Average time to read: 12 minutes

Or FMA in short. Did you hear? Citrix officially launched XenDesktop 7ย just a fewย weeks ago. One of the biggest releases in years! Of-course Iโ€™m just kidding, who could have missed that?! Citrix also announced XenApp 6.5 FP 2 which will be released in June, once again enhancing and extending XenAppโ€™s life, a good thing if you ask me. Although it seems thatย the Independent Management Architecture (IMA) will probably be around for many more years to come, itโ€™s all FMA from now on when it comes to future developments. I thought it might be a good idea (and time)ย to have a closer look at FMA. Is it new technology? No. Is it improved? Definitely! Detailed overview? Scroll down!

During this Blog I will primarily focus on the FMA, for more information on the other components and technologies used in XenDesktop 7 check out some of my other Blogs. Although they’re partly based on the Excalibur Tech Preview the information is still valid as it applies to basic infrastructure components and concepts which were already announced and โ€˜knownโ€™ a few months ago and havenโ€™t changed since and probably wonโ€™t for years to come.

The general idea

The FMA is primarily made up out of Delivery Controllers and Agents. Delivery Agents are installed on all virtual and or physical machines provisioned by XenDesktop 7, they communicate (and register themselves)ย with theย Delivery Controller(s) and the license server.ย Theย Controllers on their turnย communicate with a central (SQL) database. This database is very important, next to things like XenDesktop Siteย policies, Machine Catalogs, Delivery Groups and publishedย applications and or (hosted) desktops, it also contains all live dynamicย ‘runtime’ data like: who is connected to which resource, on which server, server load and connection statusesย used to make load balance decisions and so forth.ย Make sure you implement some kind of database redundancy like SQL replication or clustering of some sort. If the database isn’t reachable for some reason running sessions will keep working but new sessions cannot be established and configuration changes aren’t possible, keep that in mind. More on the overall architecture and its components in a minute. The picture below, owned by Citrix, isn’t new but it does still provides us with a clear overview on the overall XD7 architecture.

Excalibur components overview

A quote from Citrix: โ€œUnlike XenApp, the Delivery Agent communicates only with the controllers in the site and does not need to access the site database or license server directlyโ€ Having quoted that, XenApp workers (session host only servers) offer the same sort of benefit. As they only host user sessions and will (or can) never beย  ‘elected’ as an Data Collector for their zone they wonโ€™t get all the IMA store (database) information pushed into their LHC enhancing overall performance. However,ย these workersย still consist of the same bits and bytes as installed on a Data Collector compared to โ€˜justโ€™ a Delivery Agent which areย lighter weight, as Citrix puts it.

FMA vs IMA

With the introduction of XenDesktop 7 IMAย isย gone! But what does this tell us? Wellโ€ฆ It basically means that Zones together with their Zone Data Collectors are gone (itโ€™s now one big Site) so no more Zone preference policies and Load Balance policies are now applied at Site level instead of Zones. No more IMA protocol and Service, these are replaced by the XD7 Virtual Agents that get installed on all Virtual and or Physical machines provisioned through XenDesktop 7. Since Data Collectors (and thus Zones) are no longer part of the overall architecture and all virtual and or physical servers in XD7 basically function as โ€˜Workersโ€™ or โ€˜Session only Modeโ€™ (as far as the former XenApp servers are concerned anyway) this also means that most of our old XenApp designs donโ€™t apply anymore and it might be time to re-think and re-design them. Data flow has changed and in some designs different rules now apply.

LHC

XD7 Delivery Controllers don’t have a Local Host Cache (LHC)ย this means thatย user authentication, application enumeration (and requests) and user connection requests, plus a few more :-) all need to come from the central SQL DB, including server Load Balance information. XenDesktop has been doing it this way for a while now so it should be ok.

Improved

In XenDesktop 7 the FMA now combines provisioning and personalization tools for both desktops and applications. New and improved features include: Windows 8 and Windows Server 2012 support, Application publishing, XenApp is merged into XD or FMA if you will, allowing you to publish applications and or hosted shared desktops from Server OSโ€™s. As of this release Machine Creation Servicesย can also beย used to provision virtual server machines (also called Workloads) not just desktops, a big step forward!ย Note that Citrix Provisioning Services (PVS) can still be used, no real changes there.

