The AlwaysON feature of Citrix Gateway ensures that users are always connected to the enterprise network. This persistent VPN connectivity is achieved by automatic establishment of a VPN tunnel.
AlwaysON feature supports captive portals for Citrix ADC 12.0 Build 51.24 and later.
When to Use AlwaysON
Use AlwaysON when you need to provide seamless VPN connectivity based on user location and have to prevent network access by a user who is not connected to a VPN.
The following scenarios illustrate the use of AlwaysON.
- An employee starts the laptop outside the enterprise network and needs assistance to establish VPN connectivity.
Solution: When the laptop is started outside the enterprise network, AlwaysON seamlessly establishes a tunnel and provides VPN connectivity.
- An employee using VPN connectivity moves into the enterprise network. The employee is switched to enterprise network but remains connected to the VPN tunnel, which is not a desirable state.
Solution: When the employee moves into the enterprise network, AlwaysOn tears down the VPN tunnel and seamlessly switches the employee to the enterprise network.
- An employee moves outside the enterprise network and closes the laptop (not shut down). The employee needs assistance to establish VPN connectivity upon resuming work on the laptop.
Solution: When the employee moves outside the enterprise network, AlwaysON seamlessly establishes a tunnel and provides VPN connectivity.
- An enterprise wants to regulate the network access provided to its users when they are not connected to a VPN tunnel.
Solution: Depending on the configuration, AlwaysON restricts access, allowing users to access only the gateway network.
Understanding the AlwaysON Framework
AlwaysON automatically connects a user to a VPN tunnel that the client has previously established. The first time the user needs a VPN tunnel, the user must connect to the Citrix Gateway URL and establish the tunnel. After the AlwaysON configuration is downloaded to the client, this configuration drives subsequent establishment of the tunnel.
The Citrix Gateway client executable is always running on the client machine. When the user logs on or the network changes, the Citrix Gateway client determines whether or not the user laptop is on the enterprise network. Depending upon the location and the configuration, the Citrix Gateway client either establishes a tunnel or tears down an existing tunnel.
Tunnel establishment is initiated only after the user logs on to the computer. The Citrix Gateway client uses the client machine’s credentials to authenticate with Gateway server and tries to establish a tunnel.
Automatic reestablishment of a Tunnel
Automatic reestablishment of a tunnel is triggered when a VPN tunnel is torn down by Citrix Gateway.
In End-Point Analysis failure, the Citrix Gateway client does not reattempt tunnel establishment, but does display an error message. If there is an authentication failure, the Citrix Gateway client prompts user for credentials.
Supported user authentication methods for seamless tunnel establishment
The supported user authentication methods are as follows:
- User name + AD password: If the Windows user name and password are used for authentication, the Citrix Gateway client seamlessly establishes the tunnel by using these credentials.
- User certificate: If user certificate is used for authentication and there is only one certificate on the machine, the Citrix Gateway client seamlessly establishes the tunnel by using this certificate. If multiple client certificates are installed, the tunnel is established after the user has selected the preferred certificate. The Citrix Gateway client uses this preference for later established tunnels.
- User certificate and User name + AD password: This authentication method is the combination of previously described authentication methods.
All other authentication mechanisms are supported but the tunnel establishment is not seamless for any other authentication methods. User intervention is required for all other authentication methods.
Configuration Requirements for AlwaysON
Enterprise administrator must enforce the following for the managed devices:
- User must not be able to end the process/service for specific configuration
- User must not be able to uninstall the package for specific conﬁguration
- User must not be able to change specific registry entries
The feature might not work as expected if the user has administration privileges, as in the case of non-managed devices.
Considerations While Enabling the AlwaysON feature
Review the following section before enabling the AlwaysON feature.
Primary Network Access: When the tunnel is established, the traffic to the enterprise network is decided based on split-tunnel configuration. Additional configurations are not provided to override this behavior.
Proxy settings of client machine: Proxy settings of the client machine are ignored for connecting to the gateway server.
The Citrix ADC appliance’s proxy configuration is not ignored. Only the proxy settings of the client machine are ignored. Users who have a proxy configured on their systems are notified that the VPN plug-in has ignored their proxy settings.
