BenFB's Posts

Thank you EricSPeriard​! This some process can be used for Horizon Agent 7.x and now we no longer need 3 reboot.
We are looking for confirmation on the cipher suites that can be configured on a UAG. We have TLS 1.0/1.1 disabled so we are only using TLS 1.2. According to Using PowerShell to Deploy VMware Uni... See more...
We are looking for confirmation on the cipher suites that can be configured on a UAG. We have TLS 1.0/1.1 disabled so we are only using TLS 1.2. According to Using PowerShell to Deploy VMware Unified Access Gateway and comparing to our UAG 3.0 these are the default cipher suites. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA The connection server documentation (Default Global Policies for Security Protocols and Cipher Suites) states that the following ciphers are supported. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA Our security team is requiring that we disable all AES 128 ciphers and only use elliptical curve (ECDHE) which leaves us with the following. UAG TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Connection Server TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA We've also been told that GCM is preferred as it performs better than CBC. So in a perfect world we would only use TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 but it's not one of the listed protocols for the UAG. We've found that it can be configured on the UAG but it can't be the only cipher. So I could do the following on the UAG and Connection servers but I'm unsure if this actually works. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Our connection servers are restricted to only use TLS 1.2 and the following cipher suites. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TL;DR Will the TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 cipher suite work on a UAG? Is it possible to only use TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 on the UAG and connection server or are a minimum of two needed? Why do the UAG and Connection Servers support different ciphers?
The RADIUS server we were using did not support the functionality. We've moved to a different provider and this now works as expected. Thanks markbenson​
This has been acknowledged as a bug in 7.1/7.2 and we are awaiting a future release to fix it.
We do typically see the issue crop up overnight but we have had it in the middle of the day too. We don't backup any of our UAG since we consider them disposable.
I've requested a way to do that as well as specify the cipher suites (Those are our two manual steps when we deploy a UAG). Last I heard a future version would add the ability. Maybe markbenson c... See more...
I've requested a way to do that as well as specify the cipher suites (Those are our two manual steps when we deploy a UAG). Last I heard a future version would add the ability. Maybe markbenson can provide an update.
We experienced this a few months ago on a UAG 3.0 with two NIC. The strange thing was that we have two of them configured identically for HA (Only difference is the IP and cert) and only one of t... See more...
We experienced this a few months ago on a UAG 3.0 with two NIC. The strange thing was that we have two of them configured identically for HA (Only difference is the IP and cert) and only one of them would consistently lock up. We were asked by support to redeploy the UAG several times and after a few days it would always lock up. Working with support we eventually determined the issue was with our default route. We were unnecessarily specifying a default route. Even though the config on the UAG (route -n) looked identical whether we specified it or not. We were also asked to move our load balancer health monitoring from the Management NIC to the Internet NIC. With those two changes our UAG had been stable for the past two months. Unfortunately both of them decided to lock up last night so I'll be opening another case with support.
We discovered that even when specifying the correct "/norestart" switch there are some mandatory prerequisites that will still unexpectedly restart the system (This also happens with the Horizon ... See more...
We discovered that even when specifying the correct "/norestart" switch there are some mandatory prerequisites that will still unexpectedly restart the system (This also happens with the Horizon Agent). We've only tested with Horizon Agent 7.1 and Horizon Client 4.5 but we found that if the following prerequisites were missing it will install them and restart the system. You then have to run the silent install again. We've seen multiple restarts depending on how many of the prerequisites are missing from the system. Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148 Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24212 Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.24212
markbenson​ They pulled the logs from the RADIUS server and confirmed that it's responding with Access-Reject after identifying the user has invalid credentials. They are looking into options to... See more...
markbenson​ They pulled the logs from the RADIUS server and confirmed that it's responding with Access-Reject after identifying the user has invalid credentials. They are looking into options to instead respond with an Access-Accept so the UAG/Connection Server can handle updating the users expired password. We've actually been able to inadvertently prove that this works. We have a test account where they are setting the password to expire. If I immediately try to login after they set the password to expired we can get the RADIUS server to respond with a Access-Accept since it's not aware the password is expired yet. Then we are correctly prompted that the password is expired and needs to be updated.
We did some further testing and we are able to consistently reproduce this issue. This only happens when a user has an active PCoIP session and takes over the session on a different device using ... See more...
We did some further testing and we are able to consistently reproduce this issue. This only happens when a user has an active PCoIP session and takes over the session on a different device using Blast Extreme. It does not happen when a user has an active Blast Extreme session and takes over the session on a different device using Blast Extreme. When Skype is stuck with a status of "Away" you are able to set other away statuses such as "Be Right Back", "Off Work" and "Appear Away". You have to quit and relaunch Skype for the status to switch back to "Available" which allows the user to set any status. markbenson​ Are you my guy for Blast Extreme issues or only for UAG?
Thanks markbenson​, we are doing the later where we enter the AD username and password and the RADIUS server handles the workflow to do a device push for MFA. If that times out then the user is p... See more...
