Deploying F5 With VMware View and Horizon View
Deploying F5 With VMware View and Horizon View
Deploying F5 With VMware View and Horizon View
Why F5?
F5 and VMware have a long-standing relationship that centers on technology integration and solution
development. As a result, customers can benefit from leveraging the experience gained by peers from
deploying proven, real-world solutions.
F5s products and solutions bring an improved level of reliability, scalability, and security to View deployments.
For large View deployments requiring multiple pods or several data centers, F5s products provide the load
balancing and traffic management needed to satisfy the requirements of customers around the world.
F5 and VMware continue to work together on providing customers best-of-breed solutions that allow for better
and faster deployments as well as being ready for future needs, requirements, and growth of your organization.
Version
v11.2, 11.3, 11.4
5.0 and 5.11
5.2
RC-3
This iApp was written for, and has been tested extensively with, VMware View version 5 and 5.1, and Horizon View 5.2. However, this View 5
iApp also works with VMware View 4.6 with no modifications.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Contents
What is F5 iApp? 3
Prerequisites and configuration notes 3
Configuration examples and traffic flows
11
12
Next steps 28
Troubleshooting 29
Configuring persistence based on user name
30
37
46
Manual configuration for View Horizon Connection servers with BIG-IP system as secure gateway (PCoIP Proxy)
49
53
56
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
This deployment guide also shows optional ways you can configure the persistence on the BIG-IP system based on Active Directory
Security Groups for geographically dispersed View implementations. We provide instructions for single namespace deployments, which
includes BIG-IP Global Traffic Manager (GTM) and non-single namespace deployments. See:
Configuring persistence based on user name on page 30
Configuring a single namespace with user name persistence on page 37
Important: Make sure you are using the most recent version of this deployment guide, available at http://www.f5.com/pdf/deploymentguides/vmware-view5-iapp-dg.pdf
To provide feedback on this deployment guide or other F5 solution documents, contact us at [email protected].
What is F5 iApp?
New to BIG-IP version 11, F5 iApp is a powerful new set of features in the BIG-IP system that provides a new way to architect application
delivery in the data center, and it includes a holistic, application-centric view of how applications are managed and delivered inside, outside,
and beyond the data center. The iApp template for VMware View acts as the single-point interface for building, managing, and monitoring
VMware View deployments.
For more information on iApp, see the White Paper F5 iApp: Moving Application Delivery Beyond the Network: http://www.f5.com/pdf/
white-papers/f5-iapp-wp.pdf
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Note
efore beginning the iApp template, we recommend you set the Idle Timeout Before Automatic Logout value
B
on the BIG-IP system longer than the default value of 1200 seconds when configuring iApps. This allows
more time to configure the iApp and prevent inadvertent logouts which causes you to have to restart the iApp
configuration. To modify this value, from the Main tab, expand System and then click Preferences.
Traffic Flows
The following diagrams show the traffic flow for the different scenarios described in this guide.
BIG-IP APM/LTM with fully proxied PCoIP connections using Connection Servers only (supports public connections)
The following traffic flow diagram shows the BIG-IP LTM and APM running software versions 11.4 or later with a VMware View Horizon
5.2 or later deployment using Connection Servers only and is typically used to support public connections. Use this scenario when load
balancing public connections with BIG-IP APM authenticated connections to your Connection Servers. PCoIP connections are fully
proxied, providing a secure connection to and from your View Connection servers, thereby eliminating the need for Security servers. This
scenario also supports RSA SecurID two-factor configurations and View Client disclaimers. Note this two-factor solution does not require
altering your View environment; the BIG-IP system fully proxies RSA SecurID authentication prior to allowing connections to View Horizon
Connection Servers.
VMware Connection Servers
Client
1 TCP 443
2 UDP 4172
(PCoIP traffic)
For deployments with BIG-IP system fully proxying PCoIP traffic and Horizon View Connection Servers, the traffic flow is as follows:
1. T
he client machine (regardless of Mac, Windows, iPad, Zero Client) makes a connection to the virtual IP address on your BIG-IP
system. The BIG-IP establishes a new connection to the Connection Servers and proceeds with authentication.
2. T
he BIG-IP system persists the TCP 443 (this is natively 4172, however the BIG-IP system forces clients to use TCP 443) XML
connection to the same Connection Server.
3. Once desktop availability and entitlement are determined, PCoIP connections are persisted to the same Connection Server.
4. The BIG-IP system fully proxies the desktop PCoIP connections (UDP 4172) to the Connection Servers.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
BIG-IP LTM with Connection Servers only (supports trusted internal client connections)
The following traffic flow diagram shows the BIG-IP LTM with a VMware View deployment using Connection Servers only and is typically
used to support non-public connections. Use this scenario when load balancing internal connections or with APM authenticated
connections to your connection servers.
VMware Connection Servers
Client
1 TCP 443
BIG-IP LTM
(with PCoIP)
1 TCP 443
BIG-IP LTM
2 TCP 4172
3 UDP 4172
4 TCP 32111
For deployments with Connection Servers and PCoIP protocol the traffic flow is as follows:
1. T
he client machine (regardless of Mac, Windows, iPad, Zero Client) makes a connection to the virtual IP address for the VMware
Connection Servers, residing on the BIG-IP system. The BIG-IP establishes a new connection to the Connection Servers and
proceeds with authentication.
2. The BIG-IP system persists the TCP 4172 XML connection to the same Connection Server.
3. O
nce desktop availability and entitlement are determined, PCoIP connections and USB redirects are persisted to the same
Connection Server.
4. T
he BIG-IP system forward proxies the desktop PCoIP connections (UDP 4172) and USB redirects (TCP 32111) to the Connection
Servers.
BIG-IP LTM with Security Server and Connection Servers
This traffic flow diagram shows the BIG-IP LTM with a View deployment using both Security Servers and Connection Servers, and is
typically used to support secure public connections. Use this scenario when load balancing public connections without BIG-IP APM.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
BIG-IP LTM
2
1 TCP 443
3 TCP 4172
UDP 4172
TCP 32111
For deployments with Security Servers and PCoIP protocol the traffic flow is as follows:
1. T
he client machine (regardless of Mac, Windows, iPad, Zero Client) makes a connection to the Virtual IP Address for the VMware
Security Servers, residing on the BIG-IP. The BIG-IP establishes a new connection to the Security Servers and proceeds with
authentication.
2. The BIG-IP system persists the TCP 4172 XML connection to the same Security Server.
3. O
nce desktop availability and entitlement are determined, PCoIP connections (TCP/UDP 4172) and USB redirects (TCP 32111) are
persisted to the same Security Server.
4. VMware Security Servers control load balancing and availability of the Connection Servers.
443
Auth
Auto Launch
Client
When BIG-IP APM is added in front of the deployment, the APM performs pre-authentication, as well as additional security and client
detection.
1. T
he client machine launches the BIG-IP Edge Client makes a connection to the Virtual IP Address for either the VMware Connection
Servers or Security Servers (depending on your configuration), residing on the BIG-IP. BIG-IP establishes a new connection to the
VMware Active Directory Servers.
2. Authentication is performed directly from the BIG-IP APM. User credentials are securely cached on the BIG-IP system.
3. T
he BIG-IP Edge client checks for the availability of the View client and either downloads the client or launches it on Microsoft
Windows or Mac clients only.
4. O
nce the secured network tunnel is setup between the client and the BIG-IP APM, the client is automatically logged in using one of
the LTM scenarios (either connecting to the Security or Connection Servers). The BIG-IP system uses DTLS for platforms that support
the F5 Edge clients and SSL for platforms that do not.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Modifying the View implementation if using Connection Servers only (Security Servers not needed)
Use the following procedures if you are using Connection Servers only. Make sure to check each of the procedures to see if they are
applicable to your configuration.
Note
When using Connection Servers only, make sure you have internal routes setup to point to the BIG-IP system for your
View desktop network if you choose to route PCoIP and/or USB redirect traffic through the BIG-IP system.
Allowing HTTP connections to intermediate servers (optional and requires server reboot)
hen SSL is offloaded to an intermediate server, you can configure View Connection Server instances to allow HTTP connections from the
W
client-facing BIG-IP system. The BIG-IP system must accept HTTPS for View Client connections.
To allow HTTP connections between View servers and BIG-IP system, you must configure the locked.properties file on each View
Connection Server instance on which HTTP connections are allowed.
Even when HTTP connections between View servers and intermediate devices are allowed, you cannot disable SSL in View. View servers
continue to accept HTTPS connections as well as HTTP connections.
Note
If your View Clients use smart card authentication, the clients must make HTTPS connections directly to View
Connection Servers. SSL offloading is not supported with smart card authentication.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
3. Optional: Add properties to configure a non-default HTTP listening port and a network interface on the View server.
T o change the HTTP listening port from 80, set serverPortNonSSL to another port number to which the intermediate device is
configured to connect.
If the View server has more than one network interface, and you intend the server to listen for HTTP connections on only one
interface, set serverHost to the IP address of that network interface.
4. Save the locked.properties file.
5. Restart the View Connection Server service to make your changes take effect.
For example, the following locked.properties file allows non-SSL HTTP connections to a View server. The IP address of the View servers
client-facing network interface is 10.20.30.40. The server uses the default port 80 to listen for HTTP connections. The value http must be
lower case.
serverProtocol=http
serverHost=10.20.30.40
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Modifying the View implementation if using Security Servers and Connection Servers
Use the following procedures if using both Security Servers and Connections Servers.
Modifying the VMware View configuration if using Security and Connection Servers
In this scenario, the BIG-IP system is used to load balance Security Servers and to act as a gateway for PCoIP connections. This
procedure allows PCoIP servers to be moved off the DMZ if desired.
To modify the VMware configuration for View using Security Server
1. Log on to the View Manager Administrator tool.
2. F
rom the navigation pane, click to expand View Configuration and then click Servers. The Servers Settings opens in the main
pane.
3. For each View Connection Server, perform the following:
a. In the main pane, from the View Connection Servers section, click to select a Connection Server.
b. Click the Edit... button. The Edit View Connection Server settings box opens.
c. O
n the General tab, in the HTTP(S) Secure Tunnel External URL box, type the IP address you will associate with the BIG-IP
LTM virtual IP address for the Security Server, followed by a colon and the port. In our example we type:
https://192.0.2.123:443
d. Click OK to close the window
e. Repeat these steps for each Connection Server.
