A Secure, Publisher-Centric Web Caching Infrastructure

Total Page:16

File Type:pdf, Size:1020Kb

A Secure, Publisher-Centric Web Caching Infrastructure 1 A Secure, Publisher-Centric Web Caching Infrastructure z Andy Myersy John Chuang Urs Hengartner Yinglian Xie Weiqiang Zhuang Hui Zhang yDepartment of Electrical and Computer Engineering, Carnegie Mellon University zSchool of Information Management and Systems, University of California, Berkeley Department of Computer Science, Carnegie Mellon University Abstract— streams) back to the publishers. This is of particular con- The current web cache infrastructure, though it has a cern to publishers who rely on accurate hit counts to justify number of performance benefits, does not address many of their advertisement-driven revenue model, and to publish- the publishers’ requirements. We argue that web caches ers who wish to obtain accurate representations of the size should be enhanced to address publishers’ needs. For ex- and information consumption behavior of their audience. ample, caches will need to dynamically produce content, log/report client accesses, and give publishers QoS guaran- Finally, caches unilaterally make local copies of web ob- tees. In this paper, we propose Gemini, a publisher-centric jects, often without the consent or even the awareness of web caching infrastructure. Since Gemini caches can alter the publishers. Publishers have no knowledge of the num- content, traditional end-to-end security mechanisms can no ber and locations of cached copies of their objects, mak- longer ensure the integrity and authenticity of content. We ing object consistency impossible to maintain. As a re- thus introduce a new security architecture, based on digi- sult, caches may be serving stale or outdated objects to tal certificates and signatures. Certificates allow publishers the clients. For these reasons, many publishers have re- to specify which caches they trust to generate content for them. A certificate may apply to an entire group of caches sorted to cache-busting, i.e., bypassing the caches by tag- or it can delegate the trust decision to a third party. Digi- ging their objects ’non-cacheable’. This forces the caches tal signatures are used for verification: We require Gemini to forward all object requests back to the origin server. caches to sign their dynamically generated content, there- While this practice assures proper dynamic page genera- fore, clients can verify that this content was generated by tion, accurate hit counts, data consistency, and copyright an authorized cache. We also present a probabilistic scheme protection, it also forfeits all the benefits of caching. that exploits the non-repudiation property of digital signa- We believe that caching is fundamental to the long-term tures to let publishers identify misbehaving caches. In our scalability of the web infrastructure, and therefore it is im- design, we ensure that Gemini is incrementally deployable and seamlessly interoperates with the existing caching in- portant to align the interests of publishers and cache opera- frastructure. Along with a system design, we also present tors. We propose Gemini, a publisher-centric web caching an implementation and preliminary performance results. infrastructure and paradigm that will encourage the pub- lishers and cache operators to cooperate in the distribution and caching of web content. I. INTRODUCTION The Gemini strategy is to endow cache nodes with Web caching, like other forms of caching that occur at communications, storage and processing capabilities that various levels of the memory hierarchy (e.g., hardware, can be beneficially employed by publishers. A Gemini operating system, application), exploits the reference lo- cache node is designed as a next-generation web cache cality principle to improve the cost and performance of that can be incrementally deployed in the current cache data access. This has been especially effective at the In- infrastructure. It can transparently substitute for a regu- ternet level, where large geographic and topological dis- lar cache, as well as interoperate with existing coopera- tances separate the producers and consumers of content. tive caching schemes. A Gemini cache can support a va- The direct and tangible benefits of web caching include: riety of publisher-specified functions. In the data plane, improved access latency, reduced bandwidth consumption, it can support dynamic content generation using filtering, improved data availability, and reduced server load. versioning, and/or other publisher-authored methods based The main drawback of today’s cache infrastructure is on sandboxed, virtual machine based languages such as that it is network-centric, but not publisher-centric. From Java. In the control plane, a Gemini cache can support the publisher’s point of view, a number of important fea- customizable logging and reporting, as well as other func- tures are missing. First, caches are not equipped to han- tions such as object consistency control, access control, dle dynamically generated content, an increasingly large and publisher-specified QoS. portion of all web traffic. Requests for