Dell SonicWALL SRA 7.5 Citrix Access

Size: px
Start display at page:

Download "Dell SonicWALL SRA 7.5 Citrix Access"

Transcription

1 Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about configuring relevant settings on a Citrix server. This document contains the following sections: Feature Overview section on page 1 Administrator Tasks for Configuring Citrix Access section on page 4 User Tasks for Configuring Citrix Access section on page 21 Technical FAQs section on page 27 Glossary section on page 27 Feature Overview This section provides an introduction to accessing Citrix through the SRA appliance using Citrix bookmarks. This section contains the following subsections: What are Citrix Bookmarks? section on page 1 Benefits of Citrix Bookmarks section on page 2 Accessing Citrix Applications via SSL VPN section on page 2 Supported Platforms section on page 3 What are Citrix Bookmarks? The SRA appliance uses bookmarks to access Citrix services, which are supported as a thirdparty application running on a separate server. Citrix is a remote access, application sharing service, similar to Terminal Services such as RDP. It employs an application virtualization technology, in which an application is hosted on a central server. There are many management capabilities over a Citrix deployment such as allocation of priority and a minimum set of resources to certain users, and data synchronization between different server farms. Citrix uses the ICA protocol to communicate with the client. The Citrix ICA Client is now renamed as the Citrix XenApp Web plug-in. With the Citrix XenApp Web plug-in, users can access Windows applications as a service available from anywhere. Feature Overview 1

2 Benefits of Citrix Bookmarks Using the SRA appliance to access Citrix provides the following benefits: Secure access The SRA appliance provides secure access from anywhere. Granular Control Bookmarks, access policies, and other SSL VPN features provide full access control. Strong Authentication The SRA appliance supports various strong authentication methods which provides an added layer of security to your Citrix applications. Consolidated access The SRA appliance Virtual Office portal can provide multiple Citrix bookmarks from a single location. Some of the benefits of using Citrix to virtualize applications are the following: Reduces the expense of individual application licenses for each user. You can purchase one copy of the application for your Citrix server along with a limited number of access licenses. When the client access limit is reached, clients must wait to connect to the Citrix server. Facilitates auditing and reporting. You can track who uses which applications and when they are accessed. CPU-intensive applications can run on a powerful Citrix server, allowing access by lesspowerful clients. Operating system and file system security may be better on a Citrix server than on client systems or systems accessed with RDP. Citrix provides load balancing. Citrix can act as a Web gateway providing comprehensive access policies. Accessing Citrix Applications via SSL VPN There are two ways to use Citrix that are supported by the SRA appliance: The agent or client behaves seamlessly, accessing the application on the Citrix server as soon as the user logs into the client. This method is supported by the SRA appliance NetExtender. The user accesses the application on the remote Citrix server through a Web interface. SSL VPN Bookmarks support this access method. The SRA appliance provides secure remote Citrix access in a fashion similar to Remote Desktop access. This provides a subset of Citrix functionality, since it does not support Program Neighborhood functionality, but is sufficient for access to any Citrix application or desktop. Citrix can be compared to applications that use the Remote Desktop Protocol (RDP), in that both allow clients to access remote systems or servers. The fundamental difference is that RDP provides terminal session access control with access to the remote desktop itself, including the C drive and system files, whereas with Citrix, client access is usually restricted to application level access. Access to the Citrix desktops and applications requires installation of client software, although this software ranges from a full stand alone client fully integrated into Windows (Start Menu, Context menus) to a lightweight installation of an ActiveX control or a download of a Java applet. Citrix servers and applications are accessible through the Citrix Web portal (such as Web Interface and StoreFront). Access to the NFuse portal is provided by the SRA appliance HTTP(S) reverse proxy feature. After configuring the Citrix server, the SRA appliance administrator creates one or more Citrix (reverse proxy) bookmarks for use by client users. Client users initiate a Citrix session by first logging into the SRA appliance Virtual Office portal 2 SRA Citrix Access Feature Module

