citrix access gateway enterprise edition administrator’s guide

Upload: daniel-chia

Post on 31-Oct-2015

155 views

Category:

Documents


0 download

DESCRIPTION

Citrix Access Gateway Enterprise EditionAdministrator’s Guide. This is the guide for the 9.1 version of the AGEE.

TRANSCRIPT

  • Citrix Access Gateway 9.1, Enterprise Edition

    Citrix Access Gateway Enterprise EditionAdministrators Guide

  • Copyright and Trademark NoticeUse of the product documented in this guide is subject to your prior acceptance of the End User License Agreement. A printable copy of the End User License Agreement is included with the installation media.

    Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Citrix Systems, Inc.

    2009 Citrix Systems, Inc. All rights reserved.

    Citrix and ICA (Independent Computing Architecture) are registered trademarks and Citrix Access Gateway is a trademark of Citrix Systems, Inc. in the United States and other countries.

    All other trademarks and registered trademarks are the property of their respective owners.

    Document Code: September 3, 2009 (KKW)

  • CONTENTS

    Contents

    Chapter 1 WelcomeHow to Use this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13Getting Service and Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

    Additional Maintenance Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Subscription Advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Knowledge Center Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Education and Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

    Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

    Chapter 2 Introducing Citrix Access Gateway Enterprise EditionNew Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18Access Gateway Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19How the Access Gateway Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21Hardware Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

    Access Gateway MPX 5500 Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22Access Gateway Model 7000 Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Access Gateway Model 9000 Appliance with FIPS Option . . . . . . . . . . . . . . .23Access Gateway Model 9010 Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Access Gateway Model 10010 Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

    Chapter 3 Planning Your DeploymentPlanning for Security with the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . .25

    Configuring Secure Certificate Management . . . . . . . . . . . . . . . . . . . . . . . . . . .25Configuring Authentication Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

    Deploying the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Deploying the Access Gateway in the Network DMZ . . . . . . . . . . . . . . . . . . . . . .27

    Installing the Access Gateway in the DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . .27Access Gateway Connectivity in the DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

  • 4 Access Gateway Enterprise Edition Administrators Guide

    Deploying the Access Gateway in a Secure Network. . . . . . . . . . . . . . . . . . . . . . . 28Access Gateway Connectivity in a Secure Network . . . . . . . . . . . . . . . . . . . . . 28

    Deploying the Access Gateway to Access Published Applications . . . . . . . . . . . . 29Deploying the Access Gateway in the DMZ with a Server Farm . . . . . . . . . . . 29

    Deploying the Access Gateway in a Double-Hop DMZ. . . . . . . . . . . . . . . . . . . . . 31

    Chapter 4 Getting Started with Citrix Access GatewayIdentifying Access Gateway Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Using the Configuration Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Configuring the Access Gateway Using Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . 36

    How the Setup Wizard Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36How the Access Gateway Wizard Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37How the Published Applications Wizard Works . . . . . . . . . . . . . . . . . . . . . . . . 37

    Installing the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38Getting Ready to Install the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 38Installing the Access Gateway MPX 5500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39Installing the Access Gateway Model 7000. . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Installing the Access Gateway Model 9010 or 10010 . . . . . . . . . . . . . . . . . . . . 41

    Configuring Settings Using the Serial Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . 44Configuring Settings Using the Configuration Utility . . . . . . . . . . . . . . . . . . . . . . 44

    Configuring TCP/IP Settings Using the Setup Wizard . . . . . . . . . . . . . . . . . . . 45Configuring Settings Using the Access Gateway Wizard . . . . . . . . . . . . . . . . . 46Configuring Auto Negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    Configuring the Host Name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Defining the Fully-Qualified Domain Name . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    Installing Licenses on the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47What the Platform License Is . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48What the Universal License Is . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

    Configuring Settings with the Access Gateway Policy Manager . . . . . . . . . . . . . . 51Creating Additional Virtual Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

    Configuring IPv6 for Client Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54Configuring IP Addresses on the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . 55

    Changing the Mapped IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Configuring Subnet IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56How the Access Gateway Uses IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . 56

    Configuring Routing on the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56Configuring a Static Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

    Testing Your Access Gateway Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Configuring Name Service Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

  • Contents 5

    Chapter 5 Configuring High AvailabilityHow High Availability Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

    Gathering Information for High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . .62Configuring the Access Gateway for High Availability . . . . . . . . . . . . . . . . . . . . .63

    Adding a High Availability Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63Adding an RPC Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64Configuring the Primary and Secondary Appliances for High Availability . . .65Disabling Access Gateway Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . .65

    Customizing Your High Availability Deployment . . . . . . . . . . . . . . . . . . . . . . . . .66Synchronizing Access Gateway Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66

    Enabling and Disabling Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66Enabling High Availability Propagation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68

    Disabling Propagation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68Troubleshooting Command Propagation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

    Forcing the Primary Access Gateway to Stay Primary . . . . . . . . . . . . . . . . . . . . . .69Forcing the Secondary Appliance to Stay Secondary . . . . . . . . . . . . . . . . . . . . . . .70Forcing Failover between Access Gateway Appliances . . . . . . . . . . . . . . . . . . . . .71

    Forcing Failover on the Primary Access Gateway . . . . . . . . . . . . . . . . . . . . . . .72Forcing Failover on the Secondary Access Gateway . . . . . . . . . . . . . . . . . . . . .72Forcing Failover in Listen Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72

    Configuring the Virtual MAC Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73Configuring the Virtual MAC Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73Deleting a Virtual MAC Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74Binding and Unbinding a Virtual MAC Address . . . . . . . . . . . . . . . . . . . . . . . .74

    Configuring High Availability Pairs over Routed Networks. . . . . . . . . . . . . . . . . .74How Independent Network Configuration Works . . . . . . . . . . . . . . . . . . . . . . .75Configuring an Independent Network Computing High Availability Pair . . . .76

    Configuring Route Monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76Configuring Link Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77

    Chapter 6 Installing and Managing CertificatesInstalling Certificates on the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . .80

    Creating a Private Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81Creating a Certificate Signing Request. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82Installing the Signed Certificate on the Access Gateway. . . . . . . . . . . . . . . . . .83Unbinding Test Certificates from the Virtual Server . . . . . . . . . . . . . . . . . . . . .84Configuring Intermediate Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84Importing an Existing Certificate to the Access Gateway . . . . . . . . . . . . . . . . .87

  • 6 Access Gateway Enterprise Edition Administrators Guide

    Chapter 7 Configuring Policies and Profiles on the Access GatewayHow Policies Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

    Setting Priorities of Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90Configuring Conditional Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

    Configuring System Expressions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Configuring Client Security Expressions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Creating Simple Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Creating Compound Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Adding Custom Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

    Creating Policies on the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93How Session Policies Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

    Creating a Session Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95Binding Session Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

    How a Traffic Policy Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Creating a Traffic Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Binding a Traffic Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99Removing Traffic Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

    Allowing File Type Association . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100Creating a Web Interface Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Configuring the Access Gateway for File Type Association . . . . . . . . . . . . . 102Configuring Citrix XenApp for File Type Association . . . . . . . . . . . . . . . . . . 104

    How TCP Compression Policies Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105Creating a TCP Compression Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Monitoring TCP Compression on Client Connections . . . . . . . . . . . . . . . . . . 109

    Chapter 8 Configuring Authentication and AuthorizationConfiguring Authentication on the Access Gateway . . . . . . . . . . . . . . . . . . . . . . 112

    Authentication Types Supported on the Access Gateway. . . . . . . . . . . . . . . . 112Configuring Authentication without Authorization. . . . . . . . . . . . . . . . . . . . . 113

    Configuring Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Configuring Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

    Adding Users to Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116Configuring Session Policies with Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

    How Authentication Policies Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Configuring Authentication Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117Binding Authentication Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Setting Priorities for Authentication Policies. . . . . . . . . . . . . . . . . . . . . . . . . . 120

