4. NSX AVI Loadbalancer Integration with Horizon
You must complete Lab 2 and Lab 3 before beginning this lab. This lab will guide you through configuring a Load Balancer for the Unified Access Gateways deployed in Lab 3.
To deploy AVI LoadBalancer, there are two main components involved:
AVI Controller:
The Avi Controller is a centralized brain that spans Datacenters and clouds. The Avi Controller has full visibility across the environments and automates the deployment and management of the load balancing endpoints, which we call Service Engines.
We need one AVI Controller to manage the Service Engine across the site if all the network configurations are in-place. In Our Lab, Avi Controller is pre-deployed in Site-2 which will manage both the Service Engines
Service Engine:
Service Engine is a Load Balancer Component which runs on each datacenter. Service Engine(SE) is managed by AVI Controller. In the lab we will see how SEs are configured as a Load Balancer to full-fill the request from Applications.
In Our case Applications are UAGs across both Site-1 and Site-2
Section 1 - AVI Integration with UAG Servers in Site1
FQDN | Entity Description |
Real IP |
---|---|---|
uag-hzn-avi01.techseals.co | FQDN of Avi LB VIP Site-1 | 172.16.20.100 |
uag-hzn-01a.techseals.co |
FQDN of UAG server 1 on site 1 |
172.16.20.10 |
uag-hzn-01b.techseals.co |
FQDN of uag server 2 on site 1 |
172.16.20.11 |
- On your ControlCenter server
- from the Taskbar
- select the DNS admin shortcut

- In the DNS Admin Console
- select and expand Forward Lookup Zones
- select and expand techseals.co
- right - click techseals.co
- in the menu bar
- select New Host (A or AAAA)....

- In the New Host window
- under Name
- enter
- under Name
uag-hzn-avi01
- under IP address
- enter
172.16.20.100
- select Add Host

- In the DNS window
- select OK to close
- in the New Host window
- top-right corner
- to close the window
- select x

- On your ControlCenter Server
-
Open your Chrome Browser for Site-1
- from the Favourites bar,
- select Avi Vantage Controller
- from the Favourites bar,
-
Open your Chrome Browser for Site-1

- In the VMware NSX ALB (Avi) page
- In the Username area,
- enter admin
- In the Password area
- enter Pa$$w0rd
- select LOG IN
- In the Username area,

We will now move forward with verifying the Custom Health Monitor Profile
The next step is to validate the custom Health Monitor Profile.
Note:- This is pre-created
- From the NSX-ALB console,
- Navigate to Templates > Profiles
- Under Profiles
- Select Health Monitors > Horizon-HTTPS
- Click on the pencil icon to the right of Horizon-HTTPS
- Under Profiles
- Navigate to Templates > Profiles
- On the New Health Monitor page,
- Validate the following configuration
- Name: Horizon-HTTPS
- Type : HTTPS
- Send Interval 30
- Receive Timeout 10
- Validate the following configuration

- On the Edit Health Monitor: Horizon-HTTPS page,
- Scroll down to the HTTPS Settings section
- Under Client Request Header: GET /favicon.ico HTTP/1.0

- On the New Health Monitor: Horizon-HTTPS page,
-
Scroll down until you locate Response Code*
- Response Code* : 2XX
- Next to SSL Attributes: Checkbox is selected
- SSL Profile* : System-Standard.
-
Scroll down until you locate Response Code*

- On the New Health Monitor: Horizon-HTTPS page,
- Scroll down until you locate Maintenance Response Code*
- Maintenance Response Code :503
- Close the Edit Health Monitor: Horizon-HTTPS
- Do Not make any changes

We will now create Pools for Site-1
Pools maintain the list of servers assigned to them and perform health monitoring, load balancing, persistence, and functions that involve NSX Advanced Load Balancer-to-server interaction
Pools are created for L7 and L4 traffic
- From the NSX-ALB console
- navigate to Applications > Pools.

