<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Using PowerShell to Deploy VMware Unified Access Gateway in Horizon Documents</title>
    <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/ta-p/2782995</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;By Mark Benson, Senior Architect and Senior Staff Engineer, End-User-Computing CTO Office, VMware&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;LI-TOC indent="25" liststyle="disc" maxheadinglevel="6"&gt;&lt;/LI-TOC&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;H1&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;Introduction&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;For more information on Unified Access Gateway (UAG) deployment and configuration covering UAG 3.9, also see the tutorial in this &lt;A title="https://kb.vmware.com/s/article/78420" href="https://kb.vmware.com/s/article/78420" target="_blank" rel="noopener"&gt;VMware Knowledge Base&lt;/A&gt; article.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;In September 2015, I posted the article &lt;A title="https://blogs.vmware.com/euc/2015/09/what-is-vmware-unified-access-gateway-secure-remote-access.html" href="https://blogs.vmware.com/euc/2015/09/what-is-vmware-unified-access-gateway-secure-remote-access.html" target="_blank" rel="noopener"&gt;https://blogs.vmware.com/euc/2015/09/what-is-vmware-unified-access-gateway-secure-remote-access.html&lt;/A&gt;. Unified Access Gateway (UAG) is a VMware virtual appliance which is used with several VMware End-User Computing products for VMware Horizon, VMware Identity Manager and VMware AirWatch. In that article I mentioned the ability to perform a scripted deployment of a UAG virtual appliance to perform a repeatable deployment where all settings can be applied in a way that allows UAG to be &lt;EM&gt;&lt;STRONG&gt;production ready on first boot&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible to deploy UAG in a vSphere environment using the VMware OVF Tool command. Whilst it is great to be able to specify all configuration settings in one go at deployment time, the downside of this is that the OVF Tool command line can become very long and complex. It is also easy to introduce errors on the command line as the command syntax for OVF Tool used in this way can be difficult to get right. Also, it is not possible to validate the settings with OVF Tool and it is therefore very easy to make configuration errors such as setting an admin REST API password that doesn't meet the required complexity rules.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many Windows administrators managing a VMware End-User Computing product environment need an automated way to deploy UAG in a secure, reliable and repeatable way and to have complete control over the settings. For these reasons, we have developed a PowerShell script that can be used to deploy UAG and which overcomes the main difficulties of using OVF Tool directly on the command line. As this PowerShell script is delivered as a sample script, you can also adapt it as required for your specific needs although in most cases you won't need to modify it at all. The script calls the OVF Tool command but validates the settings and automatically constructs the correct command line syntax. The settings are taken from a simple .INI file. This script runs OVF Tool in a fully supported way for UAG deployment. Note that no password values or private key values are stored within the .INI configuration files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PowerShell script sets all configuration settings for OVF Tool at deployment time. This includes setting up the CA issued SSL Server certificate and all other possible settings. After UAG has been deployed by this script, there is no need to make configuration changes after deployment. UAG will be ready for production use on first boot. Using PowerShell and mastering configuration settings in a simple .ini file also simplifies the task or repeat deployments such as when upgrading UAG from one version to the next. You modify the .ova file reference in the .ini and re-run the PowerShell command. This automatically deletes the existing UAG appliance and replaces it with the upgraded image and automatically re-applies all of the initial settings from the .ini file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;What are the requirements for deploying UAG appliances using this script?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;OL&gt;
&lt;LI&gt;For UAG itself, a vSphere ESXi host and a vCenter Server is needed. Decide on the vSphere datastore to be used and the Network name to be used. If you are deploying a pre 3.3 version of UAG then a&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; vSphere Network Protocol Profile (or IP Pool) must be associated with every referenced network name. This Network Protocol Profile specifies &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;network settings such as IPv4 subnet mask, gateway etc. The deployment of pre 3.3 UAG appliances uses these values so make sure the values are correct. &lt;SPAN style="color: #e23d39;"&gt;&lt;STRONG&gt;Note: In order to improve vSphere deployment flexibility, UAG 3.3 no longer uses NPPs or IP Pools.&lt;/STRONG&gt;&lt;/SPAN&gt; This means UAG can be deployed in environments where these are not set up. Instead, settings of IPv4 netmask, IPv6 prefix and defaultGateway (as required) must be specified in the .ini file instead. Refer to the network settings section below for details of the configuration of each UAG NIC for IPv4 and IPv6 combinations supported.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;The PowerShell script runs on a machine running Windows 8.1 (or newer) or Windows Server 2008 R2 (or newer). This can be the vCenter Server itself if it is running on Windows, or can be a separate Windows machine.&lt;/LI&gt;
&lt;LI&gt;The Windows machine running the script must also have the VMware OVF Tool command installed. Install OVF Tool 4.2.0 or newer. You can download it from here &lt;A href="https://www.vmware.com/support/developer/ovf/" target="_blank" rel="noopener"&gt;OVF Tool Software and Documentation&lt;/A&gt;. &lt;SPAN style="color: #e23d39;"&gt;&lt;STRONG&gt;Note that if you are running OVFTool version 4.4.0 and possibly newer versions, you must omit the :PASSWORD part in the target= value in the PowerShell .ini file otherwise the vCenter password entered while running uagdeploy.ps1 will not be accepted. e.g. instead use the form &lt;SPAN style="font-size: 13.3333px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;192.168.0.21/DC1/host/esx1.example.int. :PASSWORD in the target line works with OVFTool version 4.2.0.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;How do I run the script?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;UL&gt;
&lt;LI&gt;Download a version of UAG virtual appliance image from VMware onto your Windows machine. This is an OVA file. e.g.&lt;SPAN style="font-size: 13.3333px;"&gt; euc-unified-access-gateway-3.3.0.0-8539135_OVF10.ova. Refer to &lt;A title="http://partnerweb.vmware.com/comp_guide2/sim/interop_matrix.php#interop&amp;amp;152=&amp;amp;260=&amp;amp;153=&amp;amp;154=&amp;amp;140=" href="http://partnerweb.vmware.com/comp_guide2/sim/interop_matrix.php#interop&amp;amp;152=&amp;amp;260=&amp;amp;153=&amp;amp;154=&amp;amp;140=" target="_blank" rel="noopener"&gt;VMware Product Interoperability Matrixes&lt;/A&gt; to determine the latest version to download.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Download the correct &lt;STRONG&gt;uagdeploy&lt;/STRONG&gt; or &lt;STRONG&gt;apdeploy ZIP&lt;/STRONG&gt; file attached below and extract the files into a folder on your Windows machine. &lt;SPAN style="color: #e23d39;"&gt;&lt;STRONG&gt;Note that recent uagdeploy zip files are downloaded from VMware from the same location as the UAG images are downloaded. They are no longer attached to this page.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;On your Windows machine, open a PowerShell console and change directory to the location of your script.&lt;/LI&gt;
&lt;LI&gt;Create a .INI configuration file for your UAG virtual appliance. In this example, I am going deploy a new UAG appliance called UAG1. I have created a .INI file called &lt;STRONG&gt;uag1.ini&lt;/STRONG&gt; which contains all the configuration settings for UAG1. You can use the sample .INI files contained within the &lt;STRONG&gt;uagdeploy ZIP&lt;/STRONG&gt; file to create your .INI file and then modify the settings to the values you want.&lt;/LI&gt;
