6.0
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on View Connection Server and Security Server
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the Product License Key
- Add vCenter Server Instances to View
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to View Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
- Index
When users connect to remote desktops and applications, by default the client makes a second connection to
the View Connection Server or security server host. This connection is called the tunnel connection because
it provides a secure tunnel for carrying RDP and other data over HTTPS.
When users connect to remote desktops and applications with the PCoIP display protocol, the client can
make a further connection to the PCoIP Secure Gateway on the View Connection Server or security server
host. The PCoIP Secure Gateway ensures that only authenticated users can communicate with remote
desktops and applications over PCoIP.
You can also provide secure connections to external users who use HTML Access to connect to remote
desktops. The Blast Secure Gateway ensures that only authenticated users can communicate with remote
desktops. With HTML Access, Horizon Client software does not have to be installed on the users' endpoint
devices.
Depending on the type of client device being used, additional channels are established to carry other traffic
such as USB redirection data to the client device. These data channels route traffic through the secure tunnel
if it is enabled.
When the secure tunnel and secure gateways are disabled, desktop and application sessions are established
directly between the client device and the remote machine, bypassing the View Connection Server or
security server host. This type of connection is called a direct connection.
Desktop and application sessions that use direct connections remain connected even if View Connection
Server is no longer running.
Typically, to provide secure connections for external clients that connect to a security server or View
Connection Server host over a WAN, you enable the secure tunnel, the PCoIP Secure Gateway, and, if your
users connect using HTML Access, the Blast Secure Gateway. You can disable the secure tunnel and the
secure gateways to allow internal, LAN-connected clients to establish direct connections to remote desktops
and applications.
If you enable only the secure tunnel or only one secure gateway, a session might use a direct connection for
some traffic but send other traffic through the View Connection Server or security server host, depending on
the type of client being used.
SSL is required for all client connections to View Connection Server and security server hosts.
Configure the PCoIP Secure Gateway and Secure Tunnel Connections
You use View Administrator to configure the use of the secure tunnel and PCoIP Secure Gateway. These
components ensure that only authenticated users can communicate with remote desktops and applications.
Clients that use the PCoIP display protocol can use the PCoIP Secure Gateway. Clients that use the RDP
display protocol can use the secure tunnel.
For information about configuring the Blast Secure Gateway, see “Configure Secure HTML Access,” on
page 96.
IMPORTANT A typical network configuration that provides secure connections for external clients includes a
security server. To enable or disable the secure tunnel and PCoIP Secure Gateway on a security server, you
must edit the View Connection Server instance that is paired with the security server.
In a network configuration in which external clients connect directly to a View Connection Server host, you
enable or disable the secure tunnel and PCoIP Secure Gateway by editing that View Connection Server
instance in View Administrator.
Prerequisites
n
If you intend to enable the PCoIP Secure Gateway, verify that the View Connection Server instance and
paired security server are View 4.6 or later.
Chapter 7 Configuring View for the First Time
VMware, Inc. 95