Important
If the View Client is not using Network Access through the BIG-IP APM and has a routable path to the View
Connection Servers directly, the PCoIP option must be selected/enabled.
Allowing HTTP connections to intermediate servers (optional and requires server reboot)
hen SSL is offloaded to an intermediate server, you can configure View Connection Server instances or Security Servers to allow HTTP
W
connections from the client-facing BIG-IP system. The BIG-IP system must accept HTTPS for View Client connections.
To allow HTTP connections between View servers and BIG-IP system, you must configure the locked.properties file on each View
Connection Server instance on which HTTP connections are allowed.
Even when HTTP connections between View servers and intermediate devices are allowed, you cannot disable SSL in View. View servers
continue to accept HTTPS connections as well as HTTP connections.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Note
If your View Clients use smart card authentication, the clients must make HTTPS connections directly to View
Connection Servers or Security Servers. SSL offloading is not supported with smart card authentication.
10
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
11
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Advanced options
If you select Advanced from the Template Selection list, you see Sync and Failover options for the application. This feature, new to v11, is a
part of the Device Management configuration. This functionality extends the existing High Availability infrastructure and allows for clustering,
12
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
granular control of configuration synchronization and granular control of failover. For more information on Device Management, see the
Online Help or product documentation.
1. Device Group
To select a specific Device Group, clear the Device Group check box and then select the appropriate Device Group from the list.
2. T
raffic Group
To select a specific Traffic Group, clear the Traffic Group check box and then select the appropriate Traffic Group from the list.
Template options
This section of the template asks about your View and BIG-IP implementation.
1. Do
you want to see inline help?
Select whether you want to see informational and help messages inline throughout the template. If you are unsure, we recommend
leaving the default, Show inline help text. Important and critical notes are always shown, no matter which selection you make.
ff Y
es, show inline help text
This selection causes inline help to be shown for most questions in the template.
ff N
o, do not show inline help text
If you are familiar with this iApp template, or with the BIG-IP system in general, select this option to hide the inline help text.
2. W
hich configuration mode do you want to use?
Select whether you want to use F5 recommended settings, or have more granular, advanced options presented.
ff B
asic - Use F5s recommended settings
In basic configuration mode, options like load balancing method, parent profiles, and settings are all set automatically. The F5
recommended settings come as a result of extensive testing with VMware View, so if you are unsure, choose Basic.
ff A
dvanced - Configure advanced options
In advanced configuration mode, you have more control over individual settings and objects, such as server-side optimizations
and advanced options like Slow Ramp Time and Priority Group Activation. You can also choose to attach iRules you have
previously created to the VMware View application service. This option provides more flexibility for advanced users.
Advanced options in the template are marked with the Advanced icon:
settings, you can skip the questions with this icon.
Advanced
13
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Important
You must have already created a SecurID AAA Server object on the BIG-IP APM to use this
feature. If you have not created the AAA Server, exit the template and create the AAA Server.
See Access Policy > AAA Servers > SecurID to create the AAA Server.
14
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Warning
The default certificate and key on the BIG-IP system is not secure and should never be used in
production environments. The trusted certificate must be valid for all fully qualified domain names used
to access the application. For more information on importing certificates and keys, see the BIG-IP
documentation.
iii). Which associated key do you want to use?
Select the associated key from the list.
iv). What is the directory path to the View client for Windows?
Specify the full path to the View client. The default path is
C:\Program Files\VMware\VMware View\Client\bin\wswc.exe
If you have a different path to the View Client, make sure to use the same format as the default.
Important
Auto-Launch only works in Microsoft Windows, Mac, and LINUX client environments.
v). What is the directory path to the View client for Mac?
Specify the full path to the View client for Apple Mac devices. The default installation path for Mac is
/Applications/VMware View Client.app.
vi). Which server (IP or FQDN) should users be sent to when the View client is not present?
Specify the IP address or domain name of a server from which clients can acquire the View Client software
when it is not present. If the View environment is only accessible via BIG-IP APM authenticated network access,
you must ensure this link points to a resource that is available without BIG-IP APM authenticated network
access.
vii). What is the NetBIOS domain name for your environment?
Specify the NetBIOS domains for this View environment. For example, if the FQDN is 'my.example.com', the
NetBIOS domain is 'my'.
viii). What IP address should start the lease pool range?
Specify an available IP address to being the lease pool range. The BIG-IP APM uses the IP addresses in the
range you specify to assign to clients connecting through the APM. The IP address range you specify must
have routes to View Connection Servers or View Security Servers, and a route to the View Virtual Desktop
network.
ix). What IP address should end the lease pool range?
Specify the end of the IP address range.
x). What is the IP address of the DNS server used for remote client lookups?
Specify the IP address of the primary DNS server that is used when clients are connected to BIG-IP system.
Clients will use this server to resolve addresses while connected to the BIG-IP system.
15
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
SSL Encryption
In this section, you configure the SSL encryption options for the View deployment.
1. H
ow should the BIG-IP system handle encrypted traffic?
Select whether you want to configure the BIG-IP system for SSL offload or SSL bridging.
If your application requires encryption and session persistence (which ensures requests from a single user are always distributed to
the server on which they started), we recommend you configure the BIG-IP system for SSL offload. This allows the system to more
accurately persist connections based on granular protocol or application-specific variables.
Because encryption and decryption of SSL is computationally intensive and consumes server CPU resources, if your environment
does not require encryption between the BIG-IP system and the servers, select SSL Offload to terminate the SSL session from the
client at the BIG-IP system and provide cleartext communication from the BIG-IP system to the servers.
If security requirements do not allow the BIG-IP system to offload SSL, select to re-encrypt to the servers. With this selection the
system will use the SSL ID or Client/Server IP to enforce session persistence. Because these parameters are less granular, you may
experience inconsistent distribution of client requests.
17
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
ff T
erminate SSL for clients, plaintext to View servers (SSL offload)
Choose this method if you want the BIG-IP system to offload SSL processing from the View servers. You need a valid SSL
certificate and key for this method.
ff T
erminate SSL from clients, re-encrypt to servers
Choose this method if you want the BIG-IP system to terminate SSL to process it, and then re-encrypt the traffic to the servers
(SSL Bridging). You also need a valid SSL certificate and key for this method.
With this method, the servers must process the encrypted traffic, so you have to install and manage certificates on both the
servers and the BIG-IP system. Certificates that you install on the servers may be self-signed and can be a lesser encryption
strength (shorter bit length) than the certificate on the BIG-IP system, if internal encryption requirements are different than those
that apply to public-facing traffic.
2. W
hich Client SSL profile do you want to use? Advanced
The iApp can create a new Client SSL profile, or if you have previously created a Client SSL profile which contains the appropriate
SSL certificate and key for your View implementation, you can select it from the list.
ff Select the Client SSL profile you created from the list
If you manually created a Client SSL profile, select it from the list, and then continue with #6.
ff Create a new Client SSL profile
Select this option if you want the iApp to create a new Client SSL profile.
a. W
hich SSL certificate do you want to use?
Select the SSL certificate you imported for this View deployment.
If you have not yet imported a trusted certificate, you must import one before it appears in the list. You can either complete
the template using the default certificate and key, import the trusted certificate and key, use the Reconfigure option to reenter the template, and then select them from the lists; or exit the template to import the certificate and key, and then start
the configuration over from the beginning.
!
Warning
The default certificate and key on the BIG-IP system is not secure and should never be used in
production environments. The trusted certificate must be valid for all fully qualified domain names used
to access the application. For more information on importing certificates and keys, see the BIG-IP
documentation.
b. W
hich SSL private key do you want to use?
Select the associated SSL private key.
c. W
hich intermediate certificate do you want to use? Advanced
If your implementation requires an intermediate or chain certificate, select the appropriate certificate from the list. You must
have already imported the intermediate certificate before it appears in the list.
Immediate certificates are intended to create a chain of trust between the CA that signed the certificate and the CA that is
already trusted by the recipient of the certificate. This allows the recipient to verify the validity of the certificates presented,
even when the signing CA is unknown.
2. Do you want to redirect inbound HTTP traffic to HTTPS? Advanced
Select whether you want the BIG-IP system to automatically redirect HTTP traffic to the HTTPS virtual server. This can lead to a better
users experience if users forget to use HTTPS when attempting to connect to the View deployment.
ff Redirect HTTP to HTTPS
Select this option (the default) for the BIG-IP attaches a small redirect iRule to the virtual server. You must specify the
appropriate port in the next question.
a. F
rom which port should traffic be redirected?
Specify the port number for the traffic that you want to redirect to HTTPS. The most common is port 80 (the default).
18
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
ff D
o not redirect HTTP to HTTPS
Select this option if you do not want to enable the automatic redirect.
3. Which Server SSL profile do you want to use? Advanced
This question only appears if you selected SSL bridging.
Select whether you want the iApp to create an F5 recommended Server SSL profile, or if you want to choose a Server SSL profile you
already created.
ff Select the Server SSL profile you created from the list
If you have previously created a Server SSL profile for your View implementation, from the list, select the existing Server SSL
profile you created.
ff Use F5's recommended Server SSL profile
Select this option if you want the iApp to create a new Server SSL profile.
The default, F5 recommended Server SSL profile uses the serverssl-insecure-compatible parent profile. For information about
the ciphers used in the Server SSL profile, see http://support.f5.com/kb/en-us/solutions/public/8000/800/sol8802.html.
PC over IP
In this section, you configure PCoIP settings for the deployment.
This section does not appear if you are using BIG-IP version 11.4 or later and selected to use the BIG-IP APM as a PCoIP gateway.
1. Should PCoIP connections go through the BIG-IP system?
Select whether PCoIP connections are routed through the BIG-IP system.
ff N
o, PCoIP connections should not go through the BIG-IP system
Select this option if you do not want PCoIP connections routed through the BIG-IP system as a part of this configuration.