&lt;LI&gt;Make sure script execution is unrestricted for the current user. You can do this by running the command:&lt;BR /&gt;&lt;STRONG&gt;set-executionpolicy -scope currentuser unrestricted&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;You only need to run this once and only if it is currently restricted.&lt;BR /&gt;If you get a warning about running this script, you can unblock that warning by running the command:&lt;BR /&gt;&lt;STRONG&gt;unblock-file -path .\uagdeploy.ps1&lt;BR /&gt;&lt;/STRONG&gt;or&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;unblock-file -path .\apdeploy.ps1&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Run the command &lt;STRONG&gt;.\uagdeploy.ps1 -iniFile uag1.ini&lt;/STRONG&gt; as shown in the screenshot below. If you don't specify the -iniFile option, the script will default to uag.ini (or ap.ini with older Access Point versions). You will be prompted to set a root password for the appliance and an optional password for the admin REST API. You will also be prompted for the vCenter password. Deployment takes around a minute depending on your host and storage performance. If you are prompted to add the fingerprint for the target machine, enter &lt;STRONG&gt;yes&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PowershellAPDeploy1.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/63045iE3D635ED7D067B42/image-size/large?v=v2&amp;amp;px=999" role="button" title="PowershellAPDeploy1.png" alt="PowershellAPDeploy1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;When the script completes, the UAG appliance is ready to use. No further configuration steps are required.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;.INI File Contents&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;uagdeploy ZIP&lt;/STRONG&gt; file attached at the bottom of this post contains four example .INI files. &lt;STRONG&gt;uag1-basic.ini&lt;/STRONG&gt; is a minimal .INI file which just contains the minimum settings needed. &lt;STRONG&gt;uag2-advanced.ini&lt;/STRONG&gt; is a more complex configuration file showing additional settings available. &lt;STRONG&gt;uag3-securid.ini&lt;/STRONG&gt; is an example of a configuration including RSA SecurID authentication. &lt;STRONG&gt;uag4-radius.ini&lt;/STRONG&gt; is an example of a configuration including RADIUS authentication. You should start with just a basic .INI file to ensure that this deployment method works in your environment. You can then add more advanced settings in your .INI file and repeat the deployment. If you have already deployed the named UAG appliance, then running the script again will power off the appliance, delete it, and will redeploy it with the current .INI settings. This is a useful capability to use when either upgrading the appliance to a newer version, or just to change any of the settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;Basic .INI File Example&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;##############################################&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;[General]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;name=UAG1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;source=C:\APs\euc-unified-access-gateway-3.1.0.0-6645767_OVF10.ova&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;target=vi://administrator@vsphere.local@192.168.0.21/Datacenter1/host/esx1.myco.int&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;ds=Local Disk 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;netInternet=VM Network&lt;/P&gt;
&lt;P&gt;netManagementNetwork=VM Network&lt;/P&gt;
&lt;P&gt;netBackendNetwork=VM Network&lt;/P&gt;
&lt;P&gt;honorCipherOrder=true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Horizon]&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN&gt;proxyDestinationUrl=&lt;/SPAN&gt;&lt;A class="jive-link-external-small unlinked" target="_blank" rel="nofollow"&gt;https://192.168.0.209&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;##############################################&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;The following table describes each configuration setting. These must be arranged in the .INI file under the appropriate Group Name shown in the first column and as shown in the sample .INI files.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;Configuring UAG as a Web Reverse Proxy for VMware Identified Manager&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;UAG (or Access Point) 2.6 and newer can be used as a Web Reverse Proxy in front of VMware Identity Manager version 2.6 (and newer). Make sure you use a 2.6 (or newer) version of UAG or Access Point e.g.&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;source=euc-unified-access-gateway-3.1.0.0-6645767_OVF10.ova&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;For exact up to date information on UAG and Access Point compatibility, refer to the &lt;A title="http://partnerweb.vmware.com/comp_guide2/sim/interop_matrix.php#interop&amp;amp;152=&amp;amp;260=&amp;amp;153=&amp;amp;154=&amp;amp;140=" href="http://partnerweb.vmware.com/comp_guide2/sim/interop_matrix.php#interop&amp;amp;152=&amp;amp;260=&amp;amp;153=&amp;amp;154=&amp;amp;140=" target="_blank" rel="noopener"&gt;VMware Product Interoperability Matrixes&lt;/A&gt;.&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;For this setup, remove the entire [Horizon] section from the .ini file and replace it with a new [WebReverseProxy] section. Use the values shown in the sample uag10-vidm.ini file in &lt;STRONG&gt;uag&lt;/STRONG&gt;&lt;SPAN style="color: #666666; font-size: 10pt; background-color: #fdfdfd; font-family: arial, helvetica, sans-serif;"&gt;&lt;STRONG&gt;deploy ZIP&lt;/STRONG&gt; file below&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;.&lt;/SPAN&gt; Set the proxyDestinationUrl to the URL of the Identity Manager server. If that service does not use a trusted CA signed SSL server certificate then you will also need to add the &lt;SPAN style="font-size: 13.3333px;"&gt;proxyDestinationUrlThumbprints value. Leave all other values in [WebReverseProxy] exactly as shown in the sample uag&lt;SPAN style="font-size: 13.3333px;"&gt;10-vidm.ini.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;The setup requires "split DNS" to be setup where the URL hostname for an external user resolved to the address of UAG, and the same URL hostname for an internal user resolves to the address of the Identity Manager server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;&lt;SPAN style="font-size: 18pt; font-family: arial, helvetica, sans-serif;"&gt;Configuration Settings&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="jiveBorder" style="border: 1px solid #000000; width: 776px; height: 11143px;" border="1" align="left"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px; width: 10%;" valign="middle"&gt;Group Name&lt;/TH&gt;
&lt;TH style="color: #ffffff; background-color: #6690bc; text-align: left; padding: 2px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; vertical-align: baseline; width: 15%;"&gt;Value&lt;/TH&gt;
&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px; width: 10%;" valign="middle"&gt;UAG or AP Version Required (if applicable)&lt;/TH&gt;
&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px; width: 20%;" valign="middle"&gt;Example&lt;/TH&gt;
&lt;TH style="text-align: center; background-color: #6690bc; color: #ffffff; padding: 2px; width: 45%;" valign="middle"&gt;Description&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;[CertificateAuth]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;pemCerts&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;pemCerts=C:\Users\Administrator\SSL\north-ca-256.cer&lt;/TD&gt;
&lt;TD&gt;Used for certificate authentication to specify the public CA cert file (in PEM base64 format) that was used to issue the required client certificates. See notes below on &lt;STRONG&gt;Client Device certificate authentication&lt;/STRONG&gt;.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;crlLocation&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN&gt;crlLocation=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://crl.myca.com/" target="_blank" rel="nofollow noopener"&gt;http://crl.myca.com&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;CRL Location&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;enableCertCRL&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;enableCertCRL=true&lt;/TD&gt;
&lt;TD&gt;Use CRL from Certificates&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;enableCertRevocation&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;enableCertRevocation=true&lt;/TD&gt;
&lt;TD&gt;Enable Cert revocation&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;enableOCSP&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;enableOCSP=true&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;Enable OCSP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;ocspURL&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;&lt;SPAN&gt;ocspURL=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ocsp.example.com/" target="_blank" rel="nofollow noopener"&gt;https://ocsp.example.com&lt;/A&gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;OCSP server&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;[General]&lt;/TD&gt;
&lt;TD colspan="1"&gt;adminDisclaimerText&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.10+&lt;/TD&gt;
&lt;TD colspan="1"&gt;adminDisclaimerText=x y z&lt;/TD&gt;
&lt;TD colspan="1"&gt;Specifies a text message to be shown to an admin when logging on to the UAG Admin UI.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;adminPasswordExpirationDays&lt;/TD&gt;
&lt;TD&gt;3.2+&lt;/TD&gt;
&lt;TD&gt;adminPasswordExpirationDays=100&lt;/TD&gt;
&lt;TD&gt;Number of days after which the admin user password will expire.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;cipherSuites&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.3&lt;/TD&gt;
&lt;TD colspan="1"&gt;cipherSuites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,&lt;BR /&gt;TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384&lt;/TD&gt;
&lt;TD colspan="1"&gt;List of cipher setting for HTTPS/TLS. The list is comma separated and all on one line.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;defaultGateway&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.0+&lt;/TD&gt;
&lt;TD colspan="1"&gt;defaultGateway=192.168.0.1&lt;/TD&gt;
&lt;TD colspan="1"&gt;
&lt;P&gt;Specifies the default gateway address for the UAG appliance. Used in cases where the Network Protocol Profiles in vSphere do not contain a default gateway. Also used to avoid ambiguity in cases where multiple Network Protocol Profiles are used each specifying a different gateway. An appliance can only have one default gateway and so this value can be used to explicitly specify it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to the defaultGateway, routes for other gateways can be added using the routes0, routes1 and routes2 setting for each NIC.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;deploymentOption&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;deploymentOption=&lt;/SPAN&gt;onenic&lt;/TD&gt;
&lt;TD&gt;UAG can be created with either one, two or three network interface cards (NICs). Either specify onenic, twonic or threenic. The default is onenic. This is for the standard 2 vCPU 4GB RAM deployment.