    Configuring LDAP Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Determining Attributes in your LDAP Directory . . . . . . . . . . . . . . . . . . . . . . 124

  • Contents 7

    Configuring RADIUS Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125Choosing RADIUS Authentication Protocols . . . . . . . . . . . . . . . . . . . . . . . . .126Configuring IP Address Extraction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126

    Configuring the Access Gateway to Use One-Time Passwords . . . . . . . . . . . . . .127Configuring RSA SecurID Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . .127Configuring Password Return with RADIUS. . . . . . . . . . . . . . . . . . . . . . . . . .129Configuring SafeWord Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130Configuring Gemalto Protiva Authentication. . . . . . . . . . . . . . . . . . . . . . . . . .131

    Configuring NTLM Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131Configuring TACACS+ Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132Configuring Client Certificate Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . .133

    Configuring a Client Certificate as a Secondary Method of Authentication . .136Configuring a Smart Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .136Configuring a Common Access Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137

    Configuring Multifactor Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137Setting Priorities for Authentication Policies . . . . . . . . . . . . . . . . . . . . . . . . . .137Configuring Double-Source Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . .139

    Disabling Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142Configuring the Number of User Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

    Configuring the Global User Limit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143Configuring Authentication for Specific Times. . . . . . . . . . . . . . . . . . . . . . . . . . .143Configuring Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144

    Setting Default Global Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144Configuring Authorization Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145Setting the Priority for Authorization Policies . . . . . . . . . . . . . . . . . . . . . . . . .147

    Configuring LDAP Group Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147Group Memberships from Group Objects Working Evaluations . . . . . . . . . .148Group Memberships from Group Objects Non-Working Evaluations . . . . . .148LDAP Group Attribute Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149Configuring LDAP Nested Group Extraction . . . . . . . . . . . . . . . . . . . . . . . . .149

    Configuring RADIUS Group Extraction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150Configuring LDAP Group Extraction for Multiple Domains . . . . . . . . . . . . . . . .152

    Creating Session Policies for Group Extraction . . . . . . . . . . . . . . . . . . . . . . . .153Creating LDAP Authentication Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154Creating Groups and Binding Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156

    Chapter 9 Access Gateway Client Connection MethodsChoosing the Client Access Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160Configuring Citrix XenApp Plug-in for Hosted Apps. . . . . . . . . . . . . . . . . . . . . .160

    How Users Connect to a Server Farm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161

  • 8 Access Gateway Enterprise Edition Administrators Guide

    Configuring the Access Gateway Plug-in for Windows. . . . . . . . . . . . . . . . . . . . 163Installing the Access Gateway Plug-in. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163Deploying the Access Gateway Plug-in from Active Directory . . . . . . . . . . . 164Monitoring and Ending User Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Configuring Access to Published Applications Using the Access Gateway Plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

    How the Access Gateway Plug-in for ActiveX Works. . . . . . . . . . . . . . . . . . . . . 170Using the Access Gateway Plug-in for ActiveX . . . . . . . . . . . . . . . . . . . . . . . 170

    Selecting the Plug-in Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Connecting Using the Access Gateway Plug-in for Java . . . . . . . . . . . . . . . . . . . 172How Clientless Access Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

    Enabling Clientless Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174How Clientless Access Policies Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176Configuring Domain Access for Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178Configuring Clientless Access for SharePoint 2003 and SharePoint 2007. . . 179

    Configuring the Client Choices Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181Showing the Client Choices Page at Logon. . . . . . . . . . . . . . . . . . . . . . . . . . . 182Configuring Client Choices Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

    Configuring Access Scenario Fallback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Using the Repeater Plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189How SmartAccess Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

    Chapter 10 Configuring Connections for the Access Gateway Plug-inHow User Connections Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

    Establishing the Secure Tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194Tunneling Private Network Traffic over Secure Connections . . . . . . . . . . . . 195Terminating the Secure Tunnel and Returning Packets to the Client . . . . . . . 196Supporting the Access Gateway Plug-in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

    Connecting to Internal Network Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Enabling Proxy Support for Client Connections. . . . . . . . . . . . . . . . . . . . . . . . . . 198Configuring Time-Out Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199Configuring Single Sign-On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

    Configuring Single Sign-On with Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 202Configuring Single Sign-On to Web Applications . . . . . . . . . . . . . . . . . . . . . 203Configuring Single Sign-On to a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

    Configuring Client Interception. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206Configuring Intranet Applications for the Access Gateway Plug-in. . . . . . . . 206Configuring Intranet Applications for the Access Gateway Plug-in for Java. 208

    Configuring IP Pooling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208Defining the IP Pooling Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

  • Contents 9

    Configuring Split Tunneling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .214Configuring Split Tunneling and Authorization. . . . . . . . . . . . . . . . . . . . . . . .215

    Configuring Name Service Resolution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215Supporting Voice over IP Phones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216Configuring Application Access for the Access Gateway Plug-in for Java . . . . .217

    Accessing Applications using the HOSTS File Modification Method . . . . . .217Accessing Applications Using the SourceIP and SourcePort Method. . . . . . .218

    Chapter 11 Configuring the Access InterfaceEnabling the Access Interface or Customized Home Page . . . . . . . . . . . . . . . . . .220

    Changing the Access Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .221Creating and Applying Web and File Share Links. . . . . . . . . . . . . . . . . . . . . .221

    Chapter 12 Configuring Endpoint PolicesHow Endpoint Policies Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .223

    System Requirements for Endpoint Analysis . . . . . . . . . . . . . . . . . . . . . . . . . .224Evaluating Client Logon Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .225

    Configuring Preauthentication Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226Configuring Preauthentication Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226Configuring Endpoint Analysis Expressions . . . . . . . . . . . . . . . . . . . . . . . . . .227Binding Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231Setting the Priority of Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .232Unbinding and Removing Preauthentication Polices . . . . . . . . . . . . . . . . . . . .232

    Configuring Post-Authentication Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233Configuring a Post-Authentication Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . .233Configuring the Frequency to Run a Post-Authentication Policy . . . . . . . . . .234Configuring Quarantine and Authorization Groups . . . . . . . . . . . . . . . . . . . . .234

    Configuring Client Security Preauthentication Expressions . . . . . . . . . . . . . . . . .237Configuring Antivirus, Firewall, Internet Security or Antispam Expressions.238Configuring Service Policies for Security . . . . . . . . . . . . . . . . . . . . . . . . . . . .239Configuring Process Policies for Security . . . . . . . . . . . . . . . . . . . . . . . . . . . .240Configuring Operating System Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .241Configuring File Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242Configuring Registry Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242

    Configuring Compound Client Security Expressions . . . . . . . . . . . . . . . . . . . . . .245Configuring Policies with the AND (&&) Operator . . . . . . . . . . . . . . . . . . . .245Configuring Policies with the OR ( || ) Operator . . . . . . . . . . . . . . . . . . . . . . .245Configuring Policies Using the NOT ( ! ) Operator . . . . . . . . . . . . . . . . . . . . .246

  • 10 Access Gateway Enterprise Edition Administrators Guide

    Chapter 13 Maintaining the Access GatewayUpgrading the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Configuring Delegated Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

    Configuring Command Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249Viewing Access Gateway Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . 252

    Saving the Configuration to Your Computer. . . . . . . . . . . . . . . . . . . . . . . . . . 253Viewing the Saved Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253Viewing the Current Running Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . 254Comparing the Saved and Running Configuration . . . . . . . . . . . . . . . . . . . . . 254

    Clearing the Access Gateway Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254Managing User Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Configuring Auditing on the Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

    Configuring Logs on the Access Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

    Appendix A Configuring Security SettingsSecuring Connections with Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . 263

    Introduction to Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263Introduction to Cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264Digital Certificates and Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . 266Getting Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269Getting Server Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270Using Windows Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Unencrypting the Private Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Requiring Certificates for Internal Connections . . . . . . . . . . . . . . . . . . . . . . . 274Using Wildcard Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

    Configuring FIPS 140-2 on the Model 9000 FIPS Series. . . . . . . . . . . . . . . . . . . 275How FIPS 140-2 Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275Configuring the Hardware Security Module . . . . . . . . . . . . . . . . . . . . . . . . . . 276Creating Private Keys for FIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278Exporting FIPS 140-2 Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279Importing FIPS 140-2 Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280Importing External Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280Configuring High Availability with FIPS 140-2 . . . . . . . . . . . . . . . . . . . . . . . 282

    Appendix B Advanced ConceptsConfiguring DNS Virtual Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285Resolving DNS Name Servers Located in the Secure Network. . . . . . . . . . . . . . 286Using Operators and Operands in Policy Expressions . . . . . . . . . . . . . . . . . . . . . 287Configuring Server-Initiated Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

  • 11 Access Gateway Enterprise Edition Administrators Guide

    Enabling Access Gateway Plug-in Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294

  • 12 Access Gateway Enterprise Edition Administrators Guide

  • CHAPTER 1

    Welcome

    This chapter describes who should read the Citrix Access Gateway Enterprise Edition Administrators Guide, how it is organized, and its document conventions.

