Abstract:
In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be re-encrypted for transport over the WAN in a manner that does not require explicit configuration by the administrator of the WAAS devices. For example, VDI traffic may be intercepted and all data redundancy elimination messages may be encrypted and sent to a peer network device.
Abstract:
In one embodiment, a network controller receives data indicative of one or more traffic requirements for network traffic. The network controller maps the data indicative of the one or more traffic requirements into a network policy. The network controller causes installation of the network policy onto one or more networking devices. The one or more networking devices are configured to route the network traffic based on the network policy. The network controller receives feedback regarding the installed network policy. The network controller adjusts the network policy based on the received feedback.
Abstract:
In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be re-encrypted for transport over the WAN in a manner that does not require explicit configuration by the administrator of the WAAS devices. For example, VDI traffic may be intercepted and all data redundancy elimination messages may be encrypted and sent to a peer network device.
Abstract:
In one embodiment, a network controller receives data indicative of one or more traffic requirements for network traffic. The network controller maps the data indicative of the one or more traffic requirements into a network policy. The network controller causes installation of the network policy onto one or more networking devices. The one or more networking devices are configured to route the network traffic based on the network policy. The network controller receives feedback regarding the installed network policy. The network controller adjusts the network policy based on the received feedback.