VMware View – Objective 1.3 Install View Transfer Server

Knowledge

  • Identify minimum hardware and software requirements for installation
  • Identify required firewall rules
  • Navigate the View Connection Server installation wizard

Hardware Requirements

Processor  2 vCPU

Memory 4GB RAM Minimum Server 2008 R2 and 2GB RAM Minimum Server 2003 R2

SCSI Controller LSI Logic Parallel

Operating System – Software Requirements

Windows Server 2008 R2 64 Bit Standard or Enterprise

Windows Server 2003 R2 32 Bit Standard or Enterprise

Storage Requirements

The Transfer Server connects to the ‘image library’ which is essentially the holding place for all virtual desktop images which have been configured to run in ‘Local Mode’.

With the above in mind, the Transfer Server must have:

  • Enough space to hold a copy of the ‘image library’
  • Access to the datastore that hold the virtual desktop disks

Firewall Rules

It is important to note that the Transfer Server does not secure TCP transactions.  So we might want to think about configuring ‘Local Mode’ to only allow updates when the user is connected to the LAN.

The ports that are required to be opened inbound to the Transfer Server are:

  • Port 80
  • Port 443

Transfer Server Installation

As with previous posts, it’s a good idea to start with what the Transfer Server does.  In a nutshell it allows users to take there Virtual Desktops offline and use them in what’s known as ‘Local Mode’.

The Virtual Desktop is downloaded to the users machine (which you probably would want to do on the LAN) and is then available offline.  Any changes are held in a snaphot.  When the user is back online, the data is synched back to the Transfer Server.

A couple of items before we go over the installation process:

  • Transfer Server has to be installed on it’s on VM
  • You can have multiple Transfer Servers for load balancing

VMware have an excellent KB 2032741 which covers how Local Mode works.

I haven’t followed the specification guidelines as I’m installing it in my lab, instead I have created a server called VMF-TR01 with the following specification:

1 x vCPU

4 GB RAM

1 x vNIC

1 x LSI Logic Parallel SCSI Controller

1 x 30GB Thin Provisioned HDD for Operating System

1 x 100GB Thin Provisioned HDD for Image Repository

VMF-TR01

The VMware View Transfer Server is part of the VMware View Connection Server installation, which can be downloaded from here.  As at the time of this blog post, the most recent version is VMware-viewconnectionserver-x86_64-5.1.2-928164.exe

Launch the View Connection Server installer on your Transfer Server and click Next

View Instal 1

Accept the EULA and Click Next

View Install 2

Choose the installation location, in most setups I tend to leave this as the default.

View Install 3

We are going to install a View Transfer Server, click Next

Transfer 1

We now need to enter the following details:

  • Network Domain, in my case vmfocus.local
  • Server Name, I’m rolling with VMF-TR01.vmfocus.local
  • Administrators Email Address, mine is admin@vmfocus.com

Once you are happy these are right, Click Next

Transfer 2

Good old Windows Firewall makes an entrance, select ‘Configure Windows Firewall Automatically’

Transfer 3

That was rather quick, we can Click Install

Transfer 4

Boom, the Transfer Server installation is complete

Transfer 5

Naturally, we have to configure the Transfer Server, but we will leave that for Objective 2.5

VMware View – Objective 1.5 Preparing Active Directory For Installation

Knowledge

  • Describe characteristics of required Active Directory domain accounts (e.g., permissions).
  • Describe characteristics of required Active Directory groups
  • Identify and describe the GPO template files
  • Describe Organizational Units (OUs) for machine accounts and kiosk mode client accounts
  • Verify trust relationships

Active Directory Requirements

Each View Connection Server must belong to an Active Directory domain, in my case this is vmfocus.local.  The View Connection Server must be a member server and not a domain controller (same requirements for vCenter Server).

Note, the View Connection Server can be located in a different domain as along as you have a two way trust relationship in place.

Active Directory Security Groups are used to specify which users are allowed to access which desktops and pools.  Active Directory Security Groups are also used to define which users are allowed to administrator the View Connection Server.  To make things simple, I have created two Security Groups:

  • ViewAdministrators
  • ViewUsers

ViewSecurityGroup

Note, Security Servers reside in the DMZ and as such are not required to be part of an Active Directory domain.

Organizational Unit’s should be created for View Desktops, to ensure that only specific Group Policy Objects are applied to them.  As you can see I have created one called ‘View Desktops’.

Different OU’s should be used for Kiosk/Thin Clients as different Group Policy Objects will be applied to them e.g. for a kiosk/thin client you would want to be locked down so only View can be launched and on a normal laptop or desktop the Group Policy Object would be less restrictive.

