The Always On feature of Citrix Gateway ensures that users are always connected to the enterprise network. This persistent VPN connectivity is achieved by an automatic establishment of a VPN tunnel.
Always On feature supports captive portals for Citrix ADC 12.0 Build 51.24 and later.
When to Use Always On
Use Always On when you need to provide seamless VPN connectivity based on user location and have to prevent network access by a user who is not connected to a VPN.
The following scenarios illustrate the use of Always On.
- An employee starts the laptop outside the enterprise network and needs assistance to establish VPN connectivity.
Solution: When the laptop is started outside the enterprise network, Always On seamlessly establishes a tunnel and provides VPN connectivity.
- An employee using VPN connectivity moves into the enterprise network. The employee is switched to an enterprise network but remains connected to the VPN tunnel, which is not a desirable state.
Solution: When the employee moves into the enterprise network, Always On tears down the VPN tunnel and seamlessly switches the employee to the enterprise network.
- An employee moves outside the enterprise network and closes the laptop (not shut down). The employee needs assistance to establish VPN connectivity upon resuming work on the laptop.
Solution: When the employee moves outside the enterprise network, Always On seamlessly establishes a tunnel and provides VPN connectivity.
- An enterprise wants to regulate the network access provided to its users when they are not connected to a VPN tunnel.
Solution: Depending on the configuration, Always On restricts access, allowing users to access only the gateway network.
Understanding the Always On Framework
Always On automatically connects a user to a VPN tunnel that the client has previously established. The first time the user needs a VPN tunnel, the user must connect to the Citrix Gateway URL and establish the tunnel. After the Always On configuration is downloaded to the client, this configuration drives the subsequent establishment of the tunnel.
The Citrix Gateway client executable is always running on the client machine. When the user logs on or the network changes, the Citrix Gateway client determines whether the user laptop is on the enterprise network. Depending upon the location and the configuration, the Citrix Gateway client either establishes a tunnel or tears down an existing tunnel.
Tunnel establishment is initiated only after the user logs on to the computer. The Citrix Gateway client uses the client machine’s credentials to authenticate with the gateway server and tries to establish a tunnel.
Automatic reestablishment of a Tunnel
Automatic reestablishment of a tunnel is triggered when a VPN tunnel is torn down by Citrix Gateway.
In End-Point Analysis failure, the Citrix Gateway client does not reattempt tunnel establishment, but does display an error message. If there is an authentication failure, the Citrix Gateway client prompts the user for credentials.
Supported user authentication methods for seamless tunnel establishment
The supported user authentication methods are as follows:
- User name + AD password: If the Windows user name and password are used for authentication, the Citrix Gateway client seamlessly establishes the tunnel by using these credentials.
- User certificate: If a user certificate is used for authentication and there is only one certificate on the machine, the Citrix Gateway client seamlessly establishes the tunnel by using this certificate. If multiple client certificates are installed, the tunnel is established after the user has selected the preferred certificate. The Citrix Gateway client uses this preference for later established tunnels.
- User certificate and User name + AD password: This authentication method is the combination of previously described authentication methods.
All other authentication mechanisms are supported but the tunnel establishment is not seamless for any other authentication methods. User intervention is required for all other authentication methods.
Configuration Requirements for Always On
Enterprise administrator must enforce the following for the managed devices:
- User must not be able to end the process/service for specific configuration
- User must not be able to uninstall the package for specific conﬁguration
- User must not be able to change specific registry entries
The feature might not work as expected if the user has administration privileges, as in the case of non-managed devices.
Considerations While Enabling the Always On feature
Review the following section before enabling the Always On feature.
Primary Network Access: When the tunnel is established, the traffic to the enterprise network is decided based on split-tunnel configuration. Other configurations are not provided to override this behavior.
Proxy settings of client machine: Proxy settings of the client machine are ignored for connecting to the gateway server.
The Citrix ADC appliance’s proxy configuration is not ignored. Only the proxy settings of the client machine are ignored. Users who have a proxy configured on their systems are notified that the VPN plug-in has ignored their proxy settings.
When the configuration value is set to “Deny,” the following changes apply:
- Client UI - The logoff and Exit options from the plug-in context menu and plug-in UI are disabled. Users are not allowed to change the Gateway URL.
