5.0

Table Of Contents
Configuring View Client Connections
View clients communicate with a View Connection Server or security server host over secure connections.
The initial View Client connection, which is used for user authentication and View desktop selection, is created
over HTTPS when a user provides a domain name or IP address to View Client. If firewall and load balancing
software are configured correctly in your network environment, this request reaches the View Connection
Server or security server host. With this connection, users are authenticated and a desktop is selected, but users
have not yet connected to View desktops.
When users connect to View desktops, by default View Client makes a second connection to the View
Connection Server or security server host. This connection is called the tunnel connection because it provides
a secure tunnel for carrying RDP and other data over HTTPS.
When users connect to View desktops with the PCoIP display protocol, View Client can make a further
connection to the PCoIP Secure Gateway on the View Connection Server or security server host. The PCoIP
Secure Gateway ensures that only authenticated users can communicate with View desktops over PCoIP.
When the secure tunnel or PCoIP Secure Gateway is disabled, View desktop sessions are established directly
between the client system and the View desktop virtual machine, bypassing the View Connection Server or
security server host. This type of connection is called a direct connection.
Typically, to provide secure connections for external clients that connect to a security server or View
Connection Server host over a WAN, you enable both the secure tunnel and the PCoIP Secure Gateway. You
can disable the secure tunnel and the PCoIP Secure Gateway to allow internal, LAN-connected clients to
establish direct connections to View desktops.
Certain View Client endpoints, such as thin clients, do not support the tunnel connection and use direct
connections for RDP data, but do support the PCoIP Secure Gateway for PCoIP data.
SSL for client connections is enabled by default. You can disable SSL so that initial and tunnel connections take
place over HTTP, not HTTPS. Disabling SSL might be acceptable for internal, LAN-connected clients where
communications are protected by a firewall. See “Configure SSL for Client Connections,” on page 82.
Configure the PCoIP Secure Gateway and Secure Tunnel Connections
You use View Administrator to configure the use of the secure tunnel and PCoIP Secure Gateway. These
components ensure that only authenticated users can communicate with View desktops.
Clients that use the PCoIP display protocol can use the PCoIP Secure Gateway. Clients that use the RDP display
protocol can use the secure tunnel.
IMPORTANT A typical network configuration that provides secure connections for external clients includes a
security server. To enable or disable the secure tunnel and PCoIP Secure Gateway on a security server, you
must edit the View Connection Server instance that is paired with the security server.
In a network configuration in which external clients connect directly to a View Connection Server host, you
enable or disable the secure tunnel and PCoIP Secure Gateway by editing that View Connection Server instance
in View Administrator.
Prerequisites
n
If you intend to enable the PCoIP Secure Gateway, verify that the View Connection Server instance and
paired security server are View 4.6 or later.
n
If you pair a security server to a View Connection Server instance on which you already enabled the PCoIP
Secure Gateway, verify that the security server is View 4.6 or later.
Procedure
1 In View Administrator, select View Configuration > Servers.
VMware View Installation
56 VMware, Inc.