5.2
Table Of Contents
- VMware Horizon View Installation
- Contents
- VMware Horizon View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Installing View Transfer Server
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure View Clients to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configuring Certificate Checking in View Client for Windows
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- View Transfer Server and SSL Certificates
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the View Connection Server License Key
- Add vCenter Server Instances to View Manager
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support View Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring View Client Connections
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Replace the Default Ports for View Transfer Server
- Sizing Windows Server Settings to Support Your Deployment
- Configuring User Accounts for vCenter Server and View Composer
- Adding the View Desktops Plug-in to the vSphere Web Client
- Configuring Event Reporting
- Index
3 (Optional) If the View server computer has multiple NICs, select one NIC to listen on the configured
ports.
Add the serverHost and serverHostNonSsl properties to specify the IP address that is bound to the
designated NIC.
For example:
serverHost=10.20.30.40
serverHostNonSsl=10.20.30.40
Typically, both the SSL and non-SSL listeners are configured to use the same NIC. However, if you use
the serverProtocol=http property to off-load SSL for client connections, you can set the serverHost
property to a separate NIC to provide SSL connections to systems that are used to launch View
Administrator.
If you configure SSL and non-SSL connections to use the same NIC, the SSL and non-SSL ports must
not be the same.
4 Restart the View Connection Server service or security server service to make your changes take effect.
What to do next
If necessary, manually configure your Windows firewall to open the updated ports.
Replace the Default Ports or NICs for the PCoIP Secure Gateway on View
Connection Server Instances and on Security Servers
You can replace the default ports or NICs that are used by a PCoIP Secure Gateway service that runs on a
View Connection Server instance or security server. Your organization might require you to perform these
tasks to comply with organization policies or to avoid contention.
For client-facing TCP and UDP connections, the PCoIP Secure Gateway listens on port 4172 by default. For
UDP connections to View desktops, the PCoIP Secure Gateway listens on port 55000 by default.
The port that is specified in the PCoIP External URL does not change as a result of changes that you make to
ports in this procedure. Depending on your network configuration, you might have to change the PCoIP
External URL port as well.
If the computer on which the PCoIP Secure Gateway is running has multiple NICs, the computer listens on
all NICs by default. You can select one NIC to listen on the configured ports by specifying the IP address
that is bound to that NIC.
Prerequisites
Verify that the port that is specified in the PCoIP External URL on the View Connection Server instance or
security server will continue to be valid after you change ports in this procedure.
Procedure
1 Start the Windows Registry Editor on the View Connection Server or security server computer where
the PCoIP Secure Gateway is running.
2 Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Teradici\SecurityGateway registry key.
3 Under this registry key, add one or more of the following String (REG_SZ) values with your updated port
numbers.
For example:
ExternalTCPPort "44172"
ExternalUDPPort "44172"
InternalUDPPort "55111"
VMware Horizon View Installation
110 VMware, Inc.