PCoIP Zero Client and Host Administrator Guide (Issue 5)

Parameter Description
Enabled Session
Ciphers
Enable or disable an encryption mode for the device. By default, all
encryption modes that pertain to a device are enabled.
l AES-128-GCM (Tera1 and Tera2): An encryption method
implemented in first-generation Tera1 and second-generation
Tera2 processors. This method offers the best performance
between hardware endpoints for Tera1 devices. AES-128-GCM
also may offer improved performance for Tera2 clients when
connecting to VMware 4 or later if there is more than about 7
Mbps available on the network.
l AES-256-GCM (Tera2 only): A more secure encryption method
implemented in second-generation Tera2 processors that offers
the best performance between hardware endpoints. When
connecting to VMware 4 or later, AES-128-GCM is
recommended.
l Salsa20-256-Round12 (Tera1 only): A lighter encryption method
implemented in firmware that may offer improved performance for
Tera1 clients when connecting to VMware View 4 or later if there
is more than about 7 Mbps available on the network.
Note: For more information about connecting to VMware View virtual
desktops, see "Using PCoIP® Zero Clients with VMware View User
Guide" (TER0904005).
Note: The enabled encryption mode must match between the host
and client for a session to be established. If more than one mode is
enabled, the firmware selects the following:
l Host to Tera1 or Tera2 clients: AES-128-GCM or AES-256-GCM
for the PCoIP session.
l VMware View 4.5 and later to Tera1 client: SALSA20-256-
Round12 for the PCoIP session.
l VMware View 4.5 and later to Tera2 client: AES-128-GCM for the
PCoIP session.
TER1206003 Issue 5 170
PCoIP® Zero Client and Host Administrator Guide