View AD

Template Files

VMware View comes with a number of Administrative Templates twhich have common configuration settings to make our life a bit easier!

These can be found on your View Connection Server under …VMwareVMware ViewServerextrasGroupPolicyFiles

To import the ADM template files, launch Group Policy Management

GPO1

Right Click Group Policy Objects and click New

GPO2

Give the new Group Policy Object a name, in my case, I’m going to roll with ‘View Common’ then hit OK

GPO3

Now we are going to Right Click and Edit the ‘View Common’ Group Policy

GPO4

Double Click ‘Computer Configuration’ then expand ‘Policies’ and lastly Right Click Administrative Templates and select Add/Remove Template

GPO5

Click Add

GPO6

Browse to the location on your View Connection Server and select the ADM template you want to add.  In this example, we are going to use vdm_common.adm by going to \VMF-CON01c$Program FilesVMwareVMware ViewServerextrasGroupPolicyFiles

GPO7

If you have been successful, you should see the ‘vdm_common’ ADM in your Add/Remove Templates dialogue box.

GPO8

To verify the ‘vdm_common’ ADM expand Administrative Templates > Classic Administrative Templates (ADM) and you should see VMware View Common Configuration

GPO9

Rinse and repeat for the rest of the View ADM templates you want to import.

TOP TIP: Create a GPO for each View ADM Template, to make management easier.

GPO10

Remote Desktop Users

To allow users access to there View Desktop, we need to give them the Remote Desktop Users rights.  Does this mean that each user has access to any desktop? Nope, as the connection still goes via the ‘View Connection Server’ which checks rights to access the relevant desktop.

The easiest and most effective way to grant ‘Remote Desktop User’ rights is to use Restrictive Groups.

Create a new Group Policy Object, I’m going to call mine ‘Remote Desktop Users’, I know very original!

Edit the GPO, and browse to Computer Configuration > Windows Settings > Security Settings > Restricted Groups

Restricted Groups 1

Right Click anywhere on the right hand side and Select Add Group

Restricted Groups 2

Type in Remote Desktop Users and hit OK

Restricted Groups 3

Now we need to specify who is going to be a member of the Remote Desktop Users group.  Click Add from the ‘Members of this group’ dialog box.

Restricted Groups 4

To keep things simple, I’m going to add ‘Domain Users’

Restricted Groups 5

Hit OK and you will see ‘Members of this group’ has been updated to include ‘Domain Users’.

Restricted Groups 6

Now you need to link the ‘Remote Desktop Users’ GPO to the appropriate OU in your Active Directory environment.

VMware View – Objective 1.4 Install View Security Server

Knowledge

  • Identify minimum hardware and software requirements for installation
  • Identify required firewall rules
  • Identify security server pairing password
  • Navigate the View Connection Server installation wizard

Hardware Requirements

Processor Pentium IV 2.0GHz or higher.  Recommended 4 CPU

Networking One or more 10/100Mpbs NIC’s.   Recommended 1Gbps NIC

Memory 4GB RAM.  Recommended 10GB RAM for 50 or more desktops

Operating System – Software Requirements

Windows Server 2008 R2 64 Bit Standard or Enterprise

Windows Server 2003 R2 32 Bit Standard or Enterprise

Note, to use PCoIP Secure Gateway component, the OS must be Windows Server 2008 R2 64 Bit.

Virtualization – Software Requirements

The following version of vSphere are supported:

vSphere 4.0 Update 3 or higher

vSphere 4.1 Update 1 or higher

vSphere 5.0 or higher

Note, both ESX and ESXi hosts are supported.

Firewall Rules

The Security Server acts as a ‘secure gateway’ to the View Connection Server and as such should be placed in a DMZ (a logical zone between the internet and LAN).  As the Security Server is internet facing it will require the following Ports to be opened:

TCP 443 Inbound

PCoIP View Client to Security Server

TCP 4172 View Client to Security Server

UDP 4172 View Client to Security Server

UDP 4172 Security Server to View Client

PCoIP Security Server to Virtual Desktop

TCP 4172 Security Server to Virtual Desktop

UDP 4172 Security Server to Virtual Desktop

UDP 4172 Virtual Desktop to Security Server

Security Server Installation

As with previous posts, it’s a good idea to recap on what the Security Server does.  Essentially, the Security Server bypasses the need for a third party VPN device such as PPTP, L2TP IPSEC.

An SSL connection is made directly to the Security Server.  The link to a View Connection Server is a one to one relationship.  Therefore, if you have two View Connection Servers then you would need two Security Servers.

If you decide that two Security Servers are required then a third party load balancing device will need to be obtained as View doesn’t have this ability natively.

