Citrix Access on SonicWALL SSL VPN

Size: px
Start display at page:

Download "Citrix Access on SonicWALL SSL VPN"

Transcription

1 Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring relevant settings on a Citrix server. This document contains the following sections: Feature Overview section on page 1 Administrator Tasks for Configuring Citrix Access section on page 4 User Tasks for Configuring Citrix Access section on page 19 Technical FAQs section on page 25 Glossary section on page 25 Feature Overview This section provides an introduction to accessing Citrix through SonicWALL SSL VPN using Citrix bookmarks. This section contains the following subsections: What are Citrix Bookmarks? section on page 2 Benefits of Citrix Bookmarks section on page 2 Accessing Citrix Applications via an SSL VPN section on page 2 Supported Platforms section on page 3 Citrix Access on SonicWALL SSL VPN 1

2 Feature Overview What are Citrix Bookmarks? SonicWALL SSL VPN uses bookmarks to access Citrix services, which are supported as a third-party application running on a separate server. Citrix is a remote access, application sharing service, similar to Terminal Services such as RDP. It employs an application virtualization technology, in which an application is hosted on a central server. There are many management capabilities over a Citrix deployment such as allocation of priority and a minimum set of resources to certain users, and data synchronization between different server farms. Citrix uses the ICA protocol to communicate with the client. The Citrix ICA Client is now renamed as the Citrix XenApp Web plug-in. With the Citrix XenApp Web plug-in, users can access Windows applications as a service available from anywhere. Benefits of Citrix Bookmarks Using SonicWALL SSL VPN to access Citrix provides the following benefits: Secure access SonicWALL SSL VPN provides secure access from anywhere. Granular Control Bookmarks, access policies, and other SSL VPN features provide full access control. Strong Authentication SonicWALL SSL VPN supports various strong authentication methods which provides an added layer of security to your Citrix applications. Consolidated access The SonicWALL SSL VPN Virtual Office portal can provide multiple Citrix bookmarks from a single location. Some of the benefits of using Citrix to virtualize applications are the following: Reduces the expense of individual application licenses for each user. You can purchase one copy of the application for your Citrix server along with a limited number of access licenses. When the client access limit is reached, clients must wait to connect to the Citrix server. Facilitates auditing and reporting. You can track who uses which applications and when they are accessed. CPU-intensive applications can run on a powerful Citrix server, allowing access by less-powerful clients. Operating system and file system security may be better on a Citrix server than on client systems or systems accessed with RDP. Citrix provides load balancing. Citrix can act as a Web gateway providing comprehensive access policies. Accessing Citrix Applications via an SSL VPN There are two ways to use Citrix that are supported by SonicWALL SSL VPN: The agent or client behaves seamlessly, accessing the application on the Citrix server as soon as the user logs into the client. This method is supported by SonicWALL SSL VPN NetExtender. The user accesses the application on the remote Citrix server through a Web interface. SonicWALL SSL VPN Bookmarks support this access method. SonicWALL SSL VPN provides secure remote Citrix access in a fashion similar to Remote Desktop access. This provides a subset of Citrix functionality, since it does not support Program Neighborhood functionality, but is sufficient for access to any Citrix application or desktop. 2 Citrix Access on SonicWALL SSL VPN