    How to Use this GuideThis guide is intended for system administrators responsible for installing and configuring the Access Gateway. This document assumes that the Access Gateway is connected to an existing network and that the administrator has experience configuring that network

    The configuration steps in this document assume that the Access Gateway is deployed as a standalone appliance and that users connect directly to the Access Gateway.

    Document ConventionsAccess Gateway documentation uses the following typographic conventions for menus, commands, keyboard keys, and items in the program interface:

    Convention Meaning

    Boldface Commands, names of interface items such as text boxes, option buttons, and user input.

    Italics Placeholders for information or parameters that you provide. For example, filename in a procedure means you type the actual name of a file. Italics also are used for new terms and the titles of books.

    %SystemRoot% The Windows system directory, which can be WTSRV, WINNT, WINDOWS, or other name you specify when you install Windows.

    Monospace Text displayed in a text file or command-line interface.{ braces } A series of items, one of which is required in command statements.

    For example, { yes | no } means you must type yes or no. Do not type the braces themselves.

  • 14 Access Gateway Enterprise Edition Administrators Guide

    Getting Service and SupportCitrix provides technical support primarily through the Citrix Solutions Network (CSN). Our CSN partners are trained and authorized to provide a high level of support to our customers. Contact your supplier for first-line support, or check for your nearest CSN partner at http://www.citrix.com/support/.

    In addition to the CSN channel program, Citrix offers a variety of self-service, Web-based technical support tools from its Knowledge Center athttp://support.citrix.com/. Knowledge Center features include:

    A knowledge base containing thousands of technical solutions to support your Citrix environment

    An online product documentation library

    Interactive support forums for every Citrix product

    Access to the latest hotfixes and service packs

    Security bulletins

    Online problem reporting and tracking (for organizations with valid support contracts)

    Another source of support, Citrix Preferred Support Services, provides a range of options that allows you to customize the level and type of support for your organizations Citrix products.

    Additional Maintenance SupportIn addition to the support options provided by Citrix, all Access Gateway Enterprise Edition appliances are available with Silver and Gold maintenance options. If you purchased either of these options, documentation is provided with the appropriate Citrix Technical Support numbers if you need to call.

    [ brackets ] Optional items in command statements. For example, [/ping] means that you can type /ping with the command. Do not type the brackets themselves.

    | (vertical bar) A separator between items in braces or brackets in command statements. For example, { /hold | /release | /delete } means you type /hold or/release or /delete.

    (ellipsis) You can repeat the previous item or items in command statements. For example, /route:devicename[,] means you can type additional devicenames separated by commas.

    Convention Meaning

  • Chapter 1 Welcome 15

    Silver Maintenance OptionThe Silver maintenance option provides unlimited Access Gateway support for one year. This option provides basic coverage hours, one assigned support account manager for non-technical relations management, four named contacts, and advanced replacement for materials.

    Technical support is available at the following times:

    North America, Latin America, and the Caribbean: 8 a.m. to 9 p.m. US Eastern time, Monday through Friday

    Asia (excluding Japan): 8 a.m. to 6 p.m. Hong Kong time, Monday through Friday

    Australia and New Zealand: 8 a.m. to 6 p.m. Australian Eastern Standard Time (AEST), Monday through Friday

    Europe, Middle East, and Africa: 8 a.m. to 6 p.m. Coordinated Universal Time (Greenwich Mean Time), Monday through Friday

    Gold Maintenance OptionThe Gold maintenance option provides unlimited Access Gateway support for one year. Support is available 24 hours a day, 7 days a week. This option provides assigned support account manager for non-technical relations management and six named contacts.

    Subscription AdvantageYour product includes a one-year membership in the Citrix Subscription Advantage program. The Subscription Advantage program gives you an easy way to stay current with the latest software version and information for your Citrix products. Not only do you get automatic access to download the latest feature releases, software upgrades, and enhancements that become available during the term of your membership, you also get priority access to important Citrix technology information.

    You can find more information on the Citrix Web site at http://www.citrix.com/services/ (select Subscription Advantage). You can also contact your sales representative, Citrix Customer Care, or a member of the Citrix Solutions Network program for more information.

    Knowledge Center AlertsThe Citrix Knowledge Center allows you to configure alerts, which notify you when the topic you are interested in is updated. You can set an alert on product categories. When there are updates to the product, you are notified of the update.

  • 16 Access Gateway Enterprise Edition Administrators Guide

    To set up an alert, log on to the Citrix Support Web site at http://support.citrix.com. After you are logged on, under Products, select a product. Under Tools, click Add to your Hotfix Alerts. To remove an alert, go to the Knowledge Center product and click Remove from your Hotfix Alerts.

    Education and TrainingCitrix offers a variety of instructor-led training and Web-based training solutions. Instructor-led courses are offered through Citrix Authorized Learning Centers (CALCs). CALCs provide high-quality classroom learning using professional courseware developed by Citrix. Many of these courses lead to certification.

    Web-based training courses are available through CALCs, resellers, and from the Citrix Web site.

    Information about programs and courseware for Citrix training and certification is available from http://www.citrix.com/edu/.

    Related DocumentationFor additional information about the Access Gateway, refer to the following guides:

    Getting Started with Citrix Access Gateway Enterprise Edition

    Citrix Access Gateway Enterprise Edition Pre-Installation Checklist

    Citrix Web Interface Administrators Guide

    Secure Gateway to Access Gateway Migration Guide

    Citrix Access Gateway Enterprise Edition Readme

  • CHAPTER 2

    Introducing Citrix Access Gateway Enterprise Edition

    The Access Gateway is a network appliance that securely delivers any application with policy-based SmartAccess control anywhere. Users can obtain easy-to-use secure access to all of the enterprise applications and data they need to be productive. IT organizations can cost-effectively extend access to applications outside the data center while maintaining strict control through SmartAccess application-level policies. IT organizations are empowered to cost-effectively meet the demands of all workers, deliver flexible working options, and implement business continuity while ensuring the highest-level of information security and reducing support calls.

    Access Gateway Enterprise Edition offers the following benefits:

    Remote access for the most demanding and complex environments that require increased scalability and/or performance

    High availability for uninterrupted access to critical applications and resources

    Tightest level of integration and control of remotely delivered Citrix XenApp applications, data through SmartAccess and published desktops with XenDesktop

    Natural replacement for existing Citrix XenApp customers who use the Secure Gateway

    Enterprise-class SSL VPN features including client-side cache clean-up, detailed auditing, and policy-based access control for Web and server applications

    Remote users can work with files on shared network drives, access email and intranet sites, and run applications just as if they are working inside of your organizations firewall

    Certified to meet government and commercial security standards such as Federal Information Processing Standard (FIPS) 140-2 and ICSA

  • 18 Access Gateway Enterprise Edition Administrators Guide

    Supports the Access Gateway universal license (included in Citrix XenApp Platinum Edition, Citrix XenDesktop Platinum Edition and Citrix NetScaler Platinum Edition)

    New FeaturesThis release of the Access Gateway includes the following new features:

    Support for Nested LDAP Group Extraction. If users belong to more than one group on the LDAP server, the Access Gateway extracts user information from each LDAP group.

    Support for the MPX 5500 Appliance. Access Gateway 9.1 Classic is supported on the new MPX 5500 appliance.

    Support for Imprivata OneSign. The Access Gateway support single sign-on using one-time passwords provided by Imprivata OneSign single sign-on. Users logon using the passcode provided by Imprivata and then the Imprivata server returns the Windows password to the Access Gateway.

    Support for Session Identifiers. The log signature Context is replaced with a SessionID. This allows you to track logs per session rather than per user. Logs that are generated as part of a session have the same SessionID. If a user establishes two sessions from the same client device with the same IP address, each session has a unique SessionID.

    Support for Citrix Receiver. Access Gateway Enterprise Edition supports Citrix Receiver and Citrix Merchandising Server, which are components of the Citrix Delivery Center. Citrix Merchandising Server and Citrix Receiver streamline the installation and management of application delivery to user desktops. Citrix Receiver and Citrix Merchandising Server together provide two very important features. First, the Merchandising Server allows you to configure, deliver, and upgrade plug-ins on your clients devices. Citrix Receiver manages all the operations for Citrix plug-ins on client devices.

    The orchestrated system consists of the Citrix Receiver for Windows application that is installed on client devices, the Merchandising Server that is installed on a virtual machine in your data center, and the Citrix Update Service that is hosted on Citrix.com.

    The Merchandising Server Administrator Console is the interface on the Merchandising Server that you use to configure Citrix applications (and application plug-ins) and schedule their delivery to client devices. The Merchandising Server broadcasts the plug-ins and their installation instructions to your users on the scheduled date. Your users simply install Receiver for Windows on their client devices. Once installed, Receiver for

  • Chapter 2 Introducing Citrix Access Gateway Enterprise Edition 19

    Windows gets the delivery information from the Merchandising Server and installs the plug-ins. After installation is complete, Receiver for Windows starts its plug-ins in the correct order ensuring that connectivity services are available for plug-ins that require it.

    For more information, see the Citrix Merchandising Server Administrator's Guide or the Citrix Receiver for Windows User's Guide.

    Terminology ChangesSome of the terminology used to describe product components have changed. The following list contains updated terminology used in this document. There are several name changes you need to be aware of for client software and Citrix XenApp.:

    Access Gateway ArchitectureThe core components of the Access Gateway are:

    Virtual servers. The Access Gateway virtual server is an internal entity that is a representative of all the configured services available to clients. The virtual server is also the access point through which clients access these services. Multiple virtual servers can be configured on a single appliance, allowing one Access Gateway appliance to serve multiple user communities with differing authentication and resource access requirements.

    Authentication, authorization, and accounting. Authentication, authorization, and accounting can be configured to allow users to log on to the Access Gateway with credentials that are recognized by either the

    From To

    navigation page or home page Access Interface

    Secure Access Access Gateway Plug-in

    Citrix Presentation Server Citrix XenApp

    Citrix Presentation Server Clients Citrix XenApp Plug-in for Hosted Apps

    Web Client Citrix XenApp Web Plug-in

    Program Neighborhood Agent Citrix XenApp Plug-in

    Endpoint Analysis Client Endpoint Analysis Plug-in

    WANScaler Client or Accelerator Plug-in

    Repeater Plug-in

  • 20 Access Gateway Enterprise Edition Administrators Guide

    Access Gateway or by authentication servers located in the secure network, such as LDAP or RADIUS. Authorization policies define user permissions, determining which resources a given user is authorized to access. For more information about authentication and authorization, see Configuring Authentication and Authorization on page 111. For more information about accounting, see Configuring Auditing on the Access Gateway on page 257.

    The Access Gateway uses policies to manage this information. Accounting servers maintain data about Access Gateway activity, including user logon events, resource access instances, and operational errors. This information is stored on the Access Gateway or on an external server.

    Client connections. Users can log on to the Access Gateway using the following access methods:

    The Access Gateway Plug-in is client software that is downloaded to the client device. Users log on by right-clicking an icon in the notification area on a Windows computer. Users can add an icon to the desktop that they can click to log on. If users are using a computer where the Access Gateway Plug-in is not installed, they can log on using a Web browser to download and install the plug-in.

    The Access Gateway Plug-in for ActiveX is a version of client software that users can use only through Internet Explorer. The Access Gateway Plug-in for ActiveX works only on Windows XP.

    The Access Gateway Plug-in for Java, which enables Mac OS X, Linux, and optionally, Windows users to log on using a Web browser.

    Citrix XenApp Plug-in for Hosted Apps allow connections to published applications in a server farm.

    Clientless access that provides users with the access they need without installing client software

    When configuring the Access Gateway, you can configure how users log on using policies. You can also restrict user logon with session and endpoint analysis policies.

    Network resources. These include all network services to be accessed using the Access Gateway, such as file servers, applications, and Web sites.

  • Chapter 2 Introducing Citrix Access Gateway Enterprise Edition 21

    How the Access Gateway WorksA user connects to the Access Gateway by typing the Web address in the browser. The user is presented with the logon page where the user name and password are entered. If external authentication servers are configured, the Access Gateway contacts the server and the authentication servers verify the users credentials. If local authentication is configured, user authentication is performed by the Access Gateway.

    When the user is successfully authenticated, the Access Gateway tunnel is initiated. The user is now prompted by the Access Gateway to permit the appropriate client software to be downloaded and installed. If you are using the Access Gateway Plug-in for Java, the client is also initialized with a list of preconfigured resource IP addresses and port numbers.

    When the user types the Access Gateway Web address, the Access Gateway checks to see if there are any client-based security policies in place. This is called a pre-authentication policy. If there are, it checks for the specified condition on the client device. These are generally security checks that verify that the client device has the necessary security-related operating system updates, antivirus protection, and perhaps a properly configured firewall. If the client device fails the security check, the Access Gateway blocks the user from logging on. A user unable to log on needs to download the necessary updates or packages and install them on the client device.

    After a user successfully logs on, the client device can be scanned for the required client security policies. This is called a post-authentication scan. If the client device fails the scan, either the policy is not applied or the user is placed in a quarantine group.

    Configuring preauthentication and post-authentication policies are optional.

    When the session is established, users are directed to an Access Gateway home page where they can select resources to access. The home page that is included with the Access Gateway is called the Access Interface. If the users log on using the Access Gateway Plug-in for Windows, an icon in the notification area on Windows shows that it is connected and users receive a message that the connection is established.

    If the clients request passes both checks, the Access Gateway then contacts the requested resource and initiates a secure connection between the client and that resource.

    The client can close an active session by right-clicking the Access Gateway icon in the notification area and then clicking Logoff. The session can also time out due to inactivity. When the session is closed, the tunnel is shut down and the client no longer has access to internal resources.

  • 22 Access Gateway Enterprise Edition Administrators Guide

    Hardware PlatformsAccess Gateway Enterprise Edition is available on the following hardware platforms:

    Access Gateway MPX 5500 appliance

    Access Gateway Model 7000 appliance

    Access Gateway Model 9000 series appliance

    Access Gateway Model 10010 appliance

    Access Gateway Enterprise Edition is available as an optional feature on all versions of Citrix NetScaler.

    The following table shows which Access Gateway software versions are supported on the appliance:

    (1) The MPX 5500 is supported on Version 8.1, build 65 or later.

    (2) Warning: Installing Version 9.0, build 68 or earlier on the MPX 5500 results in a boot failure.

