3.1

Table Of Contents
VMware, Inc. 35
Chapter 2 Installation
ToallowexternalclientdevicestoconnecttoasecurityserverwithintheDMZ,the
frontendfirewallmustallowinboundtrafficonTCPports80and443.Toallowthe
securityservertocommunicatewitheachstandardorreplicaserverthatresideswithin
theinternalnetwork,thebackendfirewall
mustallowinboundtrafficonTCP
port 8009forAJP13forwardedWebtrafficandTCPport4001forJavaMessageService
(JMS)traffic.
Behindthebackendfirewall,internalfirewallsmustbesimilarlyconfiguredinorder
toallowtheViewManagerdesktopsandViewConnectionServerinstancesto
communicatewitheach
other.Port4001isusedforJMStrafficoriginatingfromeither
theViewAgentcomponentinstalledoneachViewManagerdesktoporfromasecurity
serverintheDMZ,andisdirectedatstandardorreplicaViewConnectionServer
instances.
Inanyfirewallconfiguration,TCPports3389and32111areused
fortrafficbetween
ViewClientforWindowsandViewAgent,andbetweenthinclientsandViewAgent.
TCPport3389isusedforRDPtraffic.TCPport32111isusedforUSBdevicetraffic,to
enabletheclienttoinitiatesessionlogoff,andtopassadditionalinformationbetween
ViewAgentand
ViewClientforWindowsandthinclients.
FirewallrulesaresummarizedinTable 21.
Table 2-1. Firewall Rules
Firewall
Type TCP Port Protocol Source Destination
Frontend 80 HTTP
Any Securityserver
443 HTTPS
Backend 4001 JMS
Securityserver Standardorreplica
server
8009 AJP13
4001 JMS
ViewAgent
Any 3389 RDP
ViewClient(Windows
andthinclients)
32111 USB
3389 RDP
ViewClient(Windows
andthinclients)
ViewAgent
32111 USB