Quantcast
Channel: VMware Communities : All Content - VMware View
Viewing all articles
Browse latest Browse all 9103

View 6.2/Tera1 cipher negotiation workaround?

$
0
0

I've posted this on the Teradici forum as well, but wanted to reach out here just in case someone has seen it before.

 

We just did an upgrade to View 6.2.1. I tested out a connection on my T2 devices, and found that I had to upgrade to firmware 4.8 to bypass a "Session negotiation failed. The Zero Client may not be compatible with the host session negotiation cipher settings" message. Of course, I can't do that on T1 devices. I tried doing the multiple different ways of enabling the ciphers in the View Security section at

https://pubs.vmware.com/horizon-62-view/index.jsp#com.vmware.horizon-view.security.doc/GUID-70506F8C-90BD-445D-84E4-ED3C0583E4F7.html

without any luck, but I might also be doing it wrong - I'm a back-end VM noob Although I know anything past 6.0.1 isn't supported on T1, but I'm trying to see if anyone out there has encountered the same problem and found a workaround.

 

Other notes: in the logs, it is a handshake error. I can upload an actual log in a few hours. ESX5.5, LG Zero Clients, using linked-clone, not RDS desktops


Viewing all articles
Browse latest Browse all 9103

Trending Articles