Re: VMware Horizon View HTML Access using BLAST Mizuho, We don't have the HTTP(S) Secure Tunnel and Blast Secure Gateway on our Connection Servers enabled so I can't confirm if this is supported or not.

The HTTPS Secure Tunnel service (see the Horizon 7 Network Ports diagram) connects to the Horizon Agent on TCP 9427 for MMR and CDR traffic. However, with Blast Extreme it is possible to configure CDR and MMR to use a TCP side-channel which uses TCP 9427. VMware Horizon View 7 added a new security feature that is enabled by default for RFC 6454 Origin Checking. This Security feature protects against cross-site request forging. What this feature does is when you go to the View Administrator page it will check the origin URL for the web request. Sep 06, 2016 · The Horizon View Connection Server, sometimes referred to as Connection Broker or View Manager, is the central component of the View infrastructure. Its primary role is to connect a user to their virtual desktop by means of performing user authentication and then delivering the appropriate desktop resources based on the user’s profile and This entry was posted in Virtualization and tagged horizon view, vdi, vExpert, view on January 20, 2017 by Patrick Terlisten. Post navigation ← Tiny PowerShell/ Azure project: Deploy-AzureLab.ps1 Single Sign On (SSO) with RemoteApps on Windows Server 2012 (R2) → Nov 12, 2013 · Horizon View uses the vdm tag to identify which certificates it should use. As you can see I have renamed my original certificate. To do this, double click the certificate select Details tab > Edit Properties > General Tab. To start using the new certificate restart the VMware View Security Gateway Component on your Horizon View Security Server This connection is used to provide a secure tunnel for RDP. Because it’s the same protocol, the connection will be directed to the same connection or security server as before. The same applies to BLAST connections. But if the user connects to a pool via PCoIP, the View client will open a new connection using PCoIP with destination port 4172.

VMware Horizon Clients for Windows, Mac, iOS, Linux, and Android allow you to connect to your VMware Horizon virtual desktop from your device of choice giving you on-the-go access from any location. Click here for a list of certified thin clients, zero clients, and other partner solutions for VMware Horizon.

Important: A typical network configuration that provides secure connections for external clients includes a security server. To use Horizon Administrator or to enable or disable the secure tunnel and PCoIP Secure Gateway on a security server, you must edit the Connection Server instance that is paired with the security server. Apr 08, 2020 · If you want to configure the gateway for external users only, you need a replica Connection Server without PCOIP Secure Gateway configured for internal users to connect to. For more information, see the Configure the PCoIP Secure Gateway and Secure Tunnel Connections in the VMware Horizon View 5.2 and 5.3 Installation Guide. A typical network configuration that provides secure connections for external clients includes a security server. To use View Administrator to enable or disable the secure tunnel and PCoIP Secure Gateway on a security server, you must edit the View Connection Server instance that is paired with the security server. If you don't have an internal CA and you don't use HTTPS secure tunnel, you will likely receive SSL warnings about self signed certs. The common method to get around this is to turn on https secure tunneling. This will force all blast traffic to go through the connection server instead of going directly to the View Agent running on the VM guest.

Mar 22, 2013 · I made a drawing (based on VMware Horizon View Security server version 5.2) of a single View Security server that list the ports and rules that needs to be opened between the servers: (*1) HTML Access uses TCP port 8443 for client connections to the Blast Secure Gateway (*2) Enable this port for firewalls that use NAT. For non-NAT firewalls use

When using a VPN, the application on the client device (e.g. PC or Mac) establishes a secure connection and creates a tunnel between the device and the corporate network. The end user’s device then behaves as if it was in the office. All applications and services offered can send data securely over the encrypted tunnel.