VMware Deployment

Virtual Appliance Software Email

  1. Open the email you received from BeyondTrust Technical Support and click the link to download the BeyondTrust Virtual Appliance.ova file.


Deploy OVF Template

  1. Log into your virtual infrastructure client. You must use an account with permissions to deploy a virtual machine as an OVF template. Follow the process to deploy an OVF template.


Deploy OVF Template - Source

  1. In the Source section of the deployment wizard, select the BeyondTrust Virtual Appliance.ova file.



OVF Template Details

  1. Review the OVF template details.


End User License Agreement

  1. Read and accept the end user license agreement.


Name and Location

  1. Specify a name for this OVF template and select a location in the inventory to which you have rights.


Deployment Configuration

  1. Select a configuration of Small, Medium, or Large. This selection defines your default resource allocations. Choose your configuration based on your usage needs and available resources.


Host / Cluster

  1. Choose the host or cluster on which you want to run the BeyondTrust Virtual Appliance. Select a location to which you have rights.


Resource Pool

  1. Select a resource pool to which you have rights.



  1. Select the datastore on which you want the virtual appliance to run. This is where the operating system and session data is stored.


Disk Format

  1. Select how the data should be provisioned. If you are unsure of which to select, choose Thick Provision Lazy Zeroed.


Network Mapping

  1. Select the appropriate network mapping for your environment. Your virtual appliance can function anywhere in your network with internet access. However, if you are going to access systems outside of your network, for optimum security BeyondTrust recommends that you place the virtual appliance in a DMZ or outside of your internal firewall. Network location considerations are outlined in the table below. For detailed information about network locations, see The Secure Remote Access Appliance in the Network.


Network Location Considerations for Secure Remote Access Appliances
Network Location Advantages/Disadvantages

Outside your firewall

Does not require that ports 80 and 443 be open inbound for TCP traffic on your firewall. Simplifies the setup process significantly because both the representative and customer clients consoles and clients are built to resolve to a specific DNS; if your registered DNS resolves to a public IP address directly assigned to your appliance, no additional setup is required by you to initiate a session.


May require additional setup depending on your router or routers.

Inside your firewall

Requires port forwarding on your firewall and possibly additional setup of your NAT routing and internal DNS.




  1. Go back to the email you received from BeyondTrust Technical Support and copy the Appliance License Key. In the deployment wizard, paste the key into the field.


If for some reason you are unable to provide the Appliance License Key at this time, you can manually enter it later, from the virtual machine console. It is recommended that you enter the key now for the sake of simplicity.


Ready to Complete

  1. Review your settings and click Finish.
  2. The virtual appliance will deploy in the location and with the resources you specified.