- In the Pools area
- to the right of the pane
- select CREATE POOL
- to the right of the pane

- In the CREATE POOL: window,
-
Step 1: Settings
- enter the required information:
- under Name*:
- enter
- under Name*:
- enter the required information:
-
Step 1: Settings
Horizon-UAG-Pool-Site-1
- under Default Server Port
- enter 443
- under Load Balance Algorithm:
- validate the following
- that Least Connections is selected
- validate the following

- In the CREATE POOL: Horizon-UAG-Pool-Site-1 window
- select the Servers tab
- under Select Servers By IP Address
enter
- under Select Servers By IP Address
- select the Servers tab
172.16.20.10,172.16.20.11
- select ADD
-
Once Added,
- both UAG server IP Addresses from Site 1 show as Enabled.
- note: 172.16.20.10 and 172.16.20.11 are two UAG Servers in Site1
- both UAG server IP Addresses from Site 1 show as Enabled.

- In the CREATE POOL: Horizon-UAG-Pool-Site-1 window,
- select the Health Monitor tab
- Make sure the checkbox next to:
- Enable Passive Health Monitor is checked
- Select ADD.
- from the dropdown,
- select is Horizon-HTTPS
- from the dropdown,
- Make sure the checkbox next to:
- select the Health Monitor tab

this is the health monitor that you validated earlier
- In the CREATE POOL: Horizon-UAG-Pool-Site-1 window,
- in the Health Monitors area
-
scroll up
-
below Append Port To Host Name
-
next to Never
- select the radio button
-
next to Never
-
below Append Port To Host Name
-
scroll up
- in the Health Monitors area

- In the CREATE POOL: Horizon-UAG-Pool-Site-1 window,
-
Health Monitor tab
-
Scroll down
- below the SSL section
- under SSL Profile
- select System-Standard.
- under SSL Profile
- next to the Enable TLS SNI
- ensure this box is Checked
- Leave all the remaining settings as defaults
- below the SSL section
-
Scroll down
-
Health Monitor tab

- In the CREATE POOL: Horizon-UAG-Pool-Site-1 window,
- In the bottom right corner
- select SAVE
- In the bottom right corner

Validating that Connection Multiplexing is disabled
- In the NSX-ALB console
- Navigate to Templates > Profiles> Application
- In the Application area
- select System-Secure-HTTP-VDI.
- To the right of System-Secure-HTTP-VDI
- Select the edit icon.
- In the Application area
- Navigate to Templates > Profiles> Application

- In Edit Application Profile: System-Secure-HTTP-VDI window
- Ensure the checkbox next to Connection Multiplexing is NOT selected
-
Select Cancel
- to close the Edit Application Profile: System-Secure-HTTP-VDI window

Creating the Virtual Service for Site-1
Virtual services are the core of the Avi Vantage load-balancing and proxy functionality. A virtual service advertises an IP address and ports to the external world and listens for client traffic
- In the NSX-ALB Console
- Navigate to Applications > Virtual Services

- In the Virtual Services area
- to the top right, select CREATE VIRTUAL SERVICE
- select Advanced Setup.
- to the top right, select CREATE VIRTUAL SERVICE

- In the New Virtual Service wizard
-
Step 1: Settings area
- enter the following under:
-
Name*
- type
-
Name*
- enter the following under:
-
Step 1: Settings area
Horizon-UAG-Site-1
-
VS VIP *
- select the dropdown,
- notice a Create VS VIP Green box appears
- select the dropdown,

- In the New Virtual Service wizard
-
Step 1: Settings area
- In the VIP Address area
- select Create VS VIP
- In the VIP Address area
-
Step 1: Settings area

- In the Create VS VIP: page
- In the General tab,
- under Name
- type:
- under Name
- In the General tab,
VIP-Horizon-UAG-Site1
- select ADD

- In the Edit VIP: 1 page
- under IPv4 Address*
- type
- under IPv4 Address*
172.16.20.100
- select SAVE

- In the Create VS VIP: VIP-Horizon-UAG-Site1 window
- select SAVE

- In the New Virtual Service wizard
-
Step 1: Settings area
-
Scroll down to the Service Port area
- under Services
- next to SSL
- enable the checkbox
- select Switch to Advanced
- next to SSL
- under Services
-
Scroll down to the Service Port area
-
Step 1: Settings area