dynamic con- Central to our design is the architectural assumption of a tent have to be forwarded back to the origin servers, and heterogeneous global web cache infrastructure. Just as the the dynamically constructed pages cannot be reused, even Internet’s routers and links are owned by different admin- by the same client. Second, caches are unable to fur- istrative domains, we assume that caches belong to many nish reports on access statistics (e.g., hit counts and click- different administrative domains, and may have different 2 functionalities. Furthermore, the traditional client-server on modular and differential page construction techniques. architecture is replaced by a three-party architecture where For example, delta encoding [2], [3] combines the data al- the intermediary (web cache) can actively create/alter con- ready in cache with any differential updates from the origin tent on behalf of the servers. This means that traditional server. Other techniques include partial transfers, cache- end-to-end security mechanisms can no longer ensure the based compaction [4] and HTML macros [5]. integrity and authenticity of content. In the second case, Gemini supports on-the-fly page The Gemini security architecture is designed to protect construction by running publisher-authored code for filter- clients, publishers and caches from one another. First, the ing and versioning, etc. Consider the application of filter- publishers are assured of proper content generation and ac- ing to the dynamic generation of customized news pages curate logging/reporting by the caches. Second, the caches (e.g., MyYahoo). The publisher code residing at the Gem- are protected against faulty or malicious code from pub- ini cache will apply one or more filters to construct a cus- lishers or attackers. The end result: the caches create and tomized page on the fly. The filters may be derived from deliver content to the clients according to the specifications several sources. First, filters may be supplied by the user in of the publishers. the form of cookies in the HTTP request header. For exam- The rest of the paper is organized as follows. Section ple, a user may specify the news categories and stock sym- II describes the different dynamic content generation tech- bols that she wants to keep track of. Second, filters may niques and applications supported by Gemini. Sections III be derived from a user profile match that incorporates her and IV describes the security architecture and incremen- past browsing and purchasing history. This type of filters tal deployment strategy. The design and prototype imple- may be used for delivery of targetted ad banners, product mentation of the Gemini node, based on the open source recommendations and offers. Finally, the publisher code Squid [1] caching software, are presented in Section V. can generate its own filters by incorporating data that are We discuss the performance of our implementation in Sec- specific to the local environment. For example, when the tion VI, and identify related work in Section VII before we user accesses the URL from within her home area, the cus- conclude the paper. tomized page may include local weather, traffic and sports news. When the user is travelling outside her home area, II. APPLICATIONS the page may include links to food, accomodation, services Traditional caches can only handle static objects such as and maps for the foreign area instead. HTML pages. Gemini caches, on the other hand, are capa- Versioningis also useful for producing customized news ble of storing and processing active documents, including pages. For example, a page may be laid out in different the invocation of any publisher-authored methods based on ways according to user-specified preferences stored in a sandboxed, virtual machine based languages such as Java. cookie. The publisher code may also create different ver- This allows the Gemini caches to support, among a wide sions of the page for the same user based on the hard- range of publisher-centric applications, the generation and ware device (e.g., desktop and handhelds have different delivery of dynamic content. display capabilities), access bandwidth, operating system There are two main types of dynamic content. In the first and browser used to issue the request. case, a web page is dynamic because the underlying data While we have used the example of a customized news source changes frequently. Examples include stock tick- page, these techniques can also be beneficially employed ers, news headlines, and traffic reports. In the second case, by other types of web sites. For example, a consumer e- a web page is dynamic because it is constructed on the fly commerce merchant may tailor web pages to individual on a per request basis. The exact form and substance of the customers with product recommendations, special offers, page may be based on input from the client, server, and/or etc., based on the customer profile filter. cache. Examples include database or search responses, customized news, customized page layout. Using a vari- III. SECURITY ety of techniques, Gemini caches can support both types of dynamic content generation.
