                                           Clients
                                                            20%
                                             Networks
                                               30%




      “Networking   alone makes desktop virtualization cost-prohibitive”
Citrix Branch Repeater | The Big Picture
  Repeater Plug-in for Citrix Receiver         Data Center
                                                                 Applications:
                                                                 XenDesktop
                                                                 XenApp
                                                                 Web apps
                                                                 Email
   Mobile Users      Tele-workers                                File Servers
                                                      Repeater   SharePoint
                                                 Branch Repeater VPX

                                         WAN   Redundant Datacenter or
  Branch Offices                               Disaster Recovery Site




             Branch Repeater
          Branch Repeater VPX                            Repeater
  Branch Repeater with Windows Server               Branch Repeater VPX
Citrix Branch Repeater Product Family
Flexibility to Meet All Your Needs


                                                                         NEW!




    Repeater     Branch Repeater with                       Branch Repeater VPX
   Appliances      Windows Server       Repeater Plug-in     – Virtual Appliance
                         and            – Software Client          Software
                   Branch Repeater
                     Appliances
What is Branch Repeater VPX?



                                       Branch Repeater
 … is software that                         VPX
                               Print
  offers Branch Repeater      Server                      Branch
                                                         Services
 functionality in a virtual
 appliance form factor
            …
HDX WAN Optimization in Branch Repeater
… also in Branch Repeater VPX

                                   Traffic
              Adaptive          Prioritization
             Compression         And QoS




                                                 Adaptive
                                                 TCP Flow
                                                  Control

            Adaptive
            Protocol
           Acceleration
Deliver a high-definition user
   experience at the branch
      Accelerate print, video, launch
Reduce desktop delivery network
            costs
Cut bandwidth, energy, power & setup costs
Accelerate XenDesktop traffic across the WAN
                               Reduce bandwidth consumption
                                         by 89%

                               Reduce XenDesktop launch times
                                          by 40%

                                Deliver up to 2X the number of
                                 users on existing bandwidth

                                     Accelerate printing
                                           by 2X
VPX requirements



Citrix Confidential - Do Not Distribute
Requirements

   Citrix                                             VPX Minimum Requirements
   XenServer                                          • 1 GB RAM
                                                      • 60 GB Disk
                                                      • 2 Virtual NICs
                                                      • 1 Virtual CPU

   ESX / ESXi    In Tech
                Preview!
                                                                     Off-the-shelf server

   Hyper-V
                           Citrix Confidential - Do Not Distribute
Grow as you Need!

    Express         • 1 GB RAM, 60 GB Disk
                    • Recommended for VPX Express


                    • 1 GB RAM, 100 GB Disk
      Small         • Recommended for up to 2 Mbps
                    • 1000 Accelerated TCP connections, 50 Plug-ins

                    • 4 GB RAM, 250 GB Disk
    Medium          • Recommended for up to 45 Mbps
                    • 15,000 Accelerated TCP connections, 400 Plug-ins

                    • 8 GB RAM, 500 GB Disk
      Large         • Recommended for up to 45 Mbps
                    • 25,000 Accelerated TCP connections, 500 Plug-ins

                     Citrix Confidential - Do Not Distribute
VPX Sizing and Scaling
One physical NIC with two virtual NICs are required.
Each virtual NIC must be connected to a separate virtual network in XenCenter.
Out of band management can be handled by a third and/or fourth virtual NIC.
The VPX cannot use the fail-to-wire functionality (a dual port card is seen as 2 NICs
 with no special hardware support)
Branch Repeater
Deployment Simplicity
Full Network Transparency Means
Plug-n-play for Any Network




                  Branch Repeater                         Repeater
                                                                      Datacenter


                                    Proprietary Tunnel
  Branch Office
     Users


                    Non-Citrix                           Non-Citrix
                     WAN Op                               WAN Op
No dials, self-tuning approach to WAN optimization

