VMware NSX AVI Loadbalancer Integration with VMware Horizon
To deploy AVI LoadBalancer, there are two main components involved:
AVI Controller:
The Avi Controller is a centralized brain that spans data centers and clouds. The Avi Controller has full visibility across the environments and automates the deployment and management of the load balancing endpoints, which we call Service Engines.
We need one AVI Controller to manage the Service Engine across the site if all the network configurations are in-place. In Our Lab, Avi Controller is pre-deployed in Site-2 which will manage both the Service Engines
Service Engine:
Service Engine is a Load Balancer Component which runs on each datacenter. Service Engine(SE) is managed by AVI Controller. In the lab we will see how SEs are configured as a Load Balancer to full-fill the request from Applications.
In Our case Applications are UAGs across both Site-1 and Site-2
Section 1 - AVI Integration with UAG Servers in Site1
FQDN | Entity Description |
Real IP |
---|---|---|
uag-hzn-avi01.euc-livefire.com | FQDN of Avi LB VIP Site-1 | 172.16.20.100 |
uag-hzn-01a.euc-livefire.com |
FQDN of UAG server 1 on site 1 |
172.16.20.10 |
uag-hzn-01b.euc-livefire.com |
FQDN of uag server 2 on site 1 |
172.16.20.11 |

- On your ControlCenter Server
-
Open your Chrome Browser for Site-1
- In the Address bar, Enter and browse to avicontroller.euc-livefire.com
- In the Your Connection is not private window
- Select Advanced
- Select Proceed to avicontroller.euc-livefire.com
- In the Your Connection is not private window
- In the Address bar, Enter and browse to avicontroller.euc-livefire.com
-
Open your Chrome Browser for Site-1

- In the VMware NSX ALB (Avi) page
- Under Username, enter admin and VMware1!VMware1! as the password

- In the Default landing page under the Applications tab
- Close the Controller Faults notification

- From the NSX-ALB console,
- Navigate to Templates > Groups.
- Select IP Groups
- In the Groups area
- To the right of the Groups area
- Select CREATE IP GROUP
- To the right of the Groups area
- Navigate to Templates > Groups.

- In the NEW IP Group: window
- In the General area
- Under Name*
- Type UAG Servers-Site-1
- Under Name*
- Under IP Addresses area
- Select ADD
- In the General area

- In the IP Addresses (1) area
- Under IP Address
- In the Enter IP Address area
- Type 172.16.20.10
- In the Enter IP Address area
- Under IP Address

- In the IP Addresses (1) area
- Select ADD

- In the IP Addresses (2) area
- Under IP Address
- In the Enter IP Address area
- Type 172.16.20.11
- In the Enter IP Address area
- Under IP Address

- In the IP Addresses (2) area
- In the bottom right hand corner
- Select Save
- In the bottom right hand corner
The next step will be to create a custom Health Monitor Profile
The next step will be to create a custom Health Monitor Profile

- From the NSX-ALB console,
- Navigate to Templates > Profiles
- Under Profiles
- Select Health Monitors
- Under Profiles
- To the right of the console
- Select CREATE
- Navigate to Templates > Profiles

- On the New Health Monitor page,
- Enter the profile information
- Under Name*
- type Horizon-HTTPS
- Under Type
- From the drop down, select HTTPS
-
Under Send Interval
- Type 30
-
Receive Timeout
- Type 10
- Under Name*
- Enter the profile information

- On the New Health Monitor: Horizon-HTTPS page,
-
Scroll down to the HTTPS Settings section
-
Under Health Monitor Port
- Type 443
-
Under Health Monitor Port
- Under Client Request Header
- Remove GET / HTTP/1.0
- Replace with GET /favicon.ico HTTP/1.0
-
Scroll down to the HTTPS Settings section

- On the New Health Monitor: Horizon-HTTPS page,
-
Scroll down until you locate Response Code*
- Below Response Code*
- From the dropdown select 2XX
- Next to SSL Attributes:
- Select the check box.
- Below SSL Profile*
- From the dropdown
- Select System-Standard.
- From the dropdown
- Below Response Code*
-
Scroll down until you locate Response Code*

- On the New Health Monitor: Horizon-HTTPS page,
-
Scroll down until you locate Maintenance Response Code*
- Under Maintenance Response Code,
- Type 503
- Ensure to leave all the settings as default
- Type 503
- Under Maintenance Response Code,
- In the bottom right of the window
- Click Save at the end
-
Scroll down until you locate Maintenance Response Code*
We will now create L7 Pools for Site-1

- From the NSX-ALB console
- Navigate to Applications > Pools.

