Remote desktops in Access Policy Manager allow users to access the following types of internal servers in virtual desktop sessions:
You can configure remote desktops by name or by their internal IP addresses, and grant or deny users the ability to set up their own favorites.
Using an Access Policy Manager (APM) RDP type remote desktop, clients can access a server that runs Microsoft Remote Desktop Services. Microsoft Remote Desktop servers run the Microsoft Remote Desktop Protocol (RDP) server. RDP is a protocol that provides a graphical interface to another computer on a network.
To provide Microsoft RDP connections natively, APM provides these remote desktop resources:
For support information, refer to BIG-IP APM Client Compatibility Matrix on AskF5™ at http://support.f5.com/.
Citrix® remote desktops are supported by Citrix XenApp™ and ICA clients. With Access Policy Manager you can configure clients to access servers using Citrix terminal services. You provide a location from which a client can download and install a Citrix client for a Citrix ICA connection.
VMware View is VMware's virtual desktop infrastructure (VDI) software that runs a View Desktop on a user's PC from the servers in a data center. You can integrate APM with VMware View Connection Servers and present View Desktops on dynamic APM webtops. APM authenticates users on a View Connection Server and displays the View Desktops. Refer to Presenting a View Desktop on an APM Webtop for how to set this up.
When you create a remote desktop resource, Access Policy Manager (APM) automatically creates an allow ACL for the IP addresses and ports specified in the resource. To disallow access to any other IP addresses and ports, you must create ACLs that deny access to them and assign the ACLs in the per-session policy. F5 recommends that you create an ACL that rejects access to all connections and put it last in the ACL order.
These sample access policies are a reference for configuring RDP for APM webtop, a standalone client, or both.