When the configuration value is set to “Deny,” the following changes apply:
- Client UI - The logoff and Exit options from the plug-in context menu and plug-in UI are disabled. Users are not allowed to change the Gateway URL.
- Browser logon - Browser log on to a different gateway is not allowed. Client controls are disabled.
To configure AlwaysON, create an AlwaysOn profile on the Citrix Gateway appliance and apply the profile.
To create an AlwaysOn profile:
- In the Citrix ADC GUI, navigate to Configuration > Citrix Gateway > Policies > AlwaysON.
- On the AlwaysON Profiles page, click Add.
- On the Create AlwaysON Profile page, enter the following details:
- Name – The name for your profile.
Location Based VPN – Select one of the following settings:
- Remote to enable a client to detect whether or not it is in the enterprise network and establish the tunnel if not in the enterprise network. This is the default setting.
- Everywhere to let client skip the location detection and establish the tunnelregardless of the client’s location
Client Control – Select one of the following settings:
- Deny to prevent the user from logging off and connecting to another gateway. This is the default setting.
- Allow to enable user to log off and connect to another gateway.
Network Access On VPN Failure – Select one of the following settings:
- Full Access to allow network traffic to flow to and from the client when the tunnel is not established. This is the default setting.
Only To Gateway to prevent network traffic from flowing to or from the client when the tunnel is not established. However, the traffic to or from the Gateway IP address is allowed.
Note: In Only To Gateway mode, only the virtual server, DNS, and DHCP traffic are unblocked. To unblock other websites, IP address ranges, or IP addresses, you must set the alwaysonwhitelist registry with a semicolon-separated list of FQDNs, IP address ranges, or IP addresses.
For example, mycompany.com,mycdn.com,10.120.67.0-10.120.67.255,18.104.22.168
- Click Create to finish creating your profile.
To apply the AlwaysOn profile:
- In the Citrix ADC interface, select Configuration > Citrix Gateway > Global Settings.
- On the Global Settings page, click the Change Global Settings link, and then select the Client Experience tab.
- From the AlwaysON Profile Name drop down menu, select the newly created profile, and click OK.
Similar configuration can be done in Session profile to apply the policies at a group level, server lever, or a user level.
Behavior summary of different configurations for admin users and non-admin users
The table below summarizes the behavior for different configurations. It also details the possibility of certain user actions, which can affect AlwaysON functionality.
|networkAccessONVPNFailure||Client control||Non-admin user||Admin user|
|fullaccess||Allow||The tunnel gets established automatically. The user can log off and stay off the network. The user can also point to another Citrix Gateway.||The tunnel gets established automatically. The user can log off and stay off the enterprise network. The user can also point to another Citrix Gateway.|
|fullaccess||Deny||The tunnel gets establish automatically. The user cannot log off or point to another Citrix Gateway.||The tunnel gets established automatically. The user can uninstall Citrix Gateway Client or move to another Citrix Gateway.|
|onlyToGateway||Allow||The tunnel gets established automatically. The user can log off (no network access). The user can also point to another Citrix Gateway, in which case, the access is given only to the newly pointed Citrix Gateway.||The tunnel gets established automatically. The user can uninstall Citrix Gateway Client or move to another Citrix Gateway.|
|onlyToGateway||Deny||The tunnel gets establish automatically. The user cannot log off or point to another Citrix Gateway.||The tunnel gets established automatically. The user can uninstall Citrix Gateway Client or move to another Citrix Gateway.|
Whitelisting URLs when AlwaysOn is down
Users can access a few websites even when AlwaysON is down and the network is locked. Admins can use the AlwaysOnWhitelist registry to add the websites that you want to enable access to when AlwaysOn is down.
- AlwaysOnWhitelist registry is supported from release 13.0 build 47.x and later.
- AlwaysOnWhitelist registry location is Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\Secure Access Client.
- Wildcard URLs/FQDNs are not supported in the AlwaysOnWhitelist registry.
To set the AlwaysOnWhitelist registry
Set the AlwaysOnWhitelist registry with a semicolon-separated list of FQDNs, IP address ranges, or IP addresses that you want to allow access to.
The following figure displays a sample AlwaysOnWhitelist registry.