An administrator is attempting to troubleshoot an external user who cannot connect to the View
—Desktop through the PCoIP Secure Gateway. The following is observed.
Connections with RDP succeed
Connections fail with PCoIP to both the Security Server and Connection Server
View Client receives the error: Unable to connect to desktop, a common encryption protocol is
not available.
What configuration change does the administrator need to make to restore PCoIP connectivity?
A.
Update the View Client settings to use the AES-128 encryption algorithm.
B.
Update the pcoip.adm Group Policy template to enable the AES-128 encryption algorithm.
C.
Update the vdm_agent.adm Group Policy to enable Salsa-256 encryption algorithm.
D.
Update the View Agent to include Salsa-256 in the trusted.cyphers setting.
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2009122
Using Security Gateway View 4.6 and later:
Zero-client ——-> VMware View Security Gateway——->4.6 or later VM default=AES
Note: Must be AES128 on both ends.
PCoIP Software client ——-> VMware View Security Gateway——->4.6 or later VM default=AES
Note: Must be AES128 on both ends.
Zero-client (VMware View) ——-> VMware View Security Gateway——->Hard-Host Card default=AES128
http://pubs.vmware.com/view-50/index.jsp#com.vmware.view.administration.doc/GUID-0AD7962F-22DC-4FC1-B31B-D48946BF1D47.html
Configure PCoIP session encryption algorithms
Controls the encryption algorithms advertised by the PCoIP endpoint during session negotiation.
Checking one of the check boxes disables the associated encryption algorithm. You must enable at least one algorithm.
By default, both the Salsa20-256round12 and AES-128-GCM algorithms are available for negotiation by this endpoint.
This setting applies to both server and client. The endpoints negotiate the actual session encryption algorithm that is used. If FIPS140-2 approved mode is enabled, the Disable AES-128-GCM encryption value is always overridden so that AES-128-GCM encryption is enabled.
If this setting is disabled or not configured, both the Salsa20-256round12 and AES-128-GCM algorithms are available for negotiation by this endpoint.