The best thing is, all Agents communicate with the same controller no matter which OS is installed! This is what makes the diversity in operating systemsย possible especially for XenApp. For example, you can have one Delivery Group (again, we already had these in previous versions of XD, the same goes forย Machine Catalogs as well) applied to multiple different Machine Catalogs. See below and as opposed to XenApp, the Delivery Controller (former Data Collector) no longer needs to have Terminal Services installed.

Machine Creation Services

Big part of the overall FMA. As you know MCS within XD7 and earlier version takes care of the provisioning of virtual machines, multiple (tens, hundreds, thousands even) at onceย ย on your underlying Host Infrastructure (your Hypervisor of choice)ย which in the case of XD7 can either be desktop or server workloads, Windows 8 and Server 2012 included. Some cool new features have been announced recently, I picked them up during one of Citrixโ€™s Master Classes, read on below.

With the introduction of Hyper-V 3.0 in Server 2012 new features have become available. MCS as well as PVS can now both leverage SMB 3.0 shared folders on file servers with clustered shared volumes and SANโ€™s and use them as shared storage.

When Hyper-V 3.0 is used as the underlying Hypervisorย MCS supports the VHDX format. Secondary disks attached to the virtual machine destined for PVS Write cache for example will also automatically leverage the โ€˜newโ€™ VHDX format, the same goes for PVS Personal vDisks.ย PVS disks that are accessed and managed directly from the Provisioning Server itself will continue to use the VHD format since PVS is and can still be used on Windows Server 2008 R2 as well.

MCS can take advantage of another Hyper-V 3.0 feature called: Clustered Shared Volume Read Caching. I got this from one of the Citrix Blogs: XenDesktop 7ย can take advantage of this capability to reduce storage IO for MCS catalogs during boot and logon storms. ย The effect is similar to that of the caching that takes place on PVS hosts, except that the blocks are delivered once to each Hyper-V host and then shared among the VMs on that host. CSV cashing makes use of host RAM for this cache so there will be some tradeoff between cache size and the amount of RAM available to VMโ€™s.

MCS now also supports KMS during the image creation process. It enables the KMS system to record each VM as a separate machine. Each machine created provides unique activation for Windows as well as Office 2010 installations.

When creating a master image and Personal vDisks are involved, itโ€™s no longer necessary to manually run an inventory at the end of the image creation process. Also, during the image preparation process DHCP is now automatically enabled.

Storage Superseding. A new concept to MCS, you can configure certain storage in a way so that existing virtual machines on there will keep functioning but new provisioned virtual machines wonโ€™t be created on that specific storage. A nice feature to use when your storage is almost full.

PVS and MCS go hand in hand: you can create a Delivery Groupย containing both PVS and MCS provisioned machines. Perhaps not something you will implement in ‘real life’ but it shows you just how flexible the product is. Could be nice for POC’s though.

Catalogs

As far as XenDesktop goes a Catalog is still a catalog, you can have a Windows 7 catalog, a Windows 8 catalog etcโ€ฆ For XenApp however, things are different. From a XenApp point of view you can compare a Catalog with a Worker group with a few exceptionsโ€ฆ As you probably know, in a XenApp Farm all the server systems need to have the same operating system installed, no exceptions. So if you have 2 or more Worker groups then all the systems within those groups will have the same OS installed. In XD7 things work different, for example, you can create two different Catalogs (Worker groups) for use with XenApp in which you can have one Catalog with Windows Server 2008R2 installed and another with Windows Server 2012 and publish two separate hosted shared desktops, all within the same infrastructure, a big change!

Excalibur Catalogs

Delivery Groups

Delivery groups are not a new concept just a name change, used to be called Desktop groups in XenDesktop, they are still created from, or applied to,ย Catalogs and pretty much fulfill the same tasks. There is a big change thoughโ€ฆ In earlier versions of XenDesktop you assigned a Desktop Group to a Catalog or multiple Catalogs if needed, but the Catalogs all needed to be exactly the same, meaning that they all shared the same common image, 2008R2 for example. Now, in XD7 it is possible to assign a single Delivery group to multiple different Catalogs, as mentioned earlier.ย Think back to the example above, two Catalogs with two different operating systems installed same here but with just one Delivery group assigned to them. Simplified management! The same goes for XenApp, two different Catalogs: 2008R2 and 2012 (which already is a big new feature on its self), one Delivery group.