3 Feature Overview Citrix can be compared to applications that use the Remote Desktop Protocol (RDP), in that both allow clients to access remote systems or servers. The fundamental difference is that RDP provides terminal session access control with access to the remote desktop itself, including the C drive and system files, whereas with Citrix, client access is usually restricted to application level access. Access to the Citrix desktops and applications requires installation of client software, although this software ranges from a full stand alone client fully integrated into Windows (Start Menu, Context menus) to a lightweight installation of an ActiveX control or a download of a Java applet. Citrix servers and applications are accessible through the Citrix NFuse portal. Access to the NFuse portal is provided by the SonicWALL SSL VPN HTTP(S) reverse proxy feature. After configuring the Citrix server, the SSL-VPN appliance administrator creates one or more Citrix (reverse proxy) bookmarks for use by client users. Client users initiate a Citrix session by first logging into the SonicWALL SSL VPN Virtual Office portal and then clicking on the Citrix bookmarks to the NFuse server. After authenticating with the NFuse portal, the user will see the Citrix applications and desktops that are accessible to him/her. This interface is provided by the Citrix server, but is reverse-proxied by the SSL-VPN appliance. When the user clicks on an application icon, Internet Explorer launches an ActiveX control similar to the one used by Remote Desktop, while other browsers use the Java version which launches an applet. Citrix support requires Internet connectivity in order to download the ActiveX client or the Java applet from the Citrix Web site. The server will automatically decide which Citrix client version to use. Citrix is accessed from Internet Explorer using ActiveX by default, or from other browsers using Java. Java can be used with Internet Explorer by selecting an option in the bookmark configuration in SonicWALL SSL VPN. For Citrix access using Java, the Java applet download uses HTTP which is likely to have outbound access based on usual firewall deployments. When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. Supported Platforms Citrix access on SonicWALL SSL VPN 5.0 is supported on SonicWALL SRA 4200 and 1200 appliances. Citrix access is also supported on previous releases of SonicWALL SSL VPN. Citrix bookmarks with ActiveX and Java applet Citrix support are available on SonicWALL SSL VPN 2.0 or newer for the SSL-VPN 2000 and 4000 appliances, and on SonicWALL SSL VPN 3.5 and newer for the SRA 4200 and Citrix IPv6 is supported on SonicWALL SSL VPN 3.5 and higher. NTLM/Windows Integrated authentication is supported if it is enabled on the Citrix server. Some Citrix installations use NTLM instead of a login form to authenticate the user into the Web interface. Note Single Sign-On is not supported for Web Interface authentication or within the Citrix session. On SonicWALL SSL VPN 5.0, Citrix Portal Bookmarks have been tested and verified to support the following Citrix Application Virtualization platforms through the Citrix Web Interface: Servers: XenApp Server 6.0 XenApp Server 5.0 XenApp Server 4.5 Presentation Server 4.0 MetaFrameXP Feature Release 3 Citrix Access on SonicWALL SSL VPN 3

4 Administrator Tasks for Configuring Citrix Access Clients: XenApp Web Plug-in version or earlier Java client version 10.0 or earlier Citrix client software is available as an ActiveX plugin (for Internet Explorer only) or a Java plugin. The Citrix ActiveX client is supported on systems running Windows XP with Internet Explorer 6.0 or higher. The Java plugin can be used with Internet Explorer, Firefox, Chrome, or Safari browsers on Windows XP, Vista, Windows 7, Linux, or Mac OS client systems as noted in Table 1. For browsers requiring Java to run Citrix, you must have Sun Java 1.6.0_10 or above. Table 1 Citrix (Java 1.6.0_10+) Client - Supported Browsers per OS Windows XP Windows Vista Windows 7 Linux Mac OS X Internet Explorer 6.0 or higher 7.0 or higher 8.0 or higher Firefox 2 or 3 2 or higher 2 or 3 2 or 3 2 or 3 Chrome 5.0 or higher 5.0 or higher 5.0 or higher Safari 2 or 3 Administrator Tasks for Configuring Citrix Access This section contains the following subsections: Deployment Scenario section on page 5 Assumptions and Dependencies section on page 5 Configuring Authentication on the Citrix Server section on page 6 Creating a Citrix Access Policy section on page 13 Creating a Citrix Bookmark section on page 15 Enabling Custom URLs for Citrix Client Downloads section on page 16 Editing a Citrix Bookmark section on page 17 4 Citrix Access on SonicWALL SSL VPN

5 Secure Remote Access PRO 5060 Administrator Tasks for Configuring Citrix Access Deployment Scenario The recommended deployment scenario for Citrix environments places the Citrix server(s) on the LAN behind a SonicWALL Unified Threat Management (UTM) appliance acting as the gateway firewall. A SonicWALL SSL-VPN or SRA 4200 appliance is connected to a firewall interface in the DMZ. Traffic passing between the SSL-VPN and the LAN passes through the UTM appliance where it is examined for threats. SonicWALL UTM Firewall Router X1 X2 Switch X0 Switch Remote Users DMZ X0 LAN Citrix Servers SRA 4200 SRA 4200 Internet Zone Apps, , AD, SQL Assumptions and Dependencies The administrator must have the Citrix Web Interface installed and functioning for the Citrix installation. Microsoft Loopback hotfix (KB884020) is required, although this can be avoided if the ActiveX control does not use loopbacks higher than ActiveX: Users must have enough privileges in order to be able to install an ActiveX control if they don t already have one installed. Java: JRE 1.6.0_10 and above is required by the Citrix Java client in SonicWALL SSL VPN 5.0. If a lower version is detected, the connection is refused and the user is advised to upgrade Java. ActiveX & Java: Firewall rules must allow for Internet Explorer and for the JRE to be able to open server sockets on the system. Java: The SonicWALL SSL-VPN appliance must have a DNS server set up (critical). Citrix Access on SonicWALL SSL VPN 5

