View uses TCP and UDP ports for network access between its components.

During installation, View can optionally configure Windows firewall rules to open the ports that are used by default. If you change the default ports after installation, you must manually reconfigure Windows firewall rules to allow access on the updated ports. See "Replacing Default Ports for View Services" in the View Installation document.

Table 1. TCP and UDP Ports Used by View
Source Port Target Port Protocol Description
Security server 55000 View Agent 4172 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Security server 4172 Horizon Client 50001 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Security server 500 View Connection Server 500 UDP IPsec negotiation traffic.
Security server * View Connection Server 4001 TCP JMS traffic.
Security server * View Connection Server 8009 TCP AJP13-forwarded Web traffic, if not using IPsec.
Security server * View Connection Server * ESP AJP13-forwarded Web traffic, when using IPsec without NAT.
Security server 4500 View Connection Server 4500 UDP AJP13-forwarded Web traffic, when using IPsec through a NAT device.
Security server * View desktop 3389 TCP Microsoft RDP traffic to View desktops.
Security server * View desktop 9427 TCP Wyse MMR redirection.
Security server * View desktop 32111 TCP USB redirection.
Security server * View desktop 4172 TCP PCoIP (HTTPS) if PCoIP Secure Gateway is used.
Security server * View desktop 22443 TCP HTML Access.
View Agent 4172 Horizon Client 50001 UDP PCoIP, if PCoIP Secure Gateway is not used.
View Agent 4172 View Connection Server or security server 55000 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Horizon Client * View Connection Server or security server 80 TCP SSL (HTTPS access) is enabled by default for client connections, but port 80 (HTTP access) can be used in certain cases. See Notes and Caveats for TCP and UDP Ports Used by View.
Horizon Client * View security server 443 TCP HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Connection attempts over HTTP to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. You can reconfigure the redirection rule if the HTTPS port was changed. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client * View Connection Server 443 TCP HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Client connection attempts to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. Connection attempts to port 80 to reach View Administrator are not redirected. You must connect over HTTPS to reach View Administrator.

You can prevent HTTP redirection and force clients to use HTTPS. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client * View Connection Server or security server 4172 TCP PCoIP (HTTPS) if PCoIP Secure Gateway is used.
Horizon Client * View desktop 3389 TCP Microsoft RDP traffic to View desktops if direct connections are used instead of tunnel connections.
Horizon Client * View desktop 9427 TCP Wyse MMR redirection if direct connections are used instead of tunnel connections.
Horizon Client * View desktop 32111 TCP USB redirection if direct connections are used instead of tunnel connections.
Horizon Client * View Agent 4172 TCP PCoIP (HTTPS) if PCoIP Secure Gateway is not used.
Horizon Client 50001 View Agent 4172 UDP PCoIP, if PCoIP Secure Gateway is not used.
Horizon Client 50001 View Connection Server or security server 4172 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Web Browser * Security server 8443 TCP HTML Access.
View Connection Server * View Connection Server 48080 TCP For internal communication between View Connection Server components.
View Connection Server * vCenter Server or View Composer 80 TCP SOAP messages if SSL is disabled for access to vCenter Servers or View Composer.
View Connection Server * vCenter Server or View Composer 443 TCP SOAP messages if SSL is enabled for access to vCenter Servers or View Composer.
View Connection Server 55000 View Agent 4172 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.
View Connection Server 4172 Horizon Client 50001 UDP PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.
View Connection Server * View Connection Server 4100 TCP JMS inter-router traffic.
View Connection Server * View desktop 3389 TCP Microsoft RDP traffic to View desktops if tunnel connections via the View Connection Server are used.
View Connection Server * View desktop 4172 TCP PCoIP (HTTPS) if PCoIP Secure Gateway via the View Connection Server is used.
View Connection Server * View desktop 9427 TCP Wyse MMR redirection if tunnel connections via the View Connection Server are used.
View Connection Server * View desktop 32111 TCP USB redirection if tunnel connections via the View Connection Server are used.
View Connection Server * View Connection Server 8472 TCP For interpod communication in Cloud Pod Architecture.
View Connection Server * View Connection Server 22389 TCP For global LDAP replication in Cloud Pod Architecture.
View Connection Server * View Connection Server 22636 TCP For secure global LDAP replication in Cloud Pod Architecture.
View desktop * View Connection Server instances 4001 TCP JMS traffic.
View Composer service * ESXi host 902 TCP Used when View Composer customizes linked-clone disks, including View Composer internal disks and, if they are specified, persistent disks and system disposable disks.