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
It is also possible to specify onenic-large, twonic-large, threenic-large, onenic-XL, twonic-XL, threenic-XL. The large options deploy UAG as 4 vCPU 8GB RAM and the extra-large (XL) options deploy UAG as 8 vCPU and 32 GB RAM.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;diskMode&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.8+&lt;/TD&gt;
&lt;TD colspan="1"&gt;diskMode=thin&lt;/TD&gt;
&lt;TD&gt;OVF Tool vSphere Disk Mode. Sets the disk provision mode. Refer to the OVF Tool documentation for further options. Default is thick.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;dns&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;dns=192.168.0.1&lt;BR /&gt;dns=192.168.0.1 192.168.0.2&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;Optional DNS server address. Default is none. Multiple addresses must be space separated.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;dnsSearch&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;dnsSearch=localdomain.com&lt;BR /&gt;dnsSearch=domain1.com domain2.com domain3.com&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;Optional list of DNS search domains added to resolv.conf.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;ds&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;ds=Local Disk 1&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Datastore name which the appliance will be deployed to.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;fallbackNtpServers&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1"&gt;fallbackNtpServers=ntp3.myco.in ntp4.myco.int&lt;/TD&gt;
&lt;TD colspan="1"&gt;Optional list of fallback NTP servers.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;folder&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;folder=My VM Folder/My Sub Folder&lt;/TD&gt;
&lt;TD colspan="1"&gt;Deploys the appliance in the named &lt;EM&gt;&lt;STRONG&gt;VMs and Templates&lt;/STRONG&gt;&lt;/EM&gt; folder. Folders in vCenter are shown under &lt;EM&gt;&lt;STRONG&gt;VMs and Templates&lt;/STRONG&gt;&lt;/EM&gt;. The folder specified must exist before deployment.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;forwardrules&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.8+&lt;/TD&gt;
&lt;TD colspan="1"&gt;forwardrules=tcp/5262/10.20.30.40:5262,&lt;BR /&gt;tcp/88/10.20.30.40:88,&lt;BR /&gt;udp/88/10.20.30.40:88&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;A comma separated set of TCP or UDP forwarding rules. It is used as a generic protocol forwarding mechanism.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each item in the list is of the following format.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tcp|udp/listen-port-number/destination-ip-address:destination-port-number&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first part is tcp or udp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;listen-port number is the destination port number of a TCP connection or UDP datagram received by UAG. The number must not be one of the port numbers already in use on UAG.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The TCP or UDP protocol will be forwarded by UAG iptables to the destination-ip-address and destination-port number.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;honorCipherOrder&lt;/TD&gt;
&lt;TD&gt;2.7.2+&lt;/TD&gt;
&lt;TD&gt;honorCipherOrder=true&lt;/TD&gt;
&lt;TD&gt;Default value is false. When set to true, the cipher list order for the SSL/TLS 443 listener is determined by the server. This allows forward secrecy ciphers to be presented first in the cipher list to improve security. With UAG 2.7.2 and newer it is recommended that this is set to true.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;ip0&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;ip0=192.168.0.10&lt;/TD&gt;
&lt;TD&gt;IPv4 address for NIC0 (onenic, twonic or threenic)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;ip1&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;ip1=192.168.0.11&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;IPv4 address for NIC1 &lt;SPAN style="font-size: 13.3333px;"&gt;(twonic or threenic)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;ip2&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;ip2=192.168.0.12&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;IPv4 address for NIC2 &lt;SPAN style="font-size: 13.3333px;"&gt;(threenic)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;licenseEdition&lt;/TD&gt;
&lt;TD&gt;3.4 only&lt;/TD&gt;
&lt;TD&gt;licenseEdition=Standard&lt;BR /&gt;licenseEdition=Advanced&lt;BR /&gt;licenseEdition=Enterprise&lt;/TD&gt;
&lt;TD&gt;Specifies the licenseEdition. Advanced and Enterprise will enable additional features. Refer to the documentation for details.&lt;BR /&gt;Not used in versions prior to 3.4 and not used in 3.5 onward. With UAG 3.5 all features are available.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;name&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;name=UAG1&lt;/TD&gt;
&lt;TD&gt;
&lt;P style="font-size: 13.3333px;"&gt;Name of the virtual appliance as shown in vCenter. It must be between 1 and 32 characters long.&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;If name is omitted, the PowerShell script will prompt for it.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;netInternet&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;netInternet=VM Network&lt;/TD&gt;
&lt;TD&gt;The name of the vSphere Network for the UAG primary network&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;netManagementNetwork&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;netManagementNetwork=&lt;SPAN style="font-size: 13.3333px;"&gt;VM Network&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;The name of the vSphere Network for the UAG management interface network.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;netmask0&lt;/TD&gt;
&lt;TD&gt;Mandatory in 3.3+&lt;/TD&gt;
&lt;TD&gt;netmask0=255.255.255.0&lt;/TD&gt;
&lt;TD&gt;IPv4 netmask for NIC0 (onenic, twonic or threenic)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;netmask1&lt;/TD&gt;
&lt;TD&gt;Mandatory in 3.3+&lt;/TD&gt;
&lt;TD&gt;netmask1=255.255.255.0&lt;/TD&gt;
&lt;TD&gt;IPv4 netmask for NIC1 (twonic or threenic)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;netmask2&lt;/TD&gt;
&lt;TD colspan="1"&gt;Mandatory in 3.3+&lt;/TD&gt;
&lt;TD colspan="1"&gt;netmask2=255.255.255.0&lt;/TD&gt;
&lt;TD colspan="1"&gt;IPv4 netmask for NIC2 (threenic)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;netBackendNetwork&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;netBackendNetwork=&lt;SPAN style="font-size: 13.3333px;"&gt;VM Network&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;The name of the vSphere Network for the UAG backend network.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;ntpServers&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1"&gt;ntpServers=ntp1.myco.in ntp2.myco.int&lt;/TD&gt;
&lt;TD colspan="1"&gt;Optional. Sets a list of non default NTP servers for UAG time synchronization. Normally this doesn't need to be set as UAG uses default Internet time servers.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;routes0&lt;/TD&gt;
&lt;TD&gt;2.7.2+&lt;/TD&gt;
&lt;TD&gt;routes0=192.168.1.0/24 192.168.0.1,&lt;BR /&gt;192.168.2.0/24 192.168.0.2&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;List of static routes for NIC0. Comma separated list of static routes in the form of:&lt;/P&gt;
&lt;P&gt;network in CIDR format followed by a space followed by the gateway IP address. A network with addresses 192.168.1.0 to 192.168.1.255 and a subnet mask of 255.255.255.0 is represented in CIDR format as 192.168.1.0/24.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;routes1&lt;/TD&gt;
&lt;TD&gt;2.7.2+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;List of static routes for NIC1.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;routes2&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.7.2+&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;List of static routes for NIC2.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;sessionTimeout&lt;/TD&gt;
&lt;TD&gt;2.7.2+&lt;/TD&gt;
&lt;TD&gt;sessionTimeout=39600000&lt;/TD&gt;
&lt;TD&gt;Maximum session time in milliseconds allowed for a logged on user. Default is 36000000 (10 hours). User is automatically logged off after this timeout and is required to log in again.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;snmpEnabled&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1"&gt;snmpEnabled=true&lt;/TD&gt;
&lt;TD colspan="1"&gt;Enables SNMP GET and GETNEXT support on UDP port 161. This is to provide basic information and monitoring data such as sysDescr, sysName, sysUptimeInstance and CPU and memory information using the SNMP protocol.
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
e.g. run the following command on the UAG console (on a single line) to list the information.
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
snmpwalk -v 2c -c public 127.0.0.1 1.3.6&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;source&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;source=C:\Temp\euc-access-point-2.9.0.0-5178136_OVF10.ova&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Full path filename of the UAG .ova virtual machine image.&lt;/P&gt;
&lt;P&gt;The file can be downloaded from VMware.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;sshEnabled&lt;/TD&gt;
&lt;TD&gt;3.5+&lt;/TD&gt;
&lt;TD&gt;sshEnabled=true&lt;/TD&gt;
&lt;TD&gt;Default is false. Enables console ssh access on TCP port 22. This is not recommended for production deployments. On vSphere deployments it is better to use vCenter console access instead of ssh.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;sshKeyAccessEnabled&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;sshKeyAccessEnabled=true&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;Enables ssh key access login.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;sshPasswordAccessEnabled&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;sshPasswordAccessEnabled=false&lt;/TD&gt;
&lt;TD&gt;Allows password access for ssh to be disabled when sshEnabled=true. This is for cases where ssh key access only is required.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;sshPublicKey1&lt;BR /&gt;...&lt;BR /&gt;&lt;CODE&gt;sshPublicKey99&lt;/CODE&gt;&lt;BR /&gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;&lt;CODE&gt;sshPublicKey1=c:\temp\myssh_public.key&lt;/CODE&gt;&lt;/TD&gt;
&lt;TD&gt;ssh public keys to be configured on UAG when sshEnabled=true and sshKeyAccessEnabled=true&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;ssl30Enabled&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.3&lt;/TD&gt;
&lt;TD colspan="1"&gt;ssl30Enabled=false&lt;/TD&gt;
&lt;TD colspan="1"&gt;Enables SSL 3.0. Not recommended. Default is false.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;syslogUrl&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;syslogUrl=syslog://server.example.com:514&lt;/TD&gt;
&lt;TD&gt;Optional syslog server URL. This allows syslog events to be forward to a syslog management server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;target&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;192.168.0.21/DC1/host/esx1.myco.int&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;192.168.0.21/DC1/host/my folder/esx1.myco.int&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/DC1/host/Cluster1/&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/DC1/host/my folder/Cluster1/&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;192.168.0.21/DC1/host/esx1.myco.int/Resources/my_resou rcepool&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;Specifies the vCenter Server information and target ESX host. Refer to the OVF Tool documentation for details of the syntax of target.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that target must reference a vCenter host or cluste. Deploying direct to a vSphere host is not supported. In this example, 192.168.0.21 is the IP address of the vCenter host and administrator@vsphere.local is the vCenter administrator username.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that folder names, host names and cluster names used in the target value are case sensitive.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are unsure of the value to use for target, you can omit folder names etc. and OVF Tool will then provide a list of possible values for the next level. This allows you to accurately build up the full target specification one level at a time.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls10Enabled&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.3&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls10Enabled=false&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Enables TLS 1.0. Set to true or false. Default is&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls11Enabled&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.3&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls11Enabled=false&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Enables TLS 1.1. Set to true or false.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;tls12Enabled&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;3.3&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;tls12Enabled=true&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;Enables TLS 1.2. Set to true or false.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls13Enabled&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.10+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tls13Enabled=true&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Enables TLS 1.3. Set to true or false.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tlsPortSharingEnabled&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.1&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;tlsPortSharingEnabled=true&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Enables the TLS port sharing feature for AirWatch services.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;uagName&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1"&gt;uagName=uag1&lt;/TD&gt;