- In the Pools area
- To the right of the pane
- Select CREATE POOL
- To the right of the pane

- In the New Pool: Horizon-L7-Pool-Site-1 window,
-
Step 1: Settings
- Enter the required information:
- Under Name*:
- Type Horizon-L7-Pool-Site-1
- Under Default Server Port
- Type 443
- Under Load Balance:
- From the drop down
- Select Consistent Hash
- with Source IP Address as the hash key.
- Select Consistent Hash
- From the drop down
- Under Name*:
- Enter the required information:
-
Step 1: Settings

- In the New Pool: Horizon-L7-Pool-Site-1 window,
-
Step 1: Settings
- In the Health Monitors section
- Make sure the checkbox next to:
- Passive Health Monitor is checked
- Select + Add Active Monitor.
- Above + Add Active Monitor.
- From the dropdown, select is Horizon-HTTPS
- This is the health monitor that you created earlier
- From the dropdown, select is Horizon-HTTPS
- Above + Add Active Monitor.
- Make sure the checkbox next to:
- In the Health Monitors section
-
Step 1: Settings

- In the New Pool: Horizon-L7-Pool-Site-1 window,
-
Step 1: Settings
- To the right of the Health Monitors area
-
Below Append Port:
-
From the dropdown
- Select Never
-
From the dropdown
-
Below Append Port:
- To the right of the Health Monitors area
-
Step 1: Settings

- In the New Pool: Horizon-L7-Pool-Site-1 window,
- Step 1: Settings
- Select the check box, next to
- Enable SSL
- Select the check box, next to
- Step 1: Settings

- In the New Pool: Horizon-L7-Pool window
-
Step 1: Settings
-
Under SSL Profile*
- From the dropdown
- Select System-Standard.
- From the dropdown
- Ensure TLS SNI box is Checked
- Leave all the remaining settings as defaults
- To the bottom right of the page
-
Under SSL Profile*
- Select Next
-
Step 1: Settings

- In the New Pool: Horizon-L7-Pool-Site-1 window
-
Step 2: Servers
- Under Select Servers
- Select IP Group
- Under Select Servers
-
Step 2: Servers

- In the New Pool: Horizon-L7-Pool-Site-1 window
-
Step 2: Servers
-
IP Group area
- Below the IP Group header
- From the dropdown,
- select UAG Servers-Site-1
- You created this earlier
- select UAG Servers-Site-1
- From the dropdown,
- Below the IP Group header
- Leave all the settings as default
-
IP Group area
- Select Next
-
Step 2: Servers

- In the New Pool: Horizon-L7-Pool-Site-1 window
-
Step 3: Advanced
- Leave everything as Default
- Select Next
-
Step 3: Advanced

- In the New Pool: Horizon-L7-Pool-Site-1 window
- Step 4: Review
- Review your settings
- Select Save
Creating the UAG L4 Pool For Site-1

- In the NSX-ALB admin console
- In the Applications > Pools area
- Select CREATE POOL
- In the Applications > Pools area

- In the New Pool: wizard
-
Step 1: Settings area
- Enter the following under:-
- Under Name*
- type: Horizon-L4-Pool-Site-1
- Under Default Service Port
- Type: 443
- Under Load Balance:
- Select Consistent Hash
- with Source IP Address as the hash key.
- Select Consistent Hash
- Under Name*
- Enter the following under:-
-
Step 1: Settings area

- In the New Pool: wizard
-
Step 1: Settings area
- Enable the following under:-
- Ensure Passive Health Monitor is checked
- Enable the following under:-
- In the Health Monitors section,
- Select +Add Active Monitor.
-
Step 1: Settings area

- In the New Pool: wizard
- Step 1: Settings area
- Above + Add Active Monitor
- From the dropdown. select Horizon-HTTPS

- In the New Pool: wizard
- Step 1: Settings area
- To the right of + Add Active Monitor
- Below Append Port:
- From the dropdown
- Select Never
- From the dropdown
- Leave all as default
- Below Append Port:
- Select Next

- In the New Pool: wizard
-
Step 2: Servers area
- Under Select Servers
- Select IP Group
- Under Select Servers
-
Step 2: Servers area

- In the New Pool: wizard
-
Step 2: Servers area
- In the IP Group area
- Under IP Group
- From the dropdown
- Select UAG Servers-Site-1
- From the dropdown
- Under IP Group
- Leave all the rest of the settings default
- In the IP Group area
- Select Next
-
Step 2: Servers area

- In the New Pool: wizard
-
Step 3: Advanced area
- Select Next
-
Step 3: Advanced area

- In the New Pool: wizard
-
Step 4: Review area
- Select Save
-
Step 4: Review area
Installing the SSL certificate Required for L7 VIP

- From the NSX-ALB Admin console
- Navigate to Templates > Security > SSL/TLS Certificates

- In the SSL/TLS Certificates area,
- Select Create
- Select Application Certificate
- Select Create

- In the New Certificate (SSL/TLS): HZN Cert page
- Under Name*
- Type HZN_Cert
- Under Type
- From the dropdown,
- select Import
- From the dropdown,
- Under Name*

- In the New Certificate (SSL/TLS): HZN Cert page
- Under Certificate
- Select IMPORT FILE
- Under Certificate

- In Open File Explorer window
- In the address bar
- Enter the following path
- \\horizon-01a.euc-livefire.com\software\certificates\Certifcate Bundle
- Select euc-livefire_com.crt
- Select Open
- Enter the following path
- In the address bar

- In the New Certificate (SSL/TLS): HZN Cert page
- Under Upload or Paste Key (PEM) or PKCS12 File,
- Select IMPORT FILE
- Under Upload or Paste Key (PEM) or PKCS12 File,

- In Open File Explorer window
- In the address bar
- Enter the following path
- \\horizon-01a.euc-livefire.com\software\certificates\Certificate Bundle
- Select RSAprivate.key
- Select Open

- In the New Certificate (SSL/TLS): HZN Cert page
- At the bottom right - hand side of the page
- Select VALIDATE
- Select SAVE