If PCoIP connections will not go through the BIG-IP system, you must have a route on the system for traffic between the clients
and the Virtual Desktops. If you do not have a route between the View Client and the Virtual Desktop, you can either exit this
iApp template, configure a route on the BIG-IP system, and then start over; or select Yes now, and then reconfigure the iApp
after you have created the route.
If you select No, and do not have a route configured, the configuration produced by the iApp will not function properly. For more
information on configuring routes on the BIG-IP system, see the online help for routes (Main tab > Network > Routes) or the
BIG-IP system manuals.
If you select No, continue with the following section; no further information is needed.
ff Yes, PCoIP connections should go through the BIG-IP system
Select this option if you want PCoIP connections routed through the BIG-IP system. If you answer Yes, you also have the option
of VMware USB redirects going through the BIG-IP system.
a. Will PCoIP connections be proxied by the View Servers?
Select whether PCoIP connections will be forward proxied by the View Servers. Your answer here determines how the
BIG-IP system handles the PCoIP traffic.
`` No, PCoIP connections are not proxied by the View Servers
Select this option if PCoIP connections are not forward proxied by the View Servers. In this case, the BIG-IP system
creates TCP and UDP forwarding virtual servers on port 4172. These two virtual servers act as a route between the
clients and the Virtual Desktops through the BIG-IP system.
i). On which network do the Virtual Desktops reside?
Specify the network on which the Virtual Desktops reside.
ii). What is the network mask for the virtual desktops?
Type the subnet mask associated with the network of the Virtual Desktops.
19
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Configuring persistence based on user name on page 30 or Configuring a single namespace with user name persistence on
page 37, select this option.
ff Use F5's recommended persistence profile
Select this option if you want the iApp to create a new persistence profile.
The iApp creates a universal persistence profile, which uses an iRule to insert a JSESSIONID cookie in the HTTP header of
a client request after an initial load balancing decision is made. The BIG-IP system uses this cookie to direct all subsequent
requests from a given client to the same View server in the pool. We recommend this method, unless you have a specific reason
to use another profile.
5. Which load balancing method do you want to use? Advanced
Specify the load balancing method you want to use for this Web Interface server pool. We recommend the default, Least
Connections (member).
6. Should the BIG-IP system queue TCP requests? Advanced
Select whether the BIG-IP system should queue TCP requests.
TCP request queuing provides the ability to queue connection requests that exceed the capacity of connections for a pool, as
determined by the connection limit. Consequently, instead of dropping connection requests that exceed the capacity of a pool, TCP
request queuing enables those connection requests to reside within a queue according to defined conditions until capacity becomes
available. For more information on TCP Request Queuing, see the Preventing TCP Connection Requests From Being Dropped
chapter in the BIG-IP Local Traffic Manager: Implementations guide, available on Ask F5.
Important
TCP Request Queuing is an advanced feature and should be used only if you understand how it will affect your
deployment, including application behavior and BIG-IP performance.
If you enable TCP Request Queuing, you must have a Connection Limit set on at least one of the nodes when
configuring the Address/Port for the Client Access Server nodes.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
ff D
o not use Slow Ramp
Select this option if you do not want to use Slow Ramp. If you select this option, we recommend you do not use the Least
Connections load balancing method.
3. D
o you want to enable Priority Group Activation? Advanced
Select whether you want to use Priority Group Activation.
Priority Group Activation allows you to segment your servers into priority groups. With Priority Group Activation, the BIG-IP system
load balances traffic according to the priority number you assign to the pool members. A higher number indicates higher priority.
Traffic is only sent to the servers with the highest priority, unless the number of available servers in that priority group falls below the
value you specify as the minimum. The BIG-IP system then sends traffic to the group of servers with the next highest priority, and so
on. See the BIG-IP documentation for more details.
ff D
o not use Priority Group Activation
Select this option if you do not want to enable Priority Group Activation.
ff U
se Priority Group Activation
Select this option if you want to enable Priority Group Activation.
You must add a priority to each Web Interface server in the Priority box described in #9.
a. W
hat is the minimum number of active members for each priority group?
Specify the minimum number of servers that must be active to continue sending traffic to the priority group. If the number of
active servers falls below this minimum number you set, traffic is sent to the group of servers with the next highest priority
group number.
4. W
hich servers should be included in this pool?
Specify the IP Address for each View server.
If you are using nodes that already exist on the BIG-IP system, you can select them from the list. Otherwise, type the IP address in
the box. Specify the service port in the Port box.
You can optionally add a Connection Limit. If you enabled Priority Group Activation, you must also specify a Priority for each device.
Click Add to include additional servers in the pool.
5. Where
will the virtual servers be in relation to the View servers? Advanced
Select whether your BIG-IP virtual servers are on the same subnet as your Web Interface servers, or on different subnets. This setting
is used to determine the SNAT (secure NAT) and routing configuration.
ff B
IG-IP virtual servers IP and View servers are on the same subnet
Select this option if the BIG-IP virtual servers and the View servers are on the same subnet. In this case SNAT is configured on
the BIG-IP virtual server and you must specify the number of concurrent connections.
a. What is the maximum number of concurrent users you expect?
Select whether you expect more or fewer than 6,000 concurrent users to each View server. This answer is used to
determine what type of SNAT that system uses. A SNAT is an object that maps the source client IP address in a request to
a translation address defined on the BIG-IP device. The system configures SNAT Auto Map (fewer than 6,000) or a SNAT
pool (more than 6,000).
`` F
ewer than 6000
Select this option if you expect fewer than 6000 concurrent users per server. With this option, the system applies
SNAT Auto Map, which doesnt require any additional IP addresses, as the system uses an existing self IP address for
translation.
`` M
ore than 6000
Select this option if you expect more than 6000 users at one time to each server. With this option, the iApp creates a
SNAT Pool, for which you need one IP address for each 6000 users you expect.
i). W
hich IP addresses do you want to use for the SNAT pool?
Specify one otherwise unused IP address for every 6,000 concurrent users you expect, or fraction thereof. Click
Add for additional rows.
22
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Important
If you choose more than 6000 users, but do not specify enough SNAT pool address(es), after the
maximum connection limit of 6000 concurrent users per server is reached, new requests fail.
ff B
IG-IP virtual server IP and View servers are on different subnets
If the BIG-IP virtual servers and Web Interface servers are on different subnets, the following question appears asking how
routing is configured.
a. H
ow have you configured routing on your View servers?
If you selected different subnets, this question appears asking whether the View servers use this BIG-IP systems Self IP
address as their default gateway. Select the appropriate answer.
`` V
iew servers do not have a route to clients through the BIG-IP
If the View servers do not have a route to clients through the BIG-IP system, SNAT is configured on the BIG-IP virtual
server and you must select the expected number of concurrent users in the next question.
i). What is the maximum number of concurrent users you expect?
Select whether you expect more or fewer than 6,000 concurrent users to each View server. This answer is used
to determine what type of SNAT that system uses. A SNAT is an object that maps the source client IP address
in a request to a translation address defined on the BIG-IP device. The system configures SNAT Auto Map
(fewer than 6,000) or a SNAT pool (more than 6,000).
F
ewer than 6000
Select this option if you expect fewer than 6000 concurrent users per server. With this option, the system
applies SNAT Auto Map, which doesnt require any additional IP addresses, as the system uses an existing
self IP address for translation.
M
ore than 6000
Select this option if you expect more than 6000 users at one time to each server. With this option, the iApp
creates a SNAT Pool, for which you need one IP address for each 6000 users you expect.
1). W
hich IP addresses do you want to use for the SNAT pool?
Specify one otherwise unused IP address for every 6000 concurrent users you expect, or fraction
thereof. Click Add for additional rows.
Important
If you choose more than 6000 users, but do not specify enough SNAT pool address(es), after the
maximum connection limit of 6000 concurrent users per server is reached, new requests fail.
23
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Client Optimization
In this section, you configure the client optimization settings, such as caching and compression profiles. All but one of these options are
available only if you selected Advanced.
1. Which Web Acceleration profile do you want to use for caching? Advanced
The iApp can create a new Web Acceleration profile for caching, or if you have already created a Web Acceleration profile for the View
servers, you can select it from the list. You can also choose not to use a Web Acceleration profile if your implementation does not
require caching on the BIG-IP system.
Caching can improve client request response times and improve server scalability by reducing load associated with processing
subsequent requests.
ff Use F5's recommended Web Acceleration profile
Select this option to have the system create the recommended Web Acceleration profile. The system uses the optimizedcaching parent profile for View.
ff Do not use a Web Acceleration profile
Select this option if you do not require the BIG-IP system to perform caching.
ff Select the Web Acceleration profile you created from the list
If you created a custom Web Acceleration profile for the View servers, select it from the list. You should only use a custom Web
Acceleration profile if you need to define specific URIs that should or should not be cached.
2. Which HTTP compression profile do you want to use?
The iApp can create a new HTTP Compression profile for compression, or if you have already created an HTTP Compression
profile for the View servers, you can select it from the list. You can also choose not to use an HTTP Compression profile if your
implementation does not require compression on the BIG-IP system.
Compression improves performance and end user experience for Web applications that suffer from WAN latency and throughput
bottlenecks. Compression reduces the amount of traffic sent to the client to complete a transaction.
ff Use F5's recommended compression profile
Select this option to have the system create the recommended HTTP Compression profile. The system uses the wan-optimizedcompression parent profile for VMware View.
ff Do not compress HTTP responses
Select this option if you do not require the BIG-IP system to perform compression.
ff Select the HTTP Compression profile you created from the list
If you created a custom HTTP Compression profile for the View servers, select it from the list.
3. How do you want to optimize client-side connections? Advanced
The iApp can create a new client-side TCP profile what is optimized for either LAN or WAN clients, or if you have already created a
TCP profile for the View servers, you can select it from the list.
The client-side TCP profile optimizes the communication between the BIG-IP system and the client by controlling the behavior of the
traffic which results in higher transfer rates, improved connection reliability and increased bandwidth efficiency.
ff Use F5's recommended optimizations for WAN clients
Select this option if the majority of clients are connecting to the environment over the WAN. The system creates the
recommended WAN-optimized TCP profile using the tcp-wan-optimized parent profile for View.
ff Use F5's recommended optimizations for LAN clients
Select this option if the majority of clients are connecting to the environment across the LAN. The system creates the
recommended WAN-optimized TCP profile using the tcp-lan-optimized parent profile for View.
ff Select the TCP profile you created from the list
If you created a custom TCP profile for the View servers, select it from the list.
