5.2
Table Of Contents
- VMware Horizon View Installation
- Contents
- VMware Horizon View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Installing View Transfer Server
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure View Clients to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configuring Certificate Checking in View Client for Windows
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- View Transfer Server and SSL Certificates
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the View Connection Server License Key
- Add vCenter Server Instances to View Manager
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support View Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring View Client Connections
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Replace the Default Ports for View Transfer Server
- Sizing Windows Server Settings to Support Your Deployment
- Configuring User Accounts for vCenter Server and View Composer
- Adding the View Desktops Plug-in to the vSphere Web Client
- Configuring Event Reporting
- Index
Table 5‑3. MSI Properties for Silently Installing a Security Server (Continued)
MSI Property Description Default Value
VDM_SERVER_SS_PCOIP_IP
ADDR
The PCoIP Secure Gateway external IP address. This property is
supported only when the security server is installed on Windows Server
2008 R2 or later.
For example: VDM_SERVER_SS_PCOIP_IPADDR=10.20.30.40
This property is required if you plan to use the PCoIP Secure Gateway
component.
None
VDM_SERVER_SS_PCOIP_T
CPPORT
The PCoIP Secure Gateway external TCP port number. This property is
supported only when the security server is installed on Windows Server
2008 R2 or later.
For example: VDM_SERVER_SS_PCOIP_TCPPORT=4172
This property is required if you plan to use the PCoIP Secure Gateway
component.
None
VDM_SERVER_SS_PCOIP_U
DPPORT
The PCoIP Secure Gateway external UDP port number. This property is
supported only when the security server is installed on Windows Server
2008 R2 or later.
For example: VDM_SERVER_SS_PCOIP_UDPPORT=4172
This property is required if you plan to use the PCoIP Secure Gateway
component.
None
VDM_SERVER_SS_BSG_EXT
URL
The Blast Secure Gateway external URL. The URL must contain the
HTTPS protocol, an externally resolvable security server name, and port
number
For example:
VDM_SERVER_SS_BSG_EXTURL=https://view.companydomain.com:
8443
The default port number is 8443. A Blast Secure Gateway must be
installed on the security server to allow users to make Web connections
to View desktops.
None
VDM_SERVER_SS_FORCE_I
PSEC
Forces IPsec to be used between the security server and its paired View
Connection Server instance.
By default, an unattended installation and pairing of security server to a
View Connection Server instance with IPsec disabled causes the pairing
to fail.
The default value of 1 forces IPsec pairing. Set this value to 0 to allow
pairing without IPsec.
1
Prepare to Upgrade or Reinstall a Security Server
Before you can upgrade or reinstall a security server instance, you must remove the current IPsec rules that
govern communication between the security server and its paired View Connection Server instance. If you
do not take this step, the upgrade or reinstallation fails.
IMPORTANT This task pertains to View 5.1 and later security servers. If does not apply to View 5.0.x and
earlier security servers.
By default, communication between a security server and its paired View Connection Server instance is
governed by IPsec rules. When you upgrade or reinstall the security server and pair it again with the View
Connection Server instance, a new set of IPsec rules must be established. If the existing IPsec rules are not
removed before you upgrade or reinstall, the pairing fails.
You must take this step when you upgrade or reinstall a security server and are using IPsec to protect
communication between the security server and View Connection Server.
VMware Horizon View Installation
56 VMware, Inc.