3 and then clicking on the Citrix bookmarks to the NFuse server. After authenticating with the NFuse portal, the user will see the Citrix applications and desktops that are accessible to him/ her. This interface is provided by the Citrix server, but is reverse-proxied by the SRA appliance. When the user clicks on an application icon, Internet Explorer launches an ActiveX control similar to the one used by Remote Desktop, while other browsers use the Java version which launches an applet. Citrix support requires Internet connectivity in order to download the ActiveX client or the Java applet from the Citrix Web site. The server will automatically decide which Citrix client version to use. Citrix is accessed from Internet Explorer using ActiveX by default, or from other browsers using Java. Java can be used with Internet Explorer by selecting an option in the bookmark configuration in the SRA appliance. For Citrix access using Java, the Java applet download uses HTTP which is likely to have outbound access based on usual firewall deployments. When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. Supported Platforms Citrix access is supported with SRA 7.5 on SRA 4600/4200 and 1600/1200 appliances, and on the SRA Virtual Appliance. Citrix access is also supported on previous releases of the SRA appliance. Citrix bookmarks with ActiveX and Java applet Citrix support are available on SRA 2.0 or newer for the SRA 2000 and 4000 appliances, and on SRA 3.5 and newer for the SRA 4200, 1200, and Virtual Appliance. Citrix IPv6 is supported on SRA 3.5 and higher. NTLM/Windows Integrated authentication is supported if it is enabled on the Citrix server. Some Citrix installations use NTLM instead of a login form to authenticate the user into the Web interface. Note Single Sign-On is not supported for Web Interface authentication or within the Citrix session. On the SRA 7.5, Citrix Portal Bookmarks have been tested and verified to support the following Citrix Application Virtualization platforms through the Citrix Web Interface: Servers: XenApp Server 6.0 XenApp Server 5.0 XenApp Server 4.5 Clients: Receiver for Windows 3.0 Receiver for Java 10.1 XenApp Web Plug-in version or earlier Citrix client software is available as an ActiveX plugin (for Internet Explorer only) or a Java plugin. The Citrix ActiveX client is supported on systems running Windows XP with Internet Explorer 7.5 or higher. The Java plugin can be used with Internet Explorer, Firefox, Chrome, or Safari browsers on Windows, 7 Windows XP, Vista, Linux, or Mac OS client systems as noted in Table 1. For browsers requiring Java to run Citrix, you must have Sun Java 1.6.0_10 or above. Feature Overview 3

4 Table 1 Citrix (Java 1.6.0_10+) Client - Supported Browsers per OS Internet Explorer Windows 7/8 Windows Vista Windows XP Linux Mac OS X 8.0 or higher 7.0 or higher 7.0 or higher Firefox 18.0 or higher 18.0 or higher 18.0 or higher 18.0 or higher 18.0 or higher Chrome 20.0 or higher 20.0 or higher 20.0 or higher 20.0 or higher 20.0 or higher Safari Safari 6.0 or higher 6.0 or higher Administrator Tasks for Configuring Citrix Access This section contains the following subsections: Deployment Scenario section on page 5 Assumptions and Dependencies section on page 5 Configuring Authentication on the Citrix Server section on page 6 Creating a Citrix Access Policy section on page 12 Creating a Citrix Bookmark section on page 14 Enabling Custom URLs for Citrix Client Downloads section on page 15 Configuring the Web Interface on the Citrix Server section on page 19 Editing a Citrix Bookmark section on page 20 4 SRA Citrix Access Feature Module

5 Secure Remote Access PRO 5060 Deployment Scenario The recommended deployment scenario for Citrix environments places the Citrix server(s) on the LAN behind a Dell SonicWALL Unified Threat Management (UTM) appliance acting as the gateway firewall. A SRA 4200 appliance is connected to a firewall interface in the DMZ. Traffic passing between the SRA and the LAN passes through the UTM appliance where it is examined for threats. SonicWALL UTM Firewall Router X1 X2 Switch X0 Switch Remote Users DMZ X0 LAN Citrix Servers SRA 4200 SRA 4200 Internet Zone Apps, , AD, SQL Assumptions and Dependencies The administrator must have the Citrix Web Interface installed and functioning for the Citrix installation. Microsoft Loopback hotfix (KB884020) is required, although this can be avoided if the ActiveX control does not use loopbacks higher than ActiveX: Users must have enough privileges in order to be able to install an ActiveX control if they don t already have one installed. Java: JRE 1.6.0_10 and above is required by the Citrix Java client in SRA 6.0. If a lower version is detected, the connection is refused and the user is advised to upgrade Java. ActiveX & Java: Firewall rules must allow for Internet Explorer and for the JRE to be able to open server sockets on the system. Java: The SRA appliance must have a DNS server set up (critical). Administrator Tasks for Configuring Citrix Access 5