A quick note one the above, I havenโ€™t got the chance to look at the final product yet, but during one of Citrixโ€™s Masterclasses it showed that Delivery Groups can be used to either publish applications or (VDI) desktop or both from the same Delivery Group. This process is slightly different from the App publishing feature in the Excalibur Tech Preview release where Delivery Groups get added during the application publishing process. So Iโ€™m not sure if both options are still in there.

All under one roof

No more separate infrastructures for desktops and applications, itโ€™s one install, architecture and console (Citrix Studio)ย to meet all your delivery needs. It includes several workflows which simplify and speed up the process of delivering desktops and applications to users. Delivery Agents in XD7 are configured via policies.ย  Any combination of Active Directory GPOs, the Studio console (HDX Policy), and Local GPO settings can be used.

This comes from one of the Citrix Blogs regarding FMA: The biggest difference between the two Delivery Agentsย (there areย desktop and server DA’s)ย is the ICA protocol stack used.ย  For desktop machines, Citrix ships a single-user ICA stack (internally known as PortICA) which allows only one ICA session at a time.ย  This version connects users to the machineโ€™s console session, similar GoToMyPC or other Remote Access products for a Desktop OS.ย  It also includes additional HDX features such as USB and Aero redirection, which are only available on a single-user machine.ย  For server machines, Citrix includes a multi-user ICA stack, which extends Windows Remote Desktop Services with the HDX protocol.ย  This is the same ICA protocol stack developed for Citrix XenApp, just with a different management interface to make it compatible with Excalibur controllers. Iย couldnโ€™t have said it any better :-)

Other high level FMA changes

Some new services are introduced # The delegated admin service providing the Roles and Scopes # Configuration Logging # Monitor Service # Environment Tests # StoreFront integration # Machine Creation Services has been reduced to two services in total.

Some more changes:

There is a secondary database specifically for Configuration Logging and the Monitor Service # Remote PC is fully integrated into the Catalogs and Delivery Groups # Load Balancing is controlled via Group Policy, on Site level that is # Applications are now associated with Delivery Groups andย application attributes like color depth and audio are also configured through Delivery Groups.

FlexCast Delivery Technology

FlexCast delivery technologyโ€ฆ Desktop virtualization for everyone. One of the many marketing term out there. FlexCast offers you several delivery models, one solution to meet al use cases. It is designed to support all type of workers (as Citrix likes to call them) out there. For example, Task Workers access a small set of applications but at the same time they interact with customers, partners and employees. As a result they have access to critical data. A local Virtual Machine might be the best solution, hereโ€™s where FlexCast comes in. Another example, so called Road Warriors need access to their desktop from anywhere, here a Hosted VDI of Hosted Shared desktop might do the trick, again… FlexCast! Of-course itโ€™s all up to you, you decide which model best suites the use case at hand! FlexCast offers you the following desktop delivery models:

  • Local Virtual Machine
  • Streamed VHD
  • Hosted VDI
  • Hosted Shared
  • On-Demand Apps

Hereโ€™s a nice quote from one of the Citrix Blogs written almost four years ago but still valid โ€œI find that it helps me to think of FlexCast more as a strategy for delivering desktops, than as a specific technology. Itโ€™s about thinking of all your virtual desktop and application delivery methods as a toolbox that enable you to directly address the different performance, security, personalization and mobility requirements of all your usersโ€ Nice one right?! Below is aย  graphical overview, wellโ€ฆ of FlexCast Delivery in combination with the ICA / HDX protocol.

FlexCastDetailed overview

Below Iโ€™ll try and give you an complete overview on all components used within a XenDesktop 7 architecture as we know it todayย and discuss the data flow throughout, protocols and port numbers included. As always, if you feel I’m leaving anything out, give me a shout. Click to enlarge, make sure you extend it to its fullest! Please… don’t be to hard on me, I don’t use Visio that much ;-)

XenDesktop 7 Overview

Walkthrough

It took me a while to draw this, mainly because my Visio skills aren’t thatย good. I didn’t include all port numbers of all management consoles andย there are also some connections missing, it’s crowded enough in there already. I think I got the most important components, ports and protocols. It may seem a bit chaotic at first but take your time, follow the arrows and eventually it will all become clear to you… I hope :-)ย  Let me know what you think.

So what happens when a user logs in? Firstโ€ฆ data flows through the Firewall and If implemented NetScaler will load balance incoming traffic accordingly # Next StoreFront needs to authenticate the user logging in. It does this, in most cases anyway, through Active Directory # How this process is handled in detail depends on your NetScaler / StoreFront configuration.

