To deploy the Unified Access Gateway appliance, ensure that your system meets the hardware and software requirements.

VMware Product Versions Supported

You must use specific versions of VMware products with specific versions of Unified Access Gateway. Refer to the product release notes for the latest information about compatibility, and refer to the VMware Product Interoperability Matrix at http://www.vmware.com/resources/compatibility/sim/interop_matrix.php.

Hardware Requirements for ESXi Server

The Unified Access Gateway appliance must be deployed on a version of VMware vSphere that is the same as a version supported for the VMware products and versions you are using.

Note:

UAG supports all the vSphere versions starting from vSphere 5.5.x.

If you plan to use the vSphere Web client, verify that the client integration plug-in is installed. For more information, see the vSphere documentation. If you do not install this plug-in before you start the deployment wizard, the wizard prompts you to install the plug-in. This requires that you close the browser and exit the wizard.

Note:

Configure the clock (UTC) on the Unified Access Gateway appliance so that the appliance has the correct time. For example, open a console window on the Unified Access Gateway virtual machine and use arrow buttons to select the correct time zone. Also verify that the ESXi host time is synchronized with the NTP server and verify that VMware Tools, which is running in the appliance virtual machine, synchronizes the time on the virtual machine with the time on the ESXi host.

Virtual Appliance Requirements

The OVF package for the Unified Access Gateway appliance automatically selects the virtual machine configuration that the Unified Access Gateway requires. Although you can change these settings, VMware recommends that you not change the CPU, memory, or disk space to smaller values than the default OVF settings.

  • CPU minimum requirement is 2000 MHz

  • Minimum memory of 4GB

Ensure that the data store you use for the appliance has enough free disk space and meets other system requirements.

  • Virtual appliance download size is 1.6 GB

  • Thin-provisioned disk minimum requirement is 2.6 GB

  • Thick-provisioned disk minimum requirement is 20 GB

The following information is required to deploy the virtual appliance.

  • Static IP address (recommended)

  • IP address of the DNS server

  • Password for the root user

  • Password for the admin user

  • URL of the server instance of the load balancer that the Unified Access Gateway appliance points to

Unified Access Gateway Sizing Options

  • Standard: This configuration is recommended for Horizon deployment supporting up to 2000 Horizon connections, aligned with the Connection Server capacity. It is also recommended for Workspace ONE UEM Deployments (mobile use cases) up to 10,000 concurrent connections.

  • Large: This configuration is recommended for Workspace ONE UEM Deployments, where Unified Access Gateway needs to support over 10,000 concurrent connections. This size allows Content Gateway, Per App Tunnel and Proxy, and Reverse Proxy to use the same Unified Access Gateway appliance.

    Note:

    VM options for Standard and Large deployments:

    • Standard - 2 core and 4GB RAM

    • Large - 4 core and 16 GB RAM

Browser Versions Supported

Supported browsers for launching the Admin UI are Chrome, Firefox, and Internet Explorer. Please use the most current version of the browser.

Hardware Requirements When Using Windows Hyper-V Server

When you use Unified Access Gateway for an VMware AirWatch Per-App Tunnel deployment, you can install the Unified Access Gateway appliance on a Microsoft Hyper-V server.

Supported Microsoft servers are Windows Server 2012 R2 and Windows Server 2016.

Networking Configuration Requirements

You can use one, two, or three network interfaces and Unified Access Gateway requires a separate static IP address for each. Many DMZ implementations use separated networks to secure the different traffic types. Configure Unified Access Gateway according to the network design of the DMZ in which it is deployed.

  • One network interface is appropriate for POCs (proof of concept) or testing. With one NIC, external, internal, and management traffic is all on the same subnet.

  • With two network interfaces, external traffic is on one subnet, and internal and management traffic are on another subnet.

  • Using three network interfaces is the most secure option. With a third NIC, external, internal, and management traffic all have their own subnets.

Log Retention Requirements

The log files are configured by default to use a certain amount of space which is smaller than the total disk size in the aggregate. The logs for Unified Access Gateway are rotated by default. You must use syslog to preserve these log entries. See Collecting Logs from the Unified Access Gateway Appliance.