&lt;TD colspan="1"&gt;Optional. Sets hostname of appliance. Normally UAG appliance will perform a DNS reverse lookup on the eth0 IP address to determine the name, or if that is not available, will set it to a default hostname. uagName allows it to be explicitly set at deployments time.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;v6ip0&lt;/TD&gt;
&lt;TD&gt;3.3+&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip0=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;IPv6 address for NIC0 (onenic, twonic or threenic)
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
Refer to "Network Setting for each NIC" section below.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;v6ip1&lt;/TD&gt;
&lt;TD&gt;3.3+&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip1=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;IPv6 address for NIC1 (twonic or threenic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to "Network Setting for each NIC" section below.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;v6ip2&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.3+&lt;/TD&gt;
&lt;TD colspan="1"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip2=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1"&gt;
&lt;P&gt;IPv6 address for NIC2 (threenic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to "Network Setting for each NIC" section below.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;v6Prefix0&lt;/TD&gt;
&lt;TD&gt;3.3+&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipPrefix0=64&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;IPv6 prefix for NIC0 (onenic, twonic or threenic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to "Network Setting for each NIC" section below.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;v6Prefix1&lt;/TD&gt;
&lt;TD&gt;3.3+&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipPrefix1=64&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;IPv6 prefix for NIC1 (twonic or threenic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to "Network Setting for each NIC" section below.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;v6Prefix2&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.3+&lt;/TD&gt;
&lt;TD colspan="1"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipPrefix2=64&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD colspan="1"&gt;
&lt;P&gt;IPv6 prefix for NIC2 (threenic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to "Network Setting for each NIC" section below.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;[HighAvailability]&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #000000; font-family: Calibri, Helvetica, sans-serif, serif, EmojiFont; font-size: 16px;"&gt;virtualIPAddress&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;3.4+&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #000000; font-family: Calibri, Helvetica, sans-serif, serif, EmojiFont; font-size: 16px;"&gt;virtualIPAddress=192.168.0.10&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;"Floating" virtual IP address for a group of UAG appliances. Used for the High Availability feature. A group of UAG appliances with used with high availability must have NIC 1 (eth0) on the same subnet, and they must all be configured with the same groupID value.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;groupID&lt;/TD&gt;
&lt;TD&gt;3.4+&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN style="color: #000000; font-family: Calibri, Helvetica, sans-serif, serif, EmojiFont; font-size: 16px;"&gt;groupID=1&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;Used to group a set of UAG appliances that are on the same subnet. e.g. if UAG1, UAG2 and UAG3 are on the same subnet and all have a groupID value of 1, then high availability feature will work across all 3. A second group could use groupID=2 and a different floating IP address.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;[Horizon]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authMethods&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;authMethods=securid-auth&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;authMethods=radius-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;authMethods=radius-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;authMethods=certificate-auth&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;authMethods=saml-auth &amp;amp;&amp;amp; sp-auth &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;authMethods=saml-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Default when not specified is for pass-through authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;e.g. for RSA SecurID authentication specify:&lt;/P&gt;
&lt;P&gt;authMethods=securid-auth&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;saml-auth is supported from UAG 3.8+.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;blastExternalUrl&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN&gt;&lt;SPAN&gt;blastExternalUrl=&lt;/SPAN&gt;&lt;A class="jive-link-external-small unlinked" target="_blank" rel="nofollow"&gt;https://uag1.horizon.myco.com:443&lt;/A&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;URL used by Horizon native clients and HTML Access clients to connect Blast to this UAG appliance.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;
&lt;P&gt;hostEntry1&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;hostEntry99&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;2.8+&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;hostEntry1=192.168.0.125 radius-server1.myorg.int&lt;/P&gt;
&lt;P&gt;hostEntry2=192.168.0.126 rsa-am1.myorg.int&lt;/P&gt;
&lt;P&gt;hostEntry3=192.168.0.127 s1 s1-alias&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;A list of 1 or more /etc/hosts file entries to be added to UAG. This is useful if there is a requirement for host name resolution on UAG and DNS is not accessible from UAG. The hosEntry list must start at 1 and the list must be incremental and consecutive.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;idpEntityID&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.8+&lt;/TD&gt;
&lt;TD colspan="1"&gt;&lt;SPAN&gt;idpEntityID=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.example.com/" target="_blank" rel="nofollow noopener"&gt;http://www.example.com&lt;/A&gt;&lt;/TD&gt;
&lt;TD colspan="1"&gt;Used when authMethods contains saml-auth. This is the entityID of the 3rd party SAML IdP.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;matchWindowsUserName&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;matchWindowsUserName=true&lt;/TD&gt;
&lt;TD&gt;Forces subsequent username to be the same username as specified for RADIUS or RSA SecurID authentication.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1"&gt;pcoipDisableLegacyCertificate&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.5+&lt;/TD&gt;
&lt;TD colspan="1"&gt;pcoipDisableLegacyCertificate=true&lt;/TD&gt;
&lt;TD colspan="1"&gt;A self signed legacy certificate is normally available on TCP port 4172 to allow legacy PCoIP clients to connect. Newer clients use the trusted CA signed certificate when installed on UAG for TCP port 443. Setting this to true disables the presentation of the legacy self-signed certificate. If legacy PCoIP clients do not need to connect then this should be set to true. Scanners that find a self-signed certificate on TCP port 4172 may report a security vulnerability if this is not set to true.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;pcoipExternalUrl&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;pcoipExternalUrl=10.20.30.40:4172&lt;/TD&gt;
&lt;TD&gt;URL used by Horizon Clients to connect using PCoIP to this UAG appliance. This must include a valid IPv4 address.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;proxyDestinationUrl&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;proxyDestinationUrl=&lt;/SPAN&gt;&lt;A class="jive-link-external-small unlinked" target="_blank" rel="nofollow"&gt;https://cs1.view.myorg.int&lt;/A&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;URL representing the Horizon backend server such as an individual View Connection Server or a load balnced alias URL representing a group of View Connection Servers.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;
&lt;P&gt;proxyDestinationUrl&lt;/P&gt;
&lt;P&gt;Thumbprints&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;proxyDestinationUrlThumbprints=&lt;/SPAN&gt;sha1:3e ef ed c6 86 75 a6 15 ff c8 96 27 5a 4c ee 8e 16 fd 6e d3&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;An optional comma separated list of certificate thumbprints of the certificates on each backend View Connection Server. If the Horizon View environment is using trusted CA signed certificates, this setting can be ignored. For self signed or otherwise untrusted certificates enter the thumbprint values preceded by &lt;STRONG&gt;sha1:&lt;/STRONG&gt;.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="color: #000000;"&gt;proxyPattern&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Normally not required for Horizon as the default value is usually what is required. Allows an alternative URL pattern to be specified to control the URLs that can be passed to the proxy destination.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;radiusClassAttributeList&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;3.6+&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;radiusClassAttributeList=group1&lt;BR /&gt;radiusClassAttributeList=group1,group2&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;Optional list of RADIUS classes used for authorization within Horizon RADIUS 2FA. If a list is specified, then access will be denied unless the RADIUS server returns a Class Attribute in the Access-Accept with a value that is specified in this list.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;securityHeaders&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;securityHeaders={"Cache-Control":"no-cache,no-store,must-revalidate,pre-check=0,post-check=0,max-age=0,s-maxage=0","Pragma":"no-cache"}&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Adds optional HTTP response headers in cases where they are not present in responses from the proxyDestinationUrl server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;trustedCert1&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;trustedCert99&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;trustedCert1=c:\temp\CA-Cert-A.pem&lt;BR /&gt;trustedCert2=c:\temp\CA-Cert-B.pem&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Certificates in PEM format to be added to the certificate trust store for trusting certificates issued by the CAs presented on outgoing SSL/TLS connections. e.g. to Connection Server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;tunnelExternalUrl&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;SPAN&gt;&lt;SPAN&gt;tunnelExternalUrl=&lt;/SPAN&gt;&lt;A class="jive-link-external-small unlinked" target="_blank" rel="nofollow"&gt;https://uag1.horizon.myco.com:443&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;URL used by Horizon Clients to connect the secure tunnel to this UAG appliance.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;windowsSSOEnabled&lt;/TD&gt;
&lt;TD&gt;2.7.2+&lt;/TD&gt;
&lt;TD&gt;windowsSSOEnabled=true&lt;/TD&gt;
&lt;TD&gt;Used in conjunction with Horizon RADIUS authentication in cases when the RADIUS passcode is the same as the Windows domain user password.
&lt;P&gt;This then skips the subsequent domain password prompt to allow single sign-on.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;[IDPExternalMetadata1]&lt;BR /&gt;...[IDPExternalMetadata99]&lt;/TD&gt;
&lt;TD colspan="1"&gt;metadataXmlFile&lt;/TD&gt;
&lt;TD colspan="1"&gt;3.8+&lt;/TD&gt;
&lt;TD colspan="1"&gt;metadataXmlFile=c:\temp\myIDP.xml&lt;/TD&gt;
&lt;TD colspan="1"&gt;SAML 2.0 Identity Provider (IdP) Metadata file obtained from the 3rd party IdP.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;forceAuthN&lt;/TD&gt;
&lt;TD&gt;3.8+&lt;/TD&gt;
&lt;TD&gt;forceAuthN=true&lt;/TD&gt;
&lt;TD&gt;Used with 3rd party SAML IdP to add forceAuthN to the SAML request to the IdP. This forces authentication to occur by the IdP even if the previous authentication session is still valid. Default is false.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;[OCSPSigningCertificates]&lt;/TD&gt;
&lt;TD&gt;ocspSigningCert1&lt;BR /&gt;...&lt;BR /&gt;
&lt;P&gt;ocspSigningCert99&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;3.9+&lt;/TD&gt;
&lt;TD&gt;ocspSigningCert=c:\temp\mysigningcert.pem&lt;/TD&gt;
&lt;TD&gt;Issuer certificate for OCSP URL trust.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;[RADIUSAuth]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;
&lt;P&gt;accountingPort&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;accountingPort=1813&lt;/TD&gt;
&lt;TD&gt;Optional destination UDP port used for sending RADIUS accounting records to the primary RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;accountingPort_2&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.5+&lt;/TD&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authPort&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.5+&lt;/TD&gt;
&lt;TD colspan="1"&gt;authPort=1812&lt;/TD&gt;
&lt;TD&gt;Destination UDP port used for sending RADIUS authentication requests to the primary and secondary RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authPort_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authType&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.5+&lt;/TD&gt;
&lt;TD colspan="1"&gt;authType=PAP&lt;/TD&gt;
&lt;TD&gt;Specify one of PAP, CHAP, MSCHAPv1, or MSCHAPv2. This must match the configuration of the RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authType_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;hostName&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;hostName=192.168.0.100&lt;/TD&gt;
&lt;TD&gt;Hostname or IP address of the primary RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;hostname_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;numAttempts&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;numAttempts=5&lt;/TD&gt;
&lt;TD&gt;The number of times a RADIUS request will be sent if there was no reply. Default is 3 times.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;numAttempts_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;radiusDisplayHint&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;radiusDisplayHint=XXX Token&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;radiusDisplayHint is a short string that will be included in the client prompt. In this example, the user prompt will be "Enter your XXX Token username and passcode".&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;realmPrefix&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;realmPrefix=NorthDomain\&lt;/TD&gt;
&lt;TD&gt;Optional text inserted ahead of the username before it is passed to the RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;realmPrefix_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;realmSuffix&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&lt;A class="jive-link-email-small" href="mailto:realmSuffix=@north.com" target="_blank" rel="noopener"&gt;realmSuffix=@north.com&lt;/A&gt;&lt;/TD&gt;
&lt;TD&gt;Optional text inserted after the username before it is passed to the RADIUS server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;realmSuffix_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;serverTimeout&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;serverTimeout=10&lt;/TD&gt;
&lt;TD&gt;Timeout in seconds after which a RADIUS request will be resent if there was no reply. Default is 5 seconds.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;serverTimeout_2&lt;/TD&gt;
&lt;TD&gt;2.5+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;For optional secondary server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;[SSLCert]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;pemCerts&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;pemCerts=&lt;SPAN style="font-size: 13.3333px;"&gt;C:\Users\admin\My Certs\&lt;/SPAN&gt;mycaservercert.pem&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Optional SSL Server certificate filename for the user port (TCP 443). This should reference a .PEM format file containing the SSL Server certificate to be deployed onto UAG. The&amp;nbsp; PEM file should contain the SSL Server certifacte and any intermediate and root certificates. If this is omitted, UAG will generate a self-signed SSL server certificate instead.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;pemPrivKey&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;pemPrivKey=&lt;SPAN style="font-size: 13.3333px;"&gt;C:\Users\admin\My Certs\&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;mycacertrsakey.pem&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Filename of the .PEM file containg the RSA private key for the SSL server certificate referenced in pemCerts above. If pemCerts is specified, then pemPrivKey must also be specified.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;pfxCertAlias&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;3.0+&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;pfxCertAlias=myalias1&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;Optional alias specification used in cases where pfxCerts file contains multiple certificates with private key. It allows specification of which one to use. If there is only one certificate with private key, this setting is not required.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;pfxCerts&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.0+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;pfxCerts=&lt;SPAN style="font-size: 13.3333px;"&gt;C:\Users\admin\My Certs\&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;mycacerts.pfx&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;If pfxCerts is specified, pemCerts and pemPrivKey are not needed and will be ignored.&lt;/P&gt;
&lt;P&gt;Specifies a PKCS#12 certificate file normally with .p12 or .pfx extension. The file should contain the SSL server certificate and private key plus any required intermediate certificates. During deployment, the script will prompt for the file password.&lt;/P&gt;
&lt;P&gt;If the file contains multiple certificates with private key, then pfxCertAlias must be used to specify the alias or friendly name of the certificate required.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;[SSLCertAdmin]&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;3.2+&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD colspan="1" style="padding: 2px;"&gt;All the same values as in the [SSLCert] section but specifies the certificate for the Admin UI port (TCP 9443).&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;[SecurIDAuth]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;externalHostName&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.5+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;externalHostName=192.168.0.10&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Set this to the IPv4 address of UAG&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;internalHostName&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.5+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;internalHostName=192.168.0.10&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Set this to the IPv4 address of UAG&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;serverConfigFile&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.5+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;serverConfigFile=C:\temp\sdconf.rec&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Specifies the sdconf.rec file obtained from RSA Authentication Manager Server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;[WebReverseProxy]&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;authCookie&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;authCookie=HZN&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Cookie value to track authorized requests.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;
&lt;P&gt;hostEntry1&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;hostEntry99&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;2.8+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;Refer to the hostEntry description in the Horizon section.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;instanceId&lt;/TD&gt;
&lt;TD colspan="1"&gt;2.8+&lt;/TD&gt;
&lt;TD colspan="1"&gt;instanceId=vIDM&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;An optional instanceId to name individual WebReverseProxy instances when multiple instances are used.&lt;/P&gt;
&lt;P&gt;It is not necessary to specify this as this is assigned automatically.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;loginRedirectURL&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;loginRedirectURL=/SAAS/auth/login?dest=%s&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;URL to redirect request for user login.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;proxyDestinationUrl&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN&gt;proxyDestinationUrl=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://vidmserver.example.com/" target="_blank" rel="nofollow noopener"&gt;https://vidmserver.example.com&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;URL representing the backend Web server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;proxyDestinationUrl&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Thumbprints&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;proxyDestinationUrlThumbprints=&lt;SPAN style="font-size: 13.3333px;"&gt;sha1:3e ef ed c6 86 75 a6 15 ff c8 96 27 5a 4c ee 8e 16 fd 6e d3&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;An optional comma separated list of certificate thumbprints of the certificates on each backend Web Server. If the Web servers are using trusted CA signed certificates, this setting can be ignored. For self signed or otherwise untrusted certificates enter the thumbprint values preceded by &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;STRONG&gt;sha1:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;proxyHostPattern&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;3.0+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;proxyHostPattern=airwatch.myco.com&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Match on URL FQDN. Used in cases where multiple Web Reverse Proxy instances are used.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;proxyPattern&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Refer to sample uag10-vidm.ini in the uagdeploy ZIP file below.&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;Specifies the regular expression that matches&lt;/P&gt;
&lt;P&gt;URIs that should be forwarded to the &lt;SPAN style="font-size: 13.3333px; line-height: 1.5em;"&gt;proxyDestinationUrl.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;securityHeaders&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;securityHeaders={"Cache-Control":"no-cache,no-store,must-revalidate,pre-check=0,post-check=0,max-age=0,s-maxage=0","Pragma":"no-cache"}&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Adds optional HTTP response headers in cases where they are not present in responses from the proxyDestinationUrl server.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;trustedCert1&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;trustedCert99&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P&gt;trustedCert1=c:\temp\CA-Cert-A.pem&lt;/P&gt;
&lt;P&gt;trustedCert2=c:\temp\CA-Cert-B.pem&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;Certificates in PEM format to be added to the certificate trust store for trusting certificates issued by the CAs presented on outgoing SSL/TLS connections.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;unSecurePattern&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;2.6+&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Refer to sample uag10-vidm.ini in the uagdeploy ZIP file below.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 2px;"&gt;
&lt;P style="font-size: 13.3333px;"&gt;Specifies the regular expression that matches&lt;/P&gt;
&lt;P style="font-size: 13.3333px;"&gt;URIs that should be forwarded to the &lt;SPAN style="font-size: 13.3333px;"&gt;proxyDestinationUrl &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px; line-height: 1.5em;"&gt;that don't require an authenticated session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;[WebReverseProxy1]&lt;/P&gt;