24
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Server Optimization
In this section, you configure the server optimization settings, such as OneConnect and NTLM profiles. This entire section is available only if
you selected Advanced.
1. Which OneConnect profile do you want to use? Advanced
The iApp can create a new OneConnect profile for connection pooling, or if you have already created an OneConnect profile for the
View servers, you can select it from the list. You can also choose not to use a OneConnect profile if your implementation does not
require connection pooling on the BIG-IP system.
OneConnect (connection pooling or multiplexing) improves server scalability by reducing load associated with concurrent connections
and connection rate to View servers. When enabled, the BIG-IP system maintains one connection to each View server which is used
to send requests from multiple clients.
ff Use F5's recommended OneConnect profile
Select this option to have the system create the recommended OneConnect profile. The system uses the oneconnect parent
profile with a Source Mask of 255.255.255.255 for VMware View.
ff Do not use a OneConnect profile
Select this option if you do not require the BIG-IP system to perform connection pooling using a OneConnect profile.
ff Select the OneConnect profile you created from the list
If you created a custom OneConnect profile for the View servers, select it from the list.
2. How do you want to optimize server-side connections? Advanced
The iApp can create a new server-side TCP profile what is optimized for either the LAN or WAN, or if you have already created a TCP
profile for the View servers, you can select it from the list.
The server-side TCP profile optimizes the communication between the BIG-IP system and the server by controlling the behavior of the
traffic which results in higher transfer rates, improved connection reliability and increased bandwidth efficiency.
ff Use F5's recommended optimizations for the LAN
Select this option if the servers behind the BIG-IP system are on the LAN. The system creates the recommended LANoptimized TCP profile using the tcp-lan-optimized parent profile for View.
ff Use F5's recommended optimizations for the WAN
Select this option if the servers behind the BIG-IP system are on the WAN. The system creates the recommended WANoptimized TCP profile using the tcp-wan-optimized parent profile for View.
ff Select the TCP profile you created from the list
If you created a custom server-side TCP profile for the View servers, select it from the list.
Application Health
In this section, you configure the health monitoring settings.
1. Create a new health monitor or use an existing one?
The iApp can create a new health monitor for the View servers, or if you have already created a health monitor, you can select it from
the list.
The iApp creates an HTTP or HTTPS monitor to verify the health of the View servers, depending on whether you selected SSL offload
or SSL bridging in a previous question.
ff Select the monitor you created from the list
If you manually created the health monitor, select it from the list.
If you are deploying BIG-IP APM, continue with #2, otherwise, continue with the next section.
25
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
iRules
This section asks if you want to add custom iRules to the View deployment. This entire section is available only if you selected Advanced.
iRules are a scripting language that allows an administrator to instruct the system to intercept, inspect, transform, direct and track inbound
or outbound application traffic. An iRule contains the set of instructions the system uses to process data flowing through it, either in the
header or payload of a packet.
1. D
o you want to add any custom iRules to this configuration? Advanced
If you have iRules you want to attach to the virtual server the iApp creates for View, from the Options box, click the name of the
applicable iRule(s) and then click the Add (<<) button to move them to the Selected box.
If you do not want to add any iRules to the configuration, continue with the following section.
Important
While iRules can provide additional functionality not present in the iApp, iRules are an advanced feature
and should be used only if you understand how each iRule will affect your deployment, including application
behavior and BIG-IP system performance.
2. Do you want to add any custom iRules to the APM virtual server? Advanced
If you are using BIG-IP APM, you have the option of attaching iRules to the virtual server the iApp creates for VMware View. If you
have iRules to attach, from the Options box, click the name of the applicable iRule(s) and then click the Add (<<) button to move
them to the Selected box.
If you do not want to add any iRules to the configuration, continue with the following section.
Important
While iRules can provide additional functionality not present in the iApp, iRules are an advanced feature
and should be used only if you understand how each iRule will affect your deployment, including application
behavior and BIG-IP system performance.
Warning
Enabling Analytics may adversely affect overall system performance. If you choose to enable Analytics, we
recommend gathering statistics for a set time period, such as one week, and then re-entering this template
and disabling Analytics while you process the data.
26
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
If you plan on using AVR for analytics, we recommend creating a custom Analytics profile. To create a new profile, from the Main
tab, select Profiles and then click Analytics. Click New and then configure the profile as applicable for your configuration. See the
online help or product documentation for specific instructions. To select the new profile, you need to restart or reconfigure the iApp
template.
ff Do not enable Application Visibility Reporting for analytics
Select this option if you do not want to use Application Visibility Reporting for VMware View at this time.
ff Use the default analytics profile
Select this option if you want to use the default analytics profile for your View implementation. If you want to use AVR, we
strongly recommend creating a custom analytics profile for your View deployment.
ff Select the analytics profile you created from the list
If you created a custom analytics profile for the View servers, select it from the list.
2. Which HTTP request logging profile do you want to use? Advanced
The iApp allows you to use a custom Request Logging profile you created outside the template. You can also choose not to enable
Request Logging.
HTTP request logging on the BIG-IP system enables customizable log messages to be sent to a syslog server for each HTTP request
processed by this application.
Important
The performance impact of using this Request Logging should be thoroughly tested in a staging environment
prior to enabling on a production deployment.
The iApp does not provide the ability to create a Request Logging profile, you must have an existing profile. See Local
Traffic>>Profiles: Other: Request Logging to create this profile.
ff Do not enable HTTP Request Logging
Select this option if you do not want to enable Request Logging at this time.
ff Select the Request Logging profile you created from the list
If you created a custom Request Logging profile for the View servers, select it from the list.
Finished
Review the answers to your questions. When you are satisfied, click the Finished button. The
BIG-IP system creates the relevant objects.
If using BIG-IP APM, you may need to click the Apply Access Policy link (in the upper left corner of the Configuration utility, to the right of
the F5 logo) after running the iApp template.
27
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Next steps
After completing the iApp Template, the BIG-IP Application Services page opens for the VMware View service you just created. To see
the list of all the configuration objects created to support View, on the Menu bar, click Components. The complete list of all View related
objects opens. You can click individual objects to see the settings.
Once the objects have been created, you are ready to use the new deployment.
28
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Troubleshooting
Q: What do I use as the External URL in my View Connection Server settings?
A: T
he External URL is the IP or DNS address that the View Client uses to connect back to the network. In this deployment guide, we give
the example of the External URL https://broker.example.com:443. In this example we are suggesting that the IP addresses mapped to
this Virtual Server is configured on the BIG-IP LTM. Connections from the View Client therefore map back to this IP address. If there is
an upstream device, such as a firewall or router, in front of the BIG-IP LTM that is providing NAT to the BIG-IP, the External URL should
be the IP or DNS address that maps to that NAT device. The NAT device would then deliver the traffic to the BIG-IP.
Q: W
hy am I seeing the following error from the VMware client when connecting to virtual desktop: "Couldnt reach port 4001 and port
389".
A: T
ypically, this error occurs when the Connection Server and Virtual Desktop Agent are different versions, or if the Virtual Desktop Agent
has not been installed on the virtual desktop. The iApp template does not create a virtual server to manage the traffic between the
agent and Connection Server. However, there could be an issue caused by the port being blocked by another network device; View
Connection servers need to be able to communicate on port 4001 to the Virtual Desktop Agent.
After you have verified the correct version of the Virtual Desktop Agent has been installed on the virtual desktop, we recommend trying to
verify port communication:
Ports required from Client to Agent without Security Server are:
3389 - RDP
50002 - PCoIP
4172 - PCoIP (View 4.6)
4001 -JMS
Port required from Client to Agent with Security Server is:
80 - HTTP and 443 to Security Server
To verify that the virtual desktop can communicate with the Connection Server over port 4001, run netstat on your virtual desktop using
the following command:
netstat -an
If there is a connection between the local address and the Connection Server, the output looks similar to the following:
Proto Local Address Foreign Address State
TCP "IPOfVirtualMachine:random Port" "IP of the Connection Server:4001 ESTABLISHED
Note: Connectivity can be also tested by performing the netstat command on the Connection Server. After running netstat on the
Connection server, the output should look similar to the following:
Proto Local Address Foreign Address State
TCP "IP of the Connection Server:4001 "IPOfVirtualMachine:random Port" ESTABLISHED
If you receive a connection error, check your firewalls enabled on the virtual desktop, Connection Server, or in the network infrastructure
between the two points.
29
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Prerequisites
hh T
his solution requires at least one BIG-IP APM, and two BIG-IP LTM systems. The LTM and APM modules can run on a single
BIG-IP system or separate devices.
hh This solution is for deployments of at least two VMware View pods in geographically dispersed locations.
hh You must have an Active Directory implementation deployed as part of your View implementation.
hh This solution currently only supports Windows, iOS, and Wyse View Clients. It does not currently support Mac or Android clients.
wc.view.mycompany.com
PCoIP
vSphere
Active
Acti e
Directory
VMware
Mware Vie
M
View
Vi
(west coast pod)
vSphere
VMware
Mware Vie
M
View
Vi
(east coast pod)
Acti e
Active
Directory
1. A
View Client attempts to connect to the West Coast's View Environment using a secure connection to https://wc.view.mycompany.
com and is directed to the West Coast Access Policy Manager.
2. The West Coast APM checks its internal persistence table for an entry matching the user.
a. If the user name is located in the persistence table, the user is sent to his or her assigned pool and node.
b. If the user name is not located in the persistence table, the BIG-IP APM queries Active Directory.
30
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
3. The West Coast APM queries and authenticates user using local Active Directory servers.
Active Directory returns a successful login and list of the user's security group membership.
a. The BIG-IP APM matches security groups against internal defined data group.
b. If there is a match, the user is sent to matching pool. In our example, the user is a member of the East Coast pod security
group and is directed to the East Coast pool defined on West Coast APM." The East Coast pool contains a single IP
address which is the virtual server IP address defined on the East Coast APM.
c. If there is not a match, user is sent to local pool.
