• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 930
  • Last Modified:

Citrix XenDesktop 7 server roles clarification

Hi All,

I'm seeking clarification for the Citrix XenDesktop 7 server roles that is shown on the below image from the KB Article about HA:

Source: http://support.citrix.com/servlet/KbServlet/download/21773-102-650177/XD%20-%20High%20Availability%20-%20Implementation%20Guide.pdf#page21

What is the Web Interface server ? is it just the web application that publish the login page where the user can type in their credentials and then provided with the Citrix Receiver plugin to open the Desktop OS session ?

I assume that the VIP: is the clustered DDC servers which handles the master image and guest VM delta file changes.

If the BootStrap VIP: is the Clustered Citrix PVS, then what is the TFTP Server clusters VIP: ? is that a typo or are they the MS Active Directory domain controllers with FTP role (IIS installed) ?

What are those servers with the VIP ? are they the clustered StoreFront servers ?

Does the Data Collector VIP: is the licensing server clustered ?

Does the last bit is the clustered XenApp servers.

Any kind of help and suggestion would be greatly appreciated.

Senior IT System Engineer
Senior IT System Engineer
  • 3
2 Solutions
With XD7, we call Web interface as store front servers. Yes, WI is a server with IIS services installed (now knows as Store front), where users authenticate providing user name as password. In the above design, two things are possible. Either user can authenticate at the Netscaler (when connecting from external network), using single sign-on user automatically gets logged into WI as well. Other option is Netscaler can directly route the user to the web interface logon page. Hence user can authenticate from there as well.

DDC, helps to manage the VDi sessions, create new VMs, provision VMs through PVS or through Machine creation services etc. You can give access to users and so on . Similar to Citrix XenApp App center or delivery console. In this design the servers are load-balanced.

Before explaining bootstrap, let me tell how it works. When a VM is turned on that was created thru provisioning server, the dumb terminal/Thin client/Target VM should know which is the PVS server. Hence on the DHCP, we enable option 66, that tells which is your TFTP. Once the dumb terminal boots, using option 66 it contacts TFTP server (in our case both TFTP, bootstrap, PVS are all on same server). After it contact TFTP, it opens the boot strap file which is ARDBP32.bin. This again has two load balanced PVS servernames. Based on the load, it contacts the either one of the PVS, from where the vDisk is streamed.

In this design, they are using two different URLS for XenAPp and Xendesktop. Hence the right section completely talks about Xenapp Web interface servers loadbalanced with IP ending with 72. Similarly XenApp talks with Data collectors to know the current load of the XenApp servers. Hence data collectors here are IP ending with 73 (which has multiple DCs for redundancy.
Senior IT System EngineerIT ProfessionalAuthor Commented:

Many thanks for the clarification, so in this case the minimum requirement is to have the following servers scenario:

DMZ Network: Juniper SSL VPN Gateway - the current method of publishing secure web URL
Internal Network: VMware ESXi 5 - Hypervisor
Internal Network: Windows 7 and XP - Guest OS

DMZ Network: VM1 - StoreFront Server
Internal Network: VM2 - DDC Server Role
Internal Network: VM3 - XenDesktop7 Server
Internal Network: VM4 - ....Generic Windows Server 2008 R2 with TFTP, bootstrap, PVS roles

Optional servers:
Internal Network: VM5 - XenApp Server
Internal Network: VM6 - Data Collector server

is that possible and correct ?
Senior IT System EngineerIT ProfessionalAuthor Commented:
Hi basraj,

may I know if I missed any important server roles or must separate some roles in this diagram ?
Carl WebsterCommented:
You need this new document from Citrix.  Most of the product names and functionality have changed.  Plus it covers all your design decisions.

Senior IT System EngineerIT ProfessionalAuthor Commented:
thanks !
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Train for your Pen Testing Engineer Certification

Enroll today in this bundle of courses to gain experience in the logistics of pen testing, Linux fundamentals, vulnerability assessments, detecting live systems, and more! This series, valued at $3,000, is free for Premium members, Team Accounts, and Qualified Experts.

  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now