- Citrix Gateway Release Notes
- About Citrix Gateway
- Common Deployments
- Client Software Requirements
- Compatibility with Citrix Products
- Licensing
- FAQ
- Before Getting Started
- Upgrading
-
Installing the System
- Configuring Citrix Gateway
- Using the Configuration Utility
- Policies and Profiles on Citrix Gateway
- Viewing Citrix Gateway Configuration Settings
- Configuring the Citrix Gateway by Using Wizards
- Configuring the Host Name and FQDN on Citrix Gateway
-
Installing and Managing Certificates
- Creating a Certificate Signing Request
- Installing the Signed Certificate on Citrix Gateway
- Configuring Intermediate Certificates
- Using Device Certificates for Authentication
- Importing and Installing an Existing Certificate
- Convert a Certificate from PFX Format to PEM Format
- Certificate Revocation Lists
- Testing Your Citrix Gateway Configuration
- Creating Virtual Servers
- Configuring IP Addresses on Citrix Gateway
- Resolving DNS Servers Located in the Secure Network
- Configuring DNS Virtual Servers
- Configuring Name Service Providers
- Configuring Server-Initiated Connections
- Configuring Routing on Citrix Gateway
- Configuring Auto Negotiation
-
Authentication and Authorization
- Configuring Default Global Authentication Types
- Configuring Authentication Without Authorization
- Configuring Authorization
- Disabling Authentication
- Configuring Authentication for Specific Times
- How Authentication Policies Work
- Configuring Local Users
- Configuring Groups
- Configuring LDAP Authentication
- Configuring Client Certificate Authentication
- Configuring RADIUS Authentication
- Configuring SAML Authentication
- Configuring TACACS+ Authentication
- Configuring Multifactor Authentication
- Configuring Single Sign-On
- Configuring One-Time Password Use
- nFactor for Citrix Gateway Authentication
- Citrix Gateway Visualizer
- Configure Citrix Gateway to use RADIUS and LDAP Authentication with Mobile Devices
-
Configuring the VPN User Experience
- How User Connections Work with the Citrix Gateway plug-in
- How to Configure Full VPN Setup on a Citrix Gateway Appliance
- Choosing the User Access Method
- Deploying Citrix Gateway plug-ins for User Access
- Selecting the Citrix Gateway plug-in for Users
-
Integrating the Citrix Gateway plug-in with Citrix Receiver
- How User Connections Work with Citrix Receiver
- Adding the Citrix Gateway plug-in to Citrix Receiver
- Decoupling the Citrix Receiver Icon
- Configuring IPv6 for ICA Connections
- IConfiguring the Receiver Home Page on Citrix Gateway
- Applying the Receiver Theme to the Logon Page
- Creating a Custom Theme for the Logon Page
- Customizing the User Portal
- Configuring Clientless Access
- Configuring the Client Choices Page
- Configuring Access Scenario Fallback
-
Configuring Connections for the Citrix Gateway plug-in
- Configuring the Number of User Sessions
- Configuring Time-Out Settings
- Connecting to Internal Network Resources
- Configuring Split Tunneling
- Configuring Client Interception
- Configuring Name Service Resolution
- Enabling Proxy Support for User Connections
- Configuring Address Pools
- Supporting VoIP Phones
- Configuring Application Access for the Citrix Gateway plug-in for Java
- Configuring the Access Interface
- How a Traffic Policy Works
- Configuring Session Policies
-
Configuring Endpoint Polices
- How Endpoint Policies Work
- Evaluating User Logon Options
- Setting the Priority of Preauthentication Policies
- Configuring Preauthentication Policies and Profiles
- Configuring Post-Authentication Policies
- Configuring Security Preauthentication Expressions for User Devices
- Configuring Compound Client Security Expressions
- Advanced Endpoint Analysis Scans
- Managing User Sessions
- AlwaysON
- Configuring Citrix Gateway
-
Deploying in a Double-Hop DMZ
- Deploying Citrix Gateway in a Double-Hop DMZ
- How a Double-Hop Deployment Works
- Communication Flow in a Double-Hop DMZ Deployment
- Preparing for a Double-Hop DMZ Deployment
-
Installing and Configuring Citrix Gateway in a Double-Hop DMZ
- Configuring Settings on the Virtual Servers on the Citrix Gateway Proxy
- Configuring the Appliance to Communicate with the Appliance Proxy
- Configuring Citrix Gateway to Handle the STA and ICA Traffic
- Opening the Appropriate Ports on the Firewalls
- Managing SSL Certificates in a Double-Hop DMZ Deployment
-
Using High Availability
- How High Availability Works
- Configuring Settings for High Availability
- Configuring Communication Intervals
- Synchronizing Citrix Gateway Appliances
- Synchronizing Configuration Files in a High Availability Setup
- Configuring Command Propagation
- Configuring Fail-Safe Mode
- Configuring the Virtual MAC Address
- Configuring High Availability Pairs in Different Subnets
- Configuring Route Monitors
- Configuring Link Redundancy
- Understanding the Causes of Failover
- Forcing Failover from a Node
- Using Clustering
- Maintaining and Monitoring the System
- Integrating with Citrix Products
- How Users Connect to Applications, Desktops, and ShareFile
- Deploying with Citrix Endpoint Management App Edition, Citrix Virtual Apps, and Citrix Virtual Desktops
-
Accessing Citrix Virtual Apps and Desktops Resources with the Web Interface
- Integrating Citrix Gateway with Citrix Virtual Apps and Desktops
- Establishing a Secure Connection to the Server Farm
- Deploying with the Web Interface
- Setting Up a Web Interface Site to Work
- Configuring Communication with the Web Interface
- Configuring Additional Web Interface Settings on Citrix Gateway
- Configuring Access to Applications and Virtual Desktops in the Web Interface
- Configuring SmartAccess
- Configuring SmartControl
-
Configuring Single Sign-On to the Web Interface
- To configure single sign-on to Web applications globally
- To configure single sign-on to Web applications by using a session policy
