Methods of granting a user remote access to the blade PC................................................................ 8
CCI design considerations .................................................................................................................... 9
CCI static configuration network considerations................................................................................... 9
When to and when NOT to collocate blade PCs in a Data Center ......................................................... 9
Additional Active Directory information .................................................................................................. 9
Using an alias record in DNS............................................................................................................ 9
Using a static IP address ................................................................................................................... 9
Using a dynamic register through DHCP ............................................................................................. 9
Using security groups ....................................................................................................................... 9
For more information.......................................................................................................................... 10
Abstract
This document provides information on design considerations specific for the Static model
implementation of the HP Consolidated Client Infrastructure (CCI) Solution. The static configuration is
for customers who do not wish to dynamically allocate users to blade PCs. Instead, each user
connects directly to a statically assigned blade PC that is dedicated for use by that specific user.
Document Scope
This paper assumes that the reader already has a basic understanding of how CCI works and how it
is deployed in a dynamic configuration that allocates clients to blade PCs on-demand. To provide a
working example, this document describes a CCI Static implementation with the least amount of user
restriction to make the implementation as simple as possible. It will also cover static design options to
be considered when customizing the implementation to satisfy the customer’s requirements. This
paper provides information on design considerations specific for the Static implementation and is not
intended to communicate a baseline static configuration. Each customer site will require customization
for each of the CCI configurable items described in the following sections.
Static confguration description
The CCI Static configuration requires each user to be assigned to a specific blade PC. Every time the
user logs on, the user connects to their assigned blade PC. The CCI Static configuration does not
require use of an allocation engine, which can result in a simplified design and installation of a CCI
solution. Though generally simpler to implement, an increase in manual effort is required to manage
the user-to-blade PC assignments. As the number of users and blade PCs increase, the management of
a static CCI model can be more challenging due to:
• The IT staff having to establish procedures for assigning users to individual blades.
• The possibility of a catastrophic blade PC failure, requiring the user to phone the help desk, report
the issue, and be reassigned to another available blade PC. In contrast, dynamic CCI model users
are automatically assigned to different blade PCs in the event of blade failure.
Conversely, the static CCI model offers some design flexibility that is not available in a typical
dynamic CCI model.
• Although not recommended, user data files can be stored on the local hard drive of the blade PC.
However, without the use of an enterprise data backup solution deployed on each blade PC, end
users would be giving up the data protection provided by using network storage and backup
processes. IT staff would be giving up the ability to easily manage the blade PC image. The image
restore process will have to consider the user’s data files stored on the blade PC.
• A static configuration could offer less-restrictive policies on the blade PC, such as application
installation. With the dynamic CCI model, it is not logical to allow users to install software directly
to the blade PC because there is no guarantee that the user will connect to the same blade PC in
future logins. In a dynamic model, a ‘locked-down’ image ensures fewer calls to the Help Desk
asking for assistance in fixing image problems or eradicating viruses. When business requirements
make such restrictive policies inappropriate, the static CCI model may be a better option even
though many of the cost savings of a dynamic CCI implementation may not be realized.
• The static model can be configured so that the “follow-me roaming” feature is enabled. This means
that because each user is assigned to one specific blade PC, the user can move to another access
device, log in from there, and take over their active session.
• The static model can be configured to allow the user to disconnect from their blade PC without
logging off of their session. They will then be able to reconnect to their session and have access to
any open applications and data unchanged from when they disconnected.
2
Static Topology
Note:
Network Infrastructure Design can and should change to fit into the customers existing network and or
business requirements. Figure 1 below depicts an example of a simple network using just one VLAN.
Figure 1. CCI static topology with single VLAN
NIC B
NIC B
NIC B
NIC B
Blade 1
Blade 4
Blade 3
Blade 2
HP PC Blade Enclosure
NIC B
Blade 5
LAN Segment 2
NIC B
NIC B
NIC B
Blade 8
Blade 7
Blade 6
NIC B
NIC B
Blade 10
Blade 9
NIC B
NIC B
Blade 12
Blade 11
NIC B
NIC B
Blade 14
Blade 13
NIC B
NIC B
Blade 16
Blade 15
NIC B
NIC B
Blade 17
Blade 18
NIC B
NIC B
Blade 20
Blade 19
(NIC Bs disabled)
NIC A
Thin
Clients
Domain Controller/
DHCP/DNS
Altiris/
HPSIM (RDP)
Generic
Devices
NAS – File Shares
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
LAN Segment 1
NIC A
NIC A
NIC A
L2 Switch
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
NIC A
(NIC A IPs
assigned by DHCP)
WAN
Router
3
Figure 2 shows an example of a two VLAN Network design (Allows separation of the Blade PC
Imaging from daily network traffic).