                          Application Mix
                              Network Conditions




                          AutoOptimizer Engine

             TCP Flow   Compression       Protocol
                                                        QoS
              Control   De-duplication   Acceleration
Flexible deployment modes for joining the branch
network
                                            Branch Repeater
Inline                                                                          WAN
• Optional Bypass NIC    LAN Switch                              Router




Virtual Inline                                 Branch Repeater
• WCCPv2
• Policy-based Routing

                                                                          WAN
                               LAN Switch           Router
Modes – Physical Deployments

 Inline Mode (most common)



 Network will need to go down, while unit is cabled inline directly inline between WAN Router and LAN
   Switch
 Simplest Configuration (no Router/Switch configuration required)
 No traffic is allowed to bypass the Branch Repeater appliance
 Traffic flows as soon as its cabled (bypass card)
 Data flows from one accelerated eth port and is forwarded through a second port (Accelerated Pair A
   illustrated below)
Modes – Physical Deployments

 Virtual Inline Mode




 Can be deployed with no network disruption
 Uses only one Ethernet port on the BR (apA port)
 Requires Router knowledge (utilizes Policy Based Routing, rules to classify traffic and determine how its
   forwarded).
    The router redirects the packets that are destined as outbound WAN traffic
       From any LAN port other than the one used by the BR Appliance, then route traffic to the BR Appliance
       From the LAN port used by the BR Appliance, then route traffic to the WAN interface of the router
 PBR – requires the use of another physical/logical interface on the router (if not available use WCCP)
Modes – Physical Deployments

 WCCP – Web Cache Communication Protocol




 Can be deployed with no network disruption
 Requires Router knowledge (Route Policies to intercept desired traffic, route it to BR on the LAN)
 Uses a GRE tunnel (virtual communication link) between the BR and Router
 Only requirement is IP connectivity between BR and Router
 Mode contains all acceleration features
 Uses only one Ethernet port on the BR (apA port)
Modes – Physical Deployments

 HA – High Availability



 Provides protection in event of failover
 Provides two management IP addresses & one VIP address
    The subnet of the VIP address is determined by the Management IP address of both WS.


 Primary and Secondary – the primary unit handles all incoming and outgoing traffic. The secondary
   appliance takes over in the even of a failover if the primary fails.
 The first to initialize itself becomes the primary
Modes – Physical Deployments

 Group Mode



 Used for asymmetric networks
 Two or more BR inline mode, combined into a single virtual unit
 Uses forwarding rules to avoid random router packet assignment
 GM units are identified by serial # & IP address
 Individual appliances will own particular connections. If non-owning appliance receives a packet it will
   forward it to the owning appliance via GRE tunnel.
Features
Recent Accomplishments / Updates

                                    • Branch Repeater 5.7
                                     • SSL traffic acceleration and disk history
                                       encryption
                                     • Branch Repeater with Windows Server 2008
                                       R2
                                     • 64-bit Windows 7 Repeater Plug-in

• Branch Repeater VPX released!     • Branch Repeater 5.5.2 and 5.5.3
  • Virtual appliance software on
    XenServer
                                    • Notice of Status Change
• Branch Repeater VPX on Hyper-V     • Branch Repeater with Windows Server (2003
  R2 in Tech Preview!                  only) End of Sale July 31, 2010
                                     • EoM / EoL July 31, 2013
Branch Repeater Product Line & Pricing
Price $K
                                                                               Large Branch/Data center                          R 8820HS
   100

                                                                                                                                  $99,500
                                                                                                                      R 8820
    50

                                                                                                                      $49,500
    20                   Branch/Regional office                                                    R 8540

                                                                                                  $19,500
                                                                                  R 8520

                                                         BR 300                   $12,000                   VPX-45
    10                                                                                                      $13,000
                                                        $10,000+

                                       BR 200                      VPX-10
     6                                                             $7000
                                      $6,000+
                           BR 100
     4                                          VPX-2
                           $4,000+              $4000
           VPX-Express

                   $0
     0

           512Kbps         1 Mbps     2 Mbps            10 Mbps                 20 Mbps           45 Mbps             155 Mbps     500 Mbps
                                                        Citrix Confidential - Do Not Distribute                                  Bandwidth
SSL acceleration
Overview
What is the SSL Compression and Acceleration?
  SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be
   compressed using Branch Repeater’s multi-session compression engine as well as other protocol-
   specific optimizations.
  SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and
   server.