6 Configuring Authentication on the Citrix Server You can configure the Citrix server for anonymous or authenticated access. If you select anonymous access, you can configure the Citrix server for explicit, or forms-based, authentication to make sure that there is at least some type of authentication available for users. See the following sections: Configuring Anonymous or Authenticated Access on page 6 Configuring Explicit Authentication on the Citrix Server on page 9 Configuring Anonymous or Authenticated Access Microsoft IIS Manager must be configured on the Citrix server to enable anonymous access for Citrix. When Windows Integrated Authentication is configured on IIS and the Citrix server is accessed by a client through the SRA appliance, the SRA appliance will display a message indicating that it does not support the HTTPS authentication scheme used by Citrix. To configure authentication for Citrix access through the SonicWALL SRA appliance, perform the following steps: Step 1 Step 2 On the Citrix server (a Windows Server system), click Start > All Programs. Select Administrative Tools > Internet Information Services (IIS) Manager. 6 SRA Citrix Access Feature Module

7 Step 3 Step 4 In the Internet Information Services (IIS) Manager window, expand the entries for the local computer, Web Sites, Default Web Site, and Citrix. Under Citrix, right-click the service name, for example XenApp, and select Properties from the right-click menu. Step 5 Step 6 In the Properties window, click the Directory Security tab. Under Authentication and access control, click Edit. Step 7 Step 8 For anonymous access to the Citrix server, select the Enable anonymous access check box in the Authentication Methods window. (To configure authenticated access, skip to Step 12.) In the User name field, type in the account name to be used for anonymous access or click Browse to select it from the account list. Administrator Tasks for Configuring Citrix Access 7

8 Step 9 In the Password field, type in the password for this account. Step 10 Step 11 Click OK. An IIS Manager dialog box warns that the anonymous authentication option will result in unencrypted passwords being transmitted over the network except when HTTPS or SSL connections are used. Since we are using HTTPS/SSL in this case, you can safely click Yes to continue. Step 12 To configure authenticated access to the Citrix server rather than anonymous access as described above, clear the Enable anonymous access check box in the Authentication Methods window. 8 SRA Citrix Access Feature Module

9 Step 13 Under Authenticated access, select the Basic authentication (password is sent in clear text) check box. Step 14 Click OK. Configuring Explicit Authentication on the Citrix Server Explicit, or forms-based, authentication is used in conjunction with the anonymous access setting on Microsoft IIS to provide some form of authentication for users. The administrator selects the Explicit authentication method on the Citrix server, if it is not already selected. If only anonymous authentication is configured, Citrix may automatically detect it and force Explicit authentication, which will present a login form to the user. Explicit authentication performs the necessary encryption. To configure explicit authentication on the Citrix server, perform the following steps: Step 1 Log in to the Citrix server as the administrator, open the Start menu, and click Access Suite Console for Presentation Server. Administrator Tasks for Configuring Citrix Access 9

10 Step 2 In the Citrix Web Interface Management window, select the XenApp URL, for example: CTX-EDU-1.csm.demo/Citrix/XenApp1. Step 3 In the right pane under Edit Settings, click Authentication Methods. and then select the Explicit check box in the Configure Authentication Methods window. Step 4 Step 5 Select the desired settings for Enforce 2-factor authentication and Allow user to change password. Click Next. 10 SRA Citrix Access Feature Module

11 Step 6 For the Authentication Type step, select the Windows or NIS (UNIX) radio button. Step 7 Step 8 Step 9 Step 10 Click Next. For the Specify Authentication Type Settings step, under Domains, select the Display Domain field radio button. Click the Add button and add your domain, if necessary. Select Selection in the Optionally, specify domains for drop-down list, and select your domain. Administrator Tasks for Configuring Citrix Access 11

12 Step 11 Step 12 Click Next. For the Check Summary step, verify your settings and then click Finish. Creating a Citrix Access Policy You can configure access policies on the SRA appliance to provide different levels of access to the Citrix server. There are three levels of access policies: global, group, and user. You can deny or permit access to the Citrix server by creating access policies for a Citrix server IP address, an IP address range (for a server farm), or a network object. User policies take precedence over group policies and group policies take precedence over global policies, regardless of the policy definition. For policies at the same level, the most specific policy takes precedence. Tip When using Citrix bookmarks, in order to restrict proxy access to a host, a Deny rule must be configured for both Citrix and HTTP services. For more information about access policies, including policy hierarchy rules, see the Users Configuration chapter in the Dell SonicWALL SRA Administrator Guide. The procedure is the same for configuring user, group, or global access policies, except for the initial page (Users > Local Users or Users > Local Groups) and the selection of either a user, a group, or the global option for which to configure the policy. 12 SRA Citrix Access Feature Module

