Architecture Planning

Table Of Contents
A DMZ-based security server deployment requires a few ports to be opened on the firewall to allow clients
to connect with security servers inside the DMZ. You must also configure ports for communication between
security servers and the View Connection Server instances in the internal network. See “Firewall Rules for
DMZ-Based Security Servers,” on page 84 for information on specific ports.
Because users can connect directly with any View Connection Server instance from within their internal
network, you do not need to implement a security server in a LAN-based deployment.
NOTE Security servers include a PCoIP Secure Gateway component so that clients that use the PCoIP
display protocol can use a security server rather than a VPN.
For information about setting up VPNs for using PCoIP, see the VPN solution overviews, available in the
Technology Partner Resources section of the Technical Resource Center at
http://www.vmware.com/products/view/resources.html.
Best Practices for Security Server Deployments
You should follow best practice security policies and procedures when operating a security server in a
DMZ.
The DMZ Virtualization with VMware Infrastructure white paper includes examples of best practices for a
virtualized DMZ. Many of the recommendations in this white paper also apply to a physical DMZ.
To limit the scope of frame broadcasts, the View Connection Server instances that are paired with security
servers should be deployed on an isolated network. This topology can help prevent a malicious user on the
internal network from monitoring communication between the security servers and View Connection Server
instances.
Alternatively, you might be able to use advanced security features on your network switch to prevent
malicious monitoring of security server and View Connection Server communication and to guard against
monitoring attacks such as ARP Cache Poisoning. See the administration documentation for your
networking equipment for more information.
Security Server Topologies
You can implement several different security server topologies.
The topology illustrated in Figure 5-2 shows a high-availability environment that includes two load-
balanced security servers in a DMZ. The security servers communicate with two View Connection Server
instances inside the internal network.
Chapter 5 Planning for Security Features
VMware, Inc. 81