View uses TCP and UDP ports for network access between its components.

During installation, View can optionally configure Windows firewall rules to open the ports that are used by default. If you change the default ports after installation, you must manually reconfigure Windows firewall rules to allow access on the updated ports. See "Replacing Default Ports for View Services" in the View Installation document.

TCP and UDP Ports Used by View
SourcePortTargetPortProtocolDescription
Security server55000View Agent4172UDPPCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Security server4172Horizon ClientVariesUDPPCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Note:Because the target port varies, see Notes and Caveats for TCP and UDP Ports Used by View.
Security server500View Connection Server500UDPIPsec negotiation traffic.
Security server*View Connection Server4001TCPJMS traffic.
Security server*View Connection Server4002TCPJMS SSL traffic.
Security server*View Connection Server8009TCPAJP13-forwarded Web traffic, if not using IPsec.
Security server*View Connection Server*ESPAJP13-forwarded Web traffic, when using IPsec without NAT.
Security server4500View Connection Server4500UDPAJP13-forwarded Web traffic, when using IPsec through a NAT device.
Security server*View desktop3389TCPMicrosoft RDP traffic to View desktops.
Security server*View desktop9427TCPWindows Media MMR redirection and client drive redirection.
Security server*View desktop32111TCPUSB redirection and time zone synchronization.
Security server*View desktop4172TCPPCoIP if PCoIP Secure Gateway is used.
Security server*View desktop22443TCPHTML Access.
View Agent4172Horizon ClientVariesUDPPCoIP, if PCoIP Secure Gateway is not used.
Note:Because the target port varies, see Notes and Caveats for TCP and UDP Ports Used by View.
View Agent4172View Connection Server or security server55000UDPPCoIP (not SALSA20) if PCoIP Secure Gateway is used.
View Agent4172Access Point appliance*UDPPCoIP. View desktops and applications send PCoIP data back to an Access Point appliance from UDP port 4172 .

The destination UDP port will be the source port from the received UDP packets and so as this is reply data, it is normally unnecessary to add an explicit firewall rule for this.

Horizon Client*View Connection Server or security server or Access Point appliance80TCPSSL (HTTPS access) is enabled by default for client connections, but port 80 (HTTP access) can be used in certain cases. See Notes and Caveats for TCP and UDP Ports Used by View.
Horizon Client*View security server or Access Point appliance443TCPHTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed on security servers.

Connection attempts over HTTP to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. You can reconfigure the redirection rule if the HTTPS port was changed. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client*View Connection Server443TCPHTTPS access. Port 443 is enabled by default for client connections. Port 443 can be changed.

Client connection attempts to port 80 are redirected to port 443 by default, but port 80 can service client connections if SSL is off-loaded to an intermediate device. Connection attempts to port 80 to reach View Administrator are not redirected. You must connect over HTTPS to reach View Administrator.

You can prevent HTTP redirection and force clients to use HTTPS. See Notes and Caveats for TCP and UDP Ports Used by View.

Horizon Client*View Connection Server or security server or Access Point appliance4172TCP and UDPPCoIP if PCoIP Secure Gateway is used.
Horizon Client*View desktop3389TCPMicrosoft RDP traffic to View desktops if direct connections are used instead of tunnel connections.
Horizon Client*View desktop9427TCPWindows Media MMR redirection and client drive redirection, if direct connections are used instead of tunnel connections.
Horizon Client*View desktop32111TCPUSB redirection and time zone synchronization if direct connections are used instead of tunnel connections.
Horizon Client*View Agent4172TCP and UDPPCoIP if PCoIP Secure Gateway is not used.
Horizon ClientVariesView Agent4172UDPPCoIP if PCoIP Secure Gateway is not used.
Note:Because the source port varies, see Notes and Caveats for TCP and UDP Ports Used by View.
Horizon ClientVariesView Connection Server or security server4172UDPPCoIP (not SALSA20) if PCoIP Secure Gateway is used.
Note:Because the source port varies, see Notes and Caveats for TCP and UDP Ports Used by View.
Web Browser*Security server or Access Point appliance8443TCPHTML Access.
View Connection Server*View Connection Server48080TCPFor internal communication between View Connection Server components.
View Connection Server*vCenter Server or View Composer80TCPSOAP messages if SSL is disabled for access to vCenter Servers or View Composer.
View Connection Server*vCenter Server443TCPSOAP messages if SSL is enabled for access to vCenter Servers.
View Connection Server*View Composer18443TCPSOAP messages if SSL is enabled for access to View Composer.
View Connection Server55000View Agent4172UDPPCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.
View Connection Server4172Horizon ClientVariesUDPPCoIP (not SALSA20) if PCoIP Secure Gateway via the View Connection Server is used.
Note:Because the target port varies, see Notes and Caveats for TCP and UDP Ports Used by View.
View Connection Server*View Connection Server4100TCPJMS inter-router traffic.
View Connection Server*View Connection Server4101TCPJMS SSL inter-router traffic.
View Connection Server*View desktop3389TCPMicrosoft RDP traffic to View desktops if tunnel connections via the View Connection Server are used.
View Connection Server*View desktop4172TCPPCoIP if PCoIP Secure Gateway via the View Connection Server is used.
View Connection Server*View desktop9427TCPWindows Media MMR redirection and client drive redirection, if tunnel connections via the View Connection Server are used.
View Connection Server*View desktop32111TCPUSB redirection and time zone synchronization if tunnel connections via the View Connection Server are used.
View Connection Server*View Connection Server8472TCPFor interpod communication in Cloud Pod Architecture.
View Connection Server*View Connection Server22389TCPFor global LDAP replication in Cloud Pod Architecture.
View Connection Server*View Connection Server22636TCPFor secure global LDAP replication in Cloud Pod Architecture.
Access Point appliance*View Connection Server or load balancer443TCPHTTPS access. Access Point appliances connect on TCP port 443 to communicate with a View Connection Server instance or load balancer in front of multiple View Connection Server instances.
Access Point appliance*View desktop3389TCPMicrosoft RDP traffic to View desktops.
Access Point appliance*View desktop9427TCPWindows Media MMR redirection and client drive redirection.
Access Point appliance*View desktop or application4172TCP and UDPAccess Point appliances connect to View desktops and applications on TCP port 4172 and UDP port 4172 to exchange PCoIP traffic.
Access Point appliance*View desktop32111TCPUSB redirection and time zone synchronization if direct connections are used instead of tunnel connections.
Access Point appliance*View desktop22443TCPHTML Access.
View desktop*View Connection Server instances4002TCPJMS SSL traffic.
View Composer service*ESXi host902TCPUsed when View Composer customizes linked-clone disks, including View Composer internal disks and, if they are specified, persistent disks and system disposable disks.
  • Notes and Caveats for TCP and UDP Ports Used by View
    Connection attempts over HTTP are silently redirected to HTTPS, except for connection attempts to View Administrator. HTTP redirection is not needed with more recent Horizon clients because they default to HTTPS, but it is useful when your users connect with a Web browser, for example to download Horizon Client. [Read more]