Recommended publications
  • GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60Fps HFR, 4.3X Optical Zoom, IR Leds, Indoor/Outdoor
    FCS-3406 Version: 1 GEMINI Fixed Dome IP Network Camera, 2-Megapixel, H.265, 60fps HFR, 4.3X Optical Zoom, IR LEDs, Indoor/Outdoor The LevelOne FCS-3406 is a fixed-position outdoor camera offering an ultra-reliable, cost-effective solution for outdoor IP surveillance networks, and is rated at IP67 to operate within rain, extreme heat, snow, dust and humid conditions. Offering clear, sharp imagery with 2-Megapixel resolution and the versatility of 802.3af standard PoE to transfer power and data via a single Cat.5 cable, the LevelOne FCS-3406 should be an essential part of any security deployment that requires smart, reliable outdoor cameras. Key Features - 60 fps High Frame Rate (HFR) video in 1080p - Video compression: H.264, H.265 - Supports 4.3X optical zoom - Features WDR (Wide Dynamic Range) to enhance visibility under extremely bright or dark environments - Vandal-proof IK10-rated housing - Weatherproof IP67-rated housing - Built-in infrared LEDs for night viewing up to 30m - Built-in Micro SDHC/SDXC card slot for local storage Specifications System Specifications Standards: TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, PPPoE, NTP, UPnP, SMTP,SNMP,IGMP, 802.1X, QoS, IPv6, Bonjour Image Sensor: 1/1.8" Progressive Scan CMOS Lens: 2.8 to 12 mm motorization Port: 10/100Mbps (100Base-T) RJ45 Ethernet interface Power Connector Audio:In/Out I/O terminal block (1 DI/1 DO) 1 x MicroSDHC/ MicroSDXC card slot www.level1.com1 RS-485 interface Page 1 of 4 Button/Knob: Reset Button IR Cut Filter: Support IR LED: Up to 30m Shutter Time: 1 s to 1/100,000 s Angle of View: Horizontal field of view: 103°to 38° Vertical field of view: 54°to 21° Diagonal field of view: 124°to 44° Video Format: H.265/H.264/MJPEG Resolution: 50Hz: 50fps (1920 × 1080, 1280 × 960, 1280×720) 60Hz: 60fps (1920 × 1080, 1280 × 960, 1280×720) Output Video Format: MPEG-4 Audio Compression: G.711/G.722.1/G.726/MP2L2, 64 Kbps (G.711)/16 Kbps (G.722.1)/16 Kbps (G.726)/32 to 128 Kbps (MP2L2 Power Input: 12V DC±10%, PoE (802.3af) Power Consumption: With extra load: 12 VDC, 0.8 A, max.
    [Show full text]
  • Gemini Broadband Ku/Ka/C Satellite Router
    Corporate Waves Primary colors Secondary colors -C Gemini Broadband Ku/Ka/C Satellite Router Enabling High Speed Broadband Services SkyEdge II-c Gemini is a compact high-throughput VSAT, designed to enable high speed broadband services while meeting cost efficiencies required by residential customers and small businesses. Gemini enables fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Gemini is a full-featured IP router, eliminating the need for an external router via support of enhanced IP routing features such as DHCP, NAT/PAT and IGMP. Advanced application-based QoS guarantees the performance of real-time applications such as VoIP and video streaming, while also supporting other data applications. Gemini also supports next generation IPv6 networking. Gemini includes a full set of protocol optimization and application acceleration features. TCP and HTTP protocol acceleration and payload compression ensure fast Web browsing and high user Benefits experience. Gemini provides the highest level of transmission security supporting • Fast web browsing with web acceleration AES-256 bit link layer encryption with dynamic key rotation to protect and compression all user traffic, and standard IP-Sec providing end to end network layer • High quality VoIP and video security. • Simple DIY installation and automatic service activation Simple, Do-It-Yourself Installation and Service Activation • DVB-S2 ACM and DVB-RCS adaptive transmission standards Gemini is designed to support quick and reliable installation, and automatic service activation. The process requires no prior VSAT • Central monitoring and service management installation skills or technical support. • C/Ku/Ka bands The outdoor electronics and antenna are designed to simplify the assembly and mounting, and shorten the antenna pointing procedure.
