View uses TCP and UDP ports for network access between its components.

During installation, View can optionally configure Windows firewall rules to open the ports that are used by default. If you change the default ports after installation, you must manually reconfigure Windows firewall rules to allow access on the updated ports. See "Replacing Default Ports for View Services" in the VMware Horizon View Installation document.

TCP and UDP Ports Used by View, Excluding Local Mode

Source

Port

Target

Port

Protocol

Description

Security server

*

View Agent

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Security server

4172

View Client

*

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

Security server

500

View Connection Server

500

UDP

IPsec negotiation traffic.

Security server

*

View Connection Server

4001

TCP

JMS traffic.

Security server

*

View Connection Server

8009

TCP

AJP13-forwarded Web traffic, if not using IPsec or not using NAT.

Security server

4500

View Connection Server

4500

UDP

AJP13-forwarded Web traffic, when using IPsec through a NAT device.

Security server

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops.

Security server

*

View desktop

9427

TCP

Wyse MMR redirection.

Security server

*

View desktop

32111

TCP

USB redirection.

Security server

*

View desktop

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is used.

View Agent

4172

View Client

*

UDP

PCoIP, if PCoIP Secure Gateway is not used.

View Agent

4172

View Connection Server or security server

*

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

View Client

*

View Connection Server or security server

80

TCP

SSL (HTTPS access) is enabled by default for client connections, but port 80 (HTTP access) can be used in certain cases. See Notes and Caveats for TCP and UDP Ports Used by View.

View Client

*

View security server

443

TCP

HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Connection attempts over HTTP to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. You can reconfigure the redirection rule if the HTTPS port was changed. See Change the Port Number for HTTP Redirection.

View Client

*

View Connection Server

443

TCP

HTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Client connection attempts to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. Connection attempts to port 80 to reach View Administrator are not redirected. You must connect over HTTPS to reach View Administrator.

You can prevent HTTP redirection and force clients to use HTTPS. See Prevent HTTP Redirection for Client Connections.

View Client

*

View Connection Server or security server

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is used.

View Client

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops if direct connections are used instead of tunnel connections.

View Client

*

View desktop

9427

TCP

Wyse MMR redirection if direct connections are used instead of tunnel connections.

View Client

*

View desktop

32111

TCP

USB redirection if direct connections are used instead of tunnel connections.

View Client

*

View Agent

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway is not used.

View Client

*

View Agent

4172

UDP

PCoIP, if PCoIP Secure Gateway is not used.

View Client

*

View Connection Server or security server

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway is used.

View Connection Server

*

vCenter Server or View Composer

80

TCP

SOAP messages if SSL is disabled for access to vCenter Servers or View Composer.

View Connection Server

*

vCenter Server or View Composer

443

TCP

SOAP messages if SSL is enabled for access to vCenter Servers or View Composer.

View Connection Server

*

View Agent

4172

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

4172

View Client

*

UDP

PCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

*

View Connection Server

4100

TCP

JMS inter-router traffic.

View Connection Server

*

View desktop

3389

TCP

Microsoft RDP traffic to View desktops if tunnel connections via the View Connection Server are used.

View Connection Server

*

View desktop

4172

TCP

PCoIP (HTTPS) if PCoIP Secure Gateway via the View Connection Server is used.

View Connection Server

*

View desktop

9427

TCP

Wyse MMR redirection if tunnel connections via the View Connection Server are used.

View Connection Server

*

View desktop

32111

TCP

USB redirection if tunnel connections via the View Connection Server are used.

View desktop

*

View Connection Server instances

4001

TCP

JMS traffic.

View Composer service

*

ESXi host

902

TCP

Used when View Composer customizes linked-clone disks, including View Composer internal disks and, if they are specified, persistent disks and system disposable disks.

The Local Mode feature requires you to open an additional number of ports for its correct operation.

TCP and UDP Ports Used by Local Mode

Source

Port

Target

Port

Protocol

Description

Security server

*

View Transfer Server

80

TCP

Local desktop check-out, check-in, and replication if tunnel connections are used and SSL is disabled for local mode operations.

Security server

*

View Transfer Server

443

TCP

Local desktop check-out, check-in, and replication if tunnel connections are used and SSL is enabled for local mode operations.

View Client with Local Mode

*

View Transfer Server

80

TCP

Local desktop check-out, check-in, and replication if direct connections are used instead of tunnel connections, and SSL is disabled for local mode operations.

View Client with Local Mode

*

View Transfer Server

443

TCP

Local desktop check-out, check-in, and replication if direct connections are used instead of tunnel connections, and SSL is enabled for local mode operations.

View Connection Server

*

ESX host

902

TCP

Local desktop check-out, check-in, and replication.

View Connection Server

*

View Transfer Server

80

TCP

Local desktop check-out, check-in, and replication if tunnel connections via the View Connection Server are used and SSL is disabled for local mode operations.

View Connection Server

*

View Transfer Server

443

TCP

Local desktop check-out, check-in, and replication if tunnel connections via the View Connection Server are used and SSL is enabled for local mode operations.

View Transfer Server

*

View Connection Server

4001

TCP

JMS traffic to support local mode.

View Transfer Server

*

ESX host

902

TCP

Publishing View Composer packages for local mode.

View Transfer Server

*

Server that hosts the Transfer Server repository network share

445

UDP

Configuring and publishing View Composer packages to the Transfer Server repository network share.