Also note that I donโ€™t have a DMZ set up here, not even a single hop. For demonstration purposes just imagine itโ€™s there :-) Depending on your DMZ configuration (single or multiple hop) combined with your NetScaler / StoreFront server placement, authentication might take place on the NetScaler in DMZ 1. For example, if your StoreFront server is located on your internal network, which is most often the case when you implement an single hop DMZ with two firewalls configured, hence DMZ 1.ย Otherwise unauthenticated โ€˜trafficโ€™ will enter your internal network which would be a security risk. In a double hop DMZ scenario your StoreFront server will most likely be placed in the second โ€˜hopโ€™ or DMZ 2, where authentication will take place before getting access to you internal network. Of-course there multiple configuration possible.

Once authenticated, either in DMZ 1 or DMZ 2 as explained above,ย StoreFront forwards the credentials to the Delivery Controller # Here the Secure Ticket Authority (STA) as part of the Citrix XML (Broker) Service generates a โ€˜Secure Ticketโ€™ # Next the Delivery Controller queries the SQL database for the users resources (no more LHC)ย once known (XML file) StoreFront will generate a webpage based on this information, finally displaying all resources available to the user. Thatโ€™s step one.

Step two. The user clicks a resource # Again, StoreFront communicates with the STA / XML Broker Service on the Delivery Controller asking for a system that can provide the resource # Next the Delivery Controller contacts and queries the SQL database for connection information. As mentioned earlier the database contains all configuration information of the XenDesktop Site (no more LHC) so it know which system(s) can offer the requested resource. It also holds all live runtime data used for load balance decision making # Based on this (combined) data it returns the connection information back to the Delivery Controller forwarding it to StoreFront # Based on this information StoreFront generates a default.ica file including the STA / XML server address, the secure ticket and server IP address to connect to containing the resource # The user / client uses this ica file to connect to NetScaler which will contact the STA / XML service to verify if the secure ticket is valid # The STA / XML service validates the secure ticket from memory and the connection is established based on the IP address given in the default.ica file finishing the connection process # This is the first ‘phase’ the system goes through, next is the so called ICA Handshake were the client’s ‘capabilities’ are passed through followed by TS licensing, virtual channels negotiation, Citrix’s licenses and so on. Of-course this is all high level but still gives you an good idea on what’s actually going on.

Final Connection

The final connections areย highlighted as thick(er) dotted red lines within the detailed overview above.ย The connectionย can either be external using HTTPS / 443 carrying the ICA / HDX protocol (NetScaler) or internal through a direct ICA / HDX connection from the workstation to the (physical or Virtual) server IP address connecting you to your virtual (hosted) desktop or application(s). But…ย  there is one other possibility. if for whatever reason the client can’t or won’t install Receiver then StoreFront will take over and make the connection for you, still using HDX and all other optimizations featuresย available just like any other connection out there!

Conclusion

Thatโ€™s it, I hope this has been somewhat informative. If you have any questions and or remarks just drop me line. Iโ€™m off to the French Alps next week to take on the Alpe Dโ€™Huez slopes (multiple times) so it might take me a while to answer but I always do.

Bas van Kaam on FacebookBas van Kaam on LinkedinBas van Kaam on Twitter
Bas van Kaam
Bas van Kaam
Field CTO EMEA by day, author by night @ Nerdio
Father of three, EMEA Field CTO @ Nerdio, Author of the book Van de Basis tot aan Meester in de Cloud, Co-author of the book Project Byte-Sized and Yuthor of the book: Inside Citrix โ€“ The FlexCast Management Architecture, over 500 blog posts and multiple (ultimate) cheat sheets/e-books. Public speaker, sport enthusiastยญยญยญยญยญยญยญยญ: above-average runner, 3 x burpee-mile finisher and a former semiprofessional snooker player. IT community participant and initiator of the AVD User group Community world wide.
, , ,


59 responses to “FlexCast Management Architecture”

  1. Good post Bas! Thanks!

    1. Youโ€™re welcome Ufuk I’m glad you liked it.

  2. thanks a lot Bas, this is an incredible amount of info for the new technology. Perhaps no one on the internet has explained it so much yet. Cheers!

    1. Thanks Santosh! It’s appreciated.

  3. Yvan Scigala Avatar

    Great job Bas ! you’re the boss ! Just a comment on the diagram where it seems there is a typo for the layer after the NS. It’s written “Forefront” whereas it’s probably “Storefront”, isn’t it ?