- In the Service Port area
- below the unchecked Overide TCP/UDP check box
- select +Add Port
- below the unchecked Overide TCP/UDP check box

- Note Steps 8 onward
- These internal ports will be used for Tunnel Connections. These non-standard ports, are required on the Avi virtual service only. These ports do not have to be opened for UAG servers. These ports need to be opened on the firewall that is placed in front of the load balancer. Ensure all the Service Port details matches as per the screenshot above.
- In the New Virtual Service wizard
- enter 5001 in Port Min and 5005 to Port Max
- next to Use as Horizon Primary/Tunnel Protocol Ports
-
select the checkbox
-
select the checkbox
- next to Use as Horizon Primary/Tunnel Protocol Ports
- select + Add Port
- enter 5001 in the Port Min area and 5005 in the Port Max area
- next to SSL
- uncheck the checkbox
- under Override Application Profile
-
from the dropdown
- select System-L4-Application
-
from the dropdown
-
next to Override TCP/UDP
- select the checkbox
- below Override TCP/UDP
- from the Dropdown
- select System-UDP-Fast-Path-VDI
- from the Dropdown
- enter 5001 in Port Min and 5005 to Port Max
- below System-UDP-Fast-Path-VDI
- select + Add Port

- In the New Virtual Service wizard
- in the Port area, enter 20001 TO 20005
- under Override Application Profile
- from the dropdown
- select System-L4-Horizon-PCoIP
-
next to Override TCP/UDP
- uncheck the check box
- select + Add Port
- in the Port area, enter 20001 TO 20005
- under Override Application Profile
- from the dropdown menu
- select System-L4-Horizon-PCoIP
- from the dropdown menu
- next to Override TCP/UDP
- select the checkbox
- under Override Application Profile
- below the just selected Override TCP/UDP checkbox
- from the Dropdown menu
- select System-UDP-Fast-Path-VDI.
- from the Dropdown menu
- in the Port area, enter 20001 TO 20005
- select + Add Port

- In the New Virtual Service wizard
- in the Port area enter 30001 TO 30005
- under Override Application Profile
- from the dropdown
- select System-L4-Horizon-Blast
- from the dropdown
- next to Override TCP/UDP
- uncheck the checkbox
- select + Add Port again
- in the Port area enter 30001 TO 30005
- under Override Application Profile
- from the dropdown menu
- select System-L4-Horizon-Blast
- from the dropdown menu
- next to Override TCP/UDP
- select the checkbox
- below the selected Override TCP/UDP checkbox
- from the dropdown menu
- select System-UDP-Fast-Path-VDI
- from the dropdown menu

-
Ensure all the settings matches as per the screenshot above.
- Note: Ensure enough ports are opened on the virtual service to accommodate any new UAG servers you add to the UAG pool. In this example, six ports are opened for primary and secondary traffic:
- Note: Port 443
- This is for XML API traffic
- Note: Ports 5001 to 5005
- Horizon internal ports opened for L7 primary XML traffic to handle redirected traffic
- Note: Ports 30001 to 30005
- Blast
-
Note: Ports 20001 to 20005
- PCoIP
- Note: These non-standard ports, are required on the Avi virtual service only. These ports do not have to be opened for UAG servers. These ports need to be opened on the firewall that is placed in front of the load balancer.

- In the New Virtual Service wizard
- scroll up to the Settings area
- in the Profiles sub-area
- below Application Profile*:
- from the dropdown
- select System-HTTP-Horizon-UAG
- from the dropdown
- below Error Page Profile:
- from the dropdown
- select Custom-Error-Page-Profile
- from the dropdown
- below Application Profile*:

- In the New Virtual Service wizard
- in the Pool sub area
- below Pool
- from the dropdown
- select Horizon-UAG-Pool-Site1
- from the dropdown
- below Pool
- in the *SSL Settings* sub-area
- under SSL Profile*
- from the dropdown
- select: System-Standard
- from the dropdown
- under SSL Certificate:
- from the dropdown
- select HZNcert2025
- Remove the System-Default-Cert
- select HZNcert2025
- from the dropdown
- under SSL Profile*
- Leave all other settings as default
- in the bottom right corner
- select Next
- in the bottom right corner
- in the Pool sub area

