VCP5-DT Objective 2.4–Configure View Security Servers

Objective 2.4 – Configure View Security Server(s)

For this objective I used the following resources:

  • VMware View Administration guide

Knowledge

Configure View Connection Server Backup Settings

See section “Identify View Connection Server Backup Settings” in Objective 2.3 – Configure View Standard and Replica Connection Server(s)

Identify External URL Settings

See section “Configure External URL Settings” in Objective 2.3 – Configure View Standard and Replica Connection Server(s)

Identify PCoIP Secure Gateway

Step 1 – Connect and log into the VMware View Administrator console:

LogIn

Step 2 – Under “View Configuration” select “Servers”. In the right hand pane under “View Connection Servers” select the Connection Server and click the “Edit” button:

Pic2

Step 3 – The “Edit View Connection Server Settings” dialog will be displayed. From the “General” tab you can view/modify the PCoIP External URL and whether to “Use PCoIP Secure Gateway for PCoIP connections to desktop”:

Pic3

Identify View Connection Server General Settings

Local Mode Tab

Setting Description
Use secure tunnel connection for Local Mode operations Local desktops use tunneled communications. Network traffic is route through View Connection Server or a security server if one is configured.
If you do not use this setting, data transfers take place directly between local desktops and the corresponding remote desktops in the datacenter.
The default Is Not to use secure tunnel connections
Use SSL for Local Mode operations Communications and data transfers between client computes and the datacenter use SSL encryption. These operations include checking in and checking out desktops and replicating data from client computers to the datacenter, but do not include transfers of View Composer base images. They involve connections between client computers and View Transfer Server.
The default Is Not to use SSL.
Use SSL when provisioning desktops in Local Mode Transfers of View Composer base-image files from the Transfer Server repository to client computers use SSL encryption. these operations involve connections between client computers and View Transfer Server.
The default Is Not to use SSL
Use deduplication for Local Mode operations Prevents redundant data from being sent from client computers to the datacenter. Deduplication operates on transfers from the client computer to the datacenter, including replications and desktop check-ins. Deduplication does not take place when desktops are checked out.
With deduplication, the client computer detects identical blocks of data and sends a reference to the original block instead of sending the entire block again.
Deduplication is valuable on slow networks because it saves network bandwidth. However, deduplication can add to the CPU workload on the client computer when it checks for identical data blocks and to the I/O workload on View Transfer Server when it reads duplicate blocks from disk. On fast networks, it might be more efficient to disable deduplication
The default Is Not to use dedupliation.
Use compression for Local Mode operations Compresses system-image and desktop files before sending them over the network
Like deduplication, compression saves bandwidth and speeds up  transfers over slow networks. However, View Transfer Server uses additional compute resources to compress files. When you decide whether to use compression, you must weigh the benefits in the network performance against the cost in server computing.
The default Is Not to use compression

Edit View Security Server Settings

Step 1 – Connect and login into the VMware View Administrator console:

LogIn

Step 2 – Under “View Configuration” select “Servers”. In the right hand pane under “Security Servers” select the Security Server and click the “Edit” button:

Pic2b

Step 3 – The “Edit Security Server” dialog will be displayed. From this dialog you can view/modify the “HTTP(s) Secure Tunnel” and PCoIP Secure Gateway” values:

Pic3b

%d bloggers like this: