pem files to a one-line format that includes embedded newline characters
Convert the certificate into PEM-format files for the certificate chain and the private key, then convert the.
The following certificates can be used:.
When deploying UAG using PowerShell, download the latest deployment scripts, link.
It’s highly recommend to create a PowerShell script for the deployment that can be used everytime when installinging a new UAG. To access to the management interface go to:
The administration user interface (UI) can be used to set up and manage the Unified Access Gateway environment.
( *1) When using Blast Extreme over port 443, port 8443 is not needed The documentation about the the firewall ports can be found here.
Below is an overview of the VMware UAG firewall ports configuration:.
Create an IP pool before deploying the UAG.
Hardware specifications for the UAG are:.
So there no need for Windows OSes in the DMZ which improves security! It’s a hardened Linux appliance based on SUSE Enterprise Linux.
UAG is deployed in the DMZ and replaces the Horizon Security Server (Windows based).
UAG includes some improvements (such as blast Extreme) that are not available in the Horizon Security Server.
The use cases listed above can be mixed on the same UAG or seperated on multiple UAGs.
UAG is included in the Horizon standard, advanced and enterprise license.
In version 2.9 Access Point is renamed to Unified Access Gateway (UAG).
VMware Content Gateway service to allow VMware Content Locker access to internal file shares and Microsoft SharePoint.
VMware AirWatch or VMware Workspace ONE per-app tunnels and tunnel proxy.
VMware Horizon desktops and applications.
The Unified Access Gateway (UAG) provides secure access to the following environments:.
So it’s time for a new blog post with some implementation tips about VMware Access Point / Unified Access Gateway (UAG). Now the Unified Access Gateway (UAG) is replacing the VMware Security Server. In 2013 I created a blog post with some tips for implementing a VMware Horizon View Security Server (l ink)”.