Specifications
n
Tunneled Client Connections with Microsoft RDP on page 51
When users connect to a View desktop with the Microsoft RDP display protocol, View Client can make
a second HTTPS connection to the View Connection Server host. This connection is called the tunnel
connection because it provides a tunnel for carrying RDP data.
n
Direct Client Connections on page 51
Administrators can configure View Connection Server settings so that View desktop sessions are
established directly between the client system and the View desktop virtual machine, bypassing the View
Connection Server host. This type of connection is called a direct client connection.
n
View Client with Local Mode Client Connections on page 52
View Client with Local Mode offers mobile users the ability to check out View desktops onto their local
computer.
Client Connections Using the PCoIP Secure Gateway
When clients connect to a View desktop with the PCoIP display protocol from VMware, View Client can make
a second connection to the PCoIP Secure Gateway component on a View Connection Server instance or a
security server. This connection provides the required level of security and connectivity when accessing View
desktops from the Internet.
As of View 4.6, security servers include a PCoIP Secure Gateway component. The PCoIP Secure Gateway
connection offers the following advantages:
n
The only remote desktop traffic that can enter the corporate data center is traffic on behalf of a strongly
authenticated user.
n
Users can access only the desktop resources that they are authorized to access.
n
This connection supports PCoIP, which is an advanced remote desktop protocol that makes more efficient
use of the network by encapsulating video display packets in UDP instead of TCP.
n
PCoIP is secured by AES-128 encryption.
n
No VPN is required, as long as PCoIP is not blocked by any networking component. For example, someone
trying to access their View desktop from inside a hotel room might find that the proxy the hotel uses is
not configured to allow inbound traffic on TCP port 4172 and both inbound and outbound traffic on UDP
port 4172.
For more information, see “Firewall Rules for DMZ-Based Security Servers,” on page 60.
Security servers with PCoIP support run on Windows Server 2008 R2 and take full advantage of the 64-bit
architecture. This security server can also take advantage of Intel processors that support AES New Instructions
(AESNI) for highly optimized PCoIP encryption and decryption performance.
VMware View Architecture Planning
50 VMware, Inc.