How does it work? Well two SSL tunnels are created, the first to the Security Server when the user authenticates, a secondary SSL tunnel is then created when the user accesses the View Desktop.

As mentioned previously, the Security Server should sit within a DMZ and therefore should not be part of your Active Directory domain.

Taking the above into account, I have created a VM called VMF-SS01 with the following specifications:

1 x vCPU

4 GB RAM

1 x vNIC

We use the same installer as the VMware View Connection Server which can be downloaded from here.  As at the time of this blog post, the most recent version is VMware-viewconnectionserver-x86_64-5.1.2-928164.exe

Launch the installer and click Next

View Instal 1

Accept the EULA and click Next

View Install 2

Choose the installation location, in most setups I tend to leave this as the default.

View Install 3

Select View Security Server and click Next

Security Server 1

Now we have to pair the Security Server with a View Connection Server.  This relies on DNS, with this in mind, you can choose to do a number of things:

  1. Create a host entry for your View Connection Server
  2. On the Security Server use a LAN DNS server and open up UDP and TCP Port 53 to the LAN

In my configuration, I’m going to opt for option 2. As it means the Security Server can resolve all my LAN servers, you probably wouldn’t do this in production!

Security Server 2

This is where things start to get interesting, we need to enter a ‘pairing password’ on both the Security Server and View Connection Server.  You need to enter the password on the Connection Server first. Jump onto your View Connection Server and go to View Configuration > Servers > Connection Servers > More Commands > Specify Security Server Pairing Password

Security Server 3

We now have to enter our one time password to enable authentication between the Security Server and View Connection Server.  A couple of things to note before we do this.

1. Windows Firewall doesn’t need to be turned on, even though it mentions it does.

2. The password is one time only to validate each server.

With this in mind, enter your passwords and hit OK.

Security Server 4

Jump back onto the Security Server in my case VMF-SS01 and enter the same password and click Next

Security Server 5

Next we need to enter in our external URL, I’m going to roll with view.vmfocus.com and we also need to enter our external IP Address.

Note, the external IP Address has to be static, using DNS with dynamic records such as no-ip.org do not work.

Security Server 6

We will allow Security Server to configure the Windows Firewall automatically

Security Server 7

We are cooking on gas now! Click Install

Security Server 8

Voila all Finished

Security Server 9

Now the strange thing is that even though we have installed the Security Server, the PCoIP Gateway is not enabled! This is covered in Objective 2.4.

VMware View – Objective 1.1 Install View Composer

Knowledge

  • Identify minimum hardware and software requirements for installation
  • Describe Composer database and connectivity
  • Describe Composer service and dependencies
  • Navigate View Composer installation wizard

Hardware Requirements

View Composer must be installed on the same server as vCenter which rules out the vCenter Server Appliance.

Operating System Requirements

vCenter 4.0 Update 3 or Higher Windows Server 2008 R2 Standard or Enterprise with no service pack or service pack one.

vCenter 4.1 Update 1 or Higher Windows Server 2008 R2 Standard or Enterprise with no service pack or service pack one.

vCenter 5.0 or Higher Windows Server 2008 R2 Standard or Enterprise with no service pack or service pack one.

Database

View Composer requires a SQL database or Oracle database.  For SQL this can be 2005 or 2008 and for Oracle both 10g or 11g can be used.   Both can be on the same instance as the vCenter database.  The database stores data related to:

  • vCenter Server connections
  • Active Directory connections
  • Linked Clone desktops
  • Replicas created by View Composer

Note, that each View Composer service must have it’s own database.

View Composer Installation

Before we install View Composer, it’s probably a good idea to recap what View Composer does.  It’s probably the main reason that makes View so viable, essentially it provides linked clone functionality.  You have a ‘parent VM disk’ which is read only, from this desktops are created using snapshots with very minor differences such as Computer Name and Active Directory GUID.

If we think about this, it gives us some unique advantages which are:

  • Storage requirements decrease (not from an IOPS perspective)
  • Quick desktop deployment as each linked clone only starts at 32MB in size difference from the parent rather than needing to copy the whole 10 or 20 GB VMDK.
  • Easier patch management by updating your ‘golden image/template’ with new patches, then point the parent image at the new snapshot.

The VMware View Composer Server needs to be downloaded from here.  As at the time of this blog post the most recent version is VMware-viewcomposer-3.0.0-691993.exe

For this installation, I’m using SQL 2008 Express, I have created a database called ViewComposer and service.vmware has DBO rights.  If you are unsure on how to do this, I wrote a guide which can be found here under SQL Configuration.