  4. Thank you Yvan! The Boss… LOL Oh man… I did it again :-) Thanks for pointing out!

    I corrected it!

    Regards,

    Bas.

  5. Great introduction! Good job with the Visio.

    1. Thank you Arun, did my best :-)

  6. The Prodigy Avatar

    Great post, very informative !

  7. Thanks again!

  8. […] FlexCast Management Architecture (FMA). Read Bas his article/ […]

  9. Great post again. Good info. Clear outline of the FMA

    1. Thanks again Wessel! Including the Pingback of-course!

  10. Venkatesh Avatar

    Great Post !! Thanks!!

  11. Awesome!

  12. Venkatesh, Jan… Thank you both, glad you liked it!

  13. Excellent work Bas! Very clear explanation!

    1. Thanks Johan!

  14. vincent mathews Avatar

    Hey Bas .. Good information provided on the new release in market & it really helps citrix engineers to learn quickly… Excellent one bro .appreciate the way you given your time to design and post. Good Job.
    Vincent Mathews

    1. Thank you for the compliment Vincent! I enjoyed writing it!

  15. Sureshkrishnan Avatar

    Once again fantastic post. as the other user said no one in the internet could have put so much detail better than you .thanks for all u r efforts and time taking to write something like this that everyone can understand. Keep doing :)

    1. Thank you very much Sureshkrishnan!

  16. HI Bas ,
    Great artical, And thaks for information you are provided .
    I would like to learn troubleshooting steps in XENDESKTOP .
    If you have any please let me know.
    Once again wounderfull work :)

  17. Harish,

    Thank you, always nice to hear! You might want to have a look at these two: http://www.youtube.com/watch?v=m8eGG2aXSjQโ€Ž and http://www.youtube.com/watch?v=By8gu4f3xVEโ€Ž

    let me know what you think.

    Regards,

    Bas.

    1. I mean to say how you made the document as above like that do have any kind of article for troubleshooting doc ….It is easy to understood …. Any way Thank you Bas for helping for this , I will keep visiting you site for new update :)

      1. Check out one of my previous Blogs called โ€˜Troubleshooting one on oneโ€™ there are some good references in there.

  18. Hi Bas, thanks for the detailed explanation of the XenDesktop suite. is there any chance to publish the higher resolution of the Visio diagram ?

    1. Hi Albert, I can send you a copy of the original file if you like? Drop me a line on [email protected]

  19. Thanks a lot Bas. I really appreciate it.

    1. You’re welcome!

  20. Thanks Bas, great overview!!! Would you have any information on the authentication process for smart card? Thanks in advance.

    1. Hi Greg, thanks!

      Not at the moment. I can direct you to some of the E-Docs pages on the subject but I guess you’re already familiar with this those?

      http://support.citrix.com/proddocs/topic/xendesktop-7/cds-smart-cards-plan.html

      Sorry I couldn’t be more of a help, at least for now.

      Regards,

      Bas.

      1. Nguyen, Greg H Avatar

        No worries Bas. Thanks for responding so quickly.

        Regards,

        Greg Nguyen
        INF/PCI/SETS/Srv Lifecycle TS Eng
        GSC–GW3-242B
        Office Phone: 713-431-6312
        Cell Phone: 832-547-4819

  21. ajay pendota Avatar

    Excellent post Bas… Really appreciated :)

    1. No problem Ajay, it was a lot of fun to write. I’m glad you like it! Thanks!

  22. Excellent job with the architecture explaination!! The diagram depicts the detailed communication flow.
    Appreciated..
    In the older version of XenApp/Xendesktop the authentication & authorization is being done by the XML brokers/controllers. With reference to the XD7 atchitecture, i belive this is now being done by the Storefront server. Can you please confirm which service on StoreFront server will do the credentials authentication against the AD? Is there any specific service which does that?

    1. Hi Koushik, thanks.

      When it comes to authenticating users, StoreFront has a so called Authentication service (one per StoreFront deployment) that takes care of the (Active Directory) authentication process. You can configure different authentication methods, just like with WebInterface.

      The XML broker service is still there as part of the Delivery Controller and still acts as a ‘Broker’. The XML Broker determines which applications appear in the Web Interface based on the userโ€™s permissions, after he or she is authenticated to Active Directory (used in most cases).