4. T
he View client request is forwarded to the East Coast APM and user name based persistence record is maintained on the West
Coast APM.
a. The East Coast APM checks its internal persistence table for an entry matching the user.
b. If the user name is located in the persistence table, the user is sent to his or her assigned pool and node.
c. If the user name is not located in the persistence table, the BIG-IP APM queries Active Directory.
5. East Coast BIG-IP APM queries and authenticates user using local Active Directory servers.
Active Directory returns a successful login and list of the user's security group membership.
a. BIG-IP APM matches security groups against internal defined data group.
b. If there is a match then user is sent to matching pool In our example the user is a member of East Coast pod security group
and is directed to the East Coast pool defined on the East Coast APM. The East Coast pool contains a pool of Security or
Connection Servers.
6. T
he View client connection request is sent to the View server and user name based persistent request is maintained on the East
Coast APM.
7. A
fter authentication, desktop entitlement, and selection are complete, desktop connections proceed to the appropriate View Desktop,
or are proxied by a Security Server if the environment uses Security Servers.
31
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
iApp Field
Template Selection
Name
Use a unique name for each iApp deployment. In our example, we have two BIG-IP LTMs, and use the
names east_coast and west_coast.
Template options
Which configuration mode do you want to use?
Advanced
No
Web Traffic
How should the BIG-IP system handle encrypted
application traffic?
Terminate SSL for Clients, re-encrypt to View servers (SSL bridging) OR Terminate SSL for
clients, plaintext to View server (SSL offload)
Which certificate...?
Which key...?
PC over IP
Will PCoIP connections go through the BIG-IP system?
No
This IP address is used as the BIG-IP virtual server IP address and is unique for each APM/LTM iApp
deployment.
Type the appropriate FQDN for your implementation (should be different for each pod). In our example,
we use wc.view.mycompany.com.
Add each View server that is in the same location as the BIG-IP system you are currently configuring.
The servers can be Connection Servers or Security Servers depending on your specific environment.
Because traffic is secured by the BIG-IP APM, you may choose not to deploy Security Servers.
Server Optimization
Which OneConnect profile do you want to use?
iRules
iRules
Select the user_name_persistence iRule found under Options window and move over to the Selected
window. You must complete Creating the user_name_persistence iRule on page 35 before the iRule
will be available.
Repeat this iApp configuration on each BIG-IP system that is a part of this deployment.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
more than two locations, you would simply create additional pools for each location, with each pool containing only the virtual server IP
address of each other location.
BIG-IP Object
Health Monitor
None
Round Robin
Address
Type the BIG-IP virtual server IP address for the View deployment on a remote BIG-IP system
Service Port
443
Create a new pool for the virtual server of each remote View implementation that is a part of this deployment.
Repeat this section to create the pools on each BIG-IP LTM that is a part of the deployment.
AAA Servers
(Main tab-->Access Policy
-->AAA Servers)
Type
Active Directory
Domain Name
Server Connection*
Direct (if using a single AD server) or Use Pool (if you have a pool of AD servers)*
Domain Controller
Type the IP address of the Domain controller. If using a pool, type the IP address and host name of each
Domain controller.
Select gateway_icmp unless you have created a custom monitor for the Active Directory pool.
Admin Name/Password
* BIG-IP v11.2 and later only. For information on the Use Pool option, see the online help or BIG-IP APM documentation.
Create this AAA profile on each BIG-IP system that is a part of this deployment.
Type a name. This name is used in the iRule, so make note of it.
We use List_DCs.
Type
String
String Records
String
Name of your Active Directory Security Group defined for the remote location. In our example this is east_
coast_pod
Value
The name of the BIG-IP LTM pool in the remote location. In our example, this is the east_coast_pool.
Name of your Active Directory Security Group associated with the local LTM. In our example this is west_
coast_pod
Value
The name of the local LTM pool. This name is the name you gave the iApp, followed by _pool. In our
example we use west_coast_pool.
Repeat the Data Group List creation on each BIG-IP system that is a part of this deployment.
33
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Access Profile
Name
Languages
34
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
when ACCESS_SESSION_STARTED {
set username [findstr [HTTP::uri] "/" 1 ".f5"]
log local0. "APM: Username extracted is $username"
if { [ info exists username ] } {
ACCESS::session data set session.logon.last.username $username
ACCESS::session data set session.logon.last.password blah
} else {
log local0. "User did not exist. HTTP header not found from first iRule. This should not happen"
}
}
when ACCESS_ACL_ALLOWED {
log local0. "ACL ALLOWED response is: [ACCESS::session data get session.ad.last.attr.memberOf]"
HTTP::respond 200 content "<attribute>[ACCESS::session data get session.ad.last.attr.memberOf]</attribute>"
TCP::close
}
4. Click Save.
5. Repeat this procedure to create the iRule on each BIG-IP system that is a part of this deployment.
Virtual Server
(Main tab-->Local Traffic
-->Virtual Servers)
Non-default settings/Notes
Name
Address
Type an unpublished IP address (an IP address that is not a known network on this device), such as 10.0.0.1.
Service Port
80
HTTP Profile
HTTP
Access Profile
iRule
Repeat the virtual server creation on each BIG-IP system that is a part of this deployment.
35
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Variable
Values
set static::debug 0
Replace "vs_ad_check" with the name of the Active Directory virtual server you created.
Replace "List_DCs" with the name of the Data Group you created Creating Data Group List on page 33.
Replace "west_coast_pool" with the name of the local BIG-IP pool without the full path.
Replace "/Common/west_coast.app/west_coast_pool" with the name of the local BIG-IP pool using the full path.
Replace 7200 with an appropriate persistent record time out value in seconds. The default is set to 2 hours.
If you chose 0 for SSL offload, you need to include a Server SSL profile on the iApp generatred virtual server, <iApp-name>_https_virtual.
36
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Prerequisites
hh T
his solution requires at least one BIG-IP GTM, one BIG-IP APM, and two BIG-IP LTM systems. While you could run all three
modulus on one BIG-IP system, we recommend you run the BIG-IP GTM on a separate physical device from the BIG-IP APM
and LTM.
hh This solution is for deployments of at least two VMware View pods in geographically dispersed locations.
hh You must have an Active Directory implementation deployed as part of your View implementation.
hh This solution currently only supports Windows, iOS, and Wyse View Clients. It does not currently support Mac or Android clients.
PCoIP
BIG-IP
Global Traffic Manager
vSphere
Active
Acti e
Directory
VMware
Mware Vie
M
View
Vi
(west coast pod)
vSphere
Acti e
Active
Directory
VMware
Mware Vie
M
View
Vi
(east coast pod)
1. A
View Client attempts to connect to the "mycompany" View environment using a secure connection to https://view.mycompany.com.
The DNS request is sent to a Global Traffic Manager.
IG-IP GTM determines best pod location based on clients public IP address. Note: while in this example we are using geolocation
B
to decide where the client is directed, GTM has various methods to determine best pod location which are not covered in this
deployment guide.
37
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
2. The BIG-IP GTM resolves view.mycompany.com to the West Coast Access Policy Manager.
a. The West Coast APM checks its internal persistence table for an entry matching the user.
b. If the user name is located in persistence table, the user is sent to his or her assigned pool and node.
c. The BIG-IP APM queries Active Directory if the user name is not located in persistence table
3. The West Coast APM queries and authenticates user using local Active Directory servers.
Active Directory returns a successful login and list of the user's security group membership.
a. APM matches security groups against the internally defined data group.
b. If there is a match then user is sent to matching pool
In our example the user is a member of East Coast pod security group and is directed to the East Coast pool defined on
West Coast APM. East Coast pool contains a single ip address which is the virtual server ip address defined on the East
Coast APM.
c. If there is not a match, user is sent to local pool.
4. T
he View client request is forwarded to the East Coast APM, and user name based persistence record is maintained on the West
Coast APM.
a. The East Coast APM checks its internal persistence table for an entry matching the user.
b. If the user name is located in persistence table, the user is sent to his or her assigned pool and node.
c. The BIG-IP APM queries Active Directory if the user name is not located in the persistence table
5. The East Coast APM queries and authenticates the user using local Active Directory servers.
Active Directory returns a successful login and list of the user's security group membership.
a. The APM matches security groups against the internally defined data group.
b. If there is a match then user is sent to matching pool
In our example the user is a member of East Coast pod security group and is directed to the East Coast pool defined on
East Coast APM. East Coast pool contains a pool of Security or Connection Servers.
6. T
he View client connection request is sent to the View server and the user name based persistence request is maintained on the East
Coast APM.
7. After authentication, desktop entitlement, and selection are complete, desktop connections proceed to the appropriate View Desktop.
38
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Template Selection
Name
Use a unique name for each iApp deployment. In our example, we have two BIG-IP LTMs, and use the
names east_coast and west_coast.
Template options
Which configuration mode do you want to use?
Advanced
No
Web Traffic
How should the BIG-IP system handle encrypted
application traffic?
Terminate SSL for Clients, re-encrypt to View servers (SSL bridging) OR Terminate SSL for clients,
plaintext to View server (SSL offload)
Which certificate...?
Which key...?
PC over IP
Will PCoIP connections go through the BIG-IP system?
No
This IP address is used as the BIG-IP virtual server IP address and is unique for each APM/LTM iApp
deployment.
Type the appropriate FQDN for your implementation (should be different for each pod). In our example, we
use wc.view.mycompany.com.
Add each View server that is in the same location as the BIG-IP system you are currently configuring.
The servers can be Connection Servers or Security Servers depending on your specific environment. Because
traffic is secured by the BIG-IP APM, you may choose not to deploy Security Servers.
Server Optimization
Which OneConnect profile do you want to use?
iRules
iRules
Select the user_name_persistence iRule found under Options window and move over to the Selected
window. You must complete Creating the user_name_persistence iRule on page 35 before the iRule will
be available.
Repeat this iApp configuration on each BIG-IP system that is a part of this deployment.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Health Monitor
None
Round Robin
Address
Type the BIG-IP virtual server IP address for the View deployment on a remote BIG-IP system
Service Port
443
Create a new pool for the virtual server of each remote View implementation that is a part of this deployment.
Repeat this section to create the pools on each BIG-IP system that is a part of this deployment.
