Product Documentation

Configuring NetScaler Gateway to Support Enlightened Data Transport

Jan 31, 2018

If you use Enlightened Data Transport (EDT), Datagram Transport Layer Security (DTLS) must be enabled to encrypt the UDP connection used by EDT. The DTLS parameter must be enabled at the Gateway VPN virtual-server level, and XenApp and XenDesktop components must be correctly upgraded and configured to achieve encrypted traffic between the Gateway VPN virtual server and the user device. 

The following scenarios are supported:

Scenario EDT support

NetScaler Gateway

Yes

NetScaler Gateway with High Availability (HA)

Yes

NetScaler Gateway with High Availability (HA) optimization

Yes

NetScaler with Unified Gateway

Yes

NetScaler Gateway with GSLB

Yes

NetScaler Gateway with Cluster

Yes

Citrix Receiver to NetScaler Gateway DTLS encryption

Yes

Dual Secure Ticket Authority (STA) on NetScaler Gateway

Yes

NetScaler Gateway ICA session timeout

Yes

NetScaler Gateway Multi-Stream ICA 

Yes

NetScaler Gateway  session reliability (Port 2598)

Yes

NetScaler Gateway Double-Hop

Yes

NetScaler to VDA DTLS encryption

No

HDX Insight

No

NetScaler Gateway in IPv6 mode

No

NetScaler Gateway  SOCKS (Port 1494)

No

NetScaler pure LAN proxy

No

NetScaler GWaaS (Gateway as a Service)

No

Note:  EDT support for NetScaler Gateway is available for port 2598 and not for port 1494.

 

To configure NetScaler Gateway to support EDT:

     1. Deploy and configure NetScaler Gateway to communicate with StoreFront and authenticate users for XenApp and XenDesktop.

     2. On the Configuration tab in the NetScaler GUI, expand NetScaler Gateway and select Virtual Servers.

localized image

     3. Click Edit to display Basic Settings for the VPN Virtual Server, and then verify the state of the DTLS setting.

localized image

     4. Click More to display additional configuration option.

localized image

     5. Select DTLS to provide communications security for datagram protocols. Click OK. The Basic Settings area for the VPN Virtual Server shows that the DTLS flag is set to True. 

localized image

     6. Reopen the Server Certificate Binding screen and click the plus icon (+) to bind the certificate-key pair.

localized image

     7. Next to the certificate-key pair that you just bound, click Select.

localized image

     8. Save the changes to the server-certificate binding.

     9. When the certificate key pair appears, click Bind.