13 To configure an access policy for a user, perform the following steps: Step 1 In the SRA appliance management interface, navigate to Users > Local Users (or Users > Local Groups). Step 2 Click the configure icon next to the user (or group or Global Policies) that you want to configure. Step 3 In the Edit User Settings window, select the Policies tab. Step 4 Click Add Policy...to display the Add Policy window. Step 5 In the Add Policy window, in the Apply Policy To drop-down list, select whether the policy will be applied to an individual host, a range of addresses, or a network object. You can also select an IPv6 host or a range of IPv6 addresses. The Add Policy dialog box changes depending on what type of object you select in the Apply Policy To drop-down list. Note SRA policies apply to the destination address(es) of the SonicWALL SRA appliance connection (the Citrix server), not the source address. You cannot permit or block a specific IP address on the Internet from authenticating to the SonicWALL SRA appliance gateway with a policy created on the Policies tab. However, it is possible to control source logins by IP address with a login policy created on the user's Login Policies tab. Step 6 Step 7 Type a descriptive name into the Policy Name field. Do one of the following, depending on your selection in the Apply Policy To field: Administrator Tasks for Configuring Citrix Access 13

14 Step 8 Type an IP address in the IP Address field. Type a starting IP address in the IP Network Address field and type a subnet mask value in the Subnet Mask field in the form Select the network object from the Network Object drop-down list. The port number is included in the network object definition. In the Port Range/Port Number field, optionally enter a port range or an individual port. Note The Citrix Web interface and Citrix ICA server listen on different ports, typically 80/443 and 1494 respectively, which are both needed for a Citrix session. When creating a port-based access policy, you will need to create two policies in order to specify both ports. Standard TCP ports used by Citrix are mentioned in the knowledge base article available at: support.citrix.com/article/ctx Step 9 In the Service drop-down list, optionally select one of the following: Citrix Portal (Citrix) Select this if the Citrix bookmark uses HTTP Citrix Portal (Citrix_https) Select this if the Citrix bookmark uses HTTPS If the Citrix server can be accessed using either HTTP and HTTPS, then you may need to create two access policies, one for each service. An IP address based policy may be simpler in this case. Step 10 Step 11 In the Status drop-down list, click on an access action, either ALLOW or DENY. Click Accept. Creating a Citrix Bookmark You can configure a Citrix bookmark for a user or for a group. The procedure is the same, except for the initial page (Users > Local Users or Users > Local Groups) and the selection of either a user or a group for which to configure the bookmark. To configure a Citrix bookmark for a user, perform the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the SonicWALL SRA appliance management interface, navigate to Users > Local Users. Click the configure icon next to the user you want to configure. In the Edit User Settings window, select the Bookmarks tab. Click Add Bookmark... Enter a descriptive name for the bookmark in the Bookmark Name field. Enter the name or IP address of the bookmark in the Name or IP Address field. Note A Citrix bookmark will accept a port option with the IP address (IP_address:portnum). Step 7 Step 8 Step 9 From the Service drop-down list, select Citrix Portal (Citrix). The display will change. If the Citrix Web server is configured with SSL, to enable SSL encryption for communication between the SRA appliance and the Citrix server, check the HTTPS Mode check box. Optionally select the Always use Java in Internet Explorer checkbox to use Java to access the Citrix Portal when using Internet Explorer. Without this setting, a Citrix ActiveX client or plugin must be used with IE. This setting lets users avoid installing a Citrix client or plugin specifically for IE browsers. Java is used with Citrix by default on other browsers and also works with Internet Explorer. Enabling this check box leverages this portability. 14 SRA Citrix Access Feature Module

15 Step 10 Step 11 When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. To explicitly set the Citrix ICA server address for the Citrix ICA session, select the Always use specified Citrix ICA Server checkbox and then type the server IP address into the ICA Server Address field. Some Citrix deployments have the Citrix Web Interface on one IP address and the ICA server listening on a different address. If the Citrix Web Interface and Citrix ICA server do not share the same IP address, use this setting to explicitly set the ICA server address. Click Add. Enabling Custom URLs for Citrix Client Downloads The Services > Settings page allows the administrator to configure custom URLs for Citrix Java or ActiveX client downloads. The administrator needs to host the clients on a local Web server so they are available for download at the indicated URLs. See the following sections: Hosting the Citrix Clients on a Local Web Server on page 16 Configuring Custom URLs on Services > Settings on page 18 Administrator Tasks for Configuring Citrix Access 15

