You are on page 1of 11

FusionAccess Desktop Cloud

Security Level:
Typical Application Scenarios

Common Office Mobile Office

Temporary Outsourcing Public Terminal Home Office Branch BYOD


Employee Development Devices
On-demand Data security Green, energy- Handling Remote Consistent office
application for is not saving, and easy Emergency access office experience
quick acquisition disclosed. to maintain Services

2
Huawei FusionAccess Overview

Security and Reliability


Thin clients Laptops Smart phones Pad
1 E2E security protection for data of
the entire system
Complete DR and backup solutions

HDP
Huawei Desktop Protocol

FusionAccess Agility and Efficiency


2 In-depth integrated deployment of
software and hardware, visualized
and centralized management
VM VM VM Plug-and-play peripheral devices,
PC-level user experience
Virtual Desktop Infrastructure (VDI)

Virtualization Infrastructure by FusionSphere HUAWEI CLOUD Stack Online


Optimal Experience
Computing Network Storage HCS Online
Site
Cloud service and local O&M
3 Proprietary HDP delivers industry-
leading image, audio, and video
Component VPN HUAWEI CLOUD quality for desktop usage.
Region
Centralized O&M
service Platform

Monitoring data HUAWEI CLOUD services

3
Overview of FusionAccess 6.5 New Features
 Assistant Simplifies Peripheral Commissioning
 IDT — Improving User Experience in WAN Access

Optimal
Experience
Agility and
Efficiency

Security and
Reliability
 Terminal compliance check

 Self-service backup and restoration


 The mobile client supports the browser/server mode.
 Volume backup, VM backup, and batch backup are
 Desktop fault recovery in cloud platform scenarios
supported by integrating BCManager.
 Multi-network disk mounting

4
Intelligent Security Control Solution, E2E and System-Wide

Secure Linux-
SSL-
Read-only Internet based
encrypted
access/Multi- manageme
system transmission
network nt nodes
802.1x channels
isolation
Authentication Separation of
roles, and
32 independent
HDP encrypted channels
rights- and
domain-based
management
USB FusionAccess
Display
System Audio
Customizati Keyboard/Mouse
on and Video
Hardening
Others

Network
Thin Client (TC) Transmission Infra Security isolation for
virtual desktops
Multiple
modes of user Security Security
access
authentication Controllable
peripheral Secure
Secure deletion
Access device transmission Gateway & of security
blacklist and channel Firewall watermarks
whitelist

The 3 major protection links (24 key measures) ensure that data is not stored on-premises, user
behavior is traceable, and processes are auditable.
9
All-Round Reliability Mechanisms

VM service reliability
Client connection
reliability

Network Desktop protocol Desktop agent Distributed data


port negotiation software preventing Consistency
Automatic reconnection upon
network intermittent disconnection and switchover in itself from being check
Network status automatic case of application deleted or killed by Service DR
detection software conflicts mistake
Platform reliability

VM management
reliability
Key component HA Local access at branch
against physical faults offices against network
interruptions

Automatic VM VM snapshot Service layer


restart upon a against VM faults status monitoring
blue screen fault Automatic fault
Automatic clock Automatic monitoring for recovery and
synchronization memory, CPU, and network isolation
status of management nodes

10
Dual-Wheel Drive, Improving System O&M Efficiency
Unified portal One-click self-help remediation

Remote assistance Administrator User One-click Experience


Centralized Self-help optimization

O&M O&M

Centralized management and


maintenance
Self-help Maintenance
• Number of desktops managed by Unified
one person: 200 to 2,000 management portal
• Maintenance-free terminals  Service provisioning and  Quick fault locating: Maintenance VM
configuration One-click agent

 Unified monitoring, logs, log/information


and alarms collection
FusionSphere
 Unified upgrade tool  Peripheral assistant:
 Unified inspection tool One-click peripheral Management NIC

commissioning

11
Anywhere Anytime Access
Optimal Experience Biz trip office Home office
Peripheral Compatibility HDP Builds Smooth HD Office Experience
Display Display
Laptop

Adaptive
USB
Policy: Policy:
tunnel
Display tunnel Grade 3
VM1 VM2 VM3 IDT Grade 2
Audio tunnel

HDP

Client
Management
tunnel
Media tunnel
TCP Mouse client Internet
Other…
Access
Network

AG 2

AG 1
HDP display quality VDI display quality

Diversified Protocol Policies Provide More Choices


Bandwidth Intranet

Image Office zone B


display Office zone A
Image
display smoothness
definition Five key factors
affecting each DC
other User VM
Display Display
Policy: Policy:
Keyboard Grade 4 Grade 5
VM density or mouse
on a single VM Pool
response
node time
12
Self-service Maintenance Console: Quickly Repairing
Connection Interruptions

Self-service
repair

 Principle
When the VM NIC or desktop agent service stops working, a user cannot connect to the VM. In this case, the user can
enable the self-service maintenance function, and the system connects to the VM through the management channel. The
desktop connection repair tool of the VM automatically locates and rectifies the fault.
 Benefits
Users can solve common disconnection problems by themselves, reducing the service downtime as well as system
management and maintenance costs.
VM Rebuilding: Quick VM Fault Rectification and OS Upgrade
Personal data  Challenges
Faulty VM System
Personal Apps  In case of a blue screen of death (BSOD) occurs, a new VM is
disk
provisioned to the user.
Full copy template Standard Apps
 After the OS is upgraded from Windows 7 to Windows 10, VMs need to
System OS be provisioned again. Users need to copy data, which is inconvenient and
restoration Standard apps System restoration the administrator has heavy maintenance workload.
OS  Application Scenario
System  After a BSOD occurs on a VM and cannot be rectified, the administrator
disk Standard Apps
Restored VM can restore the VM to the template in one click.
OS  The administrator can upgrade VMs from Windows 7 to Windows 10 in
batches.
 Function Description
Personal data  Reconstruction of full copy VMs, including system restoration and system
VM running Windows 7 System update
disk Personal Apps
Standard App 1  After the reconstruction, the IP address and VM name remain unchanged.
Full copy template  After the system is updated, the system disk or data disk of the original
OS (Windows 7)
System VM can be used as the data disk of the new VM, and the originally
update System update
Standard apps 2 installed application is unavailable.
OS (Windows 10)  Differentiated Competitiveness
System
disk Standard App 2  Rebuilds full copy VMs.
OS (Windows 10)
 After the VM is rebuilt, the IP address and VM name remain unchanged,
so the external system is unaware of the rebuilding.
VM running Windows 10  During reconstruction, the source VM disks can be retained as the data
Data
Personal data disk, facilitating data migration.
disk
Personal Apps
Standard App 1
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2018 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like