In my previous blogs I have outlined how the Frame™ Bring Your Own (BYO) Networking capability in Amazon Web Services (AWS) could be used to deploy a Frame account in a manner that would allow Frame-managed workload VMs to be connected to an existing private network. Recent addition of Frame Remoting Protocol (FRP) 8 has adjusted some of the ports and protocols used for workload connectivity. In this blog, I will update how the Frame Streaming Gateway Appliance (SGA) interacts with the new FRP8 networking environment.
One of the most important aspects that any VDI or DaaS solution needs to address is how to allow users to securely access their virtual desktops and apps when using an external network. This is especially important when addressing work-from-home use cases.
Secure external access is typically achieved through a client VPN, site-to-site VPN, or a reverse proxy solution. The new Frame Streaming Gateway Appliance (SGA) is a reverse proxy solution that removes the need for a VPN. To understand the benefits of the Frame SGA, let's start with a review of how VPNs evolved.