Thanks markbenson​, we are doing the later where we enter the AD username and password and the RADIUS server handles the workflow to do a device push for MFA. If that times out then the user is prompted to enter a passcode that is generated from the app installed on their device. I have the team that manages the RADIUS server looking at our options to respond with a Access-Accept instead of Access-Reject when the AD password is expired. One of the early engineers on the case suggested shifting RADIUS from the UAG to the connection server. The thought was that if the UAG is configured to only do pass-through authentication it would offload that to the connection server and then the connection server would enforce RADIUS. It sounds like we would have the same issue doing that as well?
Thank you for the update markbenson​. I'm marking this as resolved for now since it sounds like a future update will fix this.
We are seeing an intermittent issue with remote users using Blast Extreme through a UAG where Skype thinks the user is still Away. You can not manually set it to Available and the Skye client mus... See more...
We are seeing an intermittent issue with remote users using Blast Extreme through a UAG where Skype thinks the user is still Away. You can not manually set it to Available and the Skye client must be quit and relaunched to set the status properly. When a user connects internally with a Dell Wyse P25/5030 zero client using PCoIP it works as expected. Skype properly detects the user is connected and sets the status to Available. We are running Horizon 7.1, Horizon Agent 7.1 on Windows 7, UAG 3.0, Horizon Client 4.5.1, Lync 2013 Standard Edition and Skype for Business 2016.
I see a small typo, change "RDP_Choice-1" to "RDP_CHOICE=1". You can omit RDP_CHOICE since the default value is 1. I'd suggest removing one MSI property at a time until you determine which one mi... See more...
I see a small typo, change "RDP_Choice-1" to "RDP_CHOICE=1". You can omit RDP_CHOICE since the default value is 1. I'd suggest removing one MSI property at a time until you determine which one might be causing the issue. We jumped straight to 7.1 but we were seeing a similar issue. We had to run the View Agent silent install up to three times before it would succeed (During the first two attempts the machine would reboot unexpectedly even though we set "REBOOT=ReallySuppress"). We were able to identify that it was first installing the Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.24212 and then Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24212 which each required a reboot. After those were installed the View Agent would install correctly. Try extracting the View Agent installer and installing the prerequisites first.
markbenson​ Thank you for checking. I was really hoping there might be a manual way to replace that cert as a workaround. Let me know when you need someone to test it. Sorry for the confusi... See more...
markbenson​ Thank you for checking. I was really hoping there might be a manual way to replace that cert as a workaround. Let me know when you need someone to test it. Sorry for the confusion on the admin UI. I swear at one time I saw it referred to as swagger but can no longer find that. I do see that the documentation references this URL https://access-point-appliance.example.com:9443/rest/swagger.yaml a lot.
markbenson​ I have a case open on this and they mentioned that they are working with you on it. I wanted to post here for the benefit of anyone else that may encounter this. We've confirmed t... See more...
markbenson​ I have a case open on this and they mentioned that they are working with you on it. I wanted to post here for the benefit of anyone else that may encounter this. We've confirmed that the UAG supports updating a users password when it has expired if you only use pass-through authentication. The problem appears to be that our UAG are configured for radius-auth which is denying the login because the password is expired. It seems like we need to have the UAG first do pass-through authentication to validate the users account is valid/update the password if necessary and then push to the RADIUS server for MFA.
markbenson​ If I convert the PFX to PEM it works. However, we would prefer not to use PEM since the private key will be stored without any password protection. I can get the PFX to work if I... See more...
markbenson​ If I convert the PFX to PEM it works. However, we would prefer not to use PEM since the private key will be stored without any password protection. I can get the PFX to work if I first convert it to PEM and then back to PFX using openssl.
VentziP​ markbenson​ The problem is I have no idea what the alias is that the UAG Admin UI/powershell script is expecting. It's in a long format that doesn't match the alias that is seen using ... See more...
VentziP​ markbenson​ The problem is I have no idea what the alias is that the UAG Admin UI/powershell script is expecting. It's in a long format that doesn't match the alias that is seen using openssl. Replacing the cert on the Admin UI shows the following error. More than one certificate found. Specify an alias from list le-XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Specifying that alias does work but I have no idea how to determine what that alias is ahead of time.
While doing a PoC of the Unified Access Gateway we discovered that it does not allow a user with a expired password to login and fails with "Access denied". We've tested this with the Horizon Cli... See more...
While doing a PoC of the Unified Access Gateway we discovered that it does not allow a user with a expired password to login and fails with "Access denied". We've tested this with the Horizon Client for Mac, Windows and iOS and the experience is the same. Logging in using a Dell P25 zero client or with a Horizon Client that points directly to the connection server correctly prompt the user that the password is expired and allows them to enter the old and new password to update it. We have an open support case but keep getting conflicting answers on whether this should or shouldn't work with the UAG. We do happen to have a RADIUS server configured for MFA and I suspect this is why it doesn't work. Can anyone let us know whether this should or shouldn't work?
What version of Horizon are you running? With Horizon 7.1 and Unified Access Gateway 3.0 the only port you need to expose externally is TCP 443 for Blast Extreme (UDP is optional). This works gre... See more...
What version of Horizon are you running? With Horizon 7.1 and Unified Access Gateway 3.0 the only port you need to expose externally is TCP 443 for Blast Extreme (UDP is optional). This works great from a Mac.