Product Documentation

NetScaler Gateway Architecture

The core components of NetScaler Gateway are:

  • Virtual servers. The NetScaler Gateway virtual server is an internal entity that is a representative of all the configured services available to users. The virtual server is also the access point through which users access these services. You can configure multiple virtual servers on a single appliance, allowing one NetScaler Gateway appliance to serve multiple user communities with differing authentication and resource access requirements.

  • Authentication, authorization, and accounting. You can configure authentication, authorization, and accounting to allow users to log on to NetScaler Gateway with credentials that either NetScaler Gateway or authentication servers located in the secure network, such as LDAP or RADIUS, recognize. Authorization policies define user permissions, determining which resources a given user is authorized to access. For more information about authentication and authorization, see Configuring Authentication and Authorization. Accounting servers maintain data about NetScaler Gateway activity, including user logon events, resource access instances, and operational errors. This information is stored on NetScaler Gateway or on an external server. For more information about accounting, see Configuring Auditing on NetScaler Gateway
  • User connections. Users can log on to NetScaler Gateway by using the following access methods:

    • The NetScaler Gateway Plug-in for Windows is software that is installed on a Windows-based computer. Users log on by right-clicking an icon in the notification area on a Windows-based computer. If users are using a computer in which the NetScaler Gateway Plug-in is not installed, they can log on by using a web browser to download and install the plug-in. If users have Citrix Receiver installed, users log on with the NetScaler Gateway Plug-in from Receiver. When Receiver and the NetScaler Gateway Plug-in are installed on the user device, Receiver adds the NetScaler Gateway Plug-in automatically.

    • The NetScaler Gateway Plug-in for Mac OS X that allows users running Mac OS X to log on. It has the same features and functions as the NetScaler Gateway Plug-in for Windows. You can provide endpoint analysis support for this plug-in version by installing NetScaler Gatway 10.1, Build 120.1316.e.

    • The NetScaler Gateway Plug-in for Java that enables Mac OS X, Linux, and optionally, Windows users to log on by using a web browser.

    • Receiver that allows user connections to published applications and virtual desktops in a server farm by using the Web Interface or Citrix StoreFront.

    • Receiver, Worx Home, WorxMail, and WorxWeb that allows users access to web and SaaS applications, iOS and Android mobile apps, and ShareFile data hosted in App Controller.

    • Users can connect from an Android device that uses the NetScaler Gateway web address. When users start an app, the connection uses Micro VPN to route network traffic to the internal network. If users connect from an Android device, you must configure DNS settings on NetScaler Gateway. For more information, see Supporting DNS Queries by Using DNS Suffixes for Android Devices.

    • Users can connect from an iOS device that uses the NetScaler Gateway web address. You configure Secure Browse either globally or in a session profile. When users start an app on their iOS device, a VPN connection starts and the connection routes through NetScaler Gateway.

    • Clientless access that provides users with the access they need without installing software on the user device.

      When configuring NetScaler Gateway, you can create policies to configure how users log on. You can also restrict user logon by creating session and endpoint analysis policies.

  • Network resources. These include all network services that users access through NetScaler Gateway, such as file servers, applications, and web sites.

  • Virtual adapter. The NetScaler Gateway virtual adapter provides support for applications that require IP spoofing. The virtual adapter is installed on the user device when the NetScaler Gateway Plug-in is installed. When users connect to the internal network, the outbound connection between NetScaler Gateway and internal servers use the intranet IP address as the source IP address. The NetScaler Gateway Plug-in receives this IP address from the server as part of the configuration.

    If you enable split tunneling on NetScaler Gateway, all intranet traffic is routed through the virtual adapter. When intercepting intranet bound traffic, the virtual adapter will intercept A and AAAA record type DNS queries while leaving all other DNS queries intact. Network traffic that is not bound for the internal network is routed through the network adapter installed on the user device. Internet and private local area network (LAN) connections remain open and connected. If you disable split tunneling, all connections are routed through the virtual adapter. Any existing connections are disconnected and the user needs to reestablish the session.

    If you configure an intranet IP address, traffic to the internal network is spoofed with the intranet IP address through the virtual adapter.

NetScaler Gateway Architecture

In this article