Type
Active Directory
Domain Name
Server Connection*
Direct (if using a single AD server) or Use Pool (if you have a pool of AD servers)*
Domain Controller
Type the IP address of the Domain controller. If using a pool, type the IP address and host name of each
Domain controller.
Select gateway_icmp unless you have created a custom monitor for the Active Directory pool.
Admin Name/Password
AAA Servers
(Main tab-->Access Policy
-->AAA Servers)
* BIG-IP v11.2 and later only. For information on the Use Pool option, see the online help or BIG-IP APM documentation.
Create this AAA profile on each BIG-IP system that is a part of this deployment.
40
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
BIG-IP Object
Type a name. This name is used in the iRule, so make note of it.
Type
String
String Records
String
Name of your Active Directory Security Group defined for the remote location. In our example this is east_
coast_pod
Value
The name of the BIG-IP LTM pool in the remote location. In our example, this is the east_coast pool
Name of your Active Directory Security Group associated with the local LTM. In our example this is west_
coast_pod
Value
The name of the local LTM pool. This name is the name you gave the iApp, followed by _pool.
Repeat the Data Group List creation on each BIG-IP system that is a part of this deployment. See Configuring the Data Group on page
34 for a screenshot of the Data Group.
Access Profile
Name
Languages
41
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
when ACCESS_SESSION_STARTED {
set username [findstr [HTTP::uri] "/" 1 ".f5"]
log local0. "APM: Username extracted is $username"
if { [ info exists username ] } {
ACCESS::session data set session.logon.last.username $username
ACCESS::session data set session.logon.last.password blah
} else {
log local0. "User did not exist. HTTP header not found from first iRule. This should not happen"
}
}
when ACCESS_ACL_ALLOWED {
log local0. "ACL ALLOWED response is: [ACCESS::session data get session.ad.last.attr.memberOf]"
HTTP::respond 200 content "<attribute>[ACCESS::session data get session.ad.last.attr.memberOf]</attribute>"
TCP::close
}
5. Click Save.
6. Repeat the iRule creation on each BIG-IP system that is a part of this deployment.
Virtual Server
(Main tab-->Local Traffic
-->Virtual Servers)
Non-default settings/Notes
Name
Address
Type an unpublished IP address (an IP address that is not a known network on this device), such as 10.0.0.1.
Service Port
80
HTTP Profile
HTTP
Access Profile
iRule
Repeat the virtual server creation on each BIG-IP system that is a part of this deployment.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Variable
Values
set static::debug 0
Replace "vs_ad_check" with the name of the Active Directory virtual server you created.
Replace "List_DCs" with the name of the Data Group you created.
Replace "west_coast_pool" with the name of the local BIG-IP pool without the full path.
Replace "/Common/west_coast.app/west_coast_pool" with the name of the local BIG-IP pool using the full
path.
Replace 7200 with an appropriate persistent record time out value in seconds. The default is set to 2 hours.
If you chose 0 for SSL offload, you need to include a Server SSL profile on the iApp generatred virtual server, <iApp-name>_https_virtual.
43
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Type a unique name. All other fields are optional. In our example we use West Coast.
Data Center
Name
Important: C
reate a GTM Data Center for each location in your View environment. In our example, we also create a Data Center with the name
East Coast
DNS Profile
Name
Disabled.
Internal Listeners
Listeners
(Global Traffic -->
Listeners)
Destination
Type the IP address on which the Global Traffic Manager listens for network traffic.
VLAN Traffic
Select Enabled On from the list, and then select the Internal VLAN(s) and add them to the Selected list.
Protocol
UDP
DNS Profile
Create a second internal Listener using Protocol TCP; all other settings are the same.
External Listeners
Destination
Type the IP address on which the Global Traffic Manager listens for network traffic.
VLAN Traffic
Select Enabled On from the list, and then select the External VLAN(s) and add them to the Selected list.
Protocol
UDP
DNS Profile
Create a second External Listener using Protocol TCP; other settings are the same.
GTM Server
Name
Address list
Servers
Data Center
Enabled
Servers
(Global Traffic -->
Servers)
LTM Servers
Name
Product
Address list
Type the Self IP address of an LTM system on which you deployed the View iApp template.
Data Center
Health Monitor
bigip
Enabled
Repeat for each BIG-iP LTM system on which you deployed the View iApp template.
Important: After creating all of the LTM Servers, see the following section, Enabling connectivity with remote BIG-IP systems and perform the
commands before continuing.
44
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Name
Preferred: Topology
Alternate: Global Availability
Fallback: Return to DNS
Enabled
Name
Topology
The following Topology Regions and Records should be configured as appropriate for your configuration. The entries in the table are
examples from our configuration.
BIG-IP GTM Object
Non-default settings/Notes
Internal
Topology Regions
(Global Traffic -->Topology
-->Regions)
Name
Region Members
Add Internal region members. In our example we use IP Subnet as the Member Type, and is, and then add the
members of our internal subnet.
External
Name
Region Members
Add External region members. In our example we use IP Subnet as the Member Type, and is not, and then add
the members of our Internal subnet.
Request Source
From the lists, select the appropriate values. In our example, we use Region is internal
Destination
From the lists, select: Pool is and then select your Internal View Pool
Geographical Records
Topology Records
(Global Traffic -->Topology
-->Records)
Name
Request Source
From the lists, select the appropriate values. In our example, we use: State is United States / New
York
Destination
From the lists, select the appropriate values. In our example, we use: Data Center is East Coast.
Geographical Records
Name
Request Source
From the lists, select the appropriate values. In our example, we use: State is United States /
California
Destination
From the lists, select the appropriate values. In our example, we use: Data Center is West Coast.
45
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Manual configuration for Connection Servers (not necessary if using Security Servers)
BIG-IP LTM Object
Health Monitor
(Main tab-->Local Traffic
-->Monitors)
Non-default settings/Notes
Name
Type
Interval
30 (recommended)
Timeout
91 (recommended)
Send String
Receive String1
clientlaunch-default
Name
Health Monitor
Traffic -->Pools)
Address
Service Port
iRule
Profiles
(Main tab-->Local Traffic
-->Profiles)
Parent Profile
Redirect Rewrite
http
3
Matching2
HTTP Compression
(Profiles-->Services)
Name
Parent Profile
wan-optimized-compression
Web Acceleration
(Profiles-->Services)
Name
Parent Profile
optimized-caching
TCP WAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-wan-optimized
TCP LAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-lan-optimized
Name
Persistence Type
Universal
iRule
Name
Parent Profile
oneconnect
Name
Parent Profile
clientssl
Name
Parent Profile
serverssl
Server Name4
pcoip-default-sni 4
Persistence
(Profiles-->Persistence)
OneConnect
(Profiles-->Other)
Client SSL
(Profiles-->SSL)
Server SSL 3
(Profiles-->SSL)
This appears in the default View installation. Modify as applicable for your configuration.
Only necessary if you want to redirect inbound HTTP traffic to HTTPS
3
You do not need the Server SSL profile if offloading SSL and not using PCoIP proxy. This profile is required for both SSL offload and SSL bridging when using the PCoIP proxy.
4
Only necessary if using the BIG-IP system as a full PCoIP proxy.
1
2
46
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Redirect virtual server2
Name
Address
Service Port
80
iRule
Address
Service Port
443
OneConnect Profile
HTTP Profile
serverssl3
SNAT Pool
Default Pool
Persistence Profile
Virtual Server
Forwarding virtual server - TCP (For PCoIP traffic routed through the BIG-IP LTM)
Name
Destination
Type: Network
Address: Type the appropriate address
Mask: Type the associated subnet Mask.
Service Port
4172
Protocol
TCP
SNAT Pool
Forwarding virtual server - UDP (For PCoIP traffic routed through the BIG-IP LTM)
Name
Destination
Type: Network
Address: Type the appropriate address
Mask: Type the associated subnet Mask.
Service Port
4172
Protocol
UDP
SNAT Pool
Forwarding virtual server - U SB redirect (Optional: For USB redirect traffic routed through the BIG-IP LTM)
Name
Destination
Type: Network
Address: Type the appropriate address
Mask: Type the associated subnet Mask.
Service Port
32111
Protocol
TCP
SNAT Pool
You must select Advanced from the Configuration list for these options to appear
2
Only necessary if you want to redirect inbound HTTP traffic to HTTPS
3
You do not need the Server SSL profile if using View 4.6 and offloading SSL. This profile is required for both SSL offload and SSL bridging when using the PCoIP proxy.
1
47
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
when HTTP_REQUEST {
if { [HTTP::cookie exists "JSESSIONID"] } {
# log local0. "Client [IP::client_addr] sent cookie [HTTP::cookie "JSESSIONID"]"
set jsess_id [string range [HTTP::cookie "JSESSIONID"] 0 31]
persist uie $jsess_id
# log local0. "uie persist $jsess_id"
} else {
# log local0. "no JSESSIONID cookie, looking for tunnel ID"
set jsess [findstr [HTTP::uri] "tunnel?" 7]
if { $jsess != "" } {
# log local0. "uie persist for tunnel $jsess"
persist uie $jsess
}
}
}
when HTTP_RESPONSE {
if { [HTTP::cookie exists "JSESSIONID"] } {
persist add uie [HTTP::cookie "JSESSIONID"]
# log local0. "persist add uie [HTTP::cookie "JSESSIONID] server: [IP::server_addr] client: [IP::client_addr]"
}
}
# when LB_SELECTED {
# log local0. "Member [LB::server addr]"
# }
SNAT Pools
If your Connection Servers do not have a route back for clients through the BIG-IP, i.e. if they do not use the BIG-IP as the default gateway,
enable SNAT Automap to translate the clients source address to an address. The Connection Servers use this new source address as the
destination address for client traffic originating through the BIG-IP.
If your View deployment is large, specifically more than 6,000 simultaneous users, a SNAT Pool must be configured, with a SNAT address
for each 6,000 simultaneous users you expect. See the BIG-IP documentation on configuring SNAT Pools.
This completes the Connection Server LTM configuration.
