VMware Horizon Community
ChrisLymanRFP
Contributor
Contributor
Jump to solution

Certificates on UAG's for View

Hello All,

     I need help with a quick sanity check.  I have two UAG's operating as an HA pair and I have a working cert on the VIP, that part is working fine.  The question I have is do I need CA created certs for the UAG's for the Blast and tunnel proxies as well?

VIP: view.myco.com (has a working CA generated cert)

UAG1: view1.myco.com (appears to be using the cert from view.myco.com)

UAG2: view2.myco.com (appears to be using the cert from view.myco.com)

     I'm assuming that the same certificate can be used for both the Blast and tunnel on each UAG.  i.e. on UAG1 I can use the same view1.myco.com certificate for both the Blast and tunnel proxy.

     Apologies for such a simple sounding question, there doesn't seem to be a lot of documentation specifically on the Blast and tunnel certs.

     The reason I'm asking this is because I'm seeing some odd problems.  I can connect via Blast via both the client and browser, but PCoIP fails with the black screen and RDP just doesn't connect at all.  I'm thinking that the problem could be cert related.

Labels (1)
Tags (2)
Reply
0 Kudos
1 Solution

Accepted Solutions
mchadwick19
Hot Shot
Hot Shot
Jump to solution

I think this may be solved by using a a SAN cert across your UAG's which contains the names view, view1, and view2. Have you tried that?

EDIT: I am reading up on this because I'm not well versed in the UAG technology. However from this page, nified Access Gateway Configured with Horizon , it looks like the UAG isn't doing "true" load balancing. What hits the nail on the head is the line under the diagram that reads "The affinity is based on the source IP address. The first connection from the client is distributed using round robin mechanism. However subsequent connections from the same client are sent to the same Unified Access Gateway which handled the first connection."

Quickest way to fix this is use a SAN cert as stated above. There are ways you can do this with a separate load balancer in front of your UAG's and not using UAG HA, but that gets complex.

VDI Engineer VCP-DCV, VCP7-DTM, VCAP7-DTM Design

View solution in original post

Reply
0 Kudos
5 Replies
BenFB
Virtuoso
Virtuoso
Jump to solution

Are you using a third-party load balancer or the native High Availability feature in UAG 3.5?

A black screen is typically a communication issue. Verify the PCoIP Secure Gateway is disabled on the connection server(s) that the UAG point to. If it's disabled make sure that routing and the firewall will allow the necessary communication from the UAG to the Horizon Agent.

Horizon 7 TCP and UDP Ports

Reply
0 Kudos
ChrisLymanRFP
Contributor
Contributor
Jump to solution

I'm using the built in HA feature in the UAG's.

(it turns out the PCoIP problem was just a missed firewall rule)

Here's the situation I want to solve (I'll worry about everything else later Smiley Happy  ), when I log into the user web interface at view.myco.com I am able to authenticate fine.  However when I launch a desktop I get a certificate error, the UAG is presenting the certificate for view.myco.com when I'm really trying to connect to view1.myco.com:8443.  So to boil it down, my question is how do I get the UAG to present one certificate via the VIP, and then another certificate when it's called upon using its non-VIP IP?

Some more items to complicate the issue:

1) A wildcard cert would solve this problem, but we're not allowed to use wildcards

2) I tried to upload a PEM certificate with a private key, but the UI errors out saying "Provide only one certificate".  So I try just providing just the public cert by itself and it takes it, which doesn't do me any good because the private key is from another machine.  Does this mean that I need to generate the CSR on the UAG? And if I do that, does it get me to my goal of one certificate on the VIP and another on the UAG IP?

Reply
0 Kudos
mchadwick19
Hot Shot
Hot Shot
Jump to solution

I think this may be solved by using a a SAN cert across your UAG's which contains the names view, view1, and view2. Have you tried that?

EDIT: I am reading up on this because I'm not well versed in the UAG technology. However from this page, nified Access Gateway Configured with Horizon , it looks like the UAG isn't doing "true" load balancing. What hits the nail on the head is the line under the diagram that reads "The affinity is based on the source IP address. The first connection from the client is distributed using round robin mechanism. However subsequent connections from the same client are sent to the same Unified Access Gateway which handled the first connection."

Quickest way to fix this is use a SAN cert as stated above. There are ways you can do this with a separate load balancer in front of your UAG's and not using UAG HA, but that gets complex.

VDI Engineer VCP-DCV, VCP7-DTM, VCAP7-DTM Design
Reply
0 Kudos
ChrisLymanRFP
Contributor
Contributor
Jump to solution

Yep, that's what I had to do.  Putting the SAN cert on the UAG's solved the problem.  I'd still like to know what those little links to replace the Blast and tunnel certificate actually do, but in the end it's working and I've got other problems.  :smileylaugh:

Reply
0 Kudos
mchadwick19
Hot Shot
Hot Shot
Jump to solution

Not too sure, but if I had to guess that would be used if you had AirWatch or Workspace also deployed that is authenticated through your UAG. Each service would require it's own external DNS name, requiring a different certificate. At that point you would want to have separate certificates for each service.

VDI Engineer VCP-DCV, VCP7-DTM, VCAP7-DTM Design
Reply
0 Kudos