Book Image

Implementing VMware Horizon 7 - Second Edition

By : Jason Ventresco
Book Image

Implementing VMware Horizon 7 - Second Edition

By: Jason Ventresco

Overview of this book

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform. We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools. Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Table of Contents (21 chapters)
Implementing VMware Horizon 7 Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Deploying a Horizon Security Server


Deploying a Horizon Security Server is broken down into two stages: the installation of the Horizon Security Server software, and the final setup using the Horizon Administrator console.

Enable PCoIP Secure Gateway

By default, once a Horizon client has authenticated a Horizon Connection Server, it allows a direct connection to their target desktop or server hosting applications. The Connection Server is responsible only for brokering the connection, not maintaining it. While this is the optimal configuration for clients located on the private network where the desktops are located, it is not recommended for clients using public Internet connections as they do not have direct access to their desktops.

In order for external Horizon clients to gain access, the Horizon Connection Server must be configured with the appropriate PCoIP Secure Gateway settings. External clients are required to tunnel their connections through the Security Server, which, as we know...