Standard SSL Connection




                                              SSL Connection
What is SSL Compression
What is the SSL Compression and Acceleration?
  SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be
   compressed using Branch Repeater’s multi-session compression engine as well as other protocol-
   specific optimizations.
  SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and
   server.



Accelerated SSL Connection




              Client Side                                                       Server Side
                                                  WAN
            SSL Connection                                                     SSL Connection
                                                SSL Tunnel
What is SSL Compression

Accelerated SSL Connection




             Client Side                                                  Server Side
                                              WAN
           SSL Connection                                                SSL Connection
                                            SSL Tunnel


• Branch Repeater has access to the clear text data of the SSL connection because the sever-
  side Branch Repeater Appliance acts as a security delegate of the endpoint server(s).

• The appliance is functioning as a security delegate of the server, therefore most configuration
  is on the server-side Branch Repeater.
What is SSL Compression
What is SSL Signaling?

                                       Peer Relationship and
                                      SSL Signaling Connection




             Client Side                                                 Server Side
           SSL Connection                                               SSL Connection
                                        SSL Data Connection


• Signaling refers to the connection, authentication and configuration between two
  appliances/endpoints.

• The Data Connection refers is the secure connection used to transmit encrypted data
  between two appliances/endpoints.
How SSL Compression Works
SSL Split Proxy Mode Overview

                                                               The server-side Branch Repeater
                                     Peer Relationship and      is allowed to act on the server’s
                                    SSL Signaling Connection
                                                                             behalf.




                                      SSL Data Connection


 • Split Proxy Mode will be used in most deployment
   scenarios where Temp RSA or Diffie-Hellman key                 •SSL Credentials (certificate and
   exchange is required.                                          public key) from either an local
                                                                  enterprise CA or the server itself
 • The server-side Branch Repeater masquerades as the             are installed on the server-side
   server to the client and proxies the connection.               Repeater.

 • Client authentication is not supported.
How SSL Compression Works
SSL Transparent Proxy Mode Overview

                                      Peer Relationship and
                                     SSL Signaling Connection




                                         SSL Data Connection


 • The server-side Branch Repeater acts on behalf of the
   server, decrypting and re-encrypting on the fly, using the       •The server’s SSL credentials
   server’s private key(s).                                         (public and private keys)
                                                                    must be installed on both the
 • Client authentication is supported.                              server and the Branch
                                                                    Repeater.
 • The client sees the connection as if it is connection directly
   to the server.
How SSL Compression Works
SSL Transparent Proxy Mode Overview

                                     Peer Relationship and
                                    SSL Signaling Connection




                                      SSL Data Connection


 • Temp RSA and Diffie-Helman key exchange is not
   supported.                                                  •The server’s SSL credentials
                                                               (public and private keys)
 • TLS Session tickets and SSL v2 is not supported in this     must be installed on both the
   mode.                                                       server and the Branch
                                                               Repeater.
 • Any session renegotiation will result in a connection
   termination.
WAN Optimierung mit Citrix Branch Repeater

Contenu connexe

Tendances

Server Virtualization using Hyper-V
Server Virtualization using Hyper-VServer Virtualization using Hyper-V
Server Virtualization using Hyper-VMd Yousup Faruqu
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppCitrix
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewITCamp
 
TechNet Live spor 1 sesjon 6 - more vdi
TechNet Live spor 1   sesjon 6 - more vdiTechNet Live spor 1   sesjon 6 - more vdi
TechNet Live spor 1 sesjon 6 - more vdiAnders Borchsenius
 
C3 Citrix Cloud Center
C3 Citrix Cloud CenterC3 Citrix Cloud Center
C3 Citrix Cloud CenterRui Lopes
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationsolarisyougood
 
