View uses TCP and UDP ports for network access between its components.

During installation, View can optionally configure Windows firewall rules to open the ports that are used by default. If you change the default ports after installation, you must manually reconfigure Windows firewall rules to allow access on the updated ports. See "Replacing Default Ports for View Services" in the View Installation document.

Table 1. TCP and UDP Ports Used by View

Source

Port

Target

Port

Protocol

Description

Security server

55000

View Agent

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Security server

4172

Horizon Client

50001

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Security server

500

View Connection Server

500

UDP

IPsec negotiation traffic.

Security server

*

View Connection Server

4001

TCP

JMS traffic.

Security server

*

View Connection Server

8009

TCP

AJP13-forwarded Web traffic, if not using IPsec.

Security server

*

View Connection Server

*

ESP

AJP13-forwarded Web traffic, when using IPsec without NAT.

Security server

4500

View Connection Server

4500

UDP

AJP13-forwarded Web traffic, when using IPsec through a NAT device.

Security server

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops.

Security server

*

View desktop

9427

TCP

Wyse MMR redirection.

Security server

*

View desktop

32111

TCP

USB redirection.

Security server

*

View desktop

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is used.

Security server

*

View desktop

22443

TCP

HTML Access.

View Agent

4172

Horizon Client

50001

UDP

PCoIP, if PCoIP Secure Gateway is not used.

View Agent

4172

View Connection Server or security server

55000

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Horizon Client

*

View Connection Server or security server

80

TCP

SSL (HTTPS access) is enabled by default for client connections, but port 80 (HTTP access) can be used in certain cases. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client

*

View security server

443

TCP

HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Connection attempts over HTTP to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. You can reconfigure the redirection rule if the HTTPS port was changed. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client

*

View Connection Server

443

TCP

HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Client connection attempts to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. Connection attempts to port 80 to reach View Administrator are not redirected. You must connect over HTTPS to reach View Administrator.

You can prevent HTTP redirection and force clients to use HTTPS. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client

*

View Connection Server or security server

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is used.

Horizon Client

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops if direct connections are used instead of tunnel connections.

Horizon Client

*

View desktop

9427

TCP

Wyse MMR redirection if direct connections are used instead of tunnel connections.

Horizon Client

*

View desktop

32111

TCP

USB redirection if direct connections are used instead of tunnel connections.

Horizon Client

*

View Agent

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is not used.

Horizon Client

50001

View Agent

4172

UDP

PCoIP, if PCoIP Secure Gateway is not used.

Horizon Client

50001

View Connection Server or security server

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Web Browser

*

Security server

8443

TCP

HTML Access.

View Connection Server

*

View Connection Server

48080

TCP

For internal communication between View Connection Server components.

View Connection Server

*

vCenter Server or View Composer

80

TCP

SOAP messages if SSL is disabled for access to vCenter Servers or View Composer.

View Connection Server

*

vCenter Server or View Composer

443

TCP

SOAP messages if SSL is enabled for access to vCenter Servers or View Composer.

View Connection Server

55000

View Agent

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

4172

Horizon Client

50001

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

*

View Connection Server

4100

TCP

JMS inter-router traffic.

View Connection Server

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops if tunnel connections via the View Connection Server are used.

View Connection Server

*

View desktop

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

*

View desktop

9427

TCP

Wyse MMR redirection if tunnel connections via the View Connection Server are used.

View Connection Server

*

View desktop

32111

TCP

USB redirection if tunnel connections via the View Connection Server are used.

View Connection Server

*

View Connection Server

8472

TCP

For interpod communication in Cloud Pod Architecture.

View Connection Server

*

View Connection Server

22389

TCP

For global LDAP replication in Cloud Pod Architecture.

View Connection Server

*

View Connection Server

22636

TCP

For secure global LDAP replication in Cloud Pod Architecture.

View desktop

*

View Connection Server instances

4001

TCP

JMS traffic.

View Composer service

*

ESXi host

902

TCP

Used when View Composer customizes linked-clone disks, including View Composer internal disks and, if they are specified, persistent disks and system disposable disks.