- In SSL/TLS Certificates page
- Select CREATE
- Select Root / intermediate CA Certificate
- Select CREATE

- In the New Certificate (SSL/TLS): window
- Select IMPORT FILE

- In Open File Explorer window
- In the address bar
- Enter the following path
- \\horizon-01a.euc-livefire.com\software\certificates\Certifcate Bundle
- Select euc-livefire_com.ca-bundle
- Select Open

- In the New Certificate (SSL/TLS): window
- Under General
- Below Name*
- Type EUC-Livefire bundle
- Below Name*
- Under General

- In the New Certificate (SSL/TLS): window
- Select VALIDATE
- Select SAVE
Validating that Connection Multiplexing is disabled

- In the NSX-ALB console
- Navigate to Templates > Profiles> Application
- In the Application area
- Select System-Secure-HTTP-VDI.
- To the right of System-Secure-HTTP-VDI
- Select the edit icon.
- In the Application area
- Navigate to Templates > Profiles> Application

- In Edit Application Profile: System-Secure-HTTP-VDI window
- Ensure the checkbox next to Connection Multiplexing is NOT selected
-
Select Cancel
- to close the Edit Application Profile: System-Secure-HTTP-VDI window
Creating the L7 Virtual Service for Site-1

- In the NSX-ALB Console
- Navigate to Applications > Virtual Services

- In the Virtual Services area
- To the top right, select CREATE VIRTUAL SERVICE
- Select Advanced Setup.
- To the top right, select CREATE VIRTUAL SERVICE

- In the New Virtual Service wizard
-
Step 1: Settings area
- Enter the following under:
-
Name*
- type Horizon-UAG-L7-Site-1
-
VS VIP *
- Select the dropdown,
- Notice a Create VS VIP Green box appears
- Select the dropdown,
-
Name*
- Enter the following under:
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
- In the VIP Address area
- Select Create VS VIP
- In the VIP Address area
-
Step 1: Settings area

- In the Create VS VIP: page
- In the General tab,
- Under Name
- type: VIP-Horizon-UAG-Site1
- Select ADD
- Under Name
- In the General tab,

- In the Edit VIP: 1 page
- Under IPv4 Address*
- type 172.16.20.100
- Select SAVE
- Under IPv4 Address*

- In the Create VS VIP: VIP-Horizon-UAG-Site1 window
- Select SAVE

- In the New Virtual Service wizard
-
Step 1: Settings area
-
Scroll down to the Service Port area
- Under Services
- Enable the checkbox next to SSL
- Under Services
-
Scroll down to the Service Port area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
- In the Profiles sub-area
- Below Application Profile*:
- From the dropdown
- Select System-Secure-HTTP-VDI
- From the dropdown
- Below Error Page Profile:
-
From the dropdown
- Select Custom-Error-Page-Profile
-
From the dropdown
- Below Application Profile*:
- In the Profiles sub-area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
- In the *Pool* sub-area
- Under Pool
- Select the dropdown
- Select: Horizon-L7-Pool-Site-1
- Select the dropdown
- Under Pool
- In the *SSL Settings* sub-area
- Under SSL Profile*
- Select the dropdown
- Select: System-Standard
- Select the dropdown
- Under SSL Certificate:
- Select the dropdown
- Select HZN_Cert
- Remove the System-Default-Cert
- Select HZN_Cert
- Leave all other settings as default
- Select the dropdown
- Under SSL Profile*
- In the *Pool* sub-area
- In the bottom right corner
- Select Next
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 2: Policies area
- (Leave everything as default)
- Select Next
-
Step 2: Policies area

- In the New Virtual Service wizard
-
Step 3: Analytics area
- (Leave everything as default)
- Select Next
-
Step 4: Advanced tab,
- (Leave everything as default)
- Select Save
-
Step 3: Analytics area

- In the New Virtual Service wizard
-
Step 4: Advanced area
- (Leave everything as default)
- Select Save
-
Step 4: Advanced area
Creating L4 Virtual Service for Site-1

- From the NSX-ALB admin console
- Navigate to Applications > Virtual Services

- In the Virtual Services window
- In the top right corner,
- Select CREATE VIRTUAL SERVICE
- Select Advanced Setup.
- In the top right corner,

- In the New Virtual Service wizard
-
Step 1: Settings area
- Configure the following under:
-
Name*
- Type Horizon-UAG-L4-Site-1
-
VS VIP *
- Select the dropdown,
- Select VIP-Horizon-UAG-Site1
- Select the dropdown,
-
Name*
- Configure the following under:
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
-
*Profiles* sub area
- Under Application Profile*
- from the dropdown
- Select: System-L4-Application
- Under Error Page Profile
- from the dropdown
- Select: Custom-Error-Page-Profile
- from the dropdown
- from the dropdown
- Under Application Profile*
-
*Profiles* sub area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
-
*Service Port* sub area
- Select Switch to Advanced.
-
*Service Port* sub area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
-
*Service Port* sub area
- Under Services
- Replace port 80 with port 443
- Port Min and Port Max areas to 443
- Replace port 80 with port 443
- Select the Checkbox next to Override TCP/UDP
- Under Services
-
*Service Port* sub area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
- Below the checkbox enabled Override TCP/UDP
- Select the dropdown
- Select System-UDP-Fast-Path-VDI
- Select + Add Port
- Select the dropdown
- Below the checkbox enabled Override TCP/UDP
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings: continued
- Type 8443 in Port Min and 8443 to Port Max
- Note: You will notice Port Max will change automatically to 8443.
- Type 8443 in Port Min and 8443 to Port Max
- Uncheck Override TCP/UDP box if selected
- Select + Add Port again.
- Type 8443 in Port Min and 8443 to Port Max
- Check the box Override TCP/UDP
- Under Select Dropdown
- Select System-UDP-Fast-Path-VDI
- Note: Ensure all the Service Port details matches as per the screenshot above.
- Select System-UDP-Fast-Path-VDI
- Select + Add Port again
-
Step 1: Settings: continued

