-
-
HDX Direct
-
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
HDX Direct (Preview)
When accessing Citrix-delivered resources, HDX Direct allows both internal and external client devices to establish a secure direct connection with the session host if direct communication is possible.
Important:
HDX Direct is currently in preview. This feature is provided without support and is not yet recommended for use in production environments. To submit feedback or report issues, use this form.
System requirements
The following are the system requirements for using HDX Direct:
-
Control plane
- Citrix DaaS
- Citrix Virtual Apps and Desktops 2311 or later
-
Virtual Delivery Agent (VDA)
- Windows: version 2311 or later
-
Workspace app
- Windows: version 2311 or later
-
Access tier
- Citrix Workspace with Citrix Gateway Service
- Citrix Workspace with NetScaler Gateway
-
Other
- Adaptive Transport must be enabled for external direct connections
Network requirements
The following are the network requirements for using HDX Direct.
Session hosts
If your session hosts have a firewall such as Windows Defender Firewall, you must allow the following inbound traffic for internal connections.
Description | Source | Protocol | Port |
---|---|---|---|
Direct internal connection | Client | TCP | 443 |
Direct internal connection | Client | UDP | 443 |
Note:
The VDA installer adds the appropriate inbound rules to Windows Defender Firewall. If you use a different firewall, you must add the rules above.
Client network
The following table describes the client network for internal and external users.
Internal users
Description | Protocol | Source | Source port | Destination | Destination port |
---|---|---|---|---|---|
Direct internal connection | TCP | Client network | 1024–65535 | VDA network | 443 |
Direct internal connection | UDP | Client network | 1024–65535 | VDA network | 443 |
External users
Description | Protocol | Source | Source port | Destination | Destination port |
---|---|---|---|---|---|
STUN (external users only) | UDP | Client network | 1024–65535 | Internet (see note below) | 3478, 19302 |
External user connection | UDP | Client network | 1024–65535 | Data center’s public IP address | 1024–65535 |
Data center network
The following table describes the data center network for internal and external users.
Internal users
Description | Protocol | Source | Source port | Destination | Destination port |
---|---|---|---|---|---|
Direct internal connection | TCP | Client network | 1024–65535 | VDA network | 443 |
Direct internal connection | UDP | Client network | 1024–65535 | VDA network | 443 |
External users
Description | Protocol | Source | Source port | Destination | Destination port |
---|---|---|---|---|---|
STUN (external users only) | UDP | VDA network | 1024–65535 | Internet (see note below) | 3478, 19302 |
External user connection | UDP | DMZ / Internal network | 1024–65535 | VDA network | 55000–55250 |
External user connection | UDP | VDA network | 55000–55250 | Client’s public IP | 1024–65535 |
Note:
Both the VDA and Workspace app attempt to send STUN requests to the following servers in the same order:
- stunserver.stunprotocol.org:3478
- employees.org:3478
- stun.l.google.com:19302
If you change the default port range for external user connections using the HDX Direct port range policy setting, the corresponding firewall rules must match your custom port range.
Configuration
HDX Direct is disabled by default. You can configure this feature using the HDX Direct setting in the Citrix policy.
- HDX Direct: To enable or disable a feature.
- HDX Direct mode: Determines if HDX Direct is available for internal clients only or for both internal and external clients.
- HDX Direct port range: Defines the port range that the VDA uses for connections from external clients.
Considerations
The following are considerations for using HDX Direct:
- HDX Direct for external users is only available with EDT (UDP) as the transport protocol. Therefore, Adaptive Transport must be enabled.
- If you are using HDX Insight, note that using HDX Direct prevents the HDX Insight data collection, as the session would no longer be proxied through NetScaler Gateway.
- When using non-persistent machines for your virtual apps and desktops, Citrix recommends enabling HDX Direct on the session hosts instead of in the master/template image so that each machine generates its own certificates.
- Using your own certificates with HDX Direct is not currently supported.
How it works
HDX Direct allows clients to establish a direct connection to the session host when direct communication is available. When direct connections are made using HDX Direct, self-signed certificates are used to secure the direct connection with network level-encryption (TLS/DTLS).
Internal users
The following diagram depicts the overview of the HDX Direct connection process of internal users.
- The client establishes an HDX session through the Gateway Service.
- Upon a successful connection, the VDA sends to the client the VDA machine’s FQDN, a list of its IP addresses, and the VDA machine’s certificate via the HDX connection.
- The client probes the IP addresses to see if it can reach the VDA directly.
- If the client can reach the VDA directly with any of the IP addresses shared, the client establishes a direct connection with the VDA, secured with (D)TLS using a certificate that matches the one exchanged in step (2).
- Once the direct connection is successfully established, the session is transferred to the new connection, and the connection to the Gateway Service is terminated.
Note:
After establishing the connection in step 2, above, the session is active. The subsequent steps do not delay or interfere with the user’s ability to use the virtual application or desktop. If any of the subsequent steps fail, the connection through the Gateway is maintained without interrupting the user’s session.
External users
The following diagram depicts the overview of the HDX Direct connection process for external users:
- The client establishes an HDX session through the Gateway Service.
- Upon a successful connection, both the client and the VDA send a STUN request to discover their public IP addresses and ports.
- The STUN server responds to the client and VDA with their corresponding public IP addresses and ports.
- Through the HDX connection, the client and the VDA exchange their public IP addresses and UDP ports, and the VDA sends its certificate to the client.
- The VDA sends UDP packets to the client’s public IP address and UDP port. The client sends UDP packets to the VDA’s public IP address and UDP port.
- Upon receipt of a message from the VDA, the client responds with a secure connection request.
- During the DTLS handshake, the client verifies that the certificate matches the certificate exchanged in step (4). After validation, the client sends its authorization token. A secure direct connection is now established.
- Once the direct connection is successfully established, the session is transferred to the new connection, and the connection to the Gateway Service is terminated.
Note:
After establishing the connection in step 2, above, the session is active. The subsequent steps do not delay or interfere with the user’s ability to use the virtual application or desktop. If any of the subsequent steps fail, the connection through the Gateway is maintained without interrupting the user’s session.
Certificate management
Session host
The following two services on the VDA machine handle certificate creation and management, both of which are set to run automatically at machine startup:
- Citrix ClxMtp Service: Responsible for CA certificate key generation and rotation.
- Citrix Certificate Manager Service: Responsible for generating and managing the self-signed root CA certificate and the machine certificates.
The following steps depict the certificate management process:
- The services start at machine startup.
-
Citrix ClxMtp Service
creates keys if none has been created already. - Citrix Certificate Manager Service checks if HDX Direct is enabled. If not, the service stops itself.
- If HDX Direct is enabled, the Citrix Certificate Manager Service checks if a self-signed root CA certificate exists. If not, a self-signed root certificate is created.
- Once a root CA certificate is available, the Citrix Certificate Manager Service checks if a self-signed machine certificate exists. If not, the service generates keys and creates a new certificate using the machine’s FQDN.
- If there is an existing machine certificate created by the Citrix Certificate Manager Service and the subject name does not match the machine’s FQDN, a new certificate is generated.
Note:
The Citrix Certificate Manager Service generates RSA certificates that leverage 2048-bit keys.
Client device
To successfully establish a secure HDX Direct connection, the client must trust the certificates used to secure the session. To facilitate this, the client receives the CA certificate for the session through the ICA file (supplied by Workspace), so it is not necessary to distribute CA certificates to the client devices’ certificate stores.
Share
Share
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.