- In the New Virtual Service wizard
-
Step 2: Policies area
- (Leave everything as default)
- select Next
-
Step 2: Policies area

- In the New Virtual Service wizard
-
Step 3: Analytics area
- (Leave everything as default)
- select Next
-
Step 4: Advanced tab,
- (Leave everything as default)
- select Save
-
Step 3: Analytics area

- In the New Virtual Service wizard
-
Step 4: Advanced area
- (Leave everything as default)
- select Save
-
Step 4: Advanced area

- From the NSX-ALB admin console
- navigate to Applications > Virtual Services
-
in front of Horizon-UAG-Site-1
- select the checkbox
- In line with Horizon-UAG-Site-1
- select edit
-
in front of Horizon-UAG-Site-1
- navigate to Applications > Virtual Services
- In the Edit Horizon-UAG-Site-1 virtual service area
- navigate to Polices > DataScripts tabs
- In the top right
- select + Add DataScript

- In the Edit Horizon-UAG-Site-1 virtual service area
- below Script To Execute
- from the dropdown
- select System-Standard-Horizon-UAG
-
In the bottom right corner
-
select Save DataScript
- select Save
-
select Save DataScript
- from the dropdown
- below Script To Execute

- In the AVI Controller Admin Page
- navigate to Applications > Pools
- select Horizon-UAG-Pool-Site1
- navigate to Applications > Pools

- In the Pool: Horizon-UAG-Pool-Site1 window
- select the Servers tab
-
Make a Note all the custom ports
-
In this example
- UAG-01a (172.16.20.10) uses 5002 for tunnel, 20002 for PCoIP and 30002 for Blast
- UAG-02 (172.16.20.11) uses 5001 for tunnel, 20001 for PCoIP and 30001 for Blast
-
In this example
-
Make a Note all the custom ports
- select the Servers tab
Note: It is just an example and it may vary based on your environment
Note: We will use these custom ports while configuring UAGs, the port configuration needs to maps to your existing setup in NSX AVI
- On your ControlCenter Server
- Open your Chrome Browser for Site-1
- In the Address bar,
- select UAG-HZN-01a
-
In the UAG Login window
-
in the username: area
- enter admin
-
in the password: area
- enter Pa$$w0rd
-
in the username: area
-
In the UAG Login window
- select SIGN IN
- select UAG-HZN-01a
- In the Address bar,
- Open your Chrome Browser for Site-1

- In the UAG Admin Console
- under Configure Manually
- click SELECT
- under Configure Manually

- In the UAG Admin Console
- In the General Settings area
- next to Edge Service Settings,
- move the TOGGLE to the right
- next to Horizon Settings
- select the GEAR icon
- next to Edge Service Settings,
- In the General Settings area

- In the UAG Admin Console
-
next to PCOIP External URL
-
edit the existing entry to the following
- 172.16.20.10:20002
-
Note: PCOIP Port number may different in your case.
- Refer Part 8 Section 1
- Note: PCOIP Port should be the custom port noted in previous section
- (Part 8 Section 1)
-
edit the existing entry to the following
- next to Blast External URL
- edit the existing entry to the following
-
next to PCOIP External URL
https://uag-hzn-01a.techseals.co:30002/?UDPPort=30002
- Note:Blast Port number may different in your case.
- Refer Part 8 Section 1
- Note: Blast Port should be the custom port noted in previous section
- Part 8 Section 1
-
scroll down
- at the bottom
- select SAVE
- at the bottom

- In the UAG admin console
- below Advanced Settings
- next to System Configuration
- select GEAR Icon
- next to System Configuration
- below Advanced Settings

- In the System Configuration window
- next to Allowed Host Headers
- enter corp.techseals.co
- to the right
- select the + icon
- to the right
- enter uag-hzn-avi01a.techseals.co
- to the right
- select the + icon
- to the right
- enter corp.techseals.co
- next to Allowed Host Headers

