Microsoft Application Center 2000 Resource Kit 2001

You can use the following three technologies to administer an Application Center cluster remotely:

VPNs


VPN technologies are being widely deployed to implement wide area networking over the Internet backbone.

To get a good foundation of Microsoft's implementation of VPN, you should read the "Windows 2000 Virtual Private Networking Scenario," which is available from TechNet (http://www.microsoft.com/TechNet/win2000/vpnscen.asp).

Another good source of information about VPN technology, from a broader, industry-wide perspective, are Rick Allen's two articles, "The Reality of Building Secure Private Networks, Parts One and Two," which are available at the SecurityPortal Web site (http://securityportal.com/cover/coverstory20000306.html). These articles provide some very good information about the issues related to building secure networks by using VPN technology.

Securing Off-Site Computers

It's important to ensure that remote users adequately secure their computers, in particular portables because they are more vulnerable to theft. (As you may recall, 69 percent of the respondents in the computer crime survey reported portable thefts.)

Use the following checklist as a guideline for implementing security on off-site computers:

The Application Center Administrative Client

The Application Center Administrative client, which you can install on a computer running Windows 2000 Professional, is the preferred method for administering a cluster. The minimum requirements for installing the Administrative client are a computer running:

Provided that you have the authority and can supply the authentication that Application Center requests for certain activities, such as adding/removing members and deploying applications, you have full access to the product feature set via the graphical user interface.

NOTE


The Administrative client installation does not include the AC.EXE command-line tool, Health Monitor, or Application Center Events and Performance Logging on the local computer.

The Application Center Web-Based Administrative Client

The Application Center Web-based Administrative client is limited to cluster monitoring features. The default page for the Web-based Administrative client view of the cluster is linked to port 4242 and can be accessed by entering http://servername:4242 in the address area of the browser.

WARNING


You should disable for all incoming Internet traffic by locking out port 4242.

The best way to restrict access to the cluster user interface is to set ACLs at the site directory level (Application Center 2000 Administrative Site). This will have some impact on performance because the user interface uses images that are located in the Images directory, which is included in the lockdown. You can also control access to the site by setting IP address and domain name restrictions on Application Center 2000 Administrative Site directory.

Windows 2000 Terminal Services

You can use the Terminal Services thin client to provide remote access to a server desktop, where the client acts as a terminal emulator. Terminal Services can be installed in either application server or remote administration mode. When this service is installed as an application server, you can configure the service to provide remote access to a specific application, such as Application Center.

Terminal Services running in application mode doesn't provide any functional gains over using the Application Center Administrative client on a remote connection, but it does provide an alternative for users who don't have access to a computer running Windows 2000 Professional. The Terminal client can run on a number of hardware devices, including Windows-based terminals. Terminal Services also supports access to a Terminal server by other devices, such as Macintosh computers or UNIX-based workstations, through the use of third-party software.

In remote administration mode, Terminal Services gives a remote user complete control over the server to which he connects. As a matter of security policy, you have to determine whether or not this level of access is really needed to support a cluster.

NOTE


Terminal Services provides robust security settings that you can implement for logon and authentication, permissions settings, and encryption.

Категории