Installation and Setup Guide

Table Of Contents
Table 310. PCoIP Client Session Variables (Continued)
Setting Description
Configure PCoIP
virtual channels
Specifies the virtual channels that can and cannot operate over PCoIP sessions. This setting also
determines whether to disable clipboard processing on the PCoIP host.
Virtual channels that are used in PCoIP sessions must appear on the virtual channel authorization
list. Virtual channels that appear in the unauthorized virtual channel list cannot be used in PCoIP
sessions.
You can specify a maximum of 15 virtual channels for use in PCoIP sessions.
Separate multiple channel names with the vertical bar (|) character. For example, the virtual channel
authorization string to allow the mksvchan and vdp_rdpvcbridge virtual channels is
mksvchan|vdp_rdpvcbridge.
If a channel name contains the vertical bar or backslash (\) character, insert a backslash character
before it. For example, type the channel name awk|ward\channel as awk\|ward\\channel.
When the authorized virtual channel list is empty, all virtual channels are disallowed. When the
unauthorized virtual channel list is empty, all virtual channels are allowed.
The virtual channels setting applies to both agent and client. Virtual channels must be enabled on
both agent and client for virtual channels to be used.
The virtual channels setting provides a separate check box that allows you to disable remote
clipboard processing on the PCoIP host. This value applies to the agent only.
By default, all virtual channels are enabled, including clipboard processing.
Configure SSL cipher
list
Configures an SSL cipher list to restrict the use of cipher suites before establishing an encrypted
SSL connection. The list consists of one or more cipher suite strings separated by colons. All cipher
suite strings are case insensitive.
The default value is ECDHE-RSA-AES256-GCM-SHA384:AES256-SHA256:AES256-SHA:ECDHE-
RSA-AES128-GCM-SHA256:AES128-SHA256:AES128-SHA:@STRENGTH.
If this setting is configured, the Enforce AES-256 or stronger ciphers for SSL connection
negotiation check box in the Configure SSL connections to satisfy Security Tools
setting is ignored.
This setting must be applied to both the PCoIP server and the PCoIP client.
Configure SSL
connections to satisfy
Security Tools
Specifies how SSL session negotiation connections are established. To satisfy security tools, such
as port scanners, enable this setting and do the following:
1 Store the certificate for the Certificate Authority that signed any Server certificate to be used with
PCoIP in the Trusted Root certificate store.
2 Configure the agent to load certificates only from the Certificate Store. If the Personal store for
the Local Machine is used, leave the CA Certificate store name unchanged with the value
ROOT, unless a different store location was used in step 1.
If this setting is disabled, the AES-128 cipher suite is not available and the endpoint uses
Certification Authority certificates from the machine account's MY store and Certification Authority
certificates from the ROOT store. This setting is disabled by default.
Configure SSL
protocols
Configures the OpenSSL protocol to restrict the use of certain protocols before establishing an
encrypted SSL connection. The protocol list consists of one or more OpenSSL protocol strings
separated by colons. All cipher strings are case insensitive.
The default value is TLS1.1:TLS1.2, which means that TLS v1.1 and TLS v1.2 are enabled and
SSL v2.0, SSLv3.0, and TLS v1.0 are disabled.
If this setting is set in both the client and the agent, the OpenSSL protocol negotation rule is
followed.
VMware Horizon Client for Windows Installation and Setup Guide
VMware, Inc. 69