- In the New Virtual Service wizard
-
Step 1: Settings: continued
- Type 4172 in Port Min and 4172 to Port Max
- Uncheck Override TCP/UDP box if selected.
- Type 4172 in Port Min and 4172 to Port Max
- Select + Add Port again
- Type 4172 in Port Min and 4172 to Port Max
-
Check the box Override TCP/UDP
- Under Select Dropdown
- Select System-UDP-Fast-Path-VDI
-
Check the box Override TCP/UDP
- Type 4172 in Port Min and 4172 to Port Max
- Note: Ensure all the Service Port details matches as per the screenshot above.
-
Step 1: Settings: continued

- In the New Virtual Service wizard
-
Step 1: Settings area
- To the right of *Service Port*
- You will see the *Pool* area
- Under Pool
- From the dropdown
- Select Horizon-L4-Pool-Site-1
- From the dropdown
- Under Pool
- You will see the *Pool* area
- Select Next
- To the right of *Service Port*
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 2: Policies area
- Leave everything as default
- Select Next
-
Step 2: Policies area

- In the New Virtual Service wizard
-
Step 3: Analytics area
- Leave everything as default
- Select Next
-
Step 3: Analytics area

- In the New Virtual Service wizard
-
Step 4: Advanced area
- Leave everything as default
- Select Save
-
Step 4: Advanced area

- In the NSX-ALB admin console
- Select Applications
- Select Virtual Services
- In the right pane your configurations should look like the image above.
- Select Applications
Configuring the Unified Access Gateway for Site1 AVI Integration
Section 1. Configuring UAG-HZN-01a for AVI Integration

- On your ControlCenter Server
- Open your Chrome Browser for Site-1
- In the Address bar, browse to https://uag-hzn-01a.euc-livefire.com:9443/admin/index.html
- Login username: admin
- Login password: VMware1!

- In the UAG Admin Console
- Under Configure Manually
- Click Select
- Under Configure Manually

- In the UAG Admin Console area
- Under Advanced Settings
-
Scroll down until you find:
- JWT Settings
-
Scroll down until you find:
- Under Advanced Settings

- In the UAG Admin Console
- Next to :
-
JWT Settings
- select the gearbox
-
JWT Settings
- In the JWT Settings window
- select Add JWT Consumer
- Next to :

- In the JWT Consumer Settings Page
- Name: HZNBangalore
-
Issuer: Cluster-HORIZON-01A
-
Note:
- It is the cluster name displayed in the Horizon Admin Console
- This a case-sensitive configuration
-
Note:
- Dynamic Public key URL: https://horizon-01a.euc-livefire.com/broker/publicKey/protocolredirection
-
Trusted Certificates:
-
click the (+) icon
- click Select
- browse to Desktop > Software > certificates > Certificate Bundle
- select euc-livefire_com.crt
-
click the (+) icon
- Public key refresh interval: 900
- Click Save
- Click Close

- In the UAG Admin Console
-
Scroll back-up to General Settings
- Next to Edge Service Settings,
- Move the TOGGLE to the right
- Next to Horizon Settings
- Select the GEAR icon
- Next to Edge Service Settings,
-
Scroll back-up to General Settings

-
In the Horizon Settings
-
Next to Enable Tunnel
- Move the Toggle Switch from enabled to disabled
-
Next to Enable Tunnel

- In the Horizon Settings
- Click on More
- Scroll Down to JWT Consumer

- In the Horizon Settings
- Next to JWT Consumer
- from the dropdown.
- select HZNBangalore

- Next to Host Port Redirect Mappings,
-
In the Source Host Port area
- enter uag-hzn-avi01.euc-livefire.com
- In the Redirect Host Port area
- enter uag-hzn-01a.euc-livefire.com
-
Once the Host Redirect Mappings are filled,
-
click on + symbol to add the entries.
- Note: It should match the screenshot above
-
click on + symbol to add the entries.
- To Close the Horizon settings page
- Select Save
-
In the Source Host Port area
Section 2: Configuring UAG-HZN-01B in Site1 for AVI Integration

- On your ControlCenter Server
- Open your Chrome Browser for Site-1
- In the Address bar, browse to https://uag-hzn-01b.euc-livefire.com:9443/admin/index.html
- Login username: admin
- Login password: VMware1!

