Book Image

Mastering VMware Horizon 7 - Second Edition

By : Barry Coombs
Book Image

Mastering VMware Horizon 7 - Second Edition

By: Barry Coombs

Overview of this book

Desktop virtualization can be a bit of a headache. But VMware Horizon 7 changes all that. With a rich and adaptive UX, improved security and a range of useful features for storage and networking optimization, there’s plenty to love. But to properly fall in love with it, you need to know how to use it. And that means venturing deeper into the software, taking advantage of its extensive range of features, many of which are underused and underpromoted. This guide will take you through everything you need to know to not only successfully virtualize your desktop infrastructure but also to maintain and optimize the infrastructure to keep all your users happy. We’ll show you how to assess and analyze your infrastructure, and how to use that analysis to design a solution that meets your organizational and user needs. Once you’ve done that, you’ll find out how to build your virtualized environment, before deploying your virtualized solution. But more than that, we’ll also make sure you know everything you need to know about the full range of features on offer, including mobile cloud, so you can use them to take full control of your virtualized infrastructure.
Table of Contents (19 chapters)
Mastering VMware Horizon 7 - Second Edition
Credits
Foreword
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Installing the View Security Server


The next component that we are going to install is the Security Server, so that you can allow external access to your end users.

The Security Server in another instance of the Connection Server and is going to be installed on the virtual machine with the hostname HZN7-SS1, which was built at the start of this chapter, and will also need a static IP address assigned to it and to NOT be joined to the domain.

Note

Don't forget that a security server has a one-to-one relationship with a Connection Server, if you wish to roll out a number of security servers; you will want to have multiple View Connection Servers.

It is also recommended that you have dedicated external View Connection Servers ready to pair with your security servers and separate View Connection Servers for internal connections. This will allow you to specify which users can access desktops from outside the organization by using the tagging functionality, which we will discuss later in this chapter...