6 Administrator Tasks for Configuring Citrix Access Configuring Authentication on the Citrix Server You can configure the Citrix server for anonymous or authenticated access. If you select anonymous access, you can configure the Citrix server for explicit, or forms-based, authentication to make sure that there is at least some type of authentication available for users. See the following sections: Configuring Anonymous or Authenticated Access on page 6 Configuring Explicit Authentication on the Citrix Server on page 9 Configuring Anonymous or Authenticated Access Microsoft IIS Manager must be configured on the Citrix server to enable anonymous access for Citrix. When Windows Integrated Authentication is configured on IIS and the Citrix server is accessed by a client through the SonicWALL SSL-VPN, the SSL-VPN will display a message indicating that it does not support the HTTPS authentication scheme used by Citrix. To configure authentication for Citrix access through SonicWALL SSL VPN, perform the following steps: Step 1 Step 2 On the Citrix server (a Windows Server system), click Start > All Programs. Select Administrative Tools > Internet Information Services (IIS) Manager. 6 Citrix Access on SonicWALL SSL VPN

7 Administrator Tasks for Configuring Citrix Access Step 3 Step 4 In the Internet Information Services (IIS) Manager window, expand the entries for the local computer, Web Sites, Default Web Site, and Citrix. Under Citrix, right-click the service name, for example MetaFrame, and select Properties from the right-click menu. Step 5 Step 6 In the MetaFrame Properties window, click the Directory Security tab. Under Authentication and access control, click Edit. Step 7 Step 8 For anonymous access to the Citrix server, select the Enable anonymous access check box in the Authentication Methods window. (To configure authenticated access, skip to Step 12.) In the User name field, type in the account name to be used for anonymous access or click Browse to select it from the account list. Citrix Access on SonicWALL SSL VPN 7

8 Administrator Tasks for Configuring Citrix Access Step 9 In the Password field, type in the password for this account. Step 10 Step 11 Click OK. An IIS Manager dialog box warns that the anonymous authentication option will result in unencrypted passwords being transmitted over the network except when HTTPS or SSL connections are used. Since we are using HTTPS/SSL in this case, you can safely click Yes to continue. Step 12 To configure authenticated access to the Citrix server rather than anonymous access as described above, clear the Enable anonymous access check box in the Authentication Methods window. 8 Citrix Access on SonicWALL SSL VPN

9 Administrator Tasks for Configuring Citrix Access Step 13 Under Authenticated access, select the Basic authentication (password is sent in clear text) check box. Step 14 Click OK. Configuring Explicit Authentication on the Citrix Server Explicit, or forms-based, authentication is used in conjunction with the anonymous access setting on Microsoft IIS to provide some form of authentication for users. The administrator selects the Explicit authentication method on the Citrix server, if it is not already selected. If only anonymous authentication is configured, Citrix may automatically detect it and force Explicit authentication, which will present a login form to the user. Explicit authentication performs the necessary encryption. To configure explicit authentication on the Citrix server, perform the following steps: Step 1 Log in to the Citrix server as the administrator, open the Start menu, and click Access Suite Console for Presentation Server. Citrix Access on SonicWALL SSL VPN 9

10 Administrator Tasks for Configuring Citrix Access Step 2 In the MetaFrame Presentation Server window, expand Suite Components > Configuration Tools > Web Interface, and then select the MetaFrame URL, for example: Step 3 In the middle pane under Common Tasks, click Configure Authentication Methods. 10 Citrix Access on SonicWALL SSL VPN

11 Administrator Tasks for Configuring Citrix Access Step 4 In the Configure Authentication Methods window, for the Specify Authentication Methods step, select the Explicit check box. Step 5 Step 6 Step 7 Select the desired settings for Enforce 2-factor authentication and Allow user to change password. Click Next. For the Define Selected Method Settings step, select the Windows or NIS (UNIX) radio button. Citrix Access on SonicWALL SSL VPN 11

12 Administrator Tasks for Configuring Citrix Access Step 8 Step 9 Step 10 Step 11 Click Next. For the Specify Authentication Type Settings step, under Domains, select the Display Domain field radio button. Click the Add button and add your domain, if necessary. Select Selection in the Optionally, specify domains for drop-down list, and select your domain. Step 12 Click Next. 12 Citrix Access on SonicWALL SSL VPN