- To define the HTTP port for single sign-on to web applications
- Additional Configuration Guidelines
- To test the single sign-on connection to the Web Interface
- Configuring Single Sign-On to the Web Interface by Using a Smart Card
- To configure single sign-on for Citrix Virtual Apps and file shares
- Allowing File Type Association
- Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
- Integrate Citrix Gateway with StoreFront
-
Configuring Settings for Your Citrix Endpoint Management Environment
- Configuring Load Balancing Servers for Citrix Endpoint Management
- Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
- Configuring Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
- Allowing Access from Mobile Devices with Citrix Mobile Productivity Apps
- Configuring Domain and Security Token Authentication for Citrix Endpoint Management
- Configuring Client Certificate or Client Certificate and Domain Authentication
- Optimizing Network Traffic with CloudBridge
- RfWebUI Persona on Citrix Gateway UX Configuration
- RDP Proxy
- Citrix Gateway Enabled PCoIP Proxy Support for VMware Horizon View
- HDX Enlightened Data Transport Support
-
Microsoft Intune Integration
- When to Use the Integrated Intune MDM Solution
- Understanding the Citrix Gateway-Intune MDM Integration
- Configuring Network Access Control device check for Citrix Gateway virtual server for single factor authentication deployment
- Understanding Azure ADAL Token Authentication
- Configuring Citrix Gateway Virtual Server for Microsoft ADAL Token Authentication
- Type of Service Support for UDP traffic
- Proxy Auto Configuration for Outbound Proxy support for Citrix Gateway
- Outbound ICA Proxy support
- Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
- Native OTP Support
- Configuring Server Name Indication Extension
- Validating the Server Certificate During an SSL Handshake
- Using Advance Policy to Create VPN Policies
- Simplified SaaS app configuration using a template
- Configure Device Certificate in nFactor as an EPA component
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This content has been machine translated dynamically.
Translation failed!
Establishing a Secure Connection to the Server Farm
The following example shows how Citrix Gateway deployed in the DMZ works with the Web Interface to provide a secure, single point-of-access to published resources available in a secure enterprise network.
In this example, all of the following conditions exist:
- User devices from the Internet connect to Citrix Gateway by using Citrix Receiver.
- The Web Interface resides behind Citrix Gateway in the secure network. The user device makes the initial connection to Citrix Gateway and the connection is passed to the Web Interface.
- The secure network contains a server farm. One server within this server farm runs the Secure Ticket Authority (STA) and the Citrix XML Service. The STA and the XML Service can run on either Citrix Virtual Apps and Desktops.
Process Overview: User Access to Published Resources in the Server Farm
- A remote user types the address of Citrix Gateway; for example,
https://www.ag.wxyco.com
, in the address field of a web browser. The user device attempts this SSL connection on port 443, which must be open through the firewall for the connection to succeed. - Citrix Gateway receives the connection request and users are asked for their credentials. The credentials are passed back through Citrix Gateway, users are authenticated, and the connection is passed to the Web Interface.
- The Web Interface sends the user credentials to the Citrix XML Service running in the server farm.
- The XML Service authenticates the user credentials and sends the Web Interface a list of the published applications or desktops the user is authorized to access.
- The Web Interface populates a Web page with the list of published resources (applications or desktops) that the user is authorized to access and sends this Web page to the user device.
- The user clicks a published application or desktop link. An HTTP request is sent to the Web Interface indicating the published resource that the user clicked.
- The Web Interface interacts with the XML Service and receives a ticket indicating the server on which the published resource runs.
- The Web Interface sends a session ticket request to the STA. This request specifies the IP address of the server on which the published resource runs. The STA saves this IP address and sends the requested session ticket to the Web Interface.
- The Web Interface generates an ICA file containing the ticket issued by the STA and sends it to the Web browser on the user device. The ICA file generated by the Web Interface contains the fully qualified domain name (FQDN) or the Domain Name System (DNS) name of Citrix Gateway. Note that the IP address of the server running the requested resource is never revealed to users.
- The ICA file contains data instructing the web browser to start Citrix Receiver. The user device connects to Citrix Gateway by using the Citrix Gateway FQDN or DNS name in the ICA file. Initial SSL/TLS handshaking occurs to establish the identity of Citrix Gateway.
- The user device sends the session ticket to Citrix Gateway and then Citrix Gateway contacts the STA for ticket validation.
- The STA returns the IP address of the server on which the requested application resides to Citrix Gateway.
- Citrix Gateway establishes a TCP connection to the server.
- Citrix Gateway completes the connection handshake with the user device and indicates to the user device that the connection is established with the server. All further traffic between the user device and the server is proxied through Citrix Gateway. The traffic between the user device and Citrix Gateway is encrypted. The traffic between Citrix Gateway and the server can be encrypted independently, but is not encrypted by default.