    [Show full text]
  • 1 the Internet Internet Levels of Access to the Internet
    The Internet DS 4250 - Business Data Communications Slide 1 Internet z Collection of interconnected networks with a common protocols. 4TCP/IP z The networks are linked through various high-speed backbones. z Routing method is hierarchical. z Can follow the packet movement on Gemini 4$ mu trace www.dell.com DS 4250 - Internet Slide 2 Levels of Access to The Internet NAP National Backbone Regional Network Internet Service Provider Consumer and Business Market ¾http://www.ispworld.com/isp/bb/n_america.htm DS 4250 - Internet Slide 3 1 Internet Structure Local ISP Local ISP Regional ISP National ISP Regional ISP National ISP NAP National ISP NationalNational ISP ISP Regional ISP National ISP NationalNational ISP ISP NAP NationalNational ISP ISP NationalNational ISP ISP Regional ISP Regional ISP Local ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP Regional ISP MAE Local ISP Regional ISP Regional ISP Local ISP Regional ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Local ISP Figure 9-1 Basic Internet Architecture DS 4250 - Internet Slide 4 Concerns in Choosing an ISP z Examine the backbone of the provider 4Does the backbone include needed areas 4Check the speed of the network 4Examine the redundancy of the network 4What power back-ups do they have 4Connections to other providers • At least three network access points 4What is the guarantee of performance DS 4250 - Internet Slide 5 Internet Addressing z Based on the software address for each device 4A unique number for each device z Used to designate
    [Show full text]
  • Gemini Quick Start Guide 70090630
    Gemini Intercom Quick Start Guide 2 Gemini Quick Start Guide Contents Contents ......................................................................................... 1 Overview ......................................................................................... 3 First Step – unpack and inspect ...................................................... 3 Network plan and IP addresses ...................................................... 4 Management PC ............................................................................. 5 Install Software ............................................................................... 6 Configure the firewall ..................................................................... 7 Gateway – the Configuration Editor ............................................... 8 Gateway – Networked DSP ............................................................ 9 File Management ............................................................................ 9 Gemini – Setting the basics .......................................................... 10 Gemini – setting the identity (EDH address) ................................ 12 Restart to apply changes .............................................................. 12 Connect to your network ............................................................. 13 Active Clients Form ....................................................................... 13 Repeat for each Gemini in your system ....................................... 14 Gemini Web Browser ..................................................................
    [Show full text]
  • Early Use of the Gemini Observatory Archive
    1 Director’s Message 45 On the Horizon Markus Kissler-Patig Gemini staff contributions 3 Gemini South Explores the 55 A Transition Comes to an End Growth of Massive Galaxy Clusters Inger Jørgensen Sarah Sweet, Rodrigo Carrasco, and 59 Gemini Harnesses the Sun from Fernanda Urrutia Both Hemispheres 7 A Gemini Spectrum of a World Alexis Ann Acohido Colder than a Night on Maunakea Gemini Connections Andy Skemer 61 Peter Michaud 11 A Case of Warped Space: Confirming Strong Gravitational 64 A New Look for Gemini’s Legacy Lenses Found in the Dark Energy Images Survey 66 Observatory Careers: New Brian Nord and Elizabeth Buckley-Geer Resources for Students, Teachers, and Parents 16 Dusting the Universe with Supernovae 68 Journey Through the Universe: Jennifer Andrews Twelve Years, and Counting! Alexis Ann Acohido 20 Science Highlights Gemini staff contributions 71 Viaje al Universo 2016: Empowering Students with Science News for Users 31 Maunel Paredes Gemini staff contributions ON THE COVER: GeminiFocus Color composite image January 2017 / 2016 Year in Review of the galaxy cluster GeminiFocus is a quarterly publication SPT-CL J0546-5345, of the Gemini Observatory comprised of Gemini 670 N. A‘ohoku Place, Hilo, Hawai‘i 96720, USA GeMS/GSAOI and HST Phone: (808) 974-2500 Fax: (808) 974-2589 data. White inset at right bottom shows Online viewing address: www.gemini.edu/geminifocus Gemini Ks image of the region. The article on Managing Editor: Peter Michaud this work begins on Associate Editor: Stephen James O’Meara page 3. Also shown Designer: Eve Furchgott/Blue Heron Multimedia are the covers from Any opinions, findings, and conclusions or April, July, and October recommendations expressed in this material are those of issues of GeminiFocus.
