PrepAway - Latest Free Exam Questions & Answers

What configuration change does the administrator need to make to restore PCoIP connectivity?

An administrator is attempting to troubleshoot an external user who cannot connect to the View

—Desktop through the PCoIP Secure Gateway. The following is observed.
Connections with RDP succeed
Connections fail with PCoIP to both the Security Server and Connection Server
View Client receives the error: Unable to connect to desktop, a common encryption protocol is
not available.
What configuration change does the administrator need to make to restore PCoIP connectivity?

PrepAway - Latest Free Exam Questions & Answers

A.
Update the View Client settings to use the AES-128 encryption algorithm.

B.
Update the pcoip.adm Group Policy template to enable the AES-128 encryption algorithm.

C.
Update the vdm_agent.adm Group Policy to enable Salsa-256 encryption algorithm.

D.
Update the View Agent to include Salsa-256 in the trusted.cyphers setting.

One Comment on “What configuration change does the administrator need to make to restore PCoIP connectivity?

  1. joe says:

    http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2009122
    Using Security Gateway View 4.6 and later:
    Zero-client ——-> VMware View Security Gateway——->4.6 or later VM default=AES
    Note: Must be AES128 on both ends.
    PCoIP Software client ——-> VMware View Security Gateway——->4.6 or later VM default=AES
    Note: Must be AES128 on both ends.
    Zero-client (VMware View) ——-> VMware View Security Gateway——->Hard-Host Card default=AES128

    http://pubs.vmware.com/view-50/index.jsp#com.vmware.view.administration.doc/GUID-0AD7962F-22DC-4FC1-B31B-D48946BF1D47.html

    Configure PCoIP session encryption algorithms
    Controls the encryption algorithms advertised by the PCoIP endpoint during session negotiation.
    Checking one of the check boxes disables the associated encryption algorithm. You must enable at least one algorithm.
    By default, both the Salsa20-256round12 and AES-128-GCM algorithms are available for negotiation by this endpoint.
    This setting applies to both server and client. The endpoints negotiate the actual session encryption algorithm that is used. If FIPS140-2 approved mode is enabled, the Disable AES-128-GCM encryption value is always overridden so that AES-128-GCM encryption is enabled.
    If this setting is disabled or not configured, both the Salsa20-256round12 and AES-128-GCM algorithms are available for negotiation by this endpoint.




    0



    0

Leave a Reply