6.2
Table Of Contents
- View Installation
- Contents
- View Installation
- System Requirements for Server Components
- System Requirements for Guest Operating Systems
- Installing View in an IPv6 Environment
- Setting Up View in an IPv6 Environment
- Supported vSphere , Database, and Active Directory Versions in an IPv6 Environment
- Supported Operating Systems for View Servers in an IPv6 Environment
- Supported Windows Operating Systems for Desktops and RDS Hosts in an IPv6 Environment
- Supported Clients in an IPv6 Environment
- Supported Remoting Protocols in an IPv6 Environment
- Supported Authentication Types in an IPv6 Environment
- Other Supported Features in an IPv6 Environment
- Installing View in FIPS Mode
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for Remote Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for Users
- Creating a User Account for vCenter Server
- Creating a User Account for a Standalone View Composer Server
- Create a User Account for View Composer AD Operations
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Disable Weak Ciphers in SSL/TLS for View Composer and View Agent Machines
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Firewall Rules for View Connection Server
- Reinstall View Connection Server with a Backup Configuration
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Components Silently by Using MSI Command-Line Options
- Configuring SSL Certificates for View Servers
- Understanding SSL Certificates for View Servers
- Overview of Tasks for Setting Up SSL Certificates
- Obtaining a Signed SSL Certificate from a CA
- Configure View Connection Server, Security Server, or View Composer to Use a New SSL Certificate
- Configure Client Endpoints to Trust Root and Intermediate Certificates
- Configuring Certificate Revocation Checking on Server Certificates
- Configure the PCoIP Secure Gateway to Use a New SSL Certificate
- Setting View Administrator to Trust a vCenter Server or View Composer Certificate
- Benefits of Using SSL Certificates Signed by a CA
- Troubleshooting Certificate Issues on View Connection Server and Security Server
- Configuring View for the First Time
- Configuring User Accounts for vCenter Server and View Composer
- Configuring View Connection Server for the First Time
- View Administrator and View Connection Server
- Log In to View Administrator
- Install the Product License Key
- Add vCenter Server Instances to View
- Configure View Composer Settings
- Configure View Composer Domains
- Allow vSphere to Reclaim Disk Space in Linked-Clone Virtual Machines
- Configure View Storage Accelerator for vCenter Server
- Concurrent Operations Limits for vCenter Server and View Composer
- Setting a Concurrent Power Operations Rate to Support Remote Desktop Logon Storms
- Accept the Thumbprint of a Default SSL Certificate
- Configuring Horizon Client Connections
- Configure the PCoIP Secure Gateway and Secure Tunnel Connections
- Configure Secure HTML Access
- Configuring External URLs for Secure Gateway and Tunnel Connections
- Set the External URLs for a View Connection Server Instance
- Modify the External URLs for a Security Server
- Give Preference to DNS Names When View Connection Server Returns Address Information
- Replacing Default Ports for View Services
- Replace the Default HTTP Ports or NICs for View Connection Server Instances and Security Servers
- Replace the Default Ports or NICs for the PCoIP Secure Gateway on View Connection Server Instances and on Security Servers
- Replace the Default Port for View Composer
- Change the Port Number for HTTP Redirection to Connection Server
- Prevent HTTP Redirection for Client Connections to Connection Server
- Enable Remote Access to View Performance Counters on Connection Servers
- Sizing Windows Server Settings to Support Your Deployment
- Configuring Event Reporting
- Index
Replace the Default HTTP Ports or NICs for View Connection Server Instances
and Security Servers
You can replace the default HTTP ports or NICs for a View Connection Server instance or security server by
editing the locked.properties file on the server computer. Your organization might require you to perform
these tasks to comply with organization policies or to avoid contention.
The default SSL port is 443. The default non-SSL port is 80.
The port that is specified in the secure tunnel External URL does not change as a result of changes that you
make to ports in this procedure. Depending on your network configuration, you might have to change the
secure tunnel External URL port as well.
If the server computer has multiple NICs, the computer listens on all NICs by default. You can select one
NIC to listen on the configured port by specifying the IP address that is bound to that NIC.
During installation, View configures the Windows firewall to open the required default ports. If you change
a port number or the NIC on which it listens, you must manually reconfigure your Windows firewall to
open the updated ports so that client devices can connect to the server.
If you change the SSL port number and you need HTTP redirection to continue working, you must also
change the port number for HTTP redirection. See “Change the Port Number for HTTP Redirection to
Connection Server,” on page 118.
Prerequisites
Verify that the port that is specified in the External URL for this View Connection Server instance or security
server will continue to be valid after you change ports in this procedure.
Procedure
1 Create or edit the locked.properties file in the SSL gateway configuration folder on the View
Connection Server or security server computer.
For example: install_directory\VMware\VMware View\Server\sslgateway\conf\locked.properties
The properties in the locked.properties file are case sensitive.
2 Add the serverPort or serverPortNonSsl property, or both properties, to the locked.properties file.
For example:
serverPort=4443
serverPortNonSsl=8080
3 (Optional) If the server computer has multiple NICs, select one NIC to listen on the configured ports.
Add the serverHost and serverHostNonSsl properties to specify the IP address that is bound to the
designated NIC.
For example:
serverHost=10.20.30.40
serverHostNonSsl=10.20.30.40
Typically, both the SSL and non-SSL listeners are configured to use the same NIC. However, if you use
the serverProtocol=http property to off-load SSL for client connections, you can set the serverHost
property to a separate NIC to provide SSL connections to systems that are used to launch View
Administrator.
If you configure SSL and non-SSL connections to use the same NIC, the SSL and non-SSL ports must
not be the same.
4 Restart the View Connection Server service or security server service to make your changes take effect.
View Installation
116 VMware, Inc.