&lt;P&gt;...[WebReverseProxy99]&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="color: #000000; text-align: left; padding: 2px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;2.8+&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;With UAG and Access Point 2.8 and newer you can add multiple [WebReverseProxy] sections. The Group Name must have a number appended in the range 1-99 and must be unique. The same values as [WebReverseProxy] are repeated for each additional group. e.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[WebReverseProxy]&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;[WebReverseProxy1]&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;[WebReverseProxy99]&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;Managing SSL Server Certificate Files&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deploying a trusted certificate authority (CA) signed SSL server certificate on UAG gives users the assurance that they are connecting to a trusted environment. It also significantly reduces the security risk of a so called man-in-the-middle attack between the user and the service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you don't specify a certificate in the [SSLCert] section of the .ini file, &lt;SPAN style="font-size: 13.3333px;"&gt;UAG will generate a self-signed SSL server certificate. This will work, and can be useful for initial testing, but a self-signed certificate will not be trusted by Horizon&amp;nbsp; and other clients and therefore users will receive a warning when connecting via UAG.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;For production environments, it is best to obtain an SSL server certificate from a trusted CA for use on each UAG appliance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;If you have the PEM format files for the SSL server certificate (including any intermediate CA certificates and root CA certificate) you can reference the files in the &lt;SPAN style="font-size: 13.3333px;"&gt;pemCerts and pemPrivKey values as described later in this section.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From UAG version 3.0, the deployment of the SSL server certificate became much simpler for customers who have their trusted CA certificate and private key in &lt;SPAN style="font-size: 13.3333px;"&gt;PKCS#12 (&lt;/SPAN&gt;.p12 or .pfx) format. From UAG version 3.0, it is no longer necessary to convert the .p12 or .pfx file to PEM format using openssl commands as described below. Instead, you can now just reference the .p12 or .pfx file directly from within the .ini file. &lt;SPAN style="font-size: 13.3333px;"&gt;In the .INI file, add the following lines.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; font-family: 'courier new', courier;"&gt;[SSLCert]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; font-family: 'courier new', courier;"&gt;pfxCerts=&lt;SPAN style="font-size: 13.3333px;"&gt;mycaservercert.pfx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #666666; font-family: proxima-nova, Arial, sans-serif;"&gt;When the script is run, these certificates and private key will be automatically deployed to the new UAG appliance. &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;The referenced pfxCerts file should contain the SSL server certificate with private key, and any intermediate certificates required. During deployment you enter the password associated with the .p12/.pfx file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;If there are multiple certificates with private key, then you can specify which one to use with the pfxCertAlias keyword.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;If you have a certificate file with private key and certificate trust chain all in one PKCS#12 format file with either a .p12 or .pfx file extension, then with UAG 3.0 and newer you can use it use it directly without conversion as described above. For UAG and Access Point versions below 3.0 you must convert the &lt;SPAN style="font-size: 13.3333px;"&gt;PKCS#12 format file&lt;/SPAN&gt; into the two PEM format files. PEM format is still supported for UAG 3.0 and newer and can still be needed if you have PEM format files. You can convert from PKCS#12 to the two PEM files with openssl (which you can download from &lt;A title="http://slproweb.com/products/Win32OpenSSL.html" href="http://slproweb.com/products/Win32OpenSSL.html" target="_blank" rel="noopener"&gt;Shining Light Productions - Win32 OpenSSL&lt;/A&gt;) by running the following example openssl commands which start with a PKCS#12 file called &lt;STRONG&gt;mycaservercert.pfx&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;openssl pkcs12 -in mycaservercert.pfx -nokeys -out mycaservercert.pem&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;openssl pkcs12 -in mycaservercert.pfx -nodes -nocerts -out mycaservercertkey.pem&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;openssl rsa -in mycaservercert&lt;SPAN style="font-size: 13.3333px;"&gt;key&lt;/SPAN&gt;.pem -check -out mycaservercert&lt;SPAN style="font-size: 13.3333px;"&gt;keyrsa&lt;/SPAN&gt;.pem&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; line-height: 1.5em;"&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;Edit &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px; font-family: arial, helvetica, sans-serif;"&gt;&lt;STRONG&gt;mycaservercert.pem&lt;/STRONG&gt; and remove any unnecessary certificate entries. It should contain the one SSL server certificate followed by any necessary intermediate CA certificates and root CA certificate.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; font-family: arial, helvetica, sans-serif; line-height: 1.5em;"&gt;The pem file may contain text between the certificates such as "Bag Attributes". These lines are not necessary and can be removed. Make sure the .pem file does not contain any single-quote/apostrophe characters. These must be removed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; line-height: 1.5em;"&gt;In the .INI file, add the following lines.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; font-family: 'courier new', courier;"&gt;[SSLCert]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px; font-family: 'courier new', courier;"&gt;pemCerts=&lt;SPAN style="font-size: 13.3333px;"&gt;mycaservercert.pem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;pemPrivKey=&lt;SPAN style="font-size: 13.3333px;"&gt;mycaservercert&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;keyrsa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px; font-family: 'courier new', courier;"&gt;.pem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;When the script is run, these certificates and private key will be automatically deployed to the new UAG appliance. The private key PEM file should be deleted from the Windows machine once UAG has been deployed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;If you find that the deployment of UAG works when you don't specify the PEM files (i.e. for UAG to use a self-signed SSL server certificate) but fails when you supply your own certificate as described above, then follow these steps. It could be caused by a missing intermediate or root certificate in your specified PEM file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Log into the console of UAG as user root and enter the root password you chose when you ran the &lt;SPAN style="font-family: 'courier new', courier;"&gt;uag&lt;/SPAN&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;deploy.ps1&lt;/SPAN&gt; script.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Using an editor such as vi, look at the log file&lt;SPAN style="font-family: courier new,courier;"&gt; /opt/vmware/gateway/logs/admin.log&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;If you see entries saying "&lt;SPAN style="font-family: courier new,courier;"&gt;Unable to build the certification path&lt;/SPAN&gt;" and "&lt;SPAN style="font-family: courier new,courier;"&gt;No issuer certificate for certificate in certification path found&lt;/SPAN&gt;" it means that you having missing intermediate or root certificate entries in the PEM or .p12/.pfx file specified for.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ap-missing intermediate cert.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/66653i4CCDE9C188CA7CD6/image-size/large?v=v2&amp;amp;px=999" role="button" title="ap-missing intermediate cert.png" alt="ap-missing intermediate cert.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;To correct this, you must make sure that any required intermediate certificates and/or root certificate are present in the PEM file and then re-run the uagdeploy.ps1 script.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;&lt;STRONG&gt;Network Setting for each NIC (UAG 3.3 and newer)&lt;/STRONG&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="jiveBorder" style="border: 1px solid #c6c6c6; width: 80%;" border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;Case&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;IPv4&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;IPv6&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;ipMode0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;
&lt;P&gt;&lt;STRONG&gt;ip0&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;netmask0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;v6ip0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;v6Prefix0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH style="text-align: left; background-color: #f2f2f2; color: #505050; padding: 6px;" valign="middle"&gt;&lt;STRONG&gt;PowerShell [General] Settings&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;1&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileyx:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;DHCPV4&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;ipMode0=DHCPV4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;2&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV4+DHCPV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;None required as this is the default.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;3&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV4+AUTOV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=DHCPV4+AUTOV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;4&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV4+STATICV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;fe80::250:56ff:feb1:e800&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;64&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=DHCPV4+STATICV6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip0=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipprefix0=64&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;5&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileyx:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV4&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;192.168.0.128&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;255.255.255.0&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ip0=192.168.0.128&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;netmask0=255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;6&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV4+&lt;/SPAN&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;192.168.0.128&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;255.255.255.0&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=&lt;/SPAN&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV4+&lt;/SPAN&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ip0=192.168.0.128&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;netmask0=255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;7&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV4+AUTOV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;192.168.0.128&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;255.255.255.0&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=STATICV4+AUTOV6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ip0=192.168.0.128&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;netmask0=255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;8&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV4+STATICV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;192.168.0.128&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;255.255.255.0&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;fe80::250:56ff:feb1:e800&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;64&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ip0=192.168.0.128&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;netmask0=255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip0=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipprefix0=64&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;9&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileyx:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;DHCPV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=DHCPV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;10&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileyx:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;AUTOV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;ipMode0=AUTOV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="padding: 6px;"&gt;11&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileyx:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;:smileycheck:&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;STATICV6&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;fe80::250:56ff:feb1:e800&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;64&lt;/TD&gt;
&lt;TD style="padding: 6px;"&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ip0=fe80::250:56ff:feb1:d01a&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif;"&gt;v6ipprefix0=64&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The table above shows the 11 IPv4 and IPv6 combination modes supported in UAG 3.3 and newer for each NIC with examples for the first NIC (eth0). The same settings can be applied to the second (eth1) and third (eth2) NICs as required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NIC0 - eth0 - ipMode0, ip0, netmask0, vcip0, v6Prefix0.&lt;/P&gt;
&lt;P&gt;NIC1 - eth1 - ipMode1, ip1, netmask1, vcip1, v6Prefix1.&lt;/P&gt;