- In the UAG Admin Console
- Under Configure Manually
- Click Select
- Under Configure Manually

- In the UAG Admin Console area
- Under Advanced Settings
-
Scroll down until you find:
- JWT Settings
-
Scroll down until you find:
- Under Advanced Settings

- In the UAG Admin Console
- Next to :
-
JWT Settings
- select the gearbox
-
JWT Settings
- In the JWT Settings window
- select Add JWT Consumer
- Next to :

- In the JWT Consumer Settings Page
- Name: HZNBangalore
-
Issuer: Cluster-HORIZON-01A
-
Note:
- It is the cluster name displayed in the Horizon Admin Console
- This a case-sensitive configuration
-
Note:
- Dynamic Public key URL: https://horizon-01a.euc-livefire.com/broker/publicKey/protocolredirection
-
Trusted Certificates:
-
click the (+) icon
- click Select
- browse to Desktop > Software > certificates > Certificate Bundle
- select euc-livefire_com.crt
-
click the (+) icon
- Public key refresh interval: 900
- Click Save
- Click Close

- In the UAG Admin Console
-
Scroll back-up to General Settings
- Next to Edge Service Settings,
- Move the TOGGLE to the right
- Next to Horizon Settings
- Select the GEAR icon
- Next to Edge Service Settings,
-
Scroll back-up to General Settings

-
In the Horizon Settings
-
Next to Enable Tunnel
- Move the Toggle Switch from enabled to disabled
-
Next to Enable Tunnel

- In the Horizon Settings
- Click on More
- Scroll Down to JWT Consumer

- In the Horizon Settings
- Next to JWT Consumer
- from the dropdown.
- select HZNBangalore

- Next to Host Redirect Mappings,
-
In the Source Host Port area
- enter uag-hzn-avi01.euc-livefire.com
- In the Redirect Host Port area
- enter uag-hzn-01b.euc-livefire.com
-
Once the Host Redirect Mappings are filled,
-
click on (+) symbol to add the entries.
- Note: It should match the screenshot above
-
click on (+) symbol to add the entries.
- To Close the Horizon settings page
- Select Save
-
In the Source Host Port area
Configuring Universal Console to map the external FQDN of HznBangalore to AVI-Site1

- Configure Gateway Settings in Horizon Cloud Console
- On ControlCenter Server
- Open the Chrome Browser for Site-1 or Site-2
- To login to Horizon Universal Console
- In the Username area
- (Enter your assigned username)
- In the Password area,
- type VMware1!
- In the Username area
- Select LOGIN
- On ControlCenter Server

- In the Horizon Universal Console Page
- Navigate to Settings > Capacity
- Next to HZNXXBangalore
- where XX is your assigned POD ID
- Select Edit
- Next to HZNXXBangalore
-
On the Edit Pod page,
-
Pod Setup area
- Select NEXT
-
Pod Setup area
- Navigate to Settings > Capacity

-
On the Edit Pod page,
-
In Gateway Settings area
- Enter the following, next to :-
- Pod External FQDN: uag-hzn-avi01.euc-livefire.com
- Pod Internal FQDN: horizon-01a.euc-livefire.com
- Click NEXT
- Enter the following, next to :-
-
In Gateway Settings area

- In Summary Page,
- Review your information
- Click VALIDATE & SAVE
- Review your information

- In the Edit Pod
-
Summary page
- When you see an error:-
- "Could not validate FQDN. Make sure the FQDN is valid and try again"
- Select SAVE again.
-
Summary page
Testing the Connectivity For Site-1

- In the ControlCenter Desktop
- Navigate to > Remote Desktops > Site1
- Launch the RDP session to w10Client-01a.RDP
-
Enter the following credentials:-
- Username: [email protected]
- Password: VMware1!
- Select OK
-
Enter the following credentials:-

- In the VMware Horizon Client
- Select your assigned Broker ID
-
BrokerXX (Your initials).euc-livefire.com
- where XX is your assigned POD ID
- Your initials. (If my name is Tom Harry, then my initials will be th)
-
BrokerXX (Your initials).euc-livefire.com
- Select your assigned Broker ID

- In the VMware Horizon Client login
- In the Username area
- enter mark
- In the login area
- enter VMware1!
- Select Login
- In the Username area

- To Confirm the Desktop is launched from Site-1
- Within the VDI Session
-
Select Start > run
- enter cmd.exe
-
Select Start > run
- In the Command Prompt Window
- Type hostname
- Notice the desktop is launched from BLR , abbreviation for Bangalore which is Site-1
- In the Horizon client
- From the 3 dot dropdown
- Select Logoff Desktop
-
In the Disconnect and log off desktop? window
- Select OK
- From the 3 dot dropdown
- Within the VDI Session
Configure AVI Service Engine for Site-2
FQDN | Entity Description | Real IP |
---|---|---|
uag-hzn-avi02.euc-livefire.com | FQDN of AVI LB VIP Site-2 | 172.16.50.100 |
uag-hzn-02a.euc-livefire.com |
FQDN of UAG Server 1 on Site-2 | 172.16.50.10 |
uag-hzn-02b.euc-livefire.com |
FQDN of UAG Server 2 on Site-2 |
172.16.50.11 |

- On your ControlCenter Server
- Open your Chrome Browser for Site-2
- In the Address bar,
- Enter and browse to avicontroller.euc-livefire.com
- In the Your Connection is not private window
- Select Advanced
- Select Proceed to avicontroller.euc-livefire.com
- Under Username area,
- enter admin
- In the Password area
- enter VMware1!VMware1!
- In the Address bar,
- Open your Chrome Browser for Site-2

- In the Default landing page
- Close the Controller Faults notification

- From the NSX-ALB console,
- Navigate to Templates > Groups.
- Select IP GROUPS
- Select Create IP Group
- Select IP GROUPS
- Navigate to Templates > Groups.