Figure 2. CCI static topology with two VLANs
Altiris/
HPSIM (RDP)
with PXE/DHCP
HP PC Blade Enclosure
NIC A
NIC A
NIC A
Blade 3
Blade 2
Blade 1
NIC B
NIC B
NIC B
Thin
Clients
Domain Controller/
DHCP/DNS
NIC A
NIC A
Blade 5
Blade 4
NIC B
NIC B
LAN Segment 1
NIC A
NIC A
NIC A
Blade 8
Blade 7
Blade 6
NIC B
NIC B
NIC B
LAN Segment 2
NIC A
NIC A
NIC A
Blade 11
Blade 10
Blade 9
NIC B
NIC B
NIC B
L2 Switch
NIC A
NIC A
Blade 13
Blade 12
NIC B
NIC B
NIC A
NIC A
Blade 14
Blade 15
NIC B
NIC B
NIC A
NIC A
Blade 17
Blade 16
NIC B
NIC B
NIC A
Blade 18
NIC B
NIC A
NIC A
Blade 20
Blade 19
NIC B
NIC B
(Segment 1
NIC IPs
assigned by DHCP)
(Segment 2
NIC IPs assigned
by DHCP)
Generic
Devices
NAS – File Shares
WAN
Router
4
Static configuration design considerations
Outlined below is the most basic Static Configuration. Compared to the dynamic CCI model, this
basic static configuration has increased risk of software image issues including viruses or losing user
data stored locally on the blade PC hard drive. Also provided is a list of customizable items that may
be considered when designing the static CCI solution to satisfy the customer’s business requirements.
Basic Static Configuration
The Basic CCI Static Configuration is similar to an unmanaged corporate PC with extended/remote
I/O devices, as described in Table 1. This configuration utilizes the least amount of user restrictions
and ease of implementation, in which each user has local Administrative privileges to their specific
blade PC.
Table 1. Basic static configuration settings
Parameter Setting
Blade PC setup Like other corporate PCs with added
CCI Blade PC tweaks and software
User-to-blade ratio One blade PC per user
Hard drive No file access restrictions
User profile Stored on blade PC hard drive (no
roaming profile)
CCI group policy restrictions Not implemented or few restrictions
User privileges User has local admin privileges
User data location Stored locally on blade PC hard drive
(no folder redirection)
User grouping All users in blade PC remote desktop
user security group
Access device (Thin Client) Kiosk mode, single or direct connect
5
CCI User-based Configuration options
Once the basic configuration is established, configuration options are available that allow ease of
management, security, reliability and maintenance. The options described below are controlled by
Active Directory Group Policy settings. Refer to the Policy Implementation and Recommendation Guide for the Consolidated Client Infrastructure (CCI) document for additional information about the Group
Policy Objects which affect the CCI solution behavior.
Hard drive File Access
• Affected behaviors:
– Blade PC hard drive access
– Microsoft hot fix install process
– Application installation or removal
– Limited User privileges or Local Admin Privilege
– Blade PC image management process
• Impact of restricting user access to file on the hard drive:
– Image is managed by IT staff – blade PC images can be restored with no impact to user. IT staff
guarantees the desired OS hot fixes are installed and application versions are the desired
revisions.
– Could require IT maintenance for multiple blade PC images to meet the user base requirements
– Users do not have the ability to install harmful or non-licensed software.
– Requires the availability of network storage for User Data files where it can be backed up
protecting it from hard drive failure.
– Blade PC’s can be housed in the data center behind data center firewalls, benefiting from
increased security native to data centers.
– Requires folder redirection to be implemented
• Impact of NOT restricting user access to files on the hard drive:
– IT staff could maintain one baseline image and delegate the responsibility of customizing the
image to the users.
– IT staff may not be able to restore blade PCs without affecting user data.
– Users can be made responsible for managing the blade PC image.
– Users have the ability to install any software applications increasing the risk of infecting blade PC
with a virus or incompatible software versions.
– Users can store data files locally on the blade PC hard drive making it vulnerable to data loss
caused by hard drive and image failure. User may be required to perform backups.
– Does not require the purchase of network storage, which simplifies the network configuration
– It is not recommended for blade PC to be housed behind data center firewalls, potential for
regular users to install malicious software to systems behind Data Center firewalls
6
Roaming profile
• Affected behaviors:
– User profile is available for any blade PC logged into, enabling the user’s environment to follow
him/her to any blade PC logged into.
• Impact of using Roaming profiles:
– Need to limit what is included in the profile. The larger the profile, the longer it takes to log in
– Enables user work environment settings to be stored on network storage
– Could cause unwanted merging of profiles with NON-CCI production systems.
– Improper session closures could result in corrupted profiles.
– May require installation of Microsoft’s user profile hive clean up utility , found at:
• Impact of NOT using Roaming profiles:
– User has to reconfigure work environment and settings if assigned a new blade PC.