- Browser logon - Browser log on to a different gateway is not allowed. Client controls are disabled.
Configuring Always On
To configure Always On, create an Always On profile on the Citrix Gateway appliance and apply the profile.
To create an Always On profile:
- In the Citrix ADC GUI, navigate to Configuration > Citrix Gateway > Policies >
- On the
AlwaysONProfiles page, click Add.
- On the Create
AlwaysONProfile page, enter the following details:
- Name – The name for your profile.
- **Location Based VPN (client-side registry name: LocationDetection) – Select one of the following settings:
- Remote to enable a client to detect whether it is in the enterprise network and establish the tunnel if not in the enterprise network. Remote is the default setting.
- Everywhere to let a client skip the location detection and establish the tunnelregardless of the client’s location
Client Control – Select one of the following settings:
- Deny to prevent the user from logging off and connecting to another gateway. Deny is the default setting.
- Allow to enable user to log off and connect to another gateway.
Network Access On VPN Failure (client-side registry name: AlwaysOn) – Select one of the following settings:
- Full Access to allow network traffic to flow to and from the client when the tunnel is not established. Full Access is the default setting.
Only To Gateway to prevent network traffic from flowing to or from the client when the tunnel is not established. However, the traffic to or from the Gateway IP address is allowed.
Note: In Only To Gateway mode, only the virtual server, DNS, and DHCP traffic are unblocked. To unblock other websites, IP address ranges, or IP addresses, you must set the
alwaysonwhitelistregistry with a semicolon-separated list of FQDNs, IP address ranges, or IP addresses. For example, mycompany.com,mycdn.com,10.120.67.0-10.120.67.255,184.108.40.206
- Click Create to finish creating your profile.
To apply the Always On profile:
- In the Citrix ADC interface, select Configuration > Citrix Gateway > Global Settings.
- On the Global Settings page, click the Change Global Settings link, and then select the Client Experience tab.
- From the AlwaysON Profile Name drop down menu, select the newly created profile, and click OK.
Similar configuration can be done in the Session profile to apply the policies at a group level, server lever, or a user level.
Note on IIPs
Machine level tunnel uses certificate-based authentication and the session that is created has the certificate’s common name as a user name. So, if device certificates have unique common names, different machines’ sessions have different user name and thus different IIPs. Ensure that you generate a device certificate with unique names. Ideally, you must use machine names as the device certificate’s common name.
Behavior summary of different configurations for admin users and non-admin users
The following table summarizes the behavior for different configurations. It also details the possibility of certain user actions, which can affect Always On functionality.
|networkAccessONVPNFailure||Client control||Non-admin user||Admin user|
||Allow||The tunnel gets established automatically. The user can log off and stay off the network. The user can also point to another Citrix Gateway.||The tunnel gets established automatically. The user can log off and stay off the enterprise network. The user can also point to another Citrix Gateway.|
||Deny||The tunnel gets establish automatically. The user cannot log off or point to another Citrix Gateway.||The tunnel gets established automatically. The user can uninstall the Citrix Gateway Client or move to another Citrix Gateway.|
|onlyToGateway||Allow||The tunnel gets established automatically. The user can log off (no network access). The user can also point to another Citrix Gateway, in which case, the access is given only to the newly pointed Citrix Gateway.||The tunnel gets established automatically. The user can uninstall the Citrix Gateway Client or move to another Citrix Gateway.|
|onlyToGateway||Deny||The tunnel gets establish automatically. The user cannot log off or point to another Citrix Gateway.||The tunnel gets established automatically. The user can uninstall the Citrix Gateway Client or move to another Citrix Gateway.|
Whitelisting URLs when Always On is down
Users can access a few websites even when Always On is down and the network is locked. Admins can use the AlwaysOnWhitelist registry to add the websites that you want to enable access to when Always On is down.
- AlwaysOnWhitelist registry is supported from release 13.0 build 47.x and later.
- AlwaysOnWhitelist registry location is Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\Secure Access Client.
- Wildcard URLs/FQDNs are not supported in the AlwaysOnWhitelist registry.
To set the AlwaysOnWhitelist registry
Set the AlwaysOnWhitelist registry with a semicolon-separated list of FQDNs, IP address ranges, or IP addresses that you want to allow access to.
The following figure displays a sample AlwaysOnWhitelist registry.