Launch the View Composer installer on your vCenter Server and click Next

View Composer 1

Accept the EULA and click Next

View Composer 2

Choose the installation location, in most setups I tend to leave this as the default.

View Composer 3

Now we need to enter the Data Source Name (DSN) details, click on ODBC DSN Setup

View Composer 4

Select System DSN and then Add

View Composer 5

Select SQL Server Native Client 10.0 and click Finish

View Composer 6

Enter the Name, Description and the SQL Server you want to connect to and hit Next.

View Composer 7

TOP TIP: If using SQL Express, go into services.msc and find SQL* and it will tell you the instance name.   In my case it’s VIM_SQLEXP

We are going to roll ‘With Integrated Windows Authentication’, so click Next

View Composer 8

Select ‘Change the default database to:’ and choose your View Composer database.

View Composer 9

Lastly click on Finish

View Composer 10

Give the connection and test and hopefully you get success!

View Composer 11

Back to the Database Information screen and enter in all the credentials.  I’m using my service.vmware account for connectivity to the View Composer database.  I strongly suggest you have a service account rather than using an administrator account.

View Composer 12

View Composer uses SOAP and uses the Port 18443 for this.  As no SSL Certificates are installed on my vCenter Server, View Composer will create an SSL.  So all we have to do is click Next

View Composer 13

Finally, we click Install and watch the magic happen.

View Composer 14

All done, click Finish

View Composer 15

Dang, we need to reboot vCenter.  In a production environment, this is key, so you may want to advise the client before hand, saving you having to wait around twiddling your thumbs!

View Composer 16

VMware View – Objective 1.2 Install View Standard & Replica Connection Server

Knowledge

  • Identify minimum hardware and software requirements for installation
  • Identify required firewall rules
  • Navigate the View Connection Server installation wizard

Hardware Requirements

Processor Pentium IV 2.0GHz or higher.  Recommended 4 CPU

Networking One or more 10/100Mpbs NIC’s.   Recommended 1Gbps NIC

Memory 4GB RAM.  Recommended 10GB RAM for 50 or more desktops

Operating System – Software Requirements

Windows Server 2008 R2 64 Bit Standard or Enterprise

Windows Server 2003 R2 32 Bit Standard or Enterprise

Note, to use PCoIP Secure Gateway component, the OS must be Windows Server 2008 R2 64 Bit.

Virtualization – Software Requirements

The following version of vSphere are supported:

vSphere 4.0 Update 3 or higher

vSphere 4.1 Update 1 or higher

vSphere 5.0 or higher

Note, both ESX and ESXi hosts are supported.

Firewall Rules

To allow communication to the View Connection Server, certain ports are required to be opened, as follows:

View Objective

View Connection Server Installation

The first server in our View environment is going to be the ‘View Connection Server’.

The Connection Server as we mentioned in the first VMware View – Overview Architecture is responsible for centralised management and handles all authentication requests via Active Directory to access a desktop.  It’s the first server in the ‘View’ infrastructure.

With this in mind, I have created a VM called VMF-CON01 with the following specifications:

1 x vCPU

4 GB RAM

1 x vNIC

I have then downloaded the VMware View Connection Server from here.  As at the time of this blog post, the most recent version is VMware-viewconnectionserver-x86_64-5.1.2-928164.exe

Launch the installer and click Next

View Instal 1

Accept the EULA and click Next

View Install 2

Choose the installation location, in most setups I tend to leave this as the default.

View Install 3

We are going to install a View Standard Server, click Next

View Install 4

Next we have to enter a password, which essentially protects any backups that View makes.

View Install 5

Good old Windows Firewall makes an entrance, select ‘Configure Windows Firewall Automatically’

View Install 6

Next we need to specify an Active Directory Security Group who can perform initial configuration tasks.  In my case, I’m rolling with ViewAdministrators

View Install 7

To access the Active Directory Domain, we need to specify a users credentials with appropriate access.  I like to use a service account for these purposes.

View Install 8

We can choose to participate in the ‘User Experience Improvement Program’ as this is a test lab, I’m going to opt out.

View Install 9

Finally, click Install, to let the View magic begin.

Capture 10

Boom, you should be greeted with ‘Installer Completed’.

View Install 11

You should notice an Icon on your desktop called ‘View Administrator Console’

View Install 12

Launch this or alternatively go to https://localhost/admin/

Ah, man down, it’s not working as we don’t have Adobe Flash Player installed

View Install 13

A quick Adobe Flash Player installation later and voila we now have access.

View Install 14

TOP TIP: I recommend choosing ‘Notify Me To Install’ Flash Updates as with many auto updates can break software access