48
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Manual configuration for View Horizon Connection servers with BIG-IP system as secure gateway (PCoIP Proxy)
This section contains LTM and APM configuration guidance if you are using View Horizon 5.2 or later Connection Servers and BIG-IP
version 11.4 or later. If you are using Security Servers or earlier versions of View, do not use this section, and continue with the APM using
Edge Clients section.
Configuration for PCoIP proxy with View Horizon 5.2 connection servers requires 2 virtual servers. The following tables contain a list of
BIG-IP system configuration objects along with any non-default settings you should configure as a part of this deployment. Unless
otherwise specified, settings not mentioned in the table can be configured as applicable for your configuration. For specific instructions on
configuring individual objects, see the online help or product documentation.
BIG-IP LTM Object
Non-default settings/Notes
HTTP
Health Monitors
(Main tab-->Local Traffic
-->Monitors)
HTTPS
Name
Type
HTTP
80
Send String
Receive String
clientlaunch-default 2
Name
Type
HTTPS
443
Send String
Receive String
clientlaunch-default 2
Name
Pool
Health Monitors
Select the HTTP or HTTPS monitor you created, depending on the protocol you are using.
Address
Service Port
443 or 80 (defaults) Depending on the protocol you are using. Repeat Address and Service Port for all nodes.
HTTP
(Profiles-->Services)
Name
Parent Profile
http
HTTP Compression
(Profiles-->Services)
Name
Parent Profile
wan-optimized-compression
Web Acceleration
(Profiles-->Services)
Name
Parent Profile
optimized-caching
TCP WAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-wan-optimized
TCP LAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-lan-optimized
OneConnect
(Profiles-->Other)
Name
Parent Profile
oneconnect
Persistence
(Profiles-->Persistence)
Name
Persistence Type
Cookie
Name
Parent Profile
clientssl
Name
Parent Profile
serverssl
Server Name
pcoip-default-sni
Profiles
(Main tab-->Local Traffic
-->Profiles)
Client SSL
(Profiles-->SSL)
Server SSL
(Profiles-->SSL)
49
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Active Directory AAA Server
Name
Type
Active Directory
Server Connection
Use Pool
Default is based on the name you entered above. You can optionally change it.
Domain Controllers
AAA Servers
(Main tab-->Access Policy
-->AAA Servers)
Admin Name
Admin Password
Type
SecurID
Click Select from Self IP LIst. Select the self IP address that you have configured on your RSA
Authentication server as an Authentication Agent.
Click Choose File and then browse to your SecurID Configuration file. This is the file you generated and
downloaded from your RSA Authentication server.
Name
Type
VMware View
Destination
Auto Logon
Enable
Connectivity Profile
Name
Parent Profile
Connectivity
Access Profile
Name
Languages
Access Policy
Edit
Edit the Access Profile you created using the Visual Policy Editor. See Editing the Access Policy for the PCoIP
proxy on page 51 for details.
Remote Desktop
(Main tab-->Access Policy
-->Application Access-->
Remote Desktops)
IP Address
Service Port
443
HTTP Profile
Virtual Server
SNAT Pool
Auto Map (if you expect more than 6,000 concurrent users per server, create a SNAT Pool)
Access Profile
Connectivity Profile
Check Enable.
Default Pool
Cookie
50
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
PCoIP virtual server
Virtual Server
(Main tab-->Local Traffic
-->Virtual Servers)
Name
Address
Service Port
4172
Protocol
UDP
SNAT Pool 2
Auto Map (if you expect more than 6,000 concurrent users per server, create a SNAT Pool)
Default Pool
None
Check Enable.
Click Update.
g. Click Save.
51
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
6. On the fallback path between Advanced Resource Assign, click the Deny box link, click Allow, and then click Save.
If you do not perform any of the optional steps, your VPE should look similar to the following.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Type a unique name
Name
TCP
TCP
Type
Alias Service Port
4172
Name
Type
HTTPS
443
Health Monitors
Send String
Receive String
clientlaunch-default 2
Name
Type
UDP
4172
Name
Type
TCP
32111
HTTPS
UDP
USB Redirect
HTTPS Pool
Name
Health Monitors
Address
Service Port
UDP Pool
Name
Pool
Health Monitors
Availability Requirement1
All
Address
Service Port
Health Monitors
Address
Service Port
53
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
HTTP
(Profiles-->Services)
Name
Parent Profile
http
TCP WAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-wan-optimized
TCP LAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-lan-optimized
UDP
(Profiles-->Protocol)
Name
Profiles
(Main tab-->Local Traffic
-->Profiles)
Persistence
(Profiles-->Persistence)
Client SSL
(Profiles-->SSL)
Server SSL
(Profiles-->SSL)
Parent Profile
UDP
Name
Persistence Type
Name
Parent Profile
clientssl
Certificate
Key
Name
Parent Profile
serverssl
TCP
Name
Address
Service Port
4172
SNAT Pool
Default Pool
Persistence Profile
HTTPS
Name
Virtual Servers
Address
Service Port
443
HTTP Profile
SNAT Pool
Default Pool
Persistence Profile
UDP
Name
Address
Service Port
4172
54
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
Protocol
UDP
SNAT Pool 2
Default Pool
Persistence Profile
USB Redirect
Virtual Servers
(Main tab-->Local Traffic
-->Virtual Servers)
1
2
Name
Address
Service Port
32111
Protocol
TCP
SNAT Pool 2
Default Pool
Persistence Profile
You must select Advanced from the Configuration list for these options to appear
If your Security Servers do not have a route back for clients through the BIG-IP, i.e. if they do not use the BIG-IP as the default gateway, enable SNAT Automap to translate the
clients source address to an address. The Security Servers will use this new source address as the destination address for client traffic originating through the BIG-IP.
If your View deployment is exceptionally large, specifically more than 6,000 simultaneous users, a SNAT Pool must be configured. See the BIG-IP documentation on configuring
SNAT Pools.
55
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Non-default settings/Notes
See Configuring BIG-IP LTM DNS and NTP settings on page 11 for instructions.
Name
Type
LDAP
Interval
30 (recommended)
Timeout
91 (recommended)
User Name
Password
Base
Filter
Type the filter for the system account. For example cn=user
389
Name
Type
Active Directory
Server Connection
Use Pool
Default is based on the name you entered above. You can optionally change it.
Domain Controllers
AAA Servers
(Main tab-->Access Policy
-->AAA Servers)
Admin Name
Admin Password
Network Access
Name
Caption
Type a caption. By default, the system uses the name you typed. Click Finished, but stay on this
page to configure DNS/Hosts.
- N
etwork Access DNS/
Hosts (Access Policy-->
Lease Pools
Name
Type the applicable IP address. If you selected IP Address Range, type a start and end IP address.
Connectivity Profile
Name
Parent Profile
Connectivity
Web Application
Name
Patching
Type: Minimal Patching. Click Scheme Patching box. Click Create. Stay on Web Application
page to add Resource item.
Network Access-->DNS/Hosts)
-R
esource Items
(Web Application page->Resource Items section->Add)
Destination
Click IP Address option button. Type the IP address of the LTM virtual server you created for the
Connection Servers.
Port
Type 443
Scheme
Select HTTPS
Paths
Type /*
Compression
Select GZIP
56
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
BIG-IP Object
Non-default settings/Notes
Name
Access Policy-->Webtops)
Type
Full
Webtop Link
Name
Application URI
Type the IP address or FQDN of the LTM virtual server you created for the Connection Servers or
Security Servers.
Name
Type
Interval
Timeout
Send String
Receive String
clientlaunch-default1
Name
Health Monitor
Address
Service Port
Rewrite
(Profiles-->Services)
Name
HTTP
(Profiles-->Services)
Name
Parent Profile
http
HTTP Compression
(Profiles-->Services)
Name
Parent Profile
wan-optimized-compression
Web Acceleration
(Profiles-->Services)
Name
Parent Profile
optimized-caching
TCP WAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-wan-optimized
TCP LAN
(Profiles-->Protocol)
Name
Parent Profile
tcp-wan-optimized
Name
Parent Profile
clientssl
Name
Parent Profile
serverssl
Health Monitor
(Main tab-->Local Traffic
-->Monitors)
Profiles
(Main tab-->Local Traffic
-->Profiles)
Client SSL
(Profiles-->SSL)
This appears in the default View installation. Modify as applicable for your configuration.
2
If your download source is an SSL protected server, a Server SSL profile is required. Your download source was defined in both the Web Application and Webtop you created.
For example, if you are pointing to the Connection Broker LTM virtual server as recommended in this guide, you will need this Server SSL profile.
If you are pointing directly at a Connection Broker listening on port 80, this Server SSL profile is not required.
1
57
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
BIG-IP Object
Non-default settings/Notes
Access Profile
Name
Languages
Access Policy
Edit
Edit the Access Profile you created using the Visual Policy Editor. See Editing the Access Policy on
page 21 for details.
Name
IP Address
Service Port
443
HTTP Profile
Virtual Server
SNAT Pool
Auto Map (if you expect more than 6,000 concurrent users, create a SNAT Pool)
Access Profile
Connectivity Profile
Rewrite Profile
Access Profile
Default Pool
source_addr
This appears in the default View installation. Modify as applicable for your configuration
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
e. F
or each of the following click the delete (x) button on the right: Windows 2000, Windows Server 2003, Windows
Server 2008, and Windows NT. These specific Windows operating systems are not supported by View Client and should be
removed.
f.
g. Return to step c and repeat steps c-f. In step f, select iOS in place of Android.
h. Click Finished.
i.
rom the State list, select Unspecified, and then click Save.
F
Note: Android and iOS currently do not support antivirus client side checks.
In the rest of the examples in this procedure, we assume this antivirus check is in place.
8. On the Windows - Successful path, between Antivirus check and Deny click the + symbol.
9. Click the Logon Page option button, and then the Add Item button.
a. Configure the Logon Page as applicable for your configuration. In our example, we leave the default.
b. Click Save.
10. On the Windows Fallback path between Logon Page and Deny, click the + symbol.
11. Click the AD Auth option button, and then the Add Item button.
a. From the Server list, select the AAA server you configured in the configuration table.
b. All other settings are optional.
c. Click Save. You now see a Successful and Fallback path from AD Auth.
