3.0.1

Table Of Contents
View Manager Administration Guide
34 VMware, Inc.
Toallowexternalclientdevicestoconnecttoasecurityserverwit hintheDMZ,the
frontendfirewallmustallowinboundtrafficonTCPports80and443.Toallowthe
securityservertocommunicatewitheachstandardorreplicaserverthatresideswithin
theinternalnetwork,thebackendfirewallmu
stallowinboundtrafficonTCPport
8009forAJP13forwardedWebtraffic,TCPport4001forJavaMessageService(JMS)
traffic,andTCPport3389forRDPtraffic.
Behindthebackendfirewall,internalfirewallsmustbesimilarlyconfiguredinorder
toallowtheViewManagerdesktopsandViewConnectionServ
erinstancesto
communicatewitheachother.Port3389(RDP)isusedfortrafficoriginatingfroma
standardorreplicaserverthatisdirectedataguestsystem.Port4001isusedforJMS
trafficoriginatingfromeithertheViewAgentcomponentinstalledoneachView
Managerdesktoporfromasecu
rityserverintheDMZ,andisdirectedatstandardor
replicaViewConnectionServerinstances.
ThebackendandfrontendfirewallrulesaresummarizedinTable 21.
External URL
Bydefault,thefullyqualifieddomainname(FQDN)ofthehostisrequiredbyView
ClientinordertoestablishaconnectionwithViewConnectionServer.Thisinformation
willnotbeavailabletoclientswhoattempttocontacttheserverfromoutsideyour
networkenvironment.
Referto“ClientConnectionsfromtheIn
ternet”onpage 71forinformationonhowto
addanexternalURLtoasecurityservertomakeitaccessiblefromtheInternet.
Table 2-1. Firewall Rules
Firewall Type TCP Port Protocol Source Destination
Frontend 80 HTTP Any Securityserver
443 HTTPS
Backend 3389 RDPSecurityserver Anydesktopvirtualmachine
4001 JMSStandardorreplicaserver
8009 AJP13
4001 JMSAnydesktopVM