&lt;P&gt;NIC2 - eth2 - ipMode2, ip2, netmask2, vcip2, v6Prefix2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Troubleshooting Deployment Problems&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. I get a security warning about running scripts downloaded from the Internet&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Verify that the PowerShell script is the script you intend to run, and then from the PowerShell console, run the command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;unblock-file .\uagdeploy.ps1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. I get an error saying "ovftool command not found".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Make sure you have installed the OVF Tool software on your Windows machine and that it is installed in the location expected by the script. &lt;A href="https://www.vmware.com/support/developer/ovf/" target="_blank" rel="noopener"&gt;OVF Tool Download&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3. I get an error saying "Invalid Network in property netmask0" or "&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;Cannot initialize property 'netmask0'. Network 'VM Network' has no associated network protocol profile&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;"&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;The message may state netmask0, netmask1 or netmask2, Check that a value has been set in the .INI file for each of the three networks (netInternet, netManagementNetwork and netBackendNetwork),Also check that a&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; vSphere Network Protocol Profile has been associated with every referenced network name. This specifies &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;network settings such as IPv4 subnet mask, gateway etc. so make sure the associated &lt;SPAN style="font-size: 13.3333px;"&gt;Network Protocol Profile&lt;/SPAN&gt; has correct values for each of the settings.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;STRONG&gt;4. I get a warning message about the operating system identifier being not supported (id: 85)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;The full message is: &lt;EM&gt;The specified operating system identifier 'SUSE Linux Enterprise Server 12.0 64bit' (id:85) is not supported on the selected host. It will be mapped to the following OS identifier: 'Other Linux (64-bit)'.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;This can be ignored. It is mapped to a supported operating system automatically.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;STRONG&gt;5. How do I configure UAG for RSA SecurID authentication?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Add the following two lines to the [Horizon] section of your .ini file:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;authMethods=securid-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;matchWindowsUserName=true&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Add a new section at the bottom of your .ini file containing:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;[SecurIDAuth]&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;serverConfigFile=C:\temp\sdconf.rec&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;externalHostName=192.168.0.90&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;internalHostName=192.168.0.90&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;The IP addresses should both be set to the IP address of UAG. The sdconf.rec file is obtained from RSA Authentication Manager (RSA-AM) which should be fully configured according to RSA documentation.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Make sure you are using UAG 2.5 or newer and that the RSA-AM server is accessible on the network from UAG.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;If there is a firewall between UAG and your RSA Authentication Manager server, make sure it isn't blocking the communication. This is normally UDP 5500 from UAG to RSA-AM and the reply traffic.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Rerun uagdeploy PowerShell command to redeploy your UAG configured for RSA SecurID. Refer to &lt;A title="https://vimeo.com/163838064" href="https://vimeo.com/163838064" target="_blank" rel="noopener"&gt;VMware UAG RSA SecurID Authentication Setup Video&lt;/A&gt; for a full step-by-step description of this setup. Also Refer to the &lt;A href="https://community.rsa.com/docs/DOC-57837" target="_blank" rel="noopener"&gt;RSA Ready Certification Document&lt;/A&gt; for VMware UAG.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Note that when RSA SecurID is configured in the .INI file, then after deployment when UAG first starts up, it performs a check against RSA-AM. If RSA-AM is not available, or if DNS cannot resolve the hostname of RSA-AM referenced in the sdconf.rec file, or if a firewall is blocking the UDP port for this communication, this startup will fail. When this initial handshake fails, the RSA SecurID component on UAG remains disabled. You can open up the sdconf.rec file with a text editor and although it is a binary file, you can see the RSA-AM hostname(s). If you suspect a communication failure, you can log in to the console of UAG as root and run nslookup with that hostname to verify that it can be resolved. Once you have resolved any environment issues, just rerun the PowerShell command to redeploy UAG.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;If you need to redeploy UAG with the PowerShell command when it was previously configured for RSA SecurID, then you must first "clear node secret" on RSA-AM so that trust can be re-established.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;STRONG&gt;6. How do I configure UAG for RADIUS authentication?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;Add the following two lines to the [Horizon] section of your .ini file:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;authMethods=radius-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;matchWindowsUserName=true&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;Add a new section at the bottom of your .ini file containing:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;[RADIUSAuth]&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;hostName=192.168.0.100&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;authType=PAP&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;authPort=1812&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;radiusDisplayHint=XXX Token&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;For more information on these and other settings, refer to the sample uag4-radius.ini file in the latest uagdeploy ZIP file below. Also refer to the [RADIUSAuth] descriptions in the table above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Make sure you are using UAG 2.5 or newer and that the RADIUS server is accessible on the network from UAG.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;If there is a firewall between UAG and your RADIUS server, make sure it isn't blocking the communication. This is normally UDP 1812 from UAG to to the RADIUS server and the reply traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Rerun uagdeploy PowerShell command to redeploy your UAG configured for RADIUS.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Note that when RADIUS is configured in the .INI file, then after deployment when UAG first starts up, it performs a check against the configured RADIUS server. If the server is not available or if a firewall is blocking communication, this startup will fail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;STRONG&gt;7. How do I configure UAG for Client Device certificate authentication?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;Add the following line to the [Horizon] section of your .ini file:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;authMethods=certificate-auth &amp;amp;&amp;amp; sp-auth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;Add a new section at the bottom of your .ini file containing:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;[CertificateAuth]&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;pemCerts=C:\Users\Administrator\Documents\SSL\CA Certs\north-ca-256.cer&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;The .cer file is the public certificate authority (CA) certificate that was used to issue required client device certificates.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;A client device certificate must be installed in the user or computer certificate store on the system where the Windows Horizon Client is installed. This proves the identity of the client computer. Unless the client supplies a valid certificate issued by this CA, then UAG will reject the connection with an error as shown below.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NoCertError.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/68407iFCFBA825BC80D90D/image-size/large?v=v2&amp;amp;px=999" role="button" title="NoCertError.png" alt="NoCertError.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Client devices that do supply a valid certificate will get the normal user authentication prompt.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;This feature is typically used to ensure that only Windows domain joined client computers can connect to desktops and applications via UAG. The client device certificates can be managed automatically as part of a Windows client machine enrolment policy.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;For the Cryptographic Service Provider (CSP) specified in the certificate issuing template, use the "Microsoft Enhanced RSA and AES Cryptographic Provider". This supports SHA256 certificates and TLS 1.2. SHA1 is generally now considered too weak for authentication purposes so you should use SHA256.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CSPSelection.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/68408iB71BFD7BC245313F/image-size/large?v=v2&amp;amp;px=999" role="button" title="CSPSelection.png" alt="CSPSelection.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;For Windows to be able to use the certificate for client authentication purposes, the user on the client computer must have read access to the certificate private key. It is not necessary or desirable to make the private key exportable. The Key Usage of the certificate must include "Digital Signature" and "Key Encipherment (a0)".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;8. I get an error saying "Locator does not refer to an object"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;This means that the target= value (used by vSphere OVF Tool) is not correct for your vCenter environment. Refer to the table above for examples of the target format used to refer to a vCenter host or cluster. If you are not sure of the names to use, you can start with the top level object, e.g. by specifying:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;This will then show a list of possible names to use at the next level. You can then expand it, one level at a time based on this list.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;Datacenter1/&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;Datacenter1/host&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;Datacenter1/host/Cluster1/&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;or&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;Datacenter1/host/&lt;/SPAN&gt;esxhost1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;or&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;target=vi://administrator@vsphere.local@&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.33px;"&gt;192.168.0.21/&lt;/SPAN&gt;Datacenter1/host/my folder/&lt;/SPAN&gt;esxhost1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;Note that folder names, host names and cluster names used in the target value are case sensitive.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;STRONG&gt;9. I get an error saying "Transfer failed and Error: failed to send http data"&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OVFToolXFFailed.png"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/69967iAD0690FCA919B8D0/image-size/large?v=v2&amp;amp;px=999" role="button" title="OVFToolXFFailed.png" alt="OVFToolXFFailed.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;This will happen if your target entry references an ESXi hostname that cannot be resolved by your local computer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-size: 13.33px;"&gt;This will also happen if you are using a version of vSphere OVF Tool that is not compatible with the version of vSphere and vCenter you are using. I have seen this error after upgrading vSphere to version 6.5 where I was using an older 4.1.0 version of OVF Tool which is not compatible. In this case, the solution was to upgrade to OVF Tool version 4.2.0 or newer - see &lt;A href="https://www.vmware.com/support/developer/ovf/" target="_blank" rel="noopener"&gt;OVF Tool Software and Documentation&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For any questions on UAG, post a message on the discussion section of the Horizon community forum. &lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Nov 2020 18:23:34 GMT</pubDate>
    <dc:creator>markbenson</dc:creator>
    <dc:date>2020-11-16T18:23:34Z</dc:date>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782996#M167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking for the &lt;SPAN style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 12px;"&gt; ap-deploy-27.zip files to download.&amp;nbsp; The AP 2.7 documentation pointed me here, but I can't find them.&amp;nbsp; Can you help?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Aug 2016 22:14:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782996#M167</guid>
      <dc:creator>whibr</dc:creator>
      <dc:date>2016-08-02T22:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782997#M168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The script didn't change for Access Point 2.7 so you can just use the latest (apdeploy-260). Make sure your source= line in the .ini file refers to the 2.7 .OVA file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2016 06:24:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782997#M168</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-08-04T06:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782998#M169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've been having problems configuring RSA integration despite following your excellent Video &lt;A href="https://vimeo.com/163838064" title="https://vimeo.com/163838064"&gt;VMware Access Point RSA SecurID Authentication Setup on Vimeo&lt;/A&gt;‌ . Put simply, the appliance will not start correctly when we specify the inclusion of the sdconf.rec file (having extracted it directly from the zip file from the Auth Manager). If we configure the INI file with everything else apart from the referenced file, the appliance starts up, but understandably doesn't perform auth. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GSS seem to be scratching their heads too, even stating that SecurID needed to be configured on the connection servers and that I should be using the Fling for the Access Point OVA Deployment Utility which doesn't cater for RSA integration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I even tried sending the JSON requests directly to a non RSA deployed appliance, but this fails too. Seems like a bit of a black art to get the appliance working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2016 11:22:43 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782998#M169</guid>