16 Hosting the Citrix Clients on a Local Web Server You can download the Citrix Java and ActiveX client packages from and place them on a local Web server to make them available to your users. To download the Citrix clients to your local Web server: Step 1 In a browser on your local Web server, navigate to the Downloads page for Receiver on 16 SRA Citrix Access Feature Module

17 Step 2 To download the ActiveX Receiver client, click Receiver for Windows 3.2. Step 3 Step 4 Step 5 In the Receiver for Windows 3.2 popup, click Download. To download the Java Receiver client, click Receiver for Java 10.1 on the Citrix Downloads page (shown in Step 1 on page 16. Click Download for either the.tar or the.zip package. Step 6 Step 7 In the Receiver for Java 10.1 popup, click Download. Move the files to the appropriate location on the Web server. Administrator Tasks for Configuring Citrix Access 17

18 Configuring Custom URLs on Services > Settings The administrator needs to host the Citrix clients on a local Web server and have the SRA download these clients from there. You can configure the URLs for the Citrix Java or ActiveX client downloads on the Services > Settings page. To configure custom URLs for Citrix Java or ActiveX client downloads, perform the following steps: Step 1 Step 2 Step 3 Step 4 In the SonicWALL SRA appliance management interface, navigate to the Services > Settings page Select the Enable custom URL for Citrix Java client downloads checkbox if you want your own HTTP URL to be used to download the Citrix Java client. Fill-in the custom URL in the URL field. If this option is not enabled, the default URL will be used. The default URL is shown in grey text in the URL field. The maximum length for the custom URL is 255 characters. Select the Enable custom URL for Citrix ActiveX client downloads checkbox if you want your own HTTP URL to be used to download the Citrix ActiveX client. Fill-in the custom URL in the URL field. If this option is not enabled, the default URL will be used. The default URL is shown in grey text in the URL field. The maximum length for the custom URL is 255 characters. Click Accept. 18 SRA Citrix Access Feature Module

19 Configuring the Web Interface on the Citrix Server In the Citrix Web Interface, you can configure the Preferences to use the native client rather than the Java client. This prevents a possible error when the Java client is launched. To configure use of the native client: Step 1 Step 2 Step 3 Log in to the SSL VPN Virtual Office portal and click on a Citrix bookmark. Log in to the Citrix Web Interface. Right-click the site name, such as XenApp, and select Client Deployment from the right-click menu. Step 4 Step 5 Step 6 Step 7 In the dialog box, select Native Client. Alternatively, configure this setting in the Preferences options. Select Connection Preferences. Select Native for the client. For Fallback Behavior, also select the Native client. Administrator Tasks for Configuring Citrix Access 19

20 Editing a Citrix Bookmark You can edit an existing Citrix bookmark by clicking the edit icon on the Virtual Office page. To edit an existing Citrix bookmark, perform the following steps: Step 1 Step 2 In the SonicWALL SRA appliance management interface, navigate to the Virtual Office page. Click Show Edit Controls to expose the Edit and Delete icons for each bookmark. Step 3 Step 4 Click the Edit icon for the bookmark you wish to edit. In the Edit Bookmark page, you can view information about the available settings. Step 5 Step 6 Step 7 Step 8 To make changes to the Bookmark Name, Name or IP Address, or Description fields, type in the new value(s). To change ability of users to edit the bookmark, select a new value from the Allow user to edit/ delete drop-down list. The default is Use user policy. To set the default window size for Citrix sessions from the Edit Bookmark page, use the Resource Window Size drop-down list to select the desired window size, as explained in step 8 on page 26. To enable SSL encryption for communication between the SRA appliance and the Citrix server, select the HTTPS Mode check box. 20 SRA Citrix Access Feature Module