13 Administrator Tasks for Configuring Citrix Access Step 13 For the Check Summary step, verify your settings and then click Finish. Creating a Citrix Access Policy You can configure access policies on the SonicWALL SSL-VPN appliance to provide different levels of access to the Citrix server. There are three levels of access policies: global, group, and user. You can deny or permit access to the Citrix server by creating access policies for a Citrix server IP address, an IP address range (for a server farm), or a network object. User policies take precedence over group policies and group policies take precedence over global policies, regardless of the policy definition. For policies at the same level, the most specific policy takes precedence. Tip When using Citrix bookmarks, in order to restrict proxy access to a host, a Deny rule must be configured for both Citrix and HTTP services. For more information about access policies, including policy hierarchy rules, see the Users Configuration chapter in the SonicWALL SSL VPN Administrator s Guide. The procedure is the same for configuring user, group, or global access policies, except for the initial page (Users > Local Users or Users > Local Groups) and the selection of either a user, a group, or the global option for which to configure the policy. To configure an access policy for a user, perform the following steps: Step 1 In the SonicWALL SSL VPN management interface, navigate to Users > Local Users (or Users > Local Groups). Citrix Access on SonicWALL SSL VPN 13

14 Administrator Tasks for Configuring Citrix Access Step 2 Click the configure icon next to the user (or group or Global Policies) that you want to configure. Step 3 In the Edit User Settings window, select the Policies tab. Step 4 Click Add Policy...to display the Add Policy window. Step 5 In the Add Policy window, in the Apply Policy To drop-down list, select whether the policy will be applied to an individual host, a range of addresses, or a network object. You can also select an IPv6 host or a range of IPv6 addresses. The Add Policy dialog box changes depending on what type of object you select in the Apply Policy To drop-down list. Note Step 6 The SonicWALL SSL VPN policies apply to the destination address(es) of the SonicWALL SSL VPN connection (the Citrix server), not the source address. You cannot permit or block a specific IP address on the Internet from authenticating to the SonicWALL SSL VPN gateway with a policy created on the Policies tab. However, it is possible to control source logins by IP address with a login policy created on the user's Login Policies tab. Type a descriptive name into the Policy Name field. 14 Citrix Access on SonicWALL SSL VPN

15 Administrator Tasks for Configuring Citrix Access Step 7 Step 8 Do one of the following, depending on your selection in the Apply Policy To field: Type an IP address in the IP Address field. Type a starting IP address in the IP Network Address field and type a subnet mask value in the Subnet Mask field in the form Select the network object from the Network Object drop-down list. The port number is included in the network object definition. In the Port Range/Port Number field, optionally enter a port range or an individual port. Note Step 9 Step 10 Step 11 The Citrix Web interface and Citrix ICA server listen on different ports, typically 80/443 and 1494 respectively, which are both needed for a Citrix session. When creating a port-based access policy, you will need to create two policies in order to specify both ports. Standard TCP ports used by Citrix are mentioned in the knowledge base article available at: In the Service drop-down list, optionally select one of the following: Citrix Portal (Citrix) Select this if the Citrix bookmark uses HTTP Citrix Portal (Citrix_https) Select this if the Citrix bookmark uses HTTPS If the Citrix server can be accessed using either HTTP and HTTPS, then you may need to create two access policies, one for each service. An IP address based policy may be simpler in this case. In the Status drop-down list, click on an access action, either PERMIT or DENY. Click Add. Creating a Citrix Bookmark You can configure a Citrix bookmark for a user or for a group. The procedure is the same, except for the initial page (Users > Local Users or Users > Local Groups) and the selection of either a user or a group for which to configure the bookmark. To configure a Citrix bookmark for a user, perform the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the SonicWALL SSL VPN management interface, navigate to Users > Local Users. Click the configure icon next to the user you want to configure. In the Edit User Settings window, select the Bookmarks tab. Click Add Bookmark... Enter a descriptive name for the bookmark in the Bookmark Name field. Enter the name or IP address of the bookmark in the Name or IP Address field. Note Step 7 Step 8 A Citrix bookmark will accept a port option with the IP address (IP_address:portnum). From the Service drop-down list, select Citrix Portal (Citrix). The display will change. To enable SSL encryption for communication between the SSL-VPN appliance and the Citrix server, select the HTTPS Mode check box. Citrix Access on SonicWALL SSL VPN 15