What is Coming in Hyper-V Vnext on Windows 8
What is Coming in Hyper-V Vnext on Windows 8What is Coming in Hyper-V Vnext on Windows 8
What is Coming in Hyper-V Vnext on Windows 8Lai Yoong Seng
 
High Performance Cloud Computing
High Performance Cloud ComputingHigh Performance Cloud Computing
High Performance Cloud ComputingNephoScale
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVSDavid McGeough
 
Designing your xen app 7.5 environment
Designing your xen app 7.5 environmentDesigning your xen app 7.5 environment
Designing your xen app 7.5 environmentsolarisyougood
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VLai Yoong Seng
 
The Next Generation of Microsoft Virtualization With Windows Server 2012
The Next Generation of Microsoft Virtualization With Windows Server 2012The Next Generation of Microsoft Virtualization With Windows Server 2012
The Next Generation of Microsoft Virtualization With Windows Server 2012Lai Yoong Seng
 
Building Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper VBuilding Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper Vrsnarayanan
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentHuy Pham
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesDavid McGeough
 
17 dani künzli citrix repeater 4
17 dani künzli citrix repeater 417 dani künzli citrix repeater 4
17 dani künzli citrix repeater 4Digicomp Academy AG
 

Tendances (19)

Server Virtualization using Hyper-V
Server Virtualization using Hyper-VServer Virtualization using Hyper-V
Server Virtualization using Hyper-V
 
What's new in XenDesktop and XenApp
What's new in XenDesktop and XenAppWhat's new in XenDesktop and XenApp
What's new in XenDesktop and XenApp
 
Tudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overviewTudor Damian - Hyper-V 3.0 overview
Tudor Damian - Hyper-V 3.0 overview
 
TechNet Live spor 1 sesjon 6 - more vdi
TechNet Live spor 1   sesjon 6 - more vdiTechNet Live spor 1   sesjon 6 - more vdi
TechNet Live spor 1 sesjon 6 - more vdi
 
Xrm xensummit
Xrm xensummitXrm xensummit
Xrm xensummit
 
C3 Citrix Cloud Center
C3 Citrix Cloud CenterC3 Citrix Cloud Center
C3 Citrix Cloud Center
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
What is Coming in Hyper-V Vnext on Windows 8
What is Coming in Hyper-V Vnext on Windows 8What is Coming in Hyper-V Vnext on Windows 8
What is Coming in Hyper-V Vnext on Windows 8
 
High Performance Cloud Computing
High Performance Cloud ComputingHigh Performance Cloud Computing
High Performance Cloud Computing
 
Workload Optimization
Workload OptimizationWorkload Optimization
Workload Optimization
 
Implementing and Troubleshooting PVS
Implementing and Troubleshooting PVSImplementing and Troubleshooting PVS
Implementing and Troubleshooting PVS
 
Designing your xen app 7.5 environment
Designing your xen app 7.5 environmentDesigning your xen app 7.5 environment
Designing your xen app 7.5 environment
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-V
 
The Next Generation of Microsoft Virtualization With Windows Server 2012
The Next Generation of Microsoft Virtualization With Windows Server 2012The Next Generation of Microsoft Virtualization With Windows Server 2012
The Next Generation of Microsoft Virtualization With Windows Server 2012
 
Building Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper VBuilding Business Continuity Solutions With Hyper V
Building Business Continuity Solutions With Hyper V
 
Licensing 2013 v1.0
Licensing 2013   v1.0Licensing 2013   v1.0
Licensing 2013 v1.0
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
 
Configuring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop SitesConfiguring and Troubleshooting XenDesktop Sites
Configuring and Troubleshooting XenDesktop Sites
 
17 dani künzli citrix repeater 4
17 dani künzli citrix repeater 417 dani künzli citrix repeater 4
17 dani künzli citrix repeater 4
 

