4.6
Table Of Contents
- VMware View Installation
- Contents
- VMware View Installation
- System Requirements for Server Components
- System Requirements for Client Components
- Supported Operating Systems for View Agent
- Supported Operating Systems for View Client and View Client with Local Mode
- Hardware Requirements for Local Mode Desktops
- Client Browser Requirements for View Portal
- Remote Display Protocol and Software Support
- Adobe Flash Requirements
- Smart Card Authentication Requirements
- Preparing Active Directory
- Configuring Domains and Trust Relationships
- Creating an OU for View Desktops
- Creating OUs and Groups for Kiosk Mode Client Accounts
- Creating Groups for View Users
- Creating a User Account for vCenter Server
- Create a User Account for View Composer
- Configure the Restricted Groups Policy
- Using View Group Policy Administrative Template Files
- Prepare Active Directory for Smart Card Authentication
- Installing View Composer
- Installing View Connection Server
- Installing the View Connection Server Software
- Installation Prerequisites for View Connection Server
- Install View Connection Server with a New Configuration
- Install a Replicated Instance of View Connection Server
- Configure a Security Server Pairing Password
- Install a Security Server
- Microsoft Windows Installer Command-Line Options
- Uninstalling View Products Silently by Using MSI Command-Line Options
- Configuring User Accounts for vCenter Server and View Composer
- Where to Use the vCenter Server User and Domain User for View Composer
- Configure a vCenter Server User for View Manager, View Composer, and Local Mode
- View Manager Privileges Required for the vCenter Server User
- View Composer Privileges Required for the vCenter Server User
- Local Mode Privileges Required for the vCenter Server User
- Configuring View Connection Server for the First Time
- Configuring View Client Connections
- Sizing Windows Server Settings to Support Your Deployment
- Installing the View Connection Server Software
- Installing View Transfer Server
- Configuring Certificate Authentication
- Replacing the Default Certificate
- Add keytool and openssl to the System Path
- Use an Existing PKCS#12 Certificate and Private Key
- Convert a PKCS#12 Keystore to JKS Format
- Creating a New SSL Certificate
- Configure a View Connection Server Instance or Security Server to Use a New Certificate
- Configure a View Transfer Server Instance to Use a New Certificate
- Configure SSL for Client Connections
- Configure SSL for View Transfer Server Communications
- Using Group Policy to Configure Certificate Checking in View Client
- Creating an Event Database
- Installing and Starting View Client
- Install the Windows-Based View Client or View Client with Local Mode
- Start the Windows-Based View Client or View Client with Local Mode
- Install View Client by Using View Portal
- Install View Client on Mac OS X
- Start View Client on Mac OS X
- Set Printing Preferences for the Virtual Printer Feature on Windows Clients
- Using USB Printers
- Installing View Client Silently
- Index
3 Configure use of the secure tunnel.
Option Description
Disable the secure tunnel
Deselect Use secure tunnel connection to desktop.
Enable the secure tunnel
Select Use secure tunnel connection to desktop.
The secure tunnel is enabled by default.
4 Configure use of the PCoIP Secure Gateway.
Option Description
Enable the PCoIP Secure Gateway
Select Use PCoIP Secure Gateway for PCoIP connections to desktop
Disable the PCoIP secure Gateway
Deselect Use PCoIP Secure Gateway for PCoIP connections to desktop
The PCoIP Secure Gateway is disabled by default.
5 Click OK to save your changes.
Configuring External URLs for PCoIP Secure Gateway and Tunnel Connections
To use the secure tunnel, a client system must have access to an IP address, or a fully qualified domain name
(FQDN) that it can resolve to an IP address, that allows the client to reach a View Connection Server or security
server host. To use the PCoIP Secure Gateway, a client system must have access to an IP address that allows
the client to reach a View Connection Server or security server host.
Using Tunnel Connections From External Locations
By default, a View Connection Server or security server host can be contacted only by tunnel clients that reside
within the same network and are therefore able to locate the requested host.
Many organizations require that users can connect from an external location by using a specific IP address or
client-resolvable domain name, and a specific port. This information might or might not resemble the actual
address and port number of the View Connection Server or security server host. The information is provided
to a client system in the form of a URL. For example:
n
https://view-example.com:443
n
https://view.example.com:443
n
https://example.com:1234
n
https://100.200.300.400:443
To use addresses like these in View Manager, you must configure the View Connection Server or security
server host to return an external URL instead of the host's FQDN.
Configuring External URLs
You configure two external URLs. One URL allows client systems to make tunnel connections. The other allows
client systems that use PCoIP to make secure connections through the PCoIP Secure Gateway. You must specify
the PCoIP external URL as an IP address, which allows client systems to connect from an external location.
If your network configuration includes security servers, provide external URLs for the security servers.
External URLs are not required on the View Connection Server instances that are paired with the security
servers.
Chapter 5 Installing View Connection Server
VMware, Inc. 61