Dell Precision R5400 Remote Access Device: Networking Considerations - Page 12
Firewall Considerations, Virtual Private Network VPN Considerations, Conclusion
View all Dell Precision R5400 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 12 highlights
Firewall Considerations For PC-over-IP traffic to pass through a firewall, the firewall must be configured to support IPSEC traffic and also have the ports in Table 4 opened. Table 4: TCP and UDP Ports Required for a PC-over-IP System Port TCP Ports UDP Ports Optional TCP port Port Number 21, 51, 80, 427, 443, 8000, 50000, 50001 53, 67, 68, 427 3389 (for optional RDP mode operation) Virtual Private Network (VPN) Considerations PC-over-IP technology can be securely run on public networks since all traffic is fully encrypted - 128-bit AES for display, USB and HD audio media streams and SSL for management and configuration traffic. However, PCover-IP technology can also operate within a hardware VPN environment as shown in Figure 5. An appropriate MTU size must be selected in the PCoIP host and portal to prevent IP packet fragmentation. The default MTU size is 1400 bytes, which can fit well in most VPN environments. Figure 5: PC-over-IP Hardware VPN Example Datacenter User Desktops Hardware VPN Blade PC's or Workstations Internet Hardware VPN Desktop Portal Conclusion Teradici's innovative PCoIP technology provides advanced capabilities for delivering a true PC experience over standard enterprise IP networks. The network traffic generated by a user desktop - display graphics, keyboard, mouse, audio etc - is dynamically managed and can be highly compressed to optimize use of network resources. This enables large-scale deployment over existing network infrastructure while maintaining a rich user experience. Additional features such as fair dynamic bandwidth sharing and the ability to impose soft and hard bandwidth consumption limits provide optional tools for IT administrators to seamlessly integrate PCoIP technology within their network infrastructure. As a result, enterprises can use PCoIP technology to consolidate individual desktop PCs and workstations and gather all of the company's applications and data storage into a single secure location. This creates safeguards against virus incursions and security breaches while simplifying compliance, boosting reliability and enabling cost-effective desktop management. TER0806005 Issue 1 12