      <dc:creator>alienjoker</dc:creator>
      <dc:date>2016-09-02T11:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782999#M170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you may know, VMware does not support any Fling for production use. The documented method is to use this PowerShell script, which as you say also supports RSA SecurID setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can either set up RSA SecurID authentication on Horizon Connection Server or on Access Point. I'm sorry if you were wrongly advised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We should be able to resolve your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you specify the RSA sdconf.rec file when doing an Access Point deployment, it does result in Access Point performing a check at startup. This involves communicating with RSA Authentication Manager Server based on the values within sdconf.rec and the IP addresses you specified in the .ini file. If this check fails, then Access Point will not startup correctly. This check must pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you are using the 2.5.x version of Access Point as shown in the video, I think there are 4 possible reasons why it is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. You have the IP addresses incorrectly set in the .ini file. If this is a 1 NIC setup then this will be the IP address of Access Point. You specify this IP address twice in the .ini file.&lt;/P&gt;&lt;P&gt;2. RSA Authentication Manager is not accessible from Access Point (at the UDP/IP layer) at startup time. It uses UDP. I know if RSA Authentication Manager is unavailable or a firewall is blocking that two-way UDP traffic it fails. Monitoring network traffic may help here.&lt;/P&gt;&lt;P&gt;3. RSA Authentication Manager is not set up correctly and is rejecting the check. You can usually find this issue by running the live logging on RSA Authentication Manager and looking for errors. You may need to clear node secret on RSA Authentication Manager.&lt;/P&gt;&lt;P&gt;4. Something is wrong with sdconf.rec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at these 4 things. If it is still failing, "private message" me your .INI file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2016 17:10:49 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2782999#M170</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-02T17:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783000#M171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much for your response. Item #2 was indeed the culprit here and having discussed the submitted FW rules with the security team, they admitted they had failed to apply one of the UDP ports which continually resulted in the deployment failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope others find these pointers as useful as I have in getting the access point into production using 2FA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Sep 2016 13:55:58 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783000#M171</guid>
      <dc:creator>alienjoker</dc:creator>
      <dc:date>2016-09-05T13:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783001#M172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for posting back. I'm glad you've fixed your firewall issue and that Access Point SecurID two-factor authentication is now working for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've just updated this document to emphasise the need for a firewall to not block the RSA SecurID communication between Access Point and RSA Authentication manager.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note also, that if you redeploy Access Point at any time, you should "clear node secret" on RSA AM so that the trust can be re-established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Sep 2016 14:10:35 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783001#M172</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-05T14:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783002#M173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;Can I configure the Access Point for Horizon to use Radius authentication but also accept passthrough/SAML when a user initiates a session a session through the Identity Manager portal? If I configure Radius on the Access Point the user always needs to enter 2-factor authentication, even when the user already authenticated through Identity Manager with 2-factor. vIDM is using another Access Point BTW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2016 08:42:52 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783002#M173</guid>
      <dc:creator>VirtualSven</dc:creator>
      <dc:date>2016-09-06T08:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783003#M174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure Horizon View for RADIUS in which case Access Point can be configured for pass-thru authentication (the default setup). In this case it will pass through RADIUS and SAML requests to Connection Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you say, if you configure Access Point to require RADIUS authentication, then it will do this always, and will not pass-thru SAML.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option is to have one Access Point configured for RADIUS and connecting to a Connection Server configured for password. Then have another Access Point configured for pass-thru connecting to a Connection Server configured for SAML.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Sep 2016 14:14:59 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783003#M174</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-06T14:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783004#M175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that's what I thought.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2016 20:17:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783004#M175</guid>
      <dc:creator>VirtualSven</dc:creator>
      <dc:date>2016-09-07T20:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783005#M176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your script. Just a question. The ver. 2.7+ of AP can have more than an edge service (a.k.a I can configure on the same appliance the web reverse proxy role and the other vs a Connection Server). It's correct? If this is correct, how can use this script to accomplish his goal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francesco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2016 06:46:49 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783005#M176</guid>
      <dc:creator>Matrix__1970</dc:creator>
      <dc:date>2016-09-19T06:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783006#M177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. To use multiple "Edge Services" on Access Point, just specify multiple sections in your .INI file. e.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Horizon]&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[WebReverseProxy]&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you use the script in apdeploy-272-v2.zip or newer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2016 11:02:44 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783006#M177</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-19T11:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783007#M178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using the apdeploy-272-v2, and the username that it uses is Administrator%40vsphere.local instead of a Administrator@vsphere.local, and the deployment obviously fails.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2016 21:38:01 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783007#M178</guid>
      <dc:creator>wallred</dc:creator>
      <dc:date>2016-09-27T21:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783008#M179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Although VMware OVF Tool displays the username as Administrator%40vsphere.local it will actually use the name you specified in the .INI file (i.e. &lt;A href="mailto:Administrator@vsphere.local"&gt;Administrator@vsphere.local&lt;/A&gt;). If you look at the PowerShell screen shot above, you'll see the same thing but it works fine. OVF Tool does this because it uses a valid URI format where it just displays @ as %40. A browser URL bar will do the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the command is not working for you, it is probably for some other reason.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure your target= value is correct. Set it to something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;target=vi://administrator@vsphere.local:PASSWORD@192.168.0.21/Datacenter1/host/esx1.myco.int&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;PASSWORD in upper case will cause OVF Tool to prompt for the real password so don't put the real password in the .INI file. The IP address 192.168.0.21 is the vCenter Server address. If you are not sure of the host or cluster name after the IP address, just put:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;target=vi://administrator@vsphere.local:PASSWORD@192.168.0.21/&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;It will fail but will show you the possible completions which you can then add one at a time to the target line to complete it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;If it is failing for some other reason, send me a private message and include your .ini file. Also be specific about what error you see or what the symptoms are and I should then be able to help to resolve this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Mark&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2016 09:05:44 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783008#M179</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-28T09:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783009#M180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no ap4-radius.ini included in the zip-file. Can you provide an example of configuring radius using powershell and an ini-file?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 11:05:08 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783009#M180</guid>
      <dc:creator>VirtualSven</dc:creator>
      <dc:date>2016-09-29T11:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783010#M181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh sorry, it was missing. I've now added it in &lt;SPAN class="j-attachment-name-chop"&gt;apdeploy-272-v3.zip&lt;/SPAN&gt; and documented all the RADIUS settings in the table above. Thanks for pointing that out!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 13:26:59 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783010#M181</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-29T13:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783011#M182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, just tested it. When deploying it only asks a shared secret for the first RADIUS-host, not for the second, is that correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 13:38:11 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783011#M182</guid>
      <dc:creator>VirtualSven</dc:creator>
      <dc:date>2016-09-29T13:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783012#M183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also checked the configuration, the second RADIUS host isn't in the configuration, Added enabledAux=true to the config file, but that doesn't work as well. So it seems that deploying it with the INI file only works with 1 RADIUS server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 15:06:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783012#M183</guid>
      <dc:creator>VirtualSven</dc:creator>
      <dc:date>2016-09-29T15:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783013#M184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;apdeploy-272-v4.zip adds supports for a secondary RADIUS server. Email me if you have any issues with this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 20:13:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783013#M184</guid>
      <dc:creator>markbenson</dc:creator>
      <dc:date>2016-09-29T20:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783014#M185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the awesome script, really takes away a lot of configuration work. I do have one question however: the configuration settings that I specify within the [Horizon] part and the [WebReverseProxy] part don't seem to get populated in the VM once it has been deployed. I've played around and put those two variables at different places in the .ini-file, but still the deployment won't set these values when the AP is being deployed. Do you have any idea what could be causing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2016 13:12:33 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783014#M185</guid>
      <dc:creator>Skeetneet</dc:creator>
      <dc:date>2016-10-06T13:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using PowerShell to Deploy VMware Unified Access Gateway</title>
      <link>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783015#M186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've shuffled the [Horizon] and [WebReverseProxy] again and retried redeploying several times, but unfortunately still no bananas. I was wondering: are there any other users who are experiencing this same symptom? Mark, if it might be a misconfiguration, what could it be?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Oct 2016 08:09:55 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Horizon-Documents/Using-PowerShell-to-Deploy-VMware-Unified-Access-Gateway/tac-p/2783015#M186</guid>
      <dc:creator>Skeetneet</dc:creator>
      <dc:date>2016-10-10T08:09:55Z</dc:date>
    </item>
  </channel>
</rss>