16 Administrator Tasks for Configuring Citrix Access Step 9 Step 10 Step 11 Optionally select the Always use Java in Internet Explorer checkbox to use Java to access the Citrix Portal when using Internet Explorer. Without this setting, a Citrix ICA client or XenApp Web plug-in (an ActiveX client) must be used with Internet Explorer. This setting lets users avoid installing a Citrix ICA client or XenApp Web plug-in specifically for Internet Explorer browsers. Java is used with Citrix by default on other browsers and also works with Internet Explorer. Enabling this check box leverages this portability. When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. To explicitly set the Citrix ICA server address for the Citrix ICA session, select the Always use specified Citrix ICA Server checkbox and then type the server IP address into the ICA Server Address field. Some Citrix deployments have the Citrix Web Interface on one IP address and the ICA server listening on a different address. If the Citrix Web Interface and Citrix ICA server do not share the same IP address, use this setting to explicitly set the ICA server address. Click Add. Enabling Custom URLs for Citrix Client Downloads The Services > Settings page allows the administrator to configure custom URLs for Citrix Java or ActiveX client downloads. To configure custom URLs for Citrix Java or ActiveX client downloads, perform the following steps: Step 1 Step 2 Step 3 Step 4 In the SonicWALL SSL VPN management interface, navigate to the Services > Settings page Select the Enable custom URL for Citrix Java client downloads checkbox if you want your own HTTP URL to be used to download the Citrix Java client. Fill-in the custom URL in the URL field. If this option is not enabled, the default URL will be used. The default URL is shown in grey text in the URL field. The maximum length for the custom URL is 255 characters. Select the Enable custom URL for Citrix ActiveX client downloads checkbox if you want your own HTTP URL to be used to download the Citrix ActiveX client. Fill-in the custom URL in the URL field. If this option is not enabled, the default URL will be used. The default URL is shown in grey text in the URL field. The maximum length for the custom URL is 255 characters. Click Accept. 16 Citrix Access on SonicWALL SSL VPN

17 Administrator Tasks for Configuring Citrix Access Editing a Citrix Bookmark You can edit an existing Citrix bookmark by clicking the edit icon on the Virtual Office page. To edit an existing Citrix bookmark, perform the following steps: Step 1 In the SonicWALL SSL VPN management interface, navigate to the Virtual Office page. Step 2 Step 3 Click Show Edit Controls to expose the Edit and Delete icons for each bookmark. Click the Edit icon for the bookmark you wish to edit. Citrix Access on SonicWALL SSL VPN 17

18 Administrator Tasks for Configuring Citrix Access Step 4 In the Edit Bookmark page, you can view information about the available settings. Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 To make changes to the Bookmark Name, Name or IP Address, or Description fields, type in the new value(s). To change ability of users to edit the bookmark, select a new value from the Allow user to edit/delete drop-down list. The default is Use user policy. To enable SSL encryption for communication between the SSL-VPN appliance and the Citrix server, select the HTTPS Mode check box. To force Internet Explorer to use the Citrix Java applet rather than the default ActiveX control, select the Always use Java in Internet Explorer check box. This setting lets users avoid installing a Citrix ICA client or XenApp Web plug-in specifically for Internet Explorer browsers. When using the Java applet, the local printers are available in the Citrix client. However, under some circumstances it might be necessary to change the Universal Printer Driver to PCL mode. To explicitly set the Citrix ICA server address for the Citrix ICA session, select the Always use specified Citrix ICA Server checkbox and then type the server IP address into the ICA Server Address field. Some Citrix deployments have the Citrix Web Interface on one IP address and the ICA server listening on a different address. If the Citrix Web Interface and Citrix ICA server do not share the same IP address, use this setting to explicitly set the ICA server address. Click OK. 18 Citrix Access on SonicWALL SSL VPN

19 User Tasks for Configuring Citrix Access User Tasks for Configuring Citrix Access Access to the Citrix server and its shared applications is provided with bookmarks on the SonicWALL SSL VPN Virtual Office portal. The administrator may have created either ActiveX or Java bookmarks. When the user launches a Citrix bookmark, the interaction is identical to reverse proxy browsing until an application icon is clicked. At that point a window containing an ActiveX control or a Java applet will pop up. Users might encounter several warnings and dialog boxes the first time they launch a Citrix application. The causes for these are certificate mismatches, applet security warnings, ActiveX security warnings, and pop-up blocking. For the ActiveX version to be functional, the XenApp Web plug-in (which was previously called Windows ICA client) must be installed on the client machine. If the client machine does not have a pre-installed ICA client, then the ActiveX control invokes an installer that downloads the necessary plugin and prompts the user for installation. The user has to go through the installation process only once, and will not be prompted for installation again for future Citrix sessions. This step requires connectivity to from the SSL-VPN appliance. See the following sections for information about using ActiveX or Java bookmarks for Citrix access: Using ActiveX Bookmarks on page 19 Using Java Bookmarks on page 23 Using ActiveX Bookmarks To access applications on the Citrix server with a Citrix(ActiveX) bookmark, perform the following steps: Step 1 Using an Internet Explorer browser, log in to the SonicWALL SSL-VPN Virtual Office portal where the Citrix bookmarks are available. Step 2 Click the desired bookmark to access the Citrix server. This example shows the Web Interface for MetaFrame Presentation Server. Citrix Access on SonicWALL SSL VPN 19