- In the NEW IP Group:window
- Under Name: UAG-Server-Site-2
- Under Type drop down menu,
- select IP Address
- Under IP Address.
- Click on Add
- Type 172.16.50.10
- Click Add
- Type 172.16.50.11
- Click on Add
- In the bottom right hand corner
- Click Save
We will now create L7 Pools for Site-2
- In the NSX-ALB UI,
- Navigate to Applications > Pools.
- Click On CREATE POOL on the right hand side
- In the New Pool window, enter the required information to the following:
-
In Step 1: Settings Tab:
- Name: Horizon-L7-Pool-Site-2
- Default Service Port: 443
-
Load Balance: Select Consistent Hash
- with Source IP Address as the hash key.
- Next to Passive Health Monitor
- Ensure the checkbox is checked
- In the Health Monitors section,
- click + Add Active Monitor.
- Above + Add Active Monitor
- From the dropdown
- select Horizon-HTTPS
- From the dropdown
- Append Port: Never
- Enable SSL: Select the check box
- SSL Profile: Select System-Standard.
- Ensure TLS SNI box is Checked
- Click Next
-
In Step 1: Settings Tab:
- In the New Pool window, enter the required information to the following:
- Click On CREATE POOL on the right hand side
- Navigate to Applications > Pools.

- In Step 2: Servers Tab
-
Select Servers, area
- Click on IP Group
-
From IP Group Drop Down,
-
Select UAG-Server-Site-2
- Leave all the settings as default
-
Select UAG-Server-Site-2
- Click Next
-
Select Servers, area

- In Step 3: Advanced Tab
- Leave all the settings as default
- Click Next

- In Step 4: Review Tab
- Click Save
Configuring L4 Pool for Site 2
- In the NSX-ALB UI,
- Navigate to Applications > Pools.
- Click On CREATE POOL on the right hand side
- In the New Pool window, enter the required information to the following:
-
In Step 1: Settings Tab:
- Name: Horizon-L4-Pool-Site2
- Default Service Port: 443
-
Load Balance: Select Consistent Hash
- with Source IP Address as the hash key.
- In the Health Monitors section,
- Make sure Passive Health Monitor
- is Checked
- Click + Add Active Monitor.
-
Above + Add Active Monitor.
- From the dropdown
- Select Horizon-HTTPS
- From the dropdown
-
Above + Add Active Monitor.
- Make sure Passive Health Monitor
- Append Port: Never
-
In Step 1: Settings Tab:
- In the New Pool window, enter the required information to the following:
- Click On CREATE POOL on the right hand side
- click Next
- Navigate to Applications > Pools.

- In Step 2: Servers Tab
- Below Select Servers,
- Click on IP Group
- From the IP Group Drop Down,
- Select UAG-Server-Site-2
- Click Next
- Below Select Servers,

- In Step 3: Advanced Tab
- Leave all the settings as default
- Click Next

- In Step 4: Review Tab
- Click Save
Creating the L7 Virtual Service for Site-2

- In the NSX-ALB Console
- Navigate to Applications > Virtual Services

- In the Virtual Services
- Click CREATE VIRTUAL SERVICE on the top right hand corner
- Select Advanced Setup.
- Click CREATE VIRTUAL SERVICE on the top right hand corner

- In New Virtual Service Window:
- Under Step 1: Settings tab:
- Name: Horizon-UAG-L7-Site2
- Under Step 1: Settings tab:

- New Virtual Service: Horizon-UAG-L7-Site2
- Under VS VIP*
- Select the dropdown,
- Select Create VS VIP
- Select the dropdown,
- Under VS VIP*

- In the Create VS VIP: VIP-Horizon-UAG-Site2 window
- In the General tab,
- Under Name
- enter: VIP-Horizon-UAG-Site2
- Under Name
- In the General tab,

- In the Create VS VIP: VIP-Horizon-UAG-Site2 window
- Under VIP,
- Click on ADD
- under IPv4 Address:
- enter 172.16.50.100
- Ensure the Enable VIP tick-box is checked
- under IPv4 Address:
- Click Save
- Click on ADD
-
To close the Create VS VIP: VIP-Horizon-UAG-Site2
- Select Save
- Under VIP,
- In the New Virtual Service: Page
-
Step 1: Settings
- Enable SSL for Services
- Application Profile: Select System-Secure-HTTP-VDI
- Error Page Profile: Custom-Error-Page-Profile
- Pool: Horizon-L7-Pool-Site-2
- SSL Profile: System-Standard
- SSL Certificate: Hzn_Cert
- Click Next
-
Step 2: Policies tab,
- Leave everything as default
- click Next
- Leave everything as default
- Step 3: Analytics tab,
- Leave everything as default
- click Next
- Leave everything as default
- Step 4: Advanced tab,
- Leave everything as default
- click Save
- Leave everything as default
-
Step 1: Settings
Creating Layer 4 Virtual Service For Site-2
- On ControlCenter, Ensure you are logged in to AVI Controller using Chrome Site-2 profile
- In the NSX-ALB Console
- Navigate to Applications > Virtual Services
- Click on CREATE VIRTUAL SERVICE on the top right hand corner
- Select Advanced Setup
- In the New Virtual Service Window
-
Under Step 1: Settings
- Name: Horizon-UAG-L4-Site-2
- Under the VS VIP dropdown,
- select VIP-Horizon-UAG-Site2
- Under Application Profile:
- select System-L4-Application
-
Under Error Page Profile:
- select Custom-Error-Page-Profile
-
Under Step 1: Settings