Similaire à WAN Optimierung mit Citrix Branch Repeater

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1Digicomp Academy AG
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionDigicomp Academy AG
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009csharney
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetNuno Alves
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VDenis Gundarev
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 OverviewTudor Damian
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
 
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...scarisbrick
 
Net scaler vpx
Net scaler vpxNet scaler vpx
Net scaler vpxNuno Alves
 
Cloud infrastructure, IaaS
Cloud infrastructure,  IaaSCloud infrastructure,  IaaS
Cloud infrastructure, IaaSSATYAVEER PAL
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computingEMC Forum India
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
 
Citrix virtual computing
Citrix virtual computingCitrix virtual computing
Citrix virtual computinggadi_fe
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMd Yousup Faruqu
 
QLogic Adapters & Virtualized Environments
QLogic Adapters & Virtualized EnvironmentsQLogic Adapters & Virtualized Environments
QLogic Adapters & Virtualized EnvironmentsQLogic Corporation
 
Microsoft Pwrpt
Microsoft PwrptMicrosoft Pwrpt
Microsoft PwrptRBratton
 

Similaire à WAN Optimierung mit Citrix Branch Repeater (20)

5 dani künzli citrix networking news 1
5 dani künzli citrix networking news 15 dani künzli citrix networking news 1
5 dani künzli citrix networking news 1
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introduction
 
Nevmug Green Pages Cisco Nexus January 2009
Nevmug   Green Pages Cisco   Nexus January 2009Nevmug   Green Pages Cisco   Nexus January 2009
Nevmug Green Pages Cisco Nexus January 2009
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater Datasheet
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-VRUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
 
Daniel künzli branch repeater
Daniel künzli branch repeaterDaniel künzli branch repeater
Daniel künzli branch repeater
 
Hyper-V 3.0 Overview
Hyper-V 3.0 OverviewHyper-V 3.0 Overview
Hyper-V 3.0 Overview
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
 
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
 
Net scaler vpx
Net scaler vpxNet scaler vpx
Net scaler vpx
 
Cloud infrastructure, IaaS
Cloud infrastructure,  IaaSCloud infrastructure,  IaaS
Cloud infrastructure, IaaS
 
Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009Citrix Vision And Strategy Oct 2009
Citrix Vision And Strategy Oct 2009
 
Track 3 - next generation computing
Track 3 - next generation computingTrack 3 - next generation computing
Track 3 - next generation computing
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
 
Citrix virtual computing
Citrix virtual computingCitrix virtual computing
Citrix virtual computing
 
Microsoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private CloudMicrosoft Server Virtualization and Private Cloud
Microsoft Server Virtualization and Private Cloud
 
QLogic Adapters & Virtualized Environments
QLogic Adapters & Virtualized EnvironmentsQLogic Adapters & Virtualized Environments
QLogic Adapters & Virtualized Environments
 
XenDesktop Features Presentation 25022010
XenDesktop Features Presentation 25022010XenDesktop Features Presentation 25022010
XenDesktop Features Presentation 25022010
 
Microsoft Pwrpt
Microsoft PwrptMicrosoft Pwrpt
Microsoft Pwrpt
 

Plus de Digicomp Academy AG

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Digicomp Academy AG
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Digicomp Academy AG
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Digicomp Academy AG
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutDigicomp Academy AG
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutDigicomp Academy AG
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xDigicomp Academy AG
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Digicomp Academy AG
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Digicomp Academy AG
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattDigicomp Academy AG
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogDigicomp Academy AG
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnDigicomp Academy AG
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessDigicomp Academy AG
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Digicomp Academy AG
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceDigicomp Academy AG
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudDigicomp Academy AG
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slidesDigicomp Academy AG
 

Plus de Digicomp Academy AG (20)

Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
Becoming Agile von Christian Botta – Personal Swiss Vortrag 2019
 
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
Swiss IPv6 Council – Case Study - Deployment von IPv6 in einer Container Plat...
 
Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018Innovation durch kollaboration gennex 2018
Innovation durch kollaboration gennex 2018
 
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handoutRoger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
Roger basler meetup_digitale-geschaeftsmodelle-entwickeln_handout
 
Roger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handoutRoger basler meetup_21082018_work-smarter-not-harder_handout
Roger basler meetup_21082018_work-smarter-not-harder_handout
 
Xing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit xXing expertendialog zu nudge unit x
Xing expertendialog zu nudge unit x
 
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
Responsive Organisation auf Basis der Holacracy – nur ein Hype oder die Zukunft?
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Agiles Management - Wie geht das?
Agiles Management - Wie geht das?Agiles Management - Wie geht das?
Agiles Management - Wie geht das?
 
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi OdermattGewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
Gewinnen Sie Menschen und Ziele - Referat von Andi Odermatt
 
Querdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING ExpertendialogQuerdenken mit Kreativitätsmethoden – XING Expertendialog
Querdenken mit Kreativitätsmethoden – XING Expertendialog
 
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickelnXing LearningZ: Digitale Geschäftsmodelle entwickeln
Xing LearningZ: Digitale Geschäftsmodelle entwickeln
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
UX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital BusinessUX – Schlüssel zum Erfolg im Digital Business
UX – Schlüssel zum Erfolg im Digital Business
 
Minenfeld IPv6
Minenfeld IPv6Minenfeld IPv6
Minenfeld IPv6
 
Was ist design thinking
Was ist design thinkingWas ist design thinking
Was ist design thinking
 
Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich Die IPv6 Journey der ETH Zürich
Die IPv6 Journey der ETH Zürich
 
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)CommerceXing LearningZ: Die 10 + 1 Trends im (E-)Commerce
Xing LearningZ: Die 10 + 1 Trends im (E-)Commerce
 
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloudZahlen Battle: klassische werbung vs.online-werbung-somexcloud
Zahlen Battle: klassische werbung vs.online-werbung-somexcloud
 
General data protection regulation-slides
General data protection regulation-slidesGeneral data protection regulation-slides
General data protection regulation-slides
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