    [Show full text]
  • Cellular Communications Commercial Security Fire Alarms & Devices
    CELLULAR COMMUNICATIONS COMMERCIAL SECURITY FIRE ALARMS & DEVICES CONNECTED HOME & BUSINESS TECH, VIDEO & ACCESS ADD-ONS Table of Contents At Napco, we appreciate the continued loyalty of our security professional customers and hearing from you – what you like about our products &/or what you’d like to see next. Included here is some of that feedback along with some fast market facts. Thanks for the support. COMMERCIAL FIRE SYSTEMS Firewolf Fire Alarm Systems, Devices, Configurations & Diagram...................................................1 & 2 FireLink FACP with Cellular Built-in ..............................................................................................................3 COMMERCIAL INTEGRATED SECURITY SYSTEMS Napco Commercial GEMC-Series Integrated Security/Fire/Access Control Platform, Configurations & Diagram .....................................................................................................................4 & 5 Napco Commercial Systems and Firewolf & FireLink Fire Alarms Ordering Info. ...............................6 CELLULAR COMMUNICATION SOLUTIONS StarLink Fire Sole & Dual Path Cell/IP Communicators & Ordering Info. ........................................7 & 8 StarLink Line Model Comparison & Ordering, Commercial Fire, Intrusion & Connected Home/Business Applications ........................................................................................................................9 StarLink Intrusion Cellular Communicators & Ordering Info. ...............................................................
    [Show full text]
  • Skyedge Ii-C Gemini-I
    SKYEDGE II-C GEMINI-I Consumer Broadband Internet VSAT ENABLING HIGH-SPEED BROADBAND SERVICES BENEFITS SkyEdge II-c Gemini-i is a high-throughput VSAT, designed to Fast web browsing with web acceleration and compression enable high-speed consumer broadband Internet services while meeting cost efficiencies required by residential customers. Enables high-quality VoIP and video Gemini-i facilitates fast web browsing, video streaming, IPTV, VoIP, and other bandwidth-intensive services. Simple installation and service activation By acting as a home router, Gemini-i also supports multiple devices through its integrated DHCP server, NAT/PAT and IGMP. Advanced QoS guarantees the performance of real- Forward and return adaptive transmission technologies time applications such as VoIP and video streaming while simultaneously enabling additional data applications. Gemini-i also Central monitoring and service management supports next-generation IPv6 networking. To ensure fast web browsing and a high-quality user experience, Supports C, Ku and Ka bands Gemini-i contains a full set of protocol optimization and application acceleration features, including TCP and HTTP protocol acceleration and payload compression. Gemini-i provides the highest level of transmission security, supporting X.509 terminal authentication and AES-256 bit link layer encryption with dynamic key rotation to protect all user traffic. SIMPLE, DO-IT-YOURSELF INSTALLATION AND SERVICE ACTIVATION Gemini-i is designed to enable quick and reliable installation and automatic service activation. The process requires no prior VSAT installation skills or technical support. The outdoor electronics and antenna are designed to simplify the assembly and mounting while shortening the antenna-pointing procedure. The outdoor unit includes an audio device to guide and provide feedback during the antenna-pointing process.
    [Show full text]
  • Gemini and NTS Exit Reform API Usage Guidelines
    Gemini and NTS Exit Reform API Usage Guidelines ~ 1 ~ Table of Contents 1. Introduction ............................................................................................................................................6 1.1. API Technology Overview ....................................................................................................................6 2. API Client Development Guidelines .....................................................................................................8 2.1. HTTPS and SSL ...................................................................................................................................9 2.2. Authentication and Authorization ...................................................................................................... 10 2.3. Maintaining the Session .................................................................................................................... 10 2.4. Authentication / Loss of Session / Authorization Failures ................................................................. 10 2.5. Request a Compressed Response to your API Client ...................................................................... 11 3. API Configuration Details ................................................................................................................... 14 3.1. API Technology Overview ................................................................................................................. 14 3.2. Network Requirements .....................................................................................................................
    [Show full text]
  • Gemini 720Im
    Gemini 720im Gemini 720im Product Manual Document: 0729-SOM-00002, Issue: 4 Document: 0729-SOM-00002, Issue: 4 1 © Tritech International Ltd. Gemini 720im © Tritech International Ltd The copyright in this document is the property of Tritech International Ltd. The document is supplied by Tritech International Ltd on the understanding that it may not be copied, used, or disclosed to others except as authorised in writing by Tritech International Ltd. Tritech International Ltd reserves the right to change, modify and update designs and specifications as part of their ongoing product development programme. All product names are trademarks of their respective companies. Open Source License Statement: This product includes software code developed by third parties, including software code subject to the GNU General Public License Version 2 ("GPLv2"). We will provide upon request the applicable GPL source code files via CD-ROM or similar storage medium for a nominal cost to cover shipping and media charges as allowed under the GPL. This offer is valid for a 3 year period from first manufacture of this product. General Public License ("GPLv2") Inquiries: Please direct all GPL inquiries to the following address: Tritech International Ltd Peregrine Road Westhill Business Park Westhill, Aberdeenshire AB32 6JL, UK Document: 0729-SOM-00002, Issue: 4 2 © Tritech International Ltd. Gemini 720im Table of Contents Warning Symbols ........................................................................................................ 4 1. Introduction ............................................................................................................