- In the New Virtual Service Window
- Under Step 1: Settings
- Under Service Port
- click on Switch to Advanced.
- Under Service Port
- Under Step 1: Settings

- In the New Virtual Service wizard
-
Step 1: Settings area
-
*Service Port*sub area
- Under Services
- Replace port 80 with port 443
- Port Min and Port Max areas
- Select the Checkbox next to Override TCP/UDP
- Replace port 80 with port 443
- Under Services
-
*Service Port*sub area
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings area
- Under Override TCP/UDP
-
Select the dropdown
- Select System-UDP-Fast-Path-VDI
-
Select the dropdown
- Select + Add Port
- Under Override TCP/UDP
-
Step 1: Settings area

- In the New Virtual Service wizard
-
Step 1: Settings: continued
- Type 8443 in Port Min and 8443 to Port Max
- Note: You will notice Port Max will change automatically to 8443.
- Uncheck Override TCP/UDP box if selected
- Select + Add Port again
- Type 8443 in Port Min and 8443 to Port Max
- Check the box Override TCP/UDP
- Under Select Dropdown
- Select System-UDP-Fast-Path-VDI
- Note: Ensure all the Service Port details matches as per the screenshot above.
- Select System-UDP-Fast-Path-VDI
- Type 8443 in Port Min and 8443 to Port Max
- Select + Add Port again
-
Step 1: Settings: continued

- In the New Virtual Service wizard
-
Step 1: Settings: continued
- Type 4172 in Port Min and 4172 to Port Max
- Uncheck Override TCP/UDP box if selected.
- Select + Add Port again
- Type 4172 in Port Min and 4172 to Port Max
- Check the box Override TCP/UDP
- Under Select Dropdown
- Select System-UDP-Fast-Path-VDI
- Note: Ensure all the Service Port details matches as per the screenshot above.
- Type 4172 in Port Min and 4172 to Port Max
-
Step 1: Settings: continued

- In the New Virtual Service wizard
-
Step 1: Settings:
- Under the Pool Section:
- Select the option Pool.
- Choose the Horizon-L4-Pool-Site2
- Click Next
- Under the Pool Section:
- Under Step 2: Policies tab,
- Leave everything as default
- click Next
- Leave everything as default
- Under Step 3: Analytics tab,
- (Leave everything as default)
- click Next
- (Leave everything as default)
- Under Step 4: Advanced tab,
- (Leave everything as default)
- click Save
- (Leave everything as default)
-
Step 1: Settings:
- Once Configured, it should be shown as the image above.
Configuring UAG-HZN-02A in Site2 for AVI Integration
Section 1. Configuring UAG-HZN-02a for AVI Integration

- On your ControlCenter Server
- Open your Chrome Browser for Site-2
- In the Address bar, browse to https://uag-hzn-02a.euc-livefire.com:9443/admin/index.html
- Login username: admin
- Login password: VMware1!

- In the UAG Admin Console
- Under Configure Manually
- Click Select
- Under Configure Manually

- In the UAG Admin Console
- General Settings area
- Next to Edge Service Settings
- Move the TOGGLE to the right
- Next to Edge Service Settings
- General Settings area

- In the UAG Admin Console
- In the Advanced Settings area
- Find JWT Settings
- In the Advanced Settings area

- In the UAG Admin Console
- Under Advanced Settings
-
JWT Settings
- click the gearbox forJWT Settings.
-
JWT Settings
- In the JWT window
- select Add JWT Consumer.
- Under Advanced Settings

- In the JWT Consumer Settings Page
- Name: HZNSeattle
-
Issuer: Cluster-HORIZON-02A
-
Note:
- It is the cluster name displayed in the Horizon Admin Console
- This configuration is case-sensitive
-
Note:
- Dynamic Public key URL: https://horizon-02a.euc-livefire.com/broker/publicKey/protocolredirection
-
Trusted Certificates:
-
click the (+) icon
- click Select
- browse to Desktop > Software > certificates > Certificate Bundle
- select euc-livefire_com.crt
-
click the (+) icon
- Public key refresh interval: 900
- Click Save
- Click Close

- In the UAG Admin Console
-
Scroll back up to General Settings
- Under Edge Service Settings,
- Next to Horizon Settings
- Select the GEAR icon
- Next to Horizon Settings
- Under Edge Service Settings,
-
Scroll back up to General Settings

-
In the Horizon Settings
-
Next to Enable Tunnel
- Move the Toggle Switch from enabled to disabled
-
Next to Enable Tunnel

- In the Horizon Settings
- Click on More
- Scroll Down to JWT Consumer

- In the Horizon Settings
- Next to JWT Consumer
- from the dropdown.
- select HZNSeattle

- Next to Host Port Redirect Mappings,
-
In the Source Host Port area
- enter uag-hzn-avi02.euc-livefire.com
- In the Redirect Host Port area
- enter uag-hzn-02a.euc-livefire.com
-
Once the Host Redirect Mappings are filled,
-
click on + symbol to add the entries.
- Note: It should match the screenshot above
-
click on + symbol to add the entries.
- To Close the Horizon settings page
- Select Save
-
In the Source Host Port area
Section 2. Configuring UAG-HZN-02b for AVI Integration

- On your ControlCenter Server
- Open your Chrome Browser for Site-1
- In the Address bar, browse to https://uag-hzn-02b.euc-livefire.com:9443/admin/index.html
- Login username: admin
- Login password: VMware1!

