- NetScaler Gateway Release Notes
- About NetScaler Gateway
- Common Deployments
- What's New
- Known Issues
- Client Software Requirements
- Compatibility with Citrix Products
- Licensing
- FAQ
- Before Getting Started
- Upgrading
-
Installing the System
- Configuring NetScaler Gateway
- Using the Configuration Utility
- Policies and Profiles on NetScaler Gateway
- Viewing NetScaler Gateway Configuration Settings
- Configuring the NetScaler Gateway by Using Wizards
- Configuring the Host Name and FQDN on NetScaler Gateway
- Installing and Managing Certificates
- Testing Your NetScaler Gateway Configuration
- Creating Virtual Servers
- Configuring IP Addresses on NetScaler Gateway
- Resolving DNS Servers Located in the Secure Network
- Configuring DNS Virtual Servers
- Configuring Name Service Providers
- Configuring Server-Initiated Connections
- Configuring Routing on NetScaler Gateway
- Configuring Auto Negotiation
-
Authentication and Authorization
- Configuring Default Global Authentication Types
- Configuring Authentication Without Authorization
- Configuring Authorization
- Disabling Authentication
- Configuring Authentication for Specific Times
- How Authentication Policies Work
- Configuring Local Users
- Configuring Groups
- Configuring LDAP Authentication
- Configuring Client Certificate Authentication
- Configuring RADIUS Authentication
- Configuring SAML Authentication
- Configuring TACACS+ Authentication
- Configuring Multifactor Authentication
- Configuring Single Sign-On
- Configuring One-Time Password Use
- nFactor for Gateway Authentication
- Unified Gateway Visualizer
-
Configuring the VPN User Experience
- How User Connections Work with the NetScaler Gateway Plug-in
- Choosing the User Access Method
- Deploying NetScaler Gateway Plug-ins for User Access
- Selecting the NetScaler Gateway Plug-in for Users
-
Integrating the NetScaler Gateway Plug-in with Citrix Receiver
- How User Connections Work with Citrix Receiver
- Adding the NetScaler Gateway Plug-in to Citrix Receiver
- Decoupling the Citrix Receiver Icon
- Configuring IPv6 for ICA Connections
- IConfiguring the Receiver Home Page on NetScaler Gateway
- Applying the Receiver Theme to the Logon Page
- Creating a Custom Theme for the Logon Page
- Customizing the User Portal
- Configuring Clientless Access
- Configuring the Client Choices Page
- Configuring Access Scenario Fallback
-
Configuring Connections for the NetScaler Gateway Plug-in
- Configuring the Number of User Sessions
- Configuring Time-Out Settings
- Connecting to Internal Network Resources
- Configuring Split Tunneling
- Configuring Client Interception
- Configuring Name Service Resolution
- Enabling Proxy Support for User Connections
- Configuring Address Pools
- Supporting VoIP Phones
- Configuring Application Access for the NetScaler Gateway Plug-in for Java
- Configuring the Access Interface
- How a Traffic Policy Works
- Configuring Session Policies
-
Configuring Endpoint Polices
- How Endpoint Policies Work
- Evaluating User Logon Options
- Setting the Priority of Preauthentication Policies
- Configuring Preauthentication Policies and Profiles
- Configuring Post-Authentication Policies
- Configuring Security Preauthentication Expressions for User Devices
- Configuring Compound Client Security Expressions
- Advanced Endpoint Analysis Scans
- Managing User Sessions
- AlwaysON
- Configuring Unified Gateway
-
Deploying in a Double-Hop DMZ
- Deploying NetScaler Gateway in a Double-Hop DMZ
- How a Double-Hop Deployment Works
- Communication Flow in a Double-Hop DMZ Deployment
- Preparing for a Double-Hop DMZ Deployment
-
Installing and Configuring Netscaler Gateway in a Double-Hop DMZ
- Configuring Settings on the Virtual Servers on the NetScaler Gateway Proxy
- Configuring the Appliance to Communicate with the Appliance Proxy
- Configuring NetScaler Gateway to Handle the STA and ICA Traffic
- Opening the Appropriate Ports on the Firewalls
- Managing SSL Certificates in a Double-Hop DMZ Deployment
-
Using High Availability
- How High Availability Works
- Configuring Settings for High Availability
- Configuring Communication Intervals
- Synchronizing NetScaler Gateway Appliances
- Synchronizing Configuration Files in a High Availability Setup
- Configuring Command Propagation
- Configuring Fail-Safe Mode
- Configuring the Virtual MAC Address
- Configuring High Availability Pairs in Different Subnets
- Configuring Route Monitors
- Configuring Link Redundancy
- Understanding the Causes of Failover
- Forcing Failover from a Node
- Using Clustering
- Maintaining and Monitoring the System
- Integrating with Citrix Products
- How Users Connect to Applications, Desktops, and ShareFile
- Deploying with XenMobile App Edition, XenApp, and XenDesktop
-
Accessing XenApp and XenDesktop Resources with the Web Interface
- Integrating NetScaler Gateway with XenApp or XenDesktop
- Establishing a Secure Connection to the Server Farm
- Deploying with the Web Interface