    [Show full text]
  • GEMINI Fixed IP Network Camera, 6-Megapixel, H.265, 4.3X Optical Zoom, IR Leds, Indoor/Outdoor
    FCS-5212 Version: 1 GEMINI Fixed IP Network Camera, 6-Megapixel, H.265, 4.3X Optical Zoom, IR LEDs, Indoor/Outdoor The LevelOne FCS-5212 is a fixed-position outdoor camera offering an ultra-reliable, cost-effective solution for outdoor IP surveillance networks, and is rated at IP67 to operate within rain, extreme heat, snow, dust and humid conditions. Offering clear, sharp imagery with 6-Megapixel resolution and the versatility of 802.3af standard PoE to transfer power and data via a single Cat.5 cable, the LevelOne FCS-5212 should be an essential part of any security deployment that requires smart, reliable outdoor cameras. Key Features - 6-Megapixel high-definition resolution - Video compression: H.264, H.265, MJPEG - Supports 3 video streams simultaneously - Supports 4.3X optical zoom - Features WDR (Wide Dynamic Range) to enhance visibility under extremely bright or dark environments - Weatherproof IP67-rated housing - Vandal-proof IK10-rated housing - Built-in infrared LEDs for night viewing up to 50m - Supports iPhone/Android phone remote viewing over the Internet Specifications System Specifications Standards: TCP(IPv6/v4), UDP, HTTP, HTTPS, DHCP, PPPoE, RTP, RTSP, DNS, DDNS, NTP, ICMP, ARP, IGMP, SMTP,FTP,SAMBA UPnP, SNMP, Bonjour IEEE 802.3 10-BASE-T, Ethernet IEEE 802.3u 100-BASE-TX, Fast Ethernet IEEE 802.3af Power over Ethernet (PoE) IEEE 802.1X Network Access Control Image Sensor: 1/2.9" Progressive Scan CMOS Lens: Aut Focus @F1.6, 2.8~12mm Motorized VF LENS www.level1.com Page 1 of 4 Port: 1 x RJ-45 10/100 Mbps PoE port
    [Show full text]
  • Gemini Guide to Connectivity Xoserve Gemini Production Access Through Citrix & API
    Gemini Guide To Connectivity Xoserve Gemini Production Access Through Citrix & API CONTENTS Table of Contents 1. Introduction .................................................................................................................................................. 4 1.1 Purpose and Scope .................................................................................................................................................4 1.2 Intended Audience...................................................................................................................................................4 1.3 Gemini Services .......................................................................................................................................................4 2. Online (Citrix) Access Configuration Details............................................................................................5 2.1 Infrastructure ............................................................................................................................................................5 2.2 Network Requirements............................................................................................................................................5 2.3 Citrix Client for Windows.........................................................................................................................................6 2.4 Best Practices to deploy Citrix Clients ..................................................................................................................6
    [Show full text]
  • GRP- Gemini Production Access Through Citrix &
    Gemini 2020 Guide to Connectivity Page 1 of 20 Xoserve Gemini Production Access Through Citrix & API CONTENTS 1 INTRODUCTION ..................................................................................................................... 4 1.1 PURPOSE AND SCOPE ......................................................................................................................... 4 1.2 INTENDED AUDIENCE .......................................................................................................................... 4 1.3 GEMINI SERVICES ............................................................................................................................... 4 2 ONLINE (CITRIX) ACCESS CONFIGURATION DETAILS ..................................................... 5 2.1 INFRASTRUCTURE ............................................................................................................................... 5 2.2 NETWORK REQUIREMENTS .................................................................................................................. 5 2.3 CITRIX CLIENT FOR WINDOWS ............................................................................................................. 6 2.4 BEST PRACTICES TO DEPLOY CITRIX CLIENTS ...................................................................................... 6 2.5 GEMINI PRODUCTION ACCESS THROUGH CITRIX RECEIVER ................................................................... 9 2.6 GEMINI LOGON ................................................................................................................................
    [Show full text]