- In the UAG Admin Console
- Under Configure Manually
- Click Select
- Under Configure Manually

- In the UAG Admin Console
- General Settings area
- Next to Edge Service Settings
- Move the TOGGLE to the right
- Next to Edge Service Settings
- General Settings area

- In the UAG Admin Console
- In the Advanced Settings area
- Find JWT Settings
- In the Advanced Settings area

- In the UAG Admin Console
- Under Advanced Settings
-
JWT Settings
- click the gearbox forJWT Settings.
-
JWT Settings
- In the JWT Settings window
- select Add JWT Consumer
- Under Advanced Settings

- In the JWT Consumer Settings Page
- Name: HZNSeattle
-
Issuer: Cluster-HORIZON-02A
-
Note:
- It is the cluster name displayed in the Horizon Admin Console
- This configuration is case-sensitive
-
Note:
- Dynamic Public key URL: https://horizon-02a.euc-livefire.com/broker/publicKey/protocolredirection
-
Trusted Certificates:
-
click the (+) icon
- click Select
- browse to Desktop > Software > certificates > Certificate Bundle
- select euc-livefire_com.crt
-
click the (+) icon
- Public key refresh interval: 900
- Click Save
- Click Close

- In the UAG Admin Console
-
Scroll back up to General Settings
- Under Edge Service Settings,
- Next to Horizon Settings
- Select the GEAR icon
- Next to Horizon Settings
- Under Edge Service Settings,
-
Scroll back up to General Settings

-
In the Horizon Settings
-
Next to Enable Tunnel
- Move the Toggle Switch from enabled to disabled
-
Next to Enable Tunnel

- In the Horizon Settings
- Click on More
- Scroll Down to JWT Consumer

- In the Horizon Settings
- Next to JWT Consumer
- from the dropdown.
- select HZNSeattle

- Next to Host Port Redirect Mappings,
-
In the Source Host Port area
- enter uag-hzn-avi02.euc-livefire.com
- In the Redirect Host Port area
- enter uag-hzn-02b.euc-livefire.com
-
Once the Host Redirect Mappings are filled,
-
click on + symbol to add the entries.
- Note: It should match the screenshot above
-
click on + symbol to add the entries.
- To Close the Horizon settings page
- Select Save
-
In the Source Host Port area
Configuring Universal Console to map the external FQDN of HznSeattle to AVI-Site2
- Configure Gateway Settings in Horizon Cloud Console
- On ControlCenter Server
- Open Chrome Browser Site-2
- Login to Horizon Universal Console https://cloud.horizon.vmware.com/
- In the Username area(Enter your assigned username)
- In the Password area, type VMware1!
- Select LOGIN

- In the Horizon Universal Console Page
- Navigate to Settings > Capacity
- Select HZNXXSeattle
- where XX is your assigned POD ID
- Select EDIT
- Select HZNXXSeattle
- In the Edit Pod wizard
-
Pod Setup page,
- Select NEXT
-
Pod Setup page,
- Navigate to Settings > Capacity

- In the Edit Pod wizard
-
Gateway Settings
- enter the following next to:
- Pod External FQDN, type uag-hzn-avi02.euc-livefire.com
- Pod Internal FQDN, type horizon-02a.euc-livefire.com
- Select NEXT
- enter the following next to:
-
Gateway Settings

- In the Edit Pod wizard
-
Summary
- Select VALIDATE & SAVE
-
Summary

- On the Edit Pod page
- Summary area
- When you see the message
- "Could not validate FQDN. Make sure the FQDN is valid and try again"
- Select SAVE
Testing the Connectivity For Site-2
We will now validate the function of our configurations.

-
In the ControlCenter
- Navigate to
- Remote Desktops > Site2
-
Launch the RDP session to w10EXT-02a.RDP
- Username: [email protected]
- Password: VMware1!
- Navigate to

- On the w10EXT-02a desktop
- Launch Horizon Client
- In Horizon Client, Click on + Add Server

- In the Name of the Connection Server window
- Enter YOUR assigned broker FQDN
- BrokerXX (Your initials).euc-livefire.com
- where XX is your assigned POD ID
- Your initials. (If my name is Tom Harry, then my initials will be th)
- Select Connect

- In the Login window
- In the Username, area
- Type Tom
- In the Password, area
- Type VMware1!
- Select Login
- In the Username, area

- In the VMware Horizon Client
- Select your CorpxxHZN desktop assignment
- Where xx is your assigned number

- To Confirm the Desktop is launched from Site-2
-
Open Command Prompt
-
within the VDI Session
-
Start > run
- type cmd.exe
-
Start > run
-
within the VDI Session
-
In the Command Prompt Window
- Type hostname
- Notice the desktop is abbreviate SEA which is from Seattle, Site-2
-
Open Command Prompt
0 Comments
Add your comment