21 Step 9 Step 10 Step 11 To force Internet Explorer to use the Citrix Java applet rather than the default ActiveX control, select the Always use Java in Internet Explorer check box. This setting lets users avoid installing a Citrix ICA client or XenApp Web plug-in specifically for Internet Explorer browsers. When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. To explicitly set the Citrix ICA server address for the Citrix ICA session, select the Always use specified Citrix ICA Server checkbox and then type the server IP address into the ICA Server Address field. Some Citrix deployments have the Citrix Web Interface on one IP address and the ICA server listening on a different address. If the Citrix Web Interface and Citrix ICA server do not share the same IP address, use this setting to explicitly set the ICA server address. Click OK. User Tasks for Configuring Citrix Access Citrix is a remote access, application sharing service, similar to RDP. It enables users to remotely access files and applications on a central computer over a secure connection. Access to the Citrix server and its shared applications is provided with bookmarks on the SonicWALL SRA appliance Virtual Office portal. The administrator may have created either ActiveX or Java bookmarks. When the user launches a Citrix bookmark, the interaction is identical to reverse proxy browsing until an application icon is clicked. At that point a window containing an ActiveX control or a Java applet will pop up. Users might encounter several warnings and dialog boxes the first time they launch a Citrix application. The causes for these are certificate mismatches, applet security warnings, ActiveX security warnings, and pop-up blocking. For the ActiveX version to be functional, the Receiver for Windows 3.0 client or the XenApp Web plug-in (which was previously called Windows ICA client) must be installed on the client machine. If the client machine does not have a pre-installed Receiver, XenApp, or ICA client, then the ActiveX control invokes an installer that downloads the necessary plugin and prompts the user for installation. The user has to go through the installation process only once, and will not be prompted for installation again for future Citrix sessions. This step requires connectivity to or to the custom URL of a configured local Web server from the SRA appliance. See the following sections for information about using ActiveX or Java bookmarks for Citrix access: Using ActiveX Bookmarks on page 22 Using Java Bookmarks on page 24 User Tasks for Configuring Citrix Access 21

22 Using ActiveX Bookmarks When using Internet Explorer, Citrix bookmarks launch the ActiveX Citrix client. The following steps describe how to launch and use the ActiveX Citrix client to access applications on the Citrix server: Step 1 Step 2 Using an Internet Explorer browser, log in to the SonicWALL SRA appliance Virtual Office portal where the Citrix bookmarks are available. Click on the Citrix bookmark. The first time you use a Citrix bookmark, it will download and install the Citrix Web Client on your computer if you do not already have it. Click Download to download the client software. Step 3 If using Internet Explorer Security, click Allow to begin the download. Step 4 To install XenApp software, open the downloaded file (default file name is XenAppWeb.exe). 22 SRA Citrix Access Feature Module

23 Step 5 Wait for the Citrix Web Client to install. Step 6 Click Yes to the Citrix license agreement. Step 7 When the Citrix Web Client has installed, click OK. If the Citrix Web Interface login window does not display, restart your Web browser and launch the Citrix bookmark again. Step 8 Enter your username, password, and domain in the Citrix Web Interface login window. User Tasks for Configuring Citrix Access 23

24 Step 9 When the Citrix Web Interface home page is displayed, click on the application you want to use. Step 10 You may be prompted to install additional Citrix software. The shared application is now launched. Using Java Bookmarks When using browsers other than Internet Explorer, Citrix bookmarks launch the Java Citrix client. You can also configure the SonicWALL SRA appliance to use the Java Citrix client even when Internet Explorer is the user s browser. The following steps describe how to launch and use the Java Citrix client. Note For more detailed, current information on Citrix Systems configuration and use, see the Citrix Systems web site at 24 SRA Citrix Access Feature Module

25 Step 1 Step 2 Using any supported browser, log in to the SonicWALL SRA Virtual Office portal where the Citrix bookmarks are available. Click on the Citrix bookmark. The login window displays. For Logon type, select either Anonymous or Explicit. Select Anonymous to login without providing a user name. Note that you may not be able to access resources that require authentication. Select Explicit to login with a user name and password. You may also be required to provide a domain name or NDS context. Step 3 Click the Log On button. The Citrix Java applet displays. The default applications will display in the Applications section in the middle of the window. Step 4 Click on the Citrix application to launch it. Step 5 Click on Preferences to customize the Citrix Java applet settings. User Tasks for Configuring Citrix Access 25

26 Step 6 Select Display Settings to change the language and to specify if Citrix hints should be displayed. Step 7 Select Session Settings to customize the default window size for Citrix sessions. Step 8 Step 9 In the Window Size drop-down menu, select one of the following options: No preference: Uses the default setting configured by your administrator. Full screen: Resources are maximized to fill your screen. Seamless: Resources that support resizing appear in resizable windows. Custom dimensions: Enables you to specify the width and height of the resource window in pixels. Percentage of screen: Enables you to specify the percentage of your screen the resources will occupy. Select Account Settings to configure the behavior of your sessions when you log out. 26 SRA Citrix Access Feature Module