WAN Optimierung mit Citrix Branch Repeater

  • 1. Citrix BranchRepeater Daniel Künzli, Systems Engineer ANG Citrix Systems GmbH, Switzerland
  • 2. Branch Offices Across WAN Present Obstacles • Inefficient use and bandwidth- hungry applications • Tradeoffs between data center consolidation and branch user experience • High cost of branch office IT
  • 3. Network costs are a key part of desktop virtualization Servers Storage 20% 30% Clients 20% Networks 30% “Networking alone makes desktop virtualization cost-prohibitive”
  • 4. Citrix Branch Repeater | The Big Picture Repeater Plug-in for Citrix Receiver Data Center Applications: XenDesktop XenApp Web apps Email Mobile Users Tele-workers File Servers Repeater SharePoint Branch Repeater VPX WAN Redundant Datacenter or Branch Offices Disaster Recovery Site Branch Repeater Branch Repeater VPX Repeater Branch Repeater with Windows Server Branch Repeater VPX
  • 5. Citrix Branch Repeater Product Family Flexibility to Meet All Your Needs NEW! Repeater Branch Repeater with Branch Repeater VPX Appliances Windows Server Repeater Plug-in – Virtual Appliance and – Software Client Software Branch Repeater Appliances
  • 6. What is Branch Repeater VPX? Branch Repeater … is software that VPX Print offers Branch Repeater Server Branch Services functionality in a virtual appliance form factor …
  • 7. HDX WAN Optimization in Branch Repeater … also in Branch Repeater VPX Traffic Adaptive Prioritization Compression And QoS Adaptive TCP Flow Control Adaptive Protocol Acceleration
  • 8. Deliver a high-definition user experience at the branch Accelerate print, video, launch Reduce desktop delivery network costs Cut bandwidth, energy, power & setup costs
  • 9. Accelerate XenDesktop traffic across the WAN Reduce bandwidth consumption by 89% Reduce XenDesktop launch times by 40% Deliver up to 2X the number of users on existing bandwidth Accelerate printing by 2X
  • 11. Requirements Citrix VPX Minimum Requirements XenServer • 1 GB RAM • 60 GB Disk • 2 Virtual NICs • 1 Virtual CPU ESX / ESXi In Tech Preview! Off-the-shelf server Hyper-V Citrix Confidential - Do Not Distribute
  • 12. Grow as you Need! Express • 1 GB RAM, 60 GB Disk • Recommended for VPX Express • 1 GB RAM, 100 GB Disk Small • Recommended for up to 2 Mbps • 1000 Accelerated TCP connections, 50 Plug-ins • 4 GB RAM, 250 GB Disk Medium • Recommended for up to 45 Mbps • 15,000 Accelerated TCP connections, 400 Plug-ins • 8 GB RAM, 500 GB Disk Large • Recommended for up to 45 Mbps • 25,000 Accelerated TCP connections, 500 Plug-ins Citrix Confidential - Do Not Distribute
  • 13. VPX Sizing and Scaling One physical NIC with two virtual NICs are required. Each virtual NIC must be connected to a separate virtual network in XenCenter. Out of band management can be handled by a third and/or fourth virtual NIC. The VPX cannot use the fail-to-wire functionality (a dual port card is seen as 2 NICs with no special hardware support)
  • 15. Full Network Transparency Means Plug-n-play for Any Network Branch Repeater Repeater Datacenter Proprietary Tunnel Branch Office Users Non-Citrix Non-Citrix WAN Op WAN Op
  • 16. No dials, self-tuning approach to WAN optimization Application Mix Network Conditions AutoOptimizer Engine TCP Flow Compression Protocol QoS Control De-duplication Acceleration
  • 17. Flexible deployment modes for joining the branch network Branch Repeater Inline WAN • Optional Bypass NIC LAN Switch Router Virtual Inline Branch Repeater • WCCPv2 • Policy-based Routing WAN LAN Switch Router
  • 18. Modes – Physical Deployments Inline Mode (most common) Network will need to go down, while unit is cabled inline directly inline between WAN Router and LAN Switch Simplest Configuration (no Router/Switch configuration required) No traffic is allowed to bypass the Branch Repeater appliance Traffic flows as soon as its cabled (bypass card) Data flows from one accelerated eth port and is forwarded through a second port (Accelerated Pair A illustrated below)
  • 19. Modes – Physical Deployments Virtual Inline Mode Can be deployed with no network disruption Uses only one Ethernet port on the BR (apA port) Requires Router knowledge (utilizes Policy Based Routing, rules to classify traffic and determine how its forwarded). The router redirects the packets that are destined as outbound WAN traffic From any LAN port other than the one used by the BR Appliance, then route traffic to the BR Appliance From the LAN port used by the BR Appliance, then route traffic to the WAN interface of the router PBR – requires the use of another physical/logical interface on the router (if not available use WCCP)
  • 20. Modes – Physical Deployments WCCP – Web Cache Communication Protocol Can be deployed with no network disruption Requires Router knowledge (Route Policies to intercept desired traffic, route it to BR on the LAN) Uses a GRE tunnel (virtual communication link) between the BR and Router Only requirement is IP connectivity between BR and Router Mode contains all acceleration features Uses only one Ethernet port on the BR (apA port)
