A gateway is a server network node that provides access into and out of a network. Set up VERDE Gateways to communicate with VERDE servers located in a secure environment. VERDE Gateways reside within the Demilitarized Zone (DMZ) to reduce exposure to internal servers. VERDE Gateways provide secure public network access and grant remote users proper access to the internal network where VERDE, applications, resources, and internal data resides. Communication between client devices and the isolated gateway is encrypted. Users must log in to the secure network with valid user credentials to access their virtual desktop(s).
An isolated gateway requires the following:
- At least one VERDE server.
- At least one network interface controller (NIC) with access to both internal and public networks, or two NICs (one for internal access and one for external).
- Configure Isolated Gateway Servers to reside within the authorized demilitarized zone (DMZ).
The VERDE Gateway server can be run as a standalone VERDE component in a virtual machine. Contact NComputing support for more details.
Before configuring the cluster master and the VERDE Gateway servers, prepare the following:
- Download the VERDE installation package onto the cluster master candidates and the Isolated Gateway server(s).
- On the GTW server, designate a system user (vb-verde) with the same UUID and GUID as the infrastructure. The system user is the designated isolated gateway administrator role.
- Determine the IP addresses of each cluster master candidate. Set up of Isolated Gateways requires a list of assigned server IP addresses for use during VERDE configuration.
Set up the following ports to facilitate communication between the public network and the internal data center via the Isolated Gateway host(s).
|DMZ Port (Gateway IP)||Internal Network Connection Port (*CM or **VDI Server)|
Configure the VERDE gateway in a test environment prior to implementing it in a production environment to ensure that all settings work correctly.