    (3) Support for Version 9.1 nCore on the MPX 5500 is expected at a later date.

    Access Gateway MPX 5500 ApplianceThe Access Gateway MPX 5500 supports up to 5,000 concurrent users per appliance.

    The appliance has the following ports:

    Four 10/100/1000 Base-T Ethernet network interfaces

    Two 10/100/1000 Base-T management interfaces

    One serial port

    Four 1 gigabyte (GB) network interfaces (copper)

    Access Gateway Version

    MPX 5500 7000 9000/9010 10010

    8.0 No Yes Yes Yew

    8.1 Yes (1) Yes Yes Yes

    9.0 No (2) Yes Yes Yes

    9.1 Classic Yes Yes Yes Yes

    9.1 nCore No (3) No No No

  • Chapter 2 Introducing Citrix Access Gateway Enterprise Edition 23

    Two 1 GB management interfaces

    LCD display with keypad

    Access Gateway Model 7000 ApplianceThe Access Gateway Model 7000 supports 2,500 concurrent users per appliance.

    The appliance has the following ports:

    Six 10/100 Base-T Ethernet network interfaces

    Two 10/100/1000 Base-T Ethernet network interfaces

    One serial port

    Access Gateway Model 9000 Appliance with FIPS OptionThe Access Gateway Model 9000 supports 5,000 concurrent users per appliance. This version of the Access Gateway includes the Federal Information Processing Standard (FIPS) 140-2, level 2-validated hardware security module.

    The appliance has the following ports:

    Four 1000-Base-SX or four 10/100/1000 Base-T copper Ethernet network interfaces

    One 10/100/1000 Base-T network Ethernet network interface

    One serial port

    Access Gateway Model 9010 ApplianceThe Access Gateway Model 9010 supports 5,000 concurrent users per appliance. It has the same Ethernet network interfaces as the Model 9000 appliance.

    Access Gateway Model 10010 ApplianceThe Access Gateway Model 10010 supports 10,000 concurrent users per appliance. It has the same Ethernet network interfaces as the Model 9010 appliance.

    You can use the serial port on each appliance to connect a computer directly to the appliance using a serial cable to access the appliance command-line interface.

  • 24 Access Gateway Enterprise Edition Administrators Guide

  • CHAPTER 3

    Planning Your Deployment

    This chapter discusses deployment scenarios for the Access Gateway.

    You can deploy the Access Gateway at the perimeter of your organizations internal network to provide a secure single point-of-access to the servers, applications, and other network resources residing in the internal network. All remote users must connect to the Access Gateway before they can access any resources on the internal network.

    In This Chapter

    Planning for Security with the Access Gateway

    Deploying the Access Gateway in the Network DMZ

    Deploying the Access Gateway in a Secure Network

    Deploying the Access Gateway to Access Published Applications

    Deploying the Access Gateway in a Double-Hop DMZ

    Planning for Security with the Access GatewayWhen planning your Access Gateway deployment, consider how you are going to secure user connections. Security considerations include the types of certificates you need and the authentication type for user logon.

    Configuring Secure Certificate ManagementBefore you deploy the Access Gateway in a production environment, Citrix recommends that you request and receive a signed SSL server certificate from a known Certificate Authority (CA) and upload it to the Access Gateway.

    If you deploy the Access Gateway in any environment where the Access Gateway must operate as the client in an SSL handshake (initiate encrypted connections with another server), you must also install a trusted root certificate on the Access Gateway.

  • 26 Access Gateway Enterprise Edition Administrators Guide

    For example, if you deploy the Access Gateway with Citrix XenApp and the Web Interface, you can encrypt connections from the Access Gateway to the Web Interface with SSL. In this configuration, you must install a trusted root certificate on the Access Gateway.

    For more information, see Installing Certificates on the Access Gateway on page 80 and Securing Connections with Digital Certificates on page 263.

    Configuring Authentication SupportYou can configure the Access Gateway to authenticate users and control the level of access (or authorization) that users have to the network resources on the internal network.

    Before deploying the Access Gateway, have your directories and authentication servers in place to support one of these authentication types:

    LDAP

    RADIUS

    RSA SecurID (using RADIUS)

    NTLM

    SafeWord products (using RADIUS)

    Smart card using client certificates for authentication

    TACACS+

    If your environment supports none of the authentication types listed above or you have a small population of remote users, you can create a list of local users on the Access Gateway and configure the Access Gateway to authenticate users against this local list. With this configuration, it is not necessary to maintain user accounts in a separate, external directory.

    For more information about authentication and authorization, see Configuring Authentication and Authorization on page 111.

    Deploying the Access GatewayThis section discusses the following Access Gateway deployments:

    Deploying the Access Gateway in the network demilitarized zone (DMZ)

    Deploying the Access Gateway in a secure network that does not have a DMZ

  • Chapter 3 Planning Your Deployment 27

    Deploying additional Access Gateway appliances to support load balancing and failover

    Deploying the Access Gateway in the Network DMZMany organizations protect their internal network with a DMZ. A DMZ is a subnet that lies between an organizations secure internal network and the Internet (or any external network). When the Access Gateway is deployed in the DMZ, users access it using the Access Gateway Plug-in or Citrix XenApp Plug-in for Hosted Apps.

    Access Gateway deployed in the DMZ

    Installing the Access Gateway in the DMZIn this configuration, you install the Access Gateway in the DMZ and configure it to connect to both the Internet and the internal network. Follow the instructions in Installing the Access Gateway on page 38 to perform installation and configuration.

    Access Gateway Connectivity in the DMZWhen you deploy the Access Gateway in the DMZ, client connections must traverse the first firewall to connect to the Access Gateway. By default, clients use Secure Sockets Layer (SSL) on port 443 to establish this connection. To support this connectivity, you must allow SSL on port 443 through the first firewall.

  • 28 Access Gateway Enterprise Edition Administrators Guide

    The Access Gateway decrypts the SSL connections from the client and establishes a connection on behalf of the client to the network resources behind the second firewall. The ports that must be open through the second firewall are dependent on the network resources that you authorize external users to access.

    For example, if you authorize external users to access a Web server in the internal network and this server listens for HTTP connections on port 80, you must allow HTTP on port 80 through the second firewall.

    Deploying the Access Gateway in a Secure NetworkYou can install the Access Gateway in the secure network. In this scenario, there is typically one firewall between the Internet and the secure network. The Access Gateway resides inside the firewall to control access to network resources.

    Access Gateway deployed in a secure network

    Access Gateway Connectivity in a Secure NetworkWhen an Access Gateway is deployed in the secure network, the Access Gateway Plug-in connection must traverse the firewall to connect to the Access Gateway. By default, both of these clients use the SSL protocol on port 443 to establish the connection. To support this connectivity, you must open port 443 on the firewall.

  • Chapter 3 Planning Your Deployment 29

    Deploying the Access Gateway to Access Published Applications

    When you deploy the Access Gateway to provide secure remote access to a server farm, the Access Gateway works with the Web Interface and the Secure Ticket Authority (STA) to provide access to published applications and resources hosted within a server farm.

    This section covers the basic aspects of deploying the Access Gateway with a server farm. For a detailed discussion of this deployment, see Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop.

    The configuration of your organizations network determines where you deploy the Access Gateway when it operates with a server farm. There are two options:

    If your organization protects the internal network with a single DMZ, deploy the Access Gateway in the DMZ.

    If your organization protects the internal network with two DMZs , deploy one Access Gateway in each of the two network segments in a double-hop DMZ configuration. For more information about deploying the Access Gateway in a double-hop DMZ, see Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop.

    Note: You can also configure a double-hop DMZ with the second Access Gateway appliance in the secure network.

    Deploying the Access Gateway in the DMZ with a Server FarmDeploying the Access Gateway in the DMZ is the most common configuration when the Access Gateway operates with a server farm.

