- Implementing VMware Horizon 7(Second Edition)
- Jason Ventresco
- 582字
- 2021-07-14 11:25:40
Horizon Security Server additional considerations
The following are additional considerations that should be kept in mind when deploying a Horizon Security Server:
- If you require Windows IPsec encryption to be applied to the network traffic between the Horizon Security Server and the Horizon Connection Server, the Windows firewall service must be enabled for both hosts in order for Horizon to create the required Windows IPsec policies. The firewall service is enabled by default; if it was disabled, visit the Microsoft TechNet article Windows Firewall with Advanced Security Overview (https://technet.microsoft.com/en-us/library/hh831365.aspx) for information about how to manage the feature. It is recommended to enable the firewall service prior to the installation of any Horizon software component, as the installer will then automatically configure the appropriate settings.
- Like Horizon Connection Servers, Horizon Security Servers have no native load-balancing functionality. It is recommended that you implement some sort of load-balancing functionality to help balance the client connections across all the Horizon Security Servers in your infrastructure. Refer to the Load-Balancing Connection Servers section in Chapter 2, Implementing Horizon Connection Server, for information about load-balancing options.
- When installed, the Horizon Security Server is configured with a self-signed SSL certificate that will not be trusted by Horizon clients. It is recommended that you replace the self-signed certificate with one issued from an internal or commercial certificate authority that the Horizon clients will trust. Chapter 14, Managing Horizon SSL Certificates will provide the process used to replace the default SSL certificates for all Horizon components.
- Options such as tunneling connections and two-factor authentication are set on a per-Connection Server basis. If either of these options is going to be used, and you do not want to subject internal Horizon clients to the additional security measures, you are required to deploy additional Connection Servers with these settings enabled to be used solely with the Horizon Security Servers.
High availability overview
When deploying Horizon Security Servers it is important to understand how that impacts our high availability requirements. This section will provide an overview of what a highly available Horizon infrastructure that must service both internal and external clients might look like.
The following diagram illustrates a Horizon infrastructure that meets the following four requirements:
- Internal Horizon clients use load-balanced connections to Connection Servers
- Remote Horizon clients use load-balanced connections to Security Servers
- Security Servers installed in a DMZ
- Two-factor authentication or connection tunneling policies that apply only to remote Horizon clients
The diagram does not show the connections to the Horizon desktops or applications; it is only meant to illustrate the placement of load-balancing appliances, and show how true high-availability might be achieved in an environment that includes multiple Horizon Security Servers. In addition, it shows that additional Connection Servers are being used for internal clients, as these connections do not require the same security settings as the remote clients do.

This Horizon architecture ensures that Horizon clients will be able to connect or reconnect if either of these two scenarios were to occur:
- Failure of any one of the four Connection Servers shown in the diagram
- Failure of any one of the Security Servers
As a single Horizon Security Server cannot be paired with more than one Connection Server, there is no need to place a load-balancer between the Security Servers and the Connection Servers. Load-balancing the Security Servers ensures that the Horizon client connection will be maintained regardless of which server fails, be it a Security Server or the Connection Server that it is paired to.
- Visual Studio 2012 Cookbook
- 密碼學原理與Java實現
- PostgreSQL技術內幕:事務處理深度探索
- 21天學通C++(第5版)
- JavaScript程序設計(第2版)
- Visual C++程序設計與項目實踐
- Web前端開發技術:HTML、CSS、JavaScript
- HTML5+CSS3+jQuery Mobile+Bootstrap開發APP從入門到精通(視頻教學版)
- 詩意的邊緣
- Java Web程序員面試筆試寶典
- 實戰圖解MACD波段交易技術
- Abaqus GUI程序開發指南(Python語言)
- Python學習手冊(原書第4版)
- Java 8函數式編程
- C++ Multithreading Cookbook