- In the System Configuration window
- to close the System Configuration window
- Scroll down
- select SAVE
- to close the System Configuration window

- On your ControlCenter Server
- on your Chrome Browser for Site-1
- on the Address bar,
- select UAG-HZN-01b
- In the UAG Login window
- in the username: area
- enter admin
- in the password: area
- enter Pa$$w0rd
- in the username: area
- select SIGN IN
- on the Address bar,
- on your Chrome Browser for Site-1

- In the UAG Admin Console
- under Configure Manually
- click SELECT
- under Configure Manually

- In the UAG Admin Console
- In the General Settings area
- next to Edge Service Settings,
- move the TOGGLE to the right
- next to Horizon Settings
- select the GEAR icon
- next to Edge Service Settings,
- In the General Settings area

- In the UAG Admin Console
- next to PCOIP External URL
172.16.20.11:20001
- note: PCOIP Port number may different in your case.
- Refer Part 8 Section 1
- note: PCOIP Port should be the custom port noted in previous section
- Part 8 Section 1
- next to Blast External URL
- enter the following
https://uag-hzn-01b.techseals.co:30001/?UDPPort=30001
-
Note:Blast Port number may different in your case.
- Refer Part 8 Section 1
-
Note: Blast Port should be the custom port noted in previous section
-
Part 8 Section 1
-
scroll down
- at the bottom
- select SAVE
- at the bottom
-
scroll down
-
Part 8 Section 1

- In the UAG admin console
- below Advanced Settings
- next to System Configuration
- select GEAR Icon
- next to System Configuration
- below Advanced Settings

- In the System Configuration window
- next to Allowed Host Headers
- enter
- next to Allowed Host Headers
corp.techseals.co
- to the right
- select the + icon

- In the System Configuration window
- to close the System Configuration window
-
scroll down
- select SAVE
-
scroll down
- to close the System Configuration window

When Integrating Horizon with Unified Access Gateway we need to disable all Tunnel configuration on the Connection servers
- On your ControlCenter server
- on the Site 1 - Bangalore Chrome browser
- from the Favourites Bar
- select the Horizon Site 1
- from the Favourites Bar
- on the Site 1 - Bangalore Chrome browser

- In the Horizon login page
- in the Username area
- enter administrator
- in the Password area
- enter Pa$$w0rd
- select Sign in
- enter Pa$$w0rd
- in the Username area

- In the Horizon Admin console
- In the Settings area
- select Servers
- In the Settings area

- In the Servers area
- select the Connection Servers tab

- In the Connection Servers tab area
- next to HORIZON-01A
- select the radio button
- select EDIT
- next to HORIZON-01A

- In the Edit Connection Server Settings window
- below HTTP(s) Secure Tunnel
- next to Use Secure Tunnel connection to machine
- uncheck the checkbox
- scroll down
- next to Use Secure Tunnel connection to machine
- below HTTP(s) Secure Tunnel

- In the Edit Connection Server Settings window
- below Blast Secure Gateway
- next to Do not use Blast Secure Gateway
- select the radio button
- next to Do not use Blast Secure Gateway
- to close the Edit Connection Server Settings window
- in the bottom right-corner
- select OK
- in the bottom right-corner
- below Blast Secure Gateway

- In the Connection Servers tab area
- next to HORIZON-01B
- select the radio button
- select EDIT
- next to HORIZON-01B

- In the Edit Connection Server Settings window
- below HTTP(s) Secure Tunnel
- next to Use Secure Tunnel connection to machine
- uncheck the checkbox
- scroll down
- next to Use Secure Tunnel connection to machine
- below HTTP(s) Secure Tunnel

- In the Edit Connection Server Settings window
- below Blast Secure Gateway
- next to Do not use Blast Secure Gateway
- select the radio button
- next to Do not use Blast Secure Gateway
- to close the Edit Connection Server Settings window
- in the bottom right-corner
- select OK
- in the bottom right-corner
- below Blast Secure Gateway

0 Comments
Add your comment