    In this configuration, the Access Gateway provides a secure single point-of-access for the Web browsers and Citrix XenApp Plug-in for Hosted Apps that access the published resources through the Web Interface.

  • 30 Access Gateway Enterprise Edition Administrators Guide

    Access Gateway and Web Interface deployed in the DMZ. Computers in the secure network are running Citrix XenApp.

    When the Access Gateway is deployed in the DMZ to provide remote access to a server farm, you can implement one of the following three deployment possibilities:

    Deploy the Web Interface behind the Access Gateway in the DMZ. In this configuration, both the Access Gateway and the Web Interface are deployed in the DMZ. The initial client connection goes to the Access Gateway and is then redirected to the Web Interface.

    Deploy the Access Gateway parallel to the Web Interface in the DMZ. In this configuration, both the Access Gateway and the Web Interface are deployed in the DMZ, but the initial client connection goes to the Web Interface instead of the Access Gateway.

    The Web Interface interacts with the Secure Ticket Authority (STA) and generates an ICA file to ensure the XenApp plug-in traffic is routed through the Access Gateway to a computer running XenApp in the server farm.

    Deploy the Access Gateway in the DMZ and deploy the Web Interface in the internal network. In this configuration, user requests are authenticated by the Access Gateway before they are relayed to the Web Interface in the secure network. The Web Interface does not perform authentication, but interacts with the STA and generates an ICA file to ensure ICA traffic is routed through the Access Gateway to the server farm.

    For more information about deploying the Web Interface behind or parallel to the Access Gateway, see the Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop.

  • Chapter 3 Planning Your Deployment 31

    Deploying the Access Gateway in a Double-Hop DMZSome organizations use three firewalls to protect their internal networks. The three firewalls divide the DMZ into two stages to provide an extra layer of security for the internal network. This network configuration is called a double-hop DMZ.

    You can deploy the Access Gateway in a double-hop DMZ configuration to provide a single point of access to a server farm residing in an internal network. With this configuration, you must deploy two Access Gateway appliances: one in the first stage of the DMZ and one in the second stage of the DMZ.

    Important: When the Access Gateway is deployed in a double-hop scenario, clients can access resources only in a server farm using Citrix XenApp Plug-in for Hosted Apps. Users cannot use the Access Gateway Plug-in to access internal network resources in a double-hop DMZ scenario. Only ICA traffic is supported.

    Two Access Gateway appliances deployed in a double-hop DMZ

    The figure above shows two Access Gateway appliances deployed in a double-hop DMZ to control access to a server farm.

    You can also deploy one Access Gateway in the DMZ and the second Access Gateway in the secure network. When you deploy a double-hop scenario in this manner, you can simplify your firewall rules.

    In this deployment, the clients, the Access Gateway appliances, and the Web Interface perform these operations:

    Users from the Internet use a Web browser and Citrix XenApp Plug-in for Hosted Apps to connect to the Access Gateway in the first DMZ.

    The Access Gateway in the first DMZ receives the client connections and redirects these connections to the Web Interface in the second DMZ. This

  • 32 Access Gateway Enterprise Edition Administrators Guide

    Access Gateway also handles connections from the clients that connect to the server farm on the internal network.

    The Web Interface performs various interactions with the Web browser clients and components of the server, including the XML Service and the Secure Ticket Authority (STA). These interactions provide users with a list of published applications and enable the user to access a published application by clicking a link in this list.

    Important: The Web Interface must be installed parallel to the Access Gateway in the second DMZ.

    The Access Gateway in the second DMZ acts as a proxy that enables ICA traffic to traverse the second DMZ and connect to the server farm in the internal network. The Access Gateway in the second DMZ also enables the Access Gateway in the first DMZ to communicate with the STA in the internal network.

    Alternatively, you can deploy a double-hop scenario with one appliance in the DMZ and the second appliance in the secure network.

    For detailed information about these interactions and the configurations required to deploy two Access Gateway appliances in a double-hop DMZ configuration, see the Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop.

  • CHAPTER 4

    Getting Started with Citrix Access Gateway

    The Access Gateway installs in any network infrastructure without requiring changes to the existing hardware or internal network. It works with other networking products, such as server load balancers, firewalls, routers, and IEEE 802.11 wireless devices.

    Citrix recommends installing the Access Gateway in the demilitarized zone (DMZ). When installed in the DMZ, the Access Gateway participates on two networks: a private network and a public network with a publicly routable IP address. Typically, the private network is the internal enterprise network and the public one is the Internet. You can also use the Access Gateway to partition local area networks internally in the organization for access control and security.

    In This Chapter

    Identifying Access Gateway Prerequisites

    Using the Configuration Utility

    Configuring the Access Gateway Using Wizards

    Installing the Access Gateway

    Configuring Settings Using the Serial Console

    Configuring Settings Using the Configuration Utility

    Configuring the Host Name

    Installing Licenses on the Access Gateway

    Creating Additional Virtual Servers

    Configuring IP Addresses on the Access Gateway

    Configuring Routing on the Access Gateway

    Testing Your Access Gateway Configuration

    Configuring Name Service Providers

  • 34 Access Gateway Enterprise Edition Administrators Guide

    Identifying Access Gateway Prerequisites Before you start to configure settings on the Access Gateway, review the prerequisites needed for a successful deployment.

    The Access Gateway is physically installed in your network and has access to the network. The Access Gateway is deployed in the demilitarized zone (DMZ) or internal network behind a firewall. You can also configure the Access Gateway in a double-hop DMZ and for connections to a server farm.

    The Access Gateway needs to be configured with a default gateway or static routes to the internal network so users can access resources in the network. The Access Gateway is configured to use static routes by default.

    The external servers used for authentication and authorization are configured and running. For more information, see Configuring Authentication and Authorization on page 111.

    The network has a DNS or WINS server for name resolution to provide correct Access Gateway user connection functionality.

    The licenses for user connections are downloaded from My Citrix and ready to be installed on the Access Gateway.

    The Access Gateway has a certificate that is signed by a trusted Certificate Authority (CA). For more information, see Installing and Managing Certificates on page 79.

    Using the Configuration UtilityThe Access Gateway can be configured using the configuration utility. The configuration utility is comprised of the following components:

    Navigation Pane. The navigation tree extends down the left side of the screen, and provides a collapsible menu that contains links to all nodes in the configuration utility. To navigate to a node, click the plus (+) sign to expand that category. The plus sign changes to a minus (-) sign and all nodes and categories within that node are displayed.

    At the bottom of the navigation pane are three links you can use to quickly navigate through the configuration utility. These include:

    Navigation Pane. This button takes you back to the navigation pane.

    Favorites. This button shows the nodes you have marked as favorites. You can use favorites to quickly go to the parts of the configuration utility you use the most.

  • Chapter 4 Getting Started with Citrix Access Gateway 35

    Quick Links. This is a list of commonly used wizards and policy managers on the appliance. You can use this button to quickly navigate to the task you want to complete.

    Details Pane. The details pane is the right portion of the configuration utility displays tasks and entities of the corresponding node in the navigation pane.

    Configuration Buttons. These are located at the bottom of the details pane. The buttons change depending on that path you opened in the navigation pane.

    Other Links. The following are description for some of the links:

    Settings. When you click this link, your settings are saved to your computer.

    Save. This saves the configuration on the Access Gateway.

    Refresh All. When ever you do any operation in the configuration utility, the configuration utility checks whether the configuration is same as on the kernel. This link helps you synchronize the latest configuration changes.

    Help. This links opens the online help for the configuration utility.

    Refresh. This button helps you to reflect the latest data.

    Add to Favorites. This button allows you to save the current details pane to a favorites list on the Access Gateway. You can access your favorites by clicking Favorites at the bottom of the navigation pane.