  • 21. Modes – Physical Deployments HA – High Availability Provides protection in event of failover Provides two management IP addresses & one VIP address The subnet of the VIP address is determined by the Management IP address of both WS. Primary and Secondary – the primary unit handles all incoming and outgoing traffic. The secondary appliance takes over in the even of a failover if the primary fails. The first to initialize itself becomes the primary
  • 22. Modes – Physical Deployments Group Mode Used for asymmetric networks Two or more BR inline mode, combined into a single virtual unit Uses forwarding rules to avoid random router packet assignment GM units are identified by serial # & IP address Individual appliances will own particular connections. If non-owning appliance receives a packet it will forward it to the owning appliance via GRE tunnel.
  • 24. Recent Accomplishments / Updates • Branch Repeater 5.7 • SSL traffic acceleration and disk history encryption • Branch Repeater with Windows Server 2008 R2 • 64-bit Windows 7 Repeater Plug-in • Branch Repeater VPX released! • Branch Repeater 5.5.2 and 5.5.3 • Virtual appliance software on XenServer • Notice of Status Change • Branch Repeater VPX on Hyper-V • Branch Repeater with Windows Server (2003 R2 in Tech Preview! only) End of Sale July 31, 2010 • EoM / EoL July 31, 2013
  • 25. Branch Repeater Product Line & Pricing Price $K Large Branch/Data center R 8820HS 100 $99,500 R 8820 50 $49,500 20 Branch/Regional office R 8540 $19,500 R 8520 BR 300 $12,000 VPX-45 10 $13,000 $10,000+ BR 200 VPX-10 6 $7000 $6,000+ BR 100 4 VPX-2 $4,000+ $4000 VPX-Express $0 0 512Kbps 1 Mbps 2 Mbps 10 Mbps 20 Mbps 45 Mbps 155 Mbps 500 Mbps Citrix Confidential - Do Not Distribute Bandwidth
  • 27. Overview What is the SSL Compression and Acceleration? SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be compressed using Branch Repeater’s multi-session compression engine as well as other protocol- specific optimizations. SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and server. Standard SSL Connection SSL Connection
  • 28. What is SSL Compression What is the SSL Compression and Acceleration? SSL compression allows standard SSL-based connections (HTTPS traffic, for example) to be compressed using Branch Repeater’s multi-session compression engine as well as other protocol- specific optimizations. SSL compression utilizes SSL certificate exchange to decrypt and re-encrypt traffic between client and server. Accelerated SSL Connection Client Side Server Side WAN SSL Connection SSL Connection SSL Tunnel
  • 29. What is SSL Compression Accelerated SSL Connection Client Side Server Side WAN SSL Connection SSL Connection SSL Tunnel • Branch Repeater has access to the clear text data of the SSL connection because the sever- side Branch Repeater Appliance acts as a security delegate of the endpoint server(s). • The appliance is functioning as a security delegate of the server, therefore most configuration is on the server-side Branch Repeater.
  • 30. What is SSL Compression What is SSL Signaling? Peer Relationship and SSL Signaling Connection Client Side Server Side SSL Connection SSL Connection SSL Data Connection • Signaling refers to the connection, authentication and configuration between two appliances/endpoints. • The Data Connection refers is the secure connection used to transmit encrypted data between two appliances/endpoints.
  • 31. How SSL Compression Works SSL Split Proxy Mode Overview The server-side Branch Repeater Peer Relationship and is allowed to act on the server’s SSL Signaling Connection behalf. SSL Data Connection • Split Proxy Mode will be used in most deployment scenarios where Temp RSA or Diffie-Hellman key •SSL Credentials (certificate and exchange is required. public key) from either an local enterprise CA or the server itself • The server-side Branch Repeater masquerades as the are installed on the server-side server to the client and proxies the connection. Repeater. • Client authentication is not supported.
  • 32. How SSL Compression Works SSL Transparent Proxy Mode Overview Peer Relationship and SSL Signaling Connection SSL Data Connection • The server-side Branch Repeater acts on behalf of the server, decrypting and re-encrypting on the fly, using the •The server’s SSL credentials server’s private key(s). (public and private keys) must be installed on both the • Client authentication is supported. server and the Branch Repeater. • The client sees the connection as if it is connection directly to the server.
  • 33. How SSL Compression Works SSL Transparent Proxy Mode Overview Peer Relationship and SSL Signaling Connection SSL Data Connection • Temp RSA and Diffie-Helman key exchange is not supported. •The server’s SSL credentials (public and private keys) • TLS Session tickets and SSL v2 is not supported in this must be installed on both the mode. server and the Branch Repeater. • Any session renegotiation will result in a connection termination.