You won't want to do it like that. PCoIP is primarily UDP based and the advantages of this would be mainly lost if you simply tunnel that through a TCP based SSL connection.
See http://cto.vmware.com/secure-remote-access-with-view-and-pcoip/ for more info on this.
We initially looked at various options around tunneling the PCoIP traffic through Security Server but we really didn’t want to interfere with the advanced performance characteristics of the protocol. The step improvement in having a UDP based remote display protocol would be somewhat eroded if we just tunneled that over an HTTPS connection which uses TCP as its underlying transport protocol. HTTPS encapsulation is good for RDP, but PCoIP is already secured by AES-128 encryption over the wire and so double encryption is unnecessary.
It is a bad idea to put most UDP based communications (including VoIP, PCoIP etc.) over a TCP based protocol such as SSL.
There are two options, both are fully supported.
1. Use a View Security Server in your DMZ. This ties in user authentication with secure PCoIP forwarding which ensures that the only PCoIP traffic that can enter the green zone of your data center is traffic on behalf of a strongly authenticated user. Other PCoIP traffic is discarded in your DMZ and can not make it to your datacenter green zone. This is what a lot of View customers do because it has very good performance and has the best user experience.
2. Use a VPN. This is also acceptable, but does require the user to first set up the VPN and authenticate separately. Also, as it's for a UDP based protocol, you'll want to ensure the VPN supports DTLS and this too requires you to open ports other than TCP 443. They do this for exactly the same reasons of not putting UDP traffic over TCP.
Refer to this document and the linked video if you want a deep-dive into the secure setup of PCoIP remote access. http://communities.vmware.com/docs/DOC-14974 It describes how to set it up so that it is secure and gives the best possible user experience.
Mark