Product Documentation

Citrix Gateway Architecture

The core components of Citrix Gateway are:

  • Virtual servers. The Citrix Gateway virtual server is an internal entity that is a representative of all the configured services available to users. The virtual server is also the access point through which users access these services. You can configure multiple virtual servers on a single appliance, allowing one Citrix Gateway appliance to serve multiple user communities with differing authentication and resource access requirements.

  • Authentication, authorization, and accounting. You can configure authentication, authorization, and accounting to allow users to log on to Citrix Gateway with credentials that either Citrix Gateway or authentication servers located in the secure network, such as LDAP or RADIUS, recognize. Authorization policies define user permissions, determining which resources a given user is authorized to access. For more information about authentication and authorization, see Configuring Authentication and Authorization. Accounting servers maintain data about Citrix Gateway activity, including user logon events, resource access instances, and operational errors. This information is stored on Citrix Gateway or on an external server. For more information about accounting, see Configuring Auditing on Citrix Gateway
  • User connections. Users can log on to Citrix Gateway by using the following access methods:

    • The Citrix Gateway Plug-in for Windows is software that is installed on a Windows-based computer. Users log on by right-clicking an icon in the notification area on a Windows-based computer. If users are using a computer in which the Citrix Gateway Plug-in is not installed, they can log on by using a web browser to download and install the plug-in. If users have Citrix Receiver installed, users log on with the Citrix Gateway Plug-in from Receiver. When Receiver and the Citrix Gateway Plug-in are installed on the user device, Receiver adds the Citrix Gateway Plug-in automatically.

    • The Citrix Gateway Plug-in for Mac OS X that allows users running Mac OS X to log on. It has the same features and functions as the Citrix Gateway Plug-in for Windows. You can provide endpoint analysis support for this plug-in version by installing Citrix ADC Gatway 10.1, Build 120.1316.e.

    • The Citrix Gateway Plug-in for Java that enables Mac OS X, Linux, and optionally, Windows users to log on by using a web browser.

    • Receiver that allows user connections to published applications and virtual desktops in a server farm by using the Web Interface or Citrix StoreFront.

    • Receiver, Worx Home, WorxMail, and WorxWeb that allows users access to web and SaaS applications, iOS and Android mobile apps, and ShareFile data hosted in App Controller.

    • Users can connect from an Android device that uses the Citrix Gateway web address. When users start an app, the connection uses Micro VPN to route network traffic to the internal network. If users connect from an Android device, you must configure DNS settings on Citrix Gateway. For more information, see Supporting DNS Queries by Using DNS Suffixes for Android Devices.

    • Users can connect from an iOS device that uses the Citrix Gateway web address. You configure Secure Browse either globally or in a session profile. When users start an app on their iOS device, a VPN connection starts and the connection routes through Citrix Gateway.

    • Clientless access that provides users with the access they need without installing software on the user device.

      When configuring Citrix Gateway, you can create policies to configure how users log on. You can also restrict user logon by creating session and endpoint analysis policies.

  • Network resources. These include all network services that users access through Citrix Gateway, such as file servers, applications, and web sites.

  • Virtual adapter. The Citrix Gateway virtual adapter provides support for applications that require IP spoofing. The virtual adapter is installed on the user device when the Citrix Gateway Plug-in is installed. When users connect to the internal network, the outbound connection between Citrix Gateway and internal servers use the intranet IP address as the source IP address. The Citrix Gateway Plug-in receives this IP address from the server as part of the configuration.

    If you enable split tunneling on Citrix Gateway, all intranet traffic is routed through the virtual adapter. When intercepting intranet bound traffic, the virtual adapter will intercept A and AAAA record type DNS queries while leaving all other DNS queries intact. Network traffic that is not bound for the internal network is routed through the network adapter installed on the user device. Internet and private local area network (LAN) connections remain open and connected. If you disable split tunneling, all connections are routed through the virtual adapter. Any existing connections are disconnected and the user needs to reestablish the session.

    If you configure an intranet IP address, traffic to the internal network is spoofed with the intranet IP address through the virtual adapter.

Citrix Gateway Architecture

In this article