- Setting Up a Web Interface Site to Work
- Configuring Communication with the Web Interface
- Configuring Additional Web Interface Settings on NetScaler Gateway
- Configuring Access to Applications and Virtual Desktops in the Web Interface
- Configuring SmartAccess
- Configuring SmartControl
-
Configuring Single Sign-On to the Web Interface
- To configure single sign-on to Web applications globally
- To configure single sign-on to Web applications by using a session policy
- To define the HTTP port for single sign-on to web applications
- Additional Configuration Guidelines
- To test the single sign-on connection to the Web Interface
- Configuring Single Sign-On to the Web Interface by Using a Smart Card
- To configure single sign-on for XenApp and file shares
- Allowing File Type Association
-
Integrating with App Controller or StoreFront
- How NetScaler Gateway and App Controller Integrate
- Creating Policies with the Quick Configuration Wizard
- Configuring NetScaler Gateway and App Controller
- Configuring Session Policies and Profiles for App Controller and StoreFront
- Configuring Custom Clientless Access Policies for Receiver
- Configuring Custom Clientless Access Policies for Receiver for Web
- Using WebFront to Integrate with StoreFront
- Integrate NetScaler Gateway with StoreFront
-
Configuring Settings for Your XenMobile Environment
- Configuring Load Balancing Servers for XenMobile
- Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
- Configuring XenMobile NetScaler Connector (XNC) ActiveSync Filtering
- Allowing Access from Mobile Devices with XenMobile Apps
- Configuring Domain and Security Token Authentication for XenMobile
- Configuring Client Certificate or Client Certificate and Domain Authentication
- Optimizing Network Traffic with CloudBridge
- RfWebUI Persona on Gateway UX Configuration
- RDP Proxy
- HDX Enlightened Data Transport Support
- Microsoft Intune Integration
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
This content has been machine translated dynamically.
This content has been machine translated dynamically.
This content has been machine translated dynamically.
Translation failed!
Creating a Web Interface 5.3 Site
When you create a Web Interface 5.3 site, you can require users to log on with either a web browser, Citrix Receiver, or Citrix Desktop Receiver. You can use the Citrix Web Interface Management console to create multiple Web Interface sites.
You can only enable single sign-on with a smart card to the Web Interface with Web Interface 5.3. This version of the Web Interface can run on XenApp 4.5, 5.0, and 6.0.
Web Interface 5.3 runs on the following operating systems:
- Windows Server 2003
- Windows Server 2008
- Windows Server 2008 R2
Note: XenApp 6.0 runs only on Windows Server 2008 R2.
To create a Web Interface 5.3 site
-
Click Start > All Programs > Citrix > Management Consoles > Citrix Web Interface Management.
-
In the left pane, select XenApp Web Sites. Users log on to the Web Interface using a Web browser.
-
On the Action menu, click Create Site.
-
Keep the default Internet Information Services (IIS) site and path and then click Next.
The default site path is /Citrix/XenApp or you can specify a path.
Note: If there are any preexisting XenApp Web sites that use the default path, an appropriate increment is added to distinguish the new site.
-
In Specify where user authentication takes place, select one of the following:
-
At Web Interface to have users authenticate using the Web Interface.
Select this option if the Web Interface is deployed as a standalone server parallel to NetScaler Gateway in the demilitarized zone (DMZ).
-
At Access Gateway to have users authenticate using the NetScaler Gateway appliance.
If you select this option, NetScaler Gateway authenticates users and initiates single sign-on to the Web Interface if it is configured on the appliance.
Note: If SmartAccess is configured on NetScaler Gateway, this setting enables SmartAccess in XenApp or XenDesktop.
-
-
Click Next.
-
in Step 5, in Authentication service URL, type the Web address to the NetScaler Gateway authentication service URL, such as
https://access.company.com/CitrixAuthService/AuthService.asmx
and then click Next. -
Under Authentication Options, select how users log on.
- Explicit. Users log on by using a Web browser.
- Smart Card. Users log on by using a smart card.
-
Click Next.
-
If you selected Smart Card in Step 8, select one of the following: - Prompt users for PIN. Users enter their personal identification number (PIN) when they start a published application or desktop. - Users do not have to enter their PIN when they start a published application or desktop.
You receive a summary screen showing your settings. Click Next to create the Web Interface site. When the site is successfully created, you are then prompted to configure the remaining settings in the Web Interface. Follow the instructions in the wizard to complete the configuration.