  • 36 Access Gateway Enterprise Edition Administrators Guide

    Configuration utility

    Configuring the Access Gateway Using WizardsThe Access Gateway has three wizards to configure settings on the appliance. These include:

    The Setup Wizard

    The Access Gateway wizard

    The Published Applications wizard

    How the Setup Wizard WorksThe Setup Wizard is used to configure the initial settings on the appliance. The Setup Wizard configures the following settings:

    System IP address and subnet mask

    Mapped IP address and subnet mask

  • Chapter 4 Getting Started with Citrix Access Gateway 37

    Host name

    Default gateway

    Administrator password

    Licenses

    Note: Before running the Setup Wizard, download your licenses from the Citrix Web site. For more information, see Installing Licenses on the Access Gateway on page 47.

    How the Access Gateway Wizard WorksThe Access Gateway wizard helps you quickly configure additional settings on the appliance. These are settings that configure how users connect to the Access Gateway. The settings include:

    Virtual servers

    Certificates

    Name service providers

    Authentication

    Authorization

    Port redirection

    Clientless access

    Clientless access for SharePoint

    How the Published Applications Wizard WorksThe Published Applications Wizard helps you to configure the Access Gateway to connect to servers running Citrix XenApp or Citrix XenDesktop in the internal network. With the Published Applications Wizard, you can:

    Select a virtual server for connections to the server farm

    Configure the settings for client connections for the Web Interface, single sign-on, and Secure Ticket Authority

    Configure Web Interface failover

    Create or select session policies for SmartAccess

  • 38 Access Gateway Enterprise Edition Administrators Guide

    Within the wizard, you can also create session policy expressions for client connections. For more information about configuring the Access Gateway to connect to a server farm, see the Citrix Access Gateway Enterprise Edition Integration Guide for Citrix XenApp and Citrix XenDesktop.

    Installing the Access GatewayThis section describes how to install the Access Gateway in your network. To install the appliance successfully, use the following guidelines:

    Plan your deployment. Before you deploy the appliance, you need to determine if the appliance is going to provide access to resources on single or multiple networks, and then choose the installation type you want.

    Install your appliance. Install the appliance on your network.

    Getting Ready to Install the Access GatewayTo install the Access Gateway, verify that the contents of the box match the packing list. If an item on the packing list is missing from the box, contact Citrix Customer Care.

    Before starting the installation, complete the Access Gateway Enterprise Edition Pre-Installation Checklist to verify the settings you need to configure. These settings include IP addresses, virtual servers, and authentication.

    Materials and Information Needed for InstallationThe box that contains the appliance should have the following items:

    An Access Gateway appliance

    The accessory kit that includes:

    One RJ-45-to-RJ-45 serial cable

    One RJ-45-to-DB-25 adapter

    Two RJ-45-to-DB-9 adapters

    One AC power cable for the Model 7000 appliance

    Two AC power cables for the Model 9000 or 10000 series appliances

    Getting Started with Citrix Access Gateway Enterprise Edition

    Citrix Access Gateway Enterprise Edition Pre-Installation Checklist

    When configuring the Access Gateway for the first time, identify the IP addresses you need to configure the appliance. These include:

  • Chapter 4 Getting Started with Citrix Access Gateway 39

    The system IP address that the Access Gateway administrator uses to configure the appliance

    The mapped IP address that routes network traffic to servers in the secure network (required)

    The subnet IP address that is an optional IP address to a different subnet in your network

    The default gateway IP address

    The IP addresses for virtual servers to which users connect

    The community name and IP address of the management station for SNMP access (optional)

    For additional information for the settings you need to configure, see the Access Gateway Enterprise Edition Pre-Installation Checklist.

    Caution: The flash disk cannot be changed when the appliance is powered on. Remove the flash disk only when the appliance is turned off.

    Installing the Access Gateway MPX 5500The tasks for installing the MPX 5500 appliance are:

    Installing the Access Gateway in a rack

    Connecting Ethernet cables to the appliance and network

    Installing the MPX 5500 in a RackThe Access Gateway ships with rack rail hardware. This hardware consists of two rear inner rails that are secured to the chassis, one on each side just behind the preinstalled front inner rails. These two rails are left- and right-specific. Both chassis rails have a locking tab, which serves two functions. The first is to lock the system into place when installed in the rack. The second is to lock the system in place when fully extended from the rack, preventing the appliance from coming out of the rack when pulled out for servicing.

    Note: You might need to remove the rack mount ears before installing the rack rails.

    To install the rear inner rails

    1. The inner rails are secured to the front half of the chassis.

  • 40 Access Gateway Enterprise Edition Administrators Guide

    2. Starting from the right side, align the two square holes on the rail against the hooks on the right side of the chassis.

    3. Attach the rail to the chassis with screws.

    4. Repeat Steps 2 and 3 to install the left rear inner rail.

    To install the rack rails

    1. Determine where you want to place the appliance in the rack.

    2. Position the chassis rail guides at the desired location in the rack, keeping the sliding rail guide facing inwards.

    3. Screw the assembly to the rack using the brackets provided.

    4. Repeat Steps 2 and 3 for attaching the assembly to the other side of the rack. Ensure that both the rack rails are at the same height and that the rail guides are facing inward.

    To install the appliance into the rack

    1. Line up the rear inner rails with the rack rails.

    2. Slide the chassis rails in the rack rails, keeping the pressure even on both sides. You may have to depress the locking tabs when inserting the chassis.

    3. When the system is pushed completely into the rack, you will hear the locking tabs click.

    4. Insert and tighten the thumbscrews to secure the front of the chassis to the rack.

    Installing the Access Gateway MPX 5500After installing the Access Gateway in the rack, connect the Access Gateway to your network.

    To install the Access Gateway MPX 5500

    1. Connect the Ethernet cables.

    2. Connect a computer to the serial console on the front of the appliance.

    The terminal emulation application must have a baud rate and character format configured to 9600 baud, 8 data bits, 1 stop bit, and no parity.

    3. Power on the Access Gateway.

    Installing the Access Gateway Model 7000The tasks for installing the Access Gateway Model 7000 are:

  • Chapter 4 Getting Started with Citrix Access Gateway 41

    Installing the Access Gateway in the rack

    Connecting Ethernet cables to the appliance and network

    Installing the Access Model 7000 in a RackBefore connecting the Access Gateway to your network, install the appliance in a rack.

    To install the Model 7000 in a rack

    1. Place the Access Gateway appliance in your server room rack, and secure it to the rack using the screws provided with the appliance.

    2. Position the appliance in the rack. Make sure that there is adequate ventilation.

    3. Verify that the screw holes are aligned with the corresponding holes on the rack.

    4. Insert two mounting screws on each side.

    5. Tighten the mounting screws.

    Installing the Access Gateway Model 7000After you install the Access Gateway appliance in the rack, connect the appliance to the network.

    To connect the Model 7000 to the network

    1. Connect the Ethernet cables.

    2. Connect a computer to the serial console on the front of the appliance.

    The terminal emulation application must have a baud rate and character format configured to 9600 baud, 8 data bits, 1 stop bit, and no parity.

    3. Power on the Access Gateway.

    Caution: Ensure that you do not create a network loop. This occurs if you connect any two cables to the same switch or virtual local area network (VLAN).

    Installing the Access Gateway Model 9010 or 10010The tasks for installing the Model 9010 or 10010 are:

  • 42 Access Gateway Enterprise Edition Administrators Guide

    Installing the Access Gateway in a rack

    Installing Small Form-factor Pluggable (SFP) network ports

    Connecting Ethernet cables to the appliance and network

    Rack Mounting the 9010 or 10010 ModelThe Access Gateway ships with rack rail hardware. This hardware consists of two rear inner rails that are secured to the chassis, one on each side just behind the preinstalled front inner rails. These two rails are left- and right-specific. Both chassis rails have a locking tab, which serves two functions. The first is to lock the appliance into place when installed in the rack. The second is to lock the appliance in place when fully extended from the rack, preventing the appliance from coming out of the rack when pulled out for servicing.