      You’re right, when using WebInterface (internally) the XML / IMA (store) service is part of the authentication mechanism, if it isn’t available, login attempts will fail. So your statement “In the older version of XenApp/XenDesktop the authentication & authorization is being done by the XML brokers/controllers” is correct when user login internally. You as an admin can choose your preferred authentication method, pass-through, smart card, explicit etc. But I’m not telling you something new here :-)

      Regards,

      Bas.

  23. Hi Bas,

    Thank you for your inputs.

    With reference to XA 6.5 farm having Web interface 5.4 as my web server, i have an another question. Appreciate if you can throw some light on it.
    I understand the XML functionality is to enumerate the resources and brokering the user sessions. However, in my XenApp environment, all user login attempts fail when the XML service on the broker server is down. When there is a seperate service on web server that takes care of AD authentication, why it is dependent on XML service? With none of the XML broker server/service availability, the user should still be allowed to login but should not display any apps/desktops the user has access to. How does the XML service affect user logins? Please clarify.

    Regards,
    Koushik

    1. Hi Koushik,

      Thanks for your reply, and you’re right of-course, the XML service is (an important) part of the authentication process. I edited my previous reply :-) No separate service on WI. Sorry for misleading you there, wasn’t my intention. As a matter a fact, I’ll look into the whole ‘Authentication’ service part on StoreFront a bit more detailed!

      Perhaps, with regards to your issue, this helps to clarify thnigs a bit more. It’s pretty old, but still valid:

      http://support.citrix.com/article/CTX129589

      regards,

      Bas.

  24. Hi Bas,

    Thank you for clarifying the queries. Much appreciated!

    I look forward for your Store Front Authentication Service blog.

    Once again great job in explaining the FMA architecture.

  25. Rodrigo Pimenta Avatar

    Thanks. you’re now in my favorites sites. =D

    1. Rodrigo, that’s really nice to hear, thank you! Spread the word! :-)

  26. Virtualkreol Avatar

    Great post thanks

    1. You’re welcome!

  27. Krishna Prasad Avatar

    That was a great Post Bas. A wonderfully compiled in depth article on a new technology!

    1. That’s great to hear, I’m glad you liked it!

      Regards,

      Bas.

  28. Thanks for the post sir, you da man!!!

    1. Haha, thanks Ken! Great compliment :-)

  29. nisarg Avatar

    Very technical and detailed yet so simple to understand. Finally new architecture will bring back the fun of designing and consulting in VDI.

    1. Glad you liked it Nisarg! Have Fun!

  30. vandana Avatar

    nice article and informative but FMA will work on which port??

    1. Bas van Kaam Avatar

      Hi Vandana,

      Just like IMA, which we had before, FMA is a service as well. IMA communicates on TCP port 2512, where FMA communicates via TCP port 80 (HTTP). These ports can be changed of course, there are several good blog posts out there showing how to do this. It is still ICA traffic, so ports 1494 (ICA) and 2598 (session reliability) also still apply, no changes there. Hope this helped.

      1. vandana Avatar

        Thanks for clarifying this,your posts are really informative and helpful

        1. Bas van Kaam Avatar

          No problem, glad I could help. And thank you of course :-)

      2. subhendu Avatar

        Hi..

        Is FMA a service or its a concept thats use the secure gateway. But when create this set up we never install FMA as a service like service in win 2k8.
        Little confusd…
        Please help.

        1. Bas van Kaam Avatar

          FMA stands for the Flex Management Architecture, XenApp and XenDesktop (as of version 7.x) are both based on this architecture. As such it gets installed as part of the XenApp and or XenDesktop installation, just like with IMA before. FMA is a service (see my previous comment as well) and on its own it has nothing to do with a Secure Gateway.

  31. thank you. you made it really easy to understand..

    1. Bas van Kaam Avatar

      No problem, glad I could help.

  32. […] and Agents, of-course thereโ€™s more to it but for now lets just leave it at that.ย Have a lookhereย for a complete overview on FMA.ย Delivery Agents are installed on all virtual and or physical […]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

About

Lorem Ipsum has been the industrys standard dummy text ever since the 1500s, when an unknown prmontserrat took a galley of type and scrambled it to make a type specimen book.

Lorem Ipsum has been the industrys standard dummy text ever since the 1500s, when an unknown prmontserrat took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.

Categories

Gallery

Verified by MonsterInsights