-
Configuring the VPN User Experience
-
How to Configure Full VPN Setup on a Citrix Gateway Appliance
-
AlwaysOn VPN before Windows logon (Formally AlwaysOn service)
-
Maintaining and Monitoring the System
-
Deploying with Citrix Endpoint Management, Citrix Virtual Apps, and Citrix Virtual Desktops
-
Accessing Citrix Virtual Apps and Desktops Resources with the Web Interface
-
Integrating Citrix Gateway with Citrix Virtual Apps and Desktops
-
Configuring Additional Web Interface Settings on Citrix Gateway
-
Configuring Access to Applications and Virtual Desktops in the Web Interface
-
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
-
Configuring Settings for Your Citrix Endpoint Management Environment
-
Configuring Load Balancing Servers for Citrix Endpoint Management
-
Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
-
Configuring Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
-
Allowing Access from Mobile Devices with Citrix Mobile Productivity Apps
-
Configuring Domain and Security Token Authentication for Citrix Endpoint Management
-
Configuring Client Certificate or Client Certificate and Domain Authentication
-
-
Citrix Gateway Enabled PCoIP Proxy Support for VMware Horizon View
-
Proxy Auto Configuration for Outbound Proxy support for Citrix Gateway
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Configuring Session Policies and Profiles for Citrix Endpoint Management and StoreFront
To allow connections through Citrix Gateway from the different versions of Receiver and by using Secure Hub, you need to create session policies and profiles for Endpoint Management and StoreFront with specific rules to enable the connections to work. You can create separate session policies and profiles for the following:
- Citrix Gateway plug-in
- Receiver for Android
- Receiver for BlackBerry 10 1.0
- Receiver for BlackBerry 2.2
- Receiver for Chromebook
- Receiver for HTML5
- Receiver for iOS
- Receiver for Linux
- Receiver for Mac
- Receiver for Playbook 1.0
- Receiver for Windows 8/RT
- Receiver for Web
- Secure Hub
When you configure the expression for Secure Hub, Receiver for Windows, Receiver for Mac, or Receiver for Web, the User-Agent header always starts with CitrixReceiver. More recent versions of Receiver that recognize the native protocols in Citrix Endpoint Management also include a header called X-Citrix-Gateway. When you create a rule, you can use AND (&&) or OR (||) to specify the condition for two configured expressions.
Important: Citrix recommends running the Quick Configuration wizard to configure all of the required policies for connections to Endpoint Management and StoreFront from Citrix Gateway. The following sections provide information about configuring the policies manually.
Configuring Virtual Servers
If Endpoint Management is part of your deployment, you need to create two virtual servers:
- The first virtual server is for users who connect by using Secure Hub. After user authentication occurs, this virtual server communicates directly with Endpoint Management.
- The second virtual server is users who connect by using Receiver for Web, Citrix Receiver for Windows, or Citrix Receiver for Mac. Receiver communicates directly with StoreFront, instead of the Endpoint Management, after Citrix Gateway authenticates users.
On each Citrix Gateway virtual server, you must install a server certificate that has a unique fully qualified domain name.
Configuring Session Policies
You configure session policies for Endpoint Management and StoreFront deployments. You can use the same policy expressions for both deployments, however the session profile settings are slightly different. The session policy expressions you configure depend on the version of Receiver and the Citrix Gateway plug-in you are using.
Some versions of Receiver do not fully support the StoreFront services protocols that allow direct connections through Citrix Gateway to stores in StoreFront. The earlier Receiver versions that do not support these protocols include:
- Receiver for Windows 3.0 and earlier versions
- Receiver for Mac 11.4 and earlier versions
- Receiver for Android 3.0 and earlier versions
- Receiver for iOS 5.5 and earlier version
The following table shows the policy expression to configure based on the version of Receiver and the Citrix Gateway plug-in you are using:
Receiver version does not support StoreFront services protocols | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER X-Citrix-Gateway NOTEXISTS |
Worx Home or Receiver version supports StoreFront services protocols | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER X-Citrix-Gateway EXISTS |
Citrix Gateway plug-in for Windows; Citrix Gateway plug-in for Mac | REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver && REQ.HTTP.HEADER Referer NOTEXISTS |
Receiver for Web | REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver && REQ.HTTP.HEADER Referer EXISTS |
Receiver for Windows 8/RT | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS WindowsRT |
When you configure the policy expression for Receiver versions, you can distinguish between the Receiver type in the policy expression.
Receiver for Android | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Android |
Receiver for BlackBerry 2.2 | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Blackberry |
Receiver for Chromebook | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Chromebook |
Receiver for HTML5 | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS HTML5 |
Receiver for iOS | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS iOS |
Receiver for Linux | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Linux |
Receiver for Mac | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS MacOSX |
Receiver for Playbook 1.0 | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Playbook |
Receiver for Windows 8/RT. 1.3 | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Win8 |
Receiver for Windows | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Windows |
Receiver for Windows Phone 8 | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS WindowsPhone |
Worx Home | REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER User-Agent CONTAINS Windows |
If you configure a session policy that supports StoreFront services protocols and Receiver for iOS, the expression might look like the following:
REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver && REQ.HTTP.HEADER X-Citrix-Gateway EXISTS && REQ.HTTP.HEADER User-Agent CONTAINS iOS/
To configure expressions in session policies
When you configure the expression for a session policy, use the following guidelines. You can use this procedure for Endpoint Management and StoreFront deployments.
- In the configuration utility, on the Configuration tab, in the navigation pane, expand Citrix Gateway > Policies and then click Session.
- In the details pane, click Add. Note: To modify a session policy, in the details pane, select the policy and then click Open.
- In the Create Citrix Gateway Session Policy dialog box, select Advanced Free-Form and then click Add.
- In the Add Expression dialog box, use the following parameters as a guideline for the expression:
- In Expression Type, select General.
- In Flow Type, select REQ.
- In Protocol, select HTTP.
- In Qualifier, select Header.
- In Operator, select CONTAINS, NOTCONTAINS, EXISTS, or NOTEXISTS depending on the expression.
- In Value, type the parameter, such as CitrixReceiver.
- In Header Name, type User-Agent and then click OK.
- After you save the first expression, click And in the Create Citrix Gateway Session Policy dialog box to add && to the expression and then click Add.
- Repeat Step 2 to configure the second rule.
- When you finish adding the rules, click Create and then click Close.
Configuring Session Profiles
When you configure session profiles for use with a session policy, you need to configure parameters that are specific for the type of connection the profile supports.
If the StoreFront IP address is a public IP address and if you disable split tunneling in the session profile, SSO functionality is internally disabled on Citrix Gateway. Users receive an access denied error message when they attempt to log on to StoreFront. You must enable split tunneling to allow SSO from a public IP address.
When you finish configuring the policy and profile, you then bind the session policy to the virtual server. You also need to assign a priority number for each session policy.
The session profiles you configure have different settings for Endpoint Management and StoreFront. For more information, see the topics for Endpoint Management and StoreFront later in this section.
Share
Share
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.