    Note: You might need to remove the rack mount ears before installing the rack rails.

    To install the rear inner rails

    1. Starting from the right side, align the two square holes on the rail against the hooks on the right side of the chassis.

    2. Attach the rail to the chassis with screws.

    3. Repeat Steps 2 and 3 to install the left rear inner rail.

    To install the rack rails

    1. Determine where you want to place the system in the rack.

    2. Position the chassis rail guides at the desired location in the rack, keeping the sliding rail guide facing inward.

    3. Screw the assembly to the rack using the brackets provided.

    4. Repeat Steps 2 and 3 for attaching the assembly to the other side of the rack. Ensure that both the rack rails are at same height and that the rail guides are facing inward.

    To install the appliance in the rack

    1. Line up the rear inner rails with the rack rails.

    2. Slide the chassis rails into the rack rails keeping the pressure even on both sides. You may have to depress the locking tabs when inserting the chassis.

    3. When the system is pushed completely into the rack, you hear the locking tabs click.

  • Chapter 4 Getting Started with Citrix Access Gateway 43

    4. Insert and tighten the thumbscrews to secure the front of the chassis to the rack.

    Installing Small Form-Factor Pluggable Network PortsIf you purchase the Model 9010 Small Form-factor Pluggable (SFP) appliance, there are four SFP network ports.

    The Model 10010 appliance supports four SFP ports and four 10/100/1000 Ethernet ports.

    Two types of SFP come with the Access Gateway. One is copper and one is fiber.

    Caution: Only those SFPs provided by Citrix are supported. If you try to install a third-party SFP port on the Access Gateway, the warranty becomes void.

    To install the copper SFP

    1. Carefully remove the copper SFP module from the box.

    2. Insert the copper SFP in the socket with the locking hinge in the DOWN position.

    3. Push the copper SFP until it is in the locking position.

    4. Move the locking hinge to the UP position and push it inward into the socket.

    Installing the fiber SFP

    1. Carefully remove the fiber SFP module from the box.

    2. Insert the fiber SFP in the socket with the locking hinge in the UP position.

    3. Push the fiber SFP until it is in the locking position.

    4. Move the locking hinge to the DOWN position.

    5. Remove the fiber dust protector.

    6. Move the locking hinge to the UP position and push it inward into the socket.

    Installing the Access Gateway Model 9010 or 10010After installing the Access Gateway in the rack and installing the SFP network ports, connect the Access Gateway to your network.

    To install the Access Gateway Model 9010 or 10010

    1. Connect the Ethernet cables.

  • 44 Access Gateway Enterprise Edition Administrators Guide

    2. Connect a computer to the serial console on the front of the appliance.

    The terminal emulation application must have a baud rate and character format configured to 9600 baud, 8 data bits, 1 stop bit, and no parity.

    3. Power on the Access Gateway.

    Important: The Access Gateway 9000 or 10000 series appliance have two power supplies. Citrix recommends that you use both power supplies. If only one power supply is used, the Access Gateway emits a high-pitched alert.

    Some models of the Access Gateway allow you to turn off the alert by pushing the small red button on the back of the appliance or under the face plate, near the LCD screen. If your appliance does not have this button, you cannot override the alert and you must use both power supplies.

    Configuring Settings Using the Serial ConsoleWhen you first install the Access Gateway, you can configure the initial settings using the serial console. Connect a serial cable to the port on the Access Gateway and the other end to a computer. With the serial console, you can change the system IP address, create a mapped IP address, configure advanced network settings, and change the time zone.

    The terminal emulation application, such as Telnet or HyperTerminal, must have a baud rate of 9600, use eight data bits, one stop bit, and no parity.

    To configure initial settings using the serial console

    1. At a command prompt, log on using the default user name and password, nsroot.

    2. At a command prompt, type:config ns

    3. Follow the instructions on the screen.

    Configuring Settings Using the Configuration UtilityThe configuration utility allows you to configure most of the Access Gateway settings. You log on to the configuration utility using a Web browser.

  • Chapter 4 Getting Started with Citrix Access Gateway 45

    To log on to the configuration utility

    1. In a Web browser, type the system IP address of the Access Gateway, such as http://192.168.100.1.

    Note: The Access Gateway is configured with a default IP address of 192.168.100.1 and subnet mask of 255.255.0.0.

    2. In User Name and Password, type nsroot.

    Note: Citrix recommends changing the administrator password using the Setup Wizard.

    3. In Start in, select Configuration and click Login.

    When you start the configuration utility, you are given the option of starting it one of two ways. The Applet Client is a Java-based client that allows you to start the configuration utility in a Web browser. The Web Start Client allows you to download Java components and start future connections to the configuration utility without typing the system IP address. Both clients require Java Runtime Environment (JRE) Version 1.4.x or later.

    The configuration utility has left and details panes that you can use to configure the Access Gateway. The left pane, called the navigation pane, contains the nodes that are used to configure settings on the Access Gateway. Depending on the node that you select in the navigation pane, the details pane displays the information for the node. After you log on, you can run the Setup Wizard to configure the initial settings on the Access Gateway.

    Configuring TCP/IP Settings Using the Setup WizardWhen you first start the configuration utility, it opens on the System node in the navigation pane. From this node, you can run the Setup Wizard.

    If you did not configure the Access Gateway using the serial console, you can configure TCP/IP settings using the Setup Wizard and the Access Gateway wizard in the configuration utility.

    If you are configuring the Access Gateway using the Setup Wizard, connect the RJ-45 cables to the Access Gateway and then to the internal network.

    To run the Setup Wizard

    1. In the configuration utility, in the navigation pane, click System.

  • 46 Access Gateway Enterprise Edition Administrators Guide

    2. In the details pane, click Setup Wizard.

    3. Click Next and follow the directions in the wizard.

    Configuring Settings Using the Access Gateway WizardAfter running the Setup Wizard, run the Access Gateway wizard to configure additional settings on the Access Gateway. The Access Gateway wizard is run from the configuration utility.

    To configure the Access Gateway using the Access Gateway wizard

    1. In the configuration utility, in the navigation pane, click Access Gateway.

    2. In the details pane, under Getting Started, click Access Gateway wizard.

    3. Click Next and follow the instructions in the wizard.

    The Access Gateway comes with a test certificate. If you do not have a signed certificate from a Certificate Authority, you can use the test certificate when using the Access Gateway wizard. When you receive the signed certificate, you can remove the test certificate and install the signed certificate. Citrix recommends obtaining the signed certificate before making the Access Gateway publicly available for users.

    Important: You can create a Certificate Signing Request (CSR) from within the Access Gateway wizard. If you create the CSR using the Access Gateway wizard, you must exit from the wizard and then start it again when the signed certificate is received from the Certificate Authority (CA). For more information about certificates, see Installing and Managing Certificates on page 79.

    Your can configure client connections for Internet Protocol version 6 (IPv6) in the Access Gateway wizard when you configure a virtual server. For more information about using IPv6 for client connections, see Configuring IPv6 for Client Connections on page 54.

    Configuring Auto NegotiationBy default, the appliance is configured to use auto negotiation, which sets the direction for transmitted data. This is either half-duplex or full-duplex. For a first time installation, configure the Access Gateway to use auto negotiation for those ports connected to the appliance. After initial logon and configuration, auto negotiation can be disabled. Auto negotiation cannot be configured globally. It must be enabled or disabled for each interface.

  • Chapter 4 Getting Started with Citrix Access Gateway 47

    To enable or disable auto negotiation

    1. In the configuration utility, in the navigation pane, expand Network and click Interfaces.

    2. In the details pane, select the interface and click Open.

    3. Do one of the following:

    To enable auto negotiation, click Yes and click OK. When this is enabled, the Access Gateway uses full duplex.

    To disable auto negotiation, click No and cli