27 Step 10 Select the Log off all sessions checkbox to shut down all of your active resources when you log off from the Citrix session. If you disable this checkbox, any active resources that are hosted on a remote server continue to run when you log off. (Offline applications always continue to run when you log off from the Citrix session.) Technical FAQs How do I find more technical information about Citrix? Technical information is available at the following links: Glossary Basic Authentication For Citrix bookmarks and other HTTP transactions, using basic authentication means that the client requests a Web page, the server responds with an authentication request, the user sees a popup login window and enters his or her credentials, the user name and password are encoded with the Base 64 algorithm (not for security, but rather to encode non-http-compatible characters), the encoded credentials are appended to the Web page request and sent back to the server. Citrix A product by Citrix Inc. that provides Terminal Services-like access to a server farm. This product allows desktop and application sharing, provides load balancing, Web gateway, and comprehensive access policies. For more detail, see Citrix ICA Client ICA stands for Independent Computing Architecture. The Citrix ICA Client is the client software that was later replaced by the Citrix XenApp plug-in and Citrix XenApp Web plug-in. The Citrix Receiver client is the most recent client software. Citrix Receiver Client Citrix Receiver is a lightweight software client available for Mac OS, Windows, Linux, ios, iphone, ipad, Android, BlackBerry, Windows Mobile, Chromebook, and other platforms. Users can access hosted applications on a Citrix server from any of these devices. Receiver for Windows 3.0 is used for Citrix ActiveX bookmarks, while Receiver for Java 10.1 is used for Citrix Java bookmarks. Citrix Web Interface The Citrix Web Interface provides the SonicWALL SRA appliance users with access to XenApp Server applications and content through a standard Web browser. The Web Interface uses Java and.net technology to dynamically create an HTML representation of server farms for XenApp Server sites. All applications published in the server farms can be made available and presented to users. The Citrix Web Interface also provides user access through the Program Neighborhood Agent, but this is not currently supported in the SonicWALL SRA appliance. ICA file A configuration file that adheres to the INI format. This file is used to launch Citrix clients and contains all the options necessary for connection. Integrated Windows Authentication Integrated Windows Authentication (IWA) is more secure than basic authentication, and can be selected when configuring Microsoft IIS. IWA is used in environments where users have Windows domain accounts and the applications in use are Active Directory aware. When using IWA, the user's domain logon credentials are encrypted and sent to the Web server with Web page requests. The Kerberos authentication protocol is used, or if unavailable, NTLMSSP is used. If the domain logon credentials cannot Technical FAQs 27

28 be used, the user is prompted to enter a user name and password. IWA cannot be used over an HTTP proxy server, but works with most modern browsers. It can also be used with file sharing, Windows service programs, and Microsoft SQL Server. Java Applet A Java application that runs in a limited environment in the Web browser. Unlike ActiveX, it is platform independent. NTLM NT LAN Manager is a Microsoft authentication protocol similar to MS-CHAP. NTLM is used with the SMB protocol. The protocol uses a challenge-response sequence of three messages between a client that wishes to authenticate and the server that is requesting authentication. Presentation Server Presentation Server allows delivery of applications as a service, providing on-demand access to users. It provides application virtualization and application streaming delivery. Presentation Server runs on a server and allows multiple users to log on and run applications in separate, protected sessions. You install and publish the applications or other resources that you want to deploy. You can group a number of servers together to form a server farm that you manage as a single entity. Program Neighborhood Agent Program Neighborhood Agent is a feature in Citrix XenApp and Citrix Presentation Server products that allows applications to be assigned to users. The name was originally inspired by Windows Network Neighborhood and was changed to Citrix Applications. The Program Neighborhood Agent client uses the Access Management Console and published application settings to provide centralized management of the client settings. It also provides pass-through authentication and integrates with the user's desktop and Start menu. It provides client to server content redirection, changing the local Windows File Type Association so that local files automatically launch the associated Citrix published application. Reverse Proxy Such a proxy is deployed between a remote user outside the intranet and a target Web server within the intranet. The proxy intercepts packets flowing across it. XenApp Server Citrix XenApp is the new name for Citrix Presentation Server. Citrix XenApp is an application virtualization solution. Virtualizing applications lets IT manage a single instance of each application in the data center. Applications can be run on high-powered servers in the data center for online access by remote clients, or delivered via application streaming directly to Windows PC s. XenApp Plug-in Users run the Citrix XenApp Plug-in on their client devices to access resources published on XenApp servers. The XenApp Plug-in requires the Citrix Web Interface. The Citrix XenApp Plug-in allows users to access published resources from a Windows desktop environment, including the Start menu and the Windows notification area, by icons that behave like local icons. The Citrix Receiver client is more recent than XenApp. XenApp Web Plug-in Citrix XenApp Web Plug-in is a smaller plugin that can be installed from the XenAppWeb.msi or the XenAppWeb.exe file. Users access published resources by clicking links on a Web page you publish on your corporate intranet or the Internet.Solution Document Version History 2014 Dell Inc. Trademarks: Dell, the DELL logo, SonicWALL, and all other SonicWALL product and service names and slogans are trademarks of Dell Inc. Citrix, Citrix Receiver, and Citrix Presentation Server are trademarks of Citrix Systems, Inc. Microsoft Windows 7, Windows Vista, Windows XP, Internet Explorer, and Active Directory are trademarks or registered trademarks of Microsoft Corporation. Firefox is a trademark of Mozilla Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies and are the sole property of their respective manufacturers. P/N Rev A 3/ SRA Citrix Access Feature Module

