Beruflich Dokumente
Kultur Dokumente
Introduction
NComputings desktop virtualization serves to extend the applications, configurations, and overall user
experience of a typical computing environment to many users instead of just one.
This document is designed to identify areas of configuration in NComputing vSpace deployments that are
not commonly known, show why these configurations are needed, and provide specific steps and general
best practices to help produce a smooth and successful installation experience.
This document is intended for experienced IT professionals who will be deploying NComputing
technology, whether its an initial evaluation or a wider deployment. A thorough understanding of
advanced Windows configurations and TCP/IP networking is assumed. These tips and many others are
included individually in our searchable knowledge base at www.ncomputing.com/knowledgebase.
Pre-Installation
OS Selection for vSpace
There is a unique version of vSpace for each major version of Windows or Linux. To ensure that you are
using the correct and latest version of vSpace for your OS, please obtain the software fresh from
http://ncomputing.com/downloads. The following tips can also help avoid any OS compatibility issues:
Security Software
Anti-virus and Anti-spyware applications are vital to maintaining safety and security on your network.
However, these classes of programs can interfere with the installation of vSpace by sometimes identifying
the vSpace install process as suspicious. To ensure that no issues develop, please uninstall them prior
to installing vSpace. Once vSpace has been installed and configured, and everything appears to be
functioning correctly, you may reinstall your security software.
TECH BRIEF
VSPACE TECHNICAL QUICK-TIPS
Post-Installation
Subnets/VLANs (L-Series)
When configuring your network to support L-series devices, it is strongly recommended that the host PC
and L-series devices be placed on the same subnet or VLAN. This will help prevent connection issues
and ensure that all product features operate correctly.
Firewall Configuration
To ensure that vSpace can operate correctly, the following ports and executables should be whitelisted
in your firewall, anti-virus, and anti-spyware applications:
Ports
o
Note: Simply adding Everyone to these Policy Objects will give remote logon rights to every user profile on the host PC.
vSpace Registration
Registration of vSpace software is required for full product functionality, and it is often best to perform this
registration immediately after installing. The exception to this is when you are creating a hard-drive
image for rapid deployment; in this case, registration should be performed after each system receives the
image. Product registration can be performed directly through an internet connection (see Firewall
Configuration above) or via e-mail with an offline registration file. For specific instructions, please check
out the user guide for your product: http://ncomputing.com/documentation.