-
-
Configuring the VPN User Experience
-
How User Connections Work with the NetScaler Gateway Plug-in
-
Integrating the NetScaler Gateway Plug-in with Citrix Receiver
-
-
Maintaining and Monitoring the System
-
Deploying with XenMobile App Edition, XenApp, and XenDesktop
-
Accessing XenApp and XenDesktop Resources with the Web Interface
-
Configuring Additional Web Interface Settings on NetScaler Gateway
-
Configuring Access to Applications and Virtual Desktops in the Web Interface
-
Configuring Settings for Your XenMobile Environment
-
Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
-
Configuring XenMobile NetScaler Connector (XNC) ActiveSync Filtering
-
Configuring Domain and Security Token Authentication for XenMobile
-
Configuring Client Certificate or Client Certificate and Domain Authentication
-
HDX Enlightened Data Transport Support
-
Configuring NetScaler Gateway to Support Enlightened Data Transport
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已动态机器翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.
Este artigo foi traduzido automaticamente.
这篇文章已经过机器翻译.放弃
Translation failed!
Configuring NetScaler Gateway to Support Enlightened Data Transport
If you use Enlightened Data Transport (EDT), Datagram Transport Layer Security (DTLS) must be enabled to encrypt the UDP connection used by EDT. The DTLS parameter must be enabled at the Gateway VPN virtual-server level, and XenApp and XenDesktop components must be correctly upgraded and configured to achieve encrypted traffic between the Gateway VPN virtual server and the user device.
Note: UDP port (for example port 443) configured for the NetScaler Gateway front end virtual server must be opened in the DMZ for the virtual server to receive the DTLS connections. DTLS and CGP are prerequisites for EDT to work with NetScaler Gateway.
The following scenarios are supported:
Scenario | EDT support |
---|---|
NetScaler Gateway | Yes |
NetScaler Gateway with High Availability (HA) | Yes |
NetScaler Gateway with High Availability (HA) optimization | Yes |
NetScaler with Unified Gateway | Yes |
NetScaler Gateway with GSLB | Yes |
NetScaler Gateway with Cluster | Yes |
Citrix Receiver to NetScaler Gateway DTLS encryption | Yes |
Dual Secure Ticket Authority (STA) on NetScaler Gateway | Yes |
NetScaler Gateway ICA session timeout | Yes |
NetScaler Gateway Multi-Stream ICA | Yes |
NetScaler Gateway session reliability (Port 2598) | Yes |
NetScaler Gateway Double-Hop | Yes |
NetScaler to VDA DTLS encryption | No |
HDX Insight | No |
NetScaler Gateway in IPv6 mode | No |
NetScaler Gateway SOCKS (Port 1494) | No |
NetScaler pure LAN proxy | No |
Note: EDT support for NetScaler Gateway is available for port 2598 and not for port 1494.
To configure NetScaler Gateway to support EDT:
-
Deploy and configure NetScaler Gateway to communicate with StoreFront and authenticate users for XenApp and XenDesktop.
-
On the Configuration tab in the NetScaler GUI, expand NetScaler Gateway and select Virtual Servers.
-
Click Edit to display Basic Settings for the VPN virtual server, and then verify the state of the DTLS setting.
-
Click More to display other configuration options.
-
Select DTLS to provide communications security for datagram protocols. Click OK. The Basic Settings area for the VPN virtual server shows that the DTLS flag is set to True.
Note: If you make a DTLS setting change, you must unbind the SSL certificate and then bind it again to the gateway. Perform the following steps to do so.
-
Reopen the Server Certificate Binding screen and click the plus icon (+) to bind the certificate-key pair.
-
Next to the certificate-key pair that you bound, click Select.
-
Save the changes to the server-certificate binding.
-
When the certificate key pair appears, click Bind.
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select Do Not Agree to exit.