– Does not require network storage to upload profile
Folder Redirection
Note:
If user’s My Documents, Application Data, Desktop and Start Menu are redirected; the customer will
have a greater opportunity to backup and protect user data. IT Staff could then manage the blade PC
image(s) without having to worry about erasing user data.
Folder Redirection – My Documents
• When redirected:
– Changes the default location of the user’s data repository to any networked server share.
– Ensures access to all data from any blade PC
• When NOT redirected:
– Risk of data loss if blade PC requires re-imaging or hard drive fails.
– Should not be implemented when blade PC hard drive is locked down.
Folder Redirection – Application Data, Desktop, and Start Menu
• When redirected: Data is not stored on the hard drive. Instead, it is stored on a shared network
resource. This allows common user experience from any blade.
• When NOT redirected: Some aspects of the user’s experience will require configuration each time
the user acquires a new blade PC.
Ability for user to shut down blade PCs
• When removed: Most users will not be able to shutdown or restart the blade PC. Other policies are
required to completely remove this feature.
• When NOT removed: User could shut down the blade PC, requiring a call to user support to have
someone power the blade PC back on through either the HP PC Blade Enclosure Integrated
Administrator or gain physical access to the blade PC and press the power button.
7
Session timer values
Session timers are especially valuable when using a dynamic configuration where total users out
number total blades. In order to ensure the highest availability of blades, timers can be set to
disconnect user sessions that remain idle for long periods of time, thereby making the blade available
to others users.
Session timers are not critical in a normal static configuration as each blade is dedicated to a
particular user. This reduces the need to make the blade available to other users.
Methods of granting a user remote access to the blade PC
For each blade PC, inserting the target user’s NT account into the Remote Desktop Users group will
provide the following:
• Advantage: Protects a user’s assigned blade PC from unauthorized access.
• Disadvantage: Adds additional work to customize each blade PC by editing the remote desktop
user group.
Using a single Security Group containing all CCI Static users and placing the security group in the
blade PCs local Remote Desktop Users group provides the following:
• Advantages:
– Easier to manage user access to assigned blade PCs.
– Every user in the security group will have the ability to log into every blade PC.
• Disadvantages:
– In an implementation where the blade PC hard drive is not locked down, there could be security
issues with users gaining access to other user’s data files.
– Only one user can have an active session at a time. So, if a foreign user has logged into a blade
PC it is possible that the user assigned to that blade PC will NOT be able to log in.
Caution:
If CCI is not the exclusive solution (non-CCI PCs are used in the domain), each PC not a part of CCI
must have several policies set to prevent the CCI policies and/or roaming profiles from being applied
to devices not participating in the CCI Solution. If care is not taken to prevent CCI-specific policies from
being applied, catastrophic problems could result, including loss of data, icons referencing dead links,
or links being removed from the desktop. The CCI Fundamentals training class and materials covers the
steps to using preventative policies. For additional information contact HP support.
8
CCI design considerations
This section discusses CCI design considerations.
CCI static configuration network considerations
CCI can function as a bridging technology to separate corporate networks from the Internet by using
one Blade PC NIC for corporate data/user access and the other Blade PC NIC for Internet access.
However, the following should be considered:
• PXE operation is supported on NIC A only.
• HP recommends that corporate network traffic be handled by a blade PC NIC, and not the NIC
used for image management and/or data backup.
When to and when NOT to collocate blade PCs in a Data Center
• Do not put user-managed blade PCs behind data center firewall.
• Install blade PCs with IT managed images requiring the additional security provided by the Data
Center security practices.
• Position data required by a widely distributed user base in the Data Center. Data access will be
faster as opposed to remote users accessing their data from local PCs.
Additional Active Directory information
This section describes various methods for users to connect to CCI.
Using an alias record in DNS
To aid with network/blade PC administration, each blade PC name should coincide with the physical
bay, enclosure, and rack where the blade PC will be located. However, this is not conducive to an
end user environment since these names are typically too cryptic for the user to remember. To ensure
a user-friendly environment, an alias (cname) record can be assigned in DNS that will mask the actual
blade PC name. Users will use the cname for their assigned blade PC to connect to CCI.
Using a static IP address
Assign static ip addresses for each blade PC. Users will use the static IP address for their assigned
blade PC to connect to CCI.
Using a dynamic register through DHCP
In this scenario, if a blade PC fails, the DNS record may have to be manually adjusted and allowed
to re-propagate throughout the DNS infrastructure before the user can reach the new blade PC
resource.
Using security groups
Computer security groups can be used to manage access to CCI blade PCs, this allows domain
administrators to manage access lists instead of having to put individual groups/names on the blade
itself.
9
For more information
For more information please access the following site: