Dell Precision R5400 Remote Access Device: Networking Considerations - Page 12

Firewall Considerations, Virtual Private Network VPN Considerations, Conclusion

Page 12 highlights

Firewall Considerations For PC-over-IP traffic to pass through a firewall, the firewall must be configured to support IPSEC traffic and also have the ports in Table 4 opened. Table 4: TCP and UDP Ports Required for a PC-over-IP System Port TCP Ports UDP Ports Optional TCP port Port Number 21, 51, 80, 427, 443, 8000, 50000, 50001 53, 67, 68, 427 3389 (for optional RDP mode operation) Virtual Private Network (VPN) Considerations PC-over-IP technology can be securely run on public networks since all traffic is fully encrypted - 128-bit AES for display, USB and HD audio media streams and SSL for management and configuration traffic. However, PCover-IP technology can also operate within a hardware VPN environment as shown in Figure 5. An appropriate MTU size must be selected in the PCoIP host and portal to prevent IP packet fragmentation. The default MTU size is 1400 bytes, which can fit well in most VPN environments. Figure 5: PC-over-IP Hardware VPN Example Datacenter User Desktops Hardware VPN Blade PC's or Workstations Internet Hardware VPN Desktop Portal Conclusion Teradici's innovative PCoIP technology provides advanced capabilities for delivering a true PC experience over standard enterprise IP networks. The network traffic generated by a user desktop - display graphics, keyboard, mouse, audio etc - is dynamically managed and can be highly compressed to optimize use of network resources. This enables large-scale deployment over existing network infrastructure while maintaining a rich user experience. Additional features such as fair dynamic bandwidth sharing and the ability to impose soft and hard bandwidth consumption limits provide optional tools for IT administrators to seamlessly integrate PCoIP technology within their network infrastructure. As a result, enterprises can use PCoIP technology to consolidate individual desktop PCs and workstations and gather all of the company's applications and data storage into a single secure location. This creates safeguards against virus incursions and security breaches while simplifying compliance, boosting reliability and enabling cost-effective desktop management. TER0806005 Issue 1 12

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13

TER0806005 Issue 1
12
Firewall Considerations
For PC-over-IP traffic to pass through a firewall, the firewall must be configured to support IPSEC traffic and
also have the ports in Table 4 opened.
Table 4: TCP and UDP Ports Required for a PC-over-IP System
Port
Port Number
TCP Ports
21, 51, 80, 427, 443, 8000, 50000, 50001
UDP Ports
53, 67, 68, 427
Optional TCP port
3389 (for optional RDP mode operation)
Virtual Private Network (VPN) Considerations
PC-over-IP technology can be securely run on public networks since all traffic is fully encrypted - 128-bit AES
for display, USB and HD audio media streams and SSL for management and configuration traffic. However, PC-
over-IP technology can also operate within a hardware VPN environment as shown in Figure 5. An appropriate
MTU size must be selected in the PCoIP host and portal to prevent IP packet fragmentation. The default MTU
size is 1400 bytes, which can fit well in most VPN environments.
Figure 5: PC-over-IP Hardware VPN Example
Conclusion
Teradici’s innovative PCoIP technology provides advanced capabilities for delivering a true PC experience over
standard enterprise IP networks. The network traffic generated by a user desktop – display graphics, keyboard,
mouse, audio etc - is dynamically managed and can be highly compressed to optimize use of network
resources. This enables large-scale deployment over existing network infrastructure while maintaining a rich
user experience.
Additional features such as fair dynamic bandwidth sharing and the ability to impose soft and hard bandwidth
consumption limits provide optional tools for IT administrators to seamlessly integrate PCoIP technology within
their network infrastructure. As a result, enterprises can use PCoIP technology to consolidate individual desktop
PCs and workstations and gather all of the company’s applications and data storage into a single secure
location. This creates safeguards against virus incursions and security breaches while simplifying compliance,
boosting reliability and enabling cost-effective desktop management.
Desktop Portal
Blade PC’s
or Workstations
Datacenter
User Desktops
Internet
Desktop Portal
Blade PC’s
or Workstations
Hardware
VPN
Hardware
VPN
Datacenter
User Desktops
Internet