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

SonicWALL SSL VPN File Shares Applet

SonicWALL SSL VPN File Shares Applet SonicWALL SSL VPN File Shares Applet Document Scope This document describes how to use and manage the SonicWALL SSL VPN File Shares Applet feature. This document contains the following sections: Feature

More information

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Copyright and Trademark Notices Use of the product documented herein is subject to your prior acceptance of the End

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Release Notes. Contents. Platform Compatibility. Licensing on the SRA Appliances and Virtual Appliance. Secure Remote Access Dell SonicWALL SRA 7.

Release Notes. Contents. Platform Compatibility. Licensing on the SRA Appliances and Virtual Appliance. Secure Remote Access Dell SonicWALL SRA 7. Secure Remote Access Dell SonicWALL SRA 7.0 Contents Platform Compatibility... 1 Licensing on the SRA Appliances and Virtual Appliance... 1 Important Differences between the SRA Appliances... 2 Feature

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Document Scope This document describes how to configure and use the Dell SonicWALL SRA Secure Virtual Meeting feature and the Dell

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.12 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 2 Important Differences

More information

Citrix Remote Access Work Instructions

Citrix Remote Access Work Instructions Work Instructions Version 1.0 15 January 2010 InTACT Shared Services Centre ACT Department of Treasury Quality Management System Service Management Tools Contents Introduction... 3 Purpose... 3 Scope...

More information

Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters

Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters This document describes how to configure and use Geo IP locations and Botnet filters, introduced in Dell SonicWALL SRA 7.0. This document contains the following

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1

Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1 Aspera Connect 2.4.7 Linux 32/64-bit Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment... 5 Basic

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

SRA 6.0 User s Guide 1

SRA 6.0 User s Guide 1 SRA 6.0 User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to hardware

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2? TM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access)... of 6 1/12/2013 11:46 PM Question/Title UTM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access) on SonicOS Enhanced (SonicOS 5.6 and

More information

VPN User Guide. For Mac

VPN User Guide. For Mac VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication

Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Citrix XenApp Fundamentals Administrator s Guide

Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals 3.1.0 for Windows Server 2008 Copyright and Trademark Notice Information in this document is subject to change without notice.

More information

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access. Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

SonicWALL SSL VPN 3.5 User s Guide

SonicWALL SSL VPN 3.5 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL VPN 3.5 User s Guide Table of Contents Using This Guide About this Guide......................................................

More information

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB Last Updated: February 18, 2012. Med Access Support Alberta Netcare Portal Support Alberta Health Services

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

SonicWALL SSL VPN 5.0 User s Guide

SonicWALL SSL VPN 5.0 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SSL VPN 5.0 User s Guide Table of Contents Using This Guide About this Guide......................................................

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting Virtual Learning Environment Internet Explorer Browser Connectivity Troubleshooting This document is for Ultimate Software use only. No part of this document may be reproduced in any form or by any means,

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Citrix StoreFront 2.0

Citrix StoreFront 2.0 White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

VPN: Virtual Private Network Setup Instructions

VPN: Virtual Private Network Setup Instructions VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

SonicWALL SSL-VPN 2.1 User s Guide

SonicWALL SSL-VPN 2.1 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL-VPN 2.1 User s Guide Using This Guide About this Guide...................................................... 5 Organization

More information

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose

More information

Juniper SSL VPN Notes Page 1

Juniper SSL VPN Notes Page 1 Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

SINGLE SIGN-ON FOR MTWEB

SINGLE SIGN-ON FOR MTWEB SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4

More information

2XApplication Server XG v10.1

2XApplication Server XG v10.1 2XApplication Server XG v10.1 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information