12. On the Successful path between AD Auth and Deny, click the + symbol.
13. Click the Windows File Check option button, and then click the Add Item button. The Windows File Checker page opens.
59
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Click the Save button. You know see a Successful and Fallback path from Windows File Check.
14. On the Successful path between Windows File Check and Deny, click the + button.
15. Click the Full Resource Assign option button, and then the Add Item button. Complete the following:
a. Click the Add New Entry button.
b. Click the Add/Delete link.
c. Click the Network Access Resources tab.
d. Click the option button for the Network Access Resource object you created in the configuration table.
e. Click the Webtop tab.
f.
Click the option button for the Webtop you created in the configuration table.
g. Click Update.
h. Click Save.
16. On the Fallback path between Full Resource Assign and Deny, click the + button.
17. Click the Variable Assign option button, and then click the Add Item button. The Resource Assignment page opens. Complete the
following:
a. In the Name box, you can optionally type a new name.
b. Click the Add new entry button.
c. Click the change link.
d. From the list on the left, select Configuration Variable and then select Secure from the adjacent list.
e. From the Type list, select Network Access if necessary.
f.
From the Name list, select the name of the Network Access object you created in the configuration table if necessary.
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
expr {"<application_launch><item><path>C:\\Program\ Files\\VMware\\VMware\ View\\Client\\bin\\wswc.exe</path><parameter>username [mcget {session.logon.last.username}] -password [mcget -secure {session.logon.last.password}] -domainName BD
-serverURL https://broker.example.com:443</parameter><os_type>WINDOWS</os_type></item></application_launch>"}
If your View client is installed in a custom location, be sure to set the correct path to the executable. Our domainName is BD; insert
the correct name of your domain. The serverURL parameter indicates where clients should connect to for accessing the View
Connection Servers (the BIG-IP LTM virtual server); replace the value of this parameter with the Connection Server virtual server
IP address or Domain Name. Additional parameters are available in the client and can be set here. Refer to VMware View client
documentation for more information.
i.
j.
18. On the Fallback path after Variable Assign click the Deny box link.
19. Click the Allow option button, and then click Save.
20. Back on the Fallback path between Windows File Check and Deny, click the + button.
21. Click the Decision Box option button and then click Add Item. Complete the following:
a. Configure the Properties as applicable. We leave the defaults.
b. Click the Branch Rules tab.
c. In the Name box, type Download the View Client.
d. Click Save.
22. On the Download View Client path between Decision Box and Deny, click the + button.
23. Click the Webtop and Links Assign option button and then click Add Item. Complete the following:
a. Click the Add/Delete link next to Webtop Links.
b. Check the box for the Webtop Link you created in the configuration table.
c. Click the Add/Delete link next to Webtop.
d. Check the box for the Webtop you created in the configuration table.
e. Click Save.
24. On the Fallback path after Webtop and Links Assign click the Deny box link.
25. Click the Allow option button, and then click Save.
26. Back near the Start, on the Fallback path between Antivirus Check and Deny, click the + symbol.
27. Click the Message Box option button, and then click Add Item.
a. In the Message box, type the message that is presented to the user in the event their antivirus check fails.
b. In the Link box, type the link text users will click. The user session restarts once they click this link.
c. Click Save.
28. Back near the Start, on the MacOS - Successful path between Antivirus Check and Deny, click the + symbol.
29. Click the Logon Page option button, and then the Add Item button.
a.
Configure the Logon Page as applicable for your configuration. In our example, we leave the default.
61
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
b. Click Save.
30. On the MacOS Fallback path between Logon Page and Deny, click the + symbol.
31. Click the AD Auth option button, and then the Add Item button.
a. From the Server list, select the AAA Server you configured in the configuration table.
b. All other settings are optional.
c. Click Save. You now see a Successful and Fallback path from AD Auth.
32. On the Successful path between AD Auth and Deny, click the + symbol.
33. Click the Mac File Check option button, and then click the Add Item button. The Mac File Checker page opens. Complete the
following:
a. In the Name box, you can optionally type a new name.
b. Click the Add new entry button.
c. In the FileName box, type the path to the View client as appropriate for your View deployment. In our example, we type the
default path:
/Applications/VMware View Client.app
d. Leave the rest of the settings at their default levels.
e. Click the Save button. You know see a Successful and Fallback path from Mac File Check.
34. On the Successful path between Mac File Check and Deny, click the + button.
35. Click the Full Resource Assign option button, and then the Add Item button. Complete the following:
a. Click the Add New Entry button.
b. Click the Add/Delete link.
c. Click the Network Access Resources tab.
d. Click the option button for the Network Access Resource object you created in the configuration table.
e. Click the Webtop tab.
f.
Click the option button for the Webtop you created in the configuration table.
g. Click Update.
h. Click Save.
36. On the Fallback path between Full Resource Assign and Deny, click the + button.
37. C
lick the Variable Assign option button, and then click the Add Item button. The Resource Assignment page opens. Complete the
following:
a. In the Name box, you can optionally type a new name.
b. Click the Add new entry button.
c. Click the change link.
d. From the list on the left, select Configuration Variable and then select Secure from the adjacent list.
e. From the Type list, select Network Access if necessary.
f.
From the Name list, select the name of the Network Access object you created in the configuration table if necessary.
62
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Our domainName is BD; insert the correct name of your domain. The @ parameter indicates where clients should connect
to for accessing the View Connection Servers (the BIG-IP LTM virtual server); replace the value of this parameter with the
Connection Server virtual server IP address or Domain Name. Additional parameters are available in the client and can be set
here. Refer to VMware View client documentation for more information.
i.
j.
38. On the Fallback path after Variable Assign click the Deny box link.
39. Click the Allow option button, and then click Save.
40. Back on the Fallback path between Mac File Check and Deny, click the + button.
41. Click the Decision Box option button and then click Add Item. Complete the following:
a. Configure the Properties as applicable. We leave the defaults.
b. Click the Branch Rules tab.
c. In the Name box, type Download the View Client.
d. Click Save.
42. On the Download View Client path between Decision Box and Deny, click the + button.
43. Click the Webtop and Links Assign option button and then click Add Item. Complete the following:
a. Click the Add/Delete link next to Webtop Links.
b. Check the box for the Webtop Link you created in the configuration table.
c. Click the Add/Delete link next to Webtop.
d. Check the box for the Webtop you created in the configuration table.
e. Click Save.
44. On the Fallback path after Webtop and Links Assign click the Deny box link.
45. Click the Allow option button, and then click Save.
46. Back near the Start, on the MacOS fallback path between Antivirus Check and Deny, click the + symbol.
47. Click the Message Box option button, and then click Add Item.
63
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
a. In the Message box, type the message that is presented to the user in the event their antivirus check fails.
b. In the Link box, type the link text users will click. The user session restarts once they click this link.
c. Click Save.
48. Back near the start, on the successful path between the bottom Antivirus Check box and Deny, click the + button.
49. Click Logon Page option button, and then the Add Item button.
a. Configure the Logon Page as applicable for your configuration. In our example, we leave the default.
b. Click Save.
50. On the Fallback path between Logon Page and Deny, click the + symbol.
51. Click AD Auth option button, and then the Add Item button.
a. From the Server list, select the AAA server you configured in the configuration table.
b. All other settings are optional.
c. Click Save. You now see Successful and Fallback paths from AD Auth.
52. On the Successful path between AD Auth and Deny, click the + symbol.
53. Click Full Resource Assign option button, and then the Add Item button. Complete the following:
a. Click the Add New Entry button.
b. Click the Add/Delete link.
c. Click the Network Access Resources tab.
d. Click the option button for the Network Access Resource object you created in the configuration table.
e. Click the Webtop tab.
f.
Click the option button for the Webtop you created in the configuration table.
g. Click Update.
h. Click Save.
54. On the Fallback path after Full Resource Assign and Deny, click the + button.
55. C
lick the Variable Assign option button, and then click the Add Item button. The Resource Assignment page opens. Complete the
following:
a. In the Name box, you can optionally type a new name.
b. Click the Add new entry button.
c. Click the change link.
d. From the list on the left, select Configuration Variable and then select Secure from the adjacent list.
e. From the Type list, select Network Access if necessary.
f.
From the Name list, select the name of the Network Access object you created in the configuration table if necessary.
64
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
pick up unnecessary spaces or line breaks that will cause a syntax error in the code. We present the code below for your
information; we strongly recommend you copy and paste the proper section of code from the following text file:
www.f5.com/solutions/resources/deployment-guides/files/view-vpe-expression.txt.
And then carefully replace the values in red below with values from your implementation.
expr {"<application_launch><item><path>/usr/bin/firefox</path><parameter>vmware-view://[mcget
{session.logon.last.username}]@broker.example.com:443/?domainName=BD</parameter><os_type>UNIX</os_
type></item></application_launch>"}
Our domainName is BD; insert the correct name of your domain. The @ parameter indicates where clients should connect
to for accessing the View Connection Servers (the BIG-IP LTM virtual server); replace the value of this parameter with the
Connection Server virtual server IP address or Domain Name. Additional parameters are available in the client and can be set
here. Refer to View client documentation for more information.
i.
j.
56. On the fallback path after Variable Assign, click the Deny box link.
57. Click the Allow option button, and then click Save.
58. Back near the Start, on the Fallback path between the lower Antivirus Check box and Deny, click the + symbol.
59. Click the Message Box option button, and then click Add Item.
a. In the Message box, type the message that is presented to the user in the event their antivirus check fails.
b. In the Link box, type the link text users will click. The user session restarts once they click this link.
c. Click Save.
60. Click the yellow Apply Access Policy link in the upper left part of the window. You must apply an access policy before it takes effect.
When complete, if you configured the optional antivirus checks, your VPE will look like the following example (in this example, we did not
change any of the object names, so additional objects of the same type have a (1) and (2) next to them).
VPE Example
66
DEPLOYMENT GUIDE
View 5.0, 5.1, and 5.2
Description
New document for RC-3
08-16-2013
F5 Networks
Asia-Pacific
[email protected]
Date
888-882-4447
F5 Networks Ltd.
Europe/Middle-East/Africa
[email protected]
www.f5.com
F5 Networks
Japan K.K.
[email protected]
2013 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, and IT agility. Your way., are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified
at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. 0412