20 User Tasks for Configuring Citrix Access Step 3 Type your Citrix credentials into the User name and Password fields, select the appropriate domain from the Domain drop-down list, and click the Log In button. Step 4 If pop-ups are blocked when the MetaFrame Presentation Server applications are displayed, you will see a warning from your Internet Explorer browser. Click OK in the dialog box, and then enable pop-ups for this site. To enable pop-ups, perform the following steps: a. In your browser, navigate to Tools > Internet Options. b. In the Internet Options window, click the Privacy tab. c. Under Pop-up Blocker, click the Settings button. d. In the Pop-up Blocker Settings window, type the IP address of the Citrix server into the Address of website to allow field, click Add, and then click Close. e. In the Internet Options window, click OK. 20 Citrix Access on SonicWALL SSL VPN

21 User Tasks for Configuring Citrix Access Step 5 In the Citrix Web Interface window, click the desired application, such as Microsoft Word. Step 6 If you see a warning that the page contains both secure and nonsecure items, click Yes in the dialog box to display all items. Step 7 The Citrix Web Client (an ActiveX control) must be running on your system in order to access the application. If this ActiveX control is not installed on your system, the Citrix server attempts to download it for you. The server displays a message to wait while the Citrix Web Client loads. If you see a warning in a yellow bar at the top of the display, click in the yellow bar and select Install ActiveX Control in the popup menu. Step 8 In the Security Warning dialog box, click Install. Citrix Access on SonicWALL SSL VPN 21

22 User Tasks for Configuring Citrix Access Step 9 You are prompted to log in to the Citrix server. Enter your credentials (you do not have to be an Administrator) and select the domain, and click OK. Step 10 The shared application opens and you may begin using it. Step 11 When you are finished, save your changes and close the application. On the Citrix Web Interface page, click the Log Off button to log off the MetaFrame Presentation Server. 22 Citrix Access on SonicWALL SSL VPN

23 User Tasks for Configuring Citrix Access Using Java Bookmarks To access applications on the Citrix server with a Citrix(Java) bookmark, perform the following steps: Step 1 Using any supported browser, log in to the SonicWALL SSL-VPN Virtual Office portal where the Citrix bookmarks are available. Step 2 Step 3 Click the desired bookmark to access the Citrix server. This example shows the Web Interface for MetaFrame Presentation Server. If you see a certificate warning such as those shown below, click the Yes or Run button to continue. Citrix Access on SonicWALL SSL VPN 23

24 User Tasks for Configuring Citrix Access Step 4 In the Citrix Web Interface window, type your Citrix credentials into the User name and Password fields, select the appropriate domain from the Domain drop-down list, and click the Log In button. Step 5 Click the desired application, such as Microsoft Word. Step 6 Step 7 You are prompted to log in to the Citrix server. Enter your credentials (you do not have to be an Administrator) and select the domain, and click OK. If you are using Internet Explorer with Java, you may see a warning dialog that the page uses Java. Click OK. Step 8 The application opens and you may begin using it. 24 Citrix Access on SonicWALL SSL VPN

25 Technical FAQs Step 9 When you are finished, save your changes and close the application. On the Citrix Web Interface page, click the Log Off button to log off the MetaFrame Presentation Server. Technical FAQs How do I find more technical information about Citrix? Technical information is available at the following links: Glossary Basic Authentication For Citrix bookmarks and other HTTP transactions, using basic authentication means that the client requests a Web page, the server responds with an authentication request, the user sees a popup login window and enters his or her credentials, the user name and password are encoded with the Base 64 algorithm (not for security, but rather to encode non-http-compatible characters), the encoded credentials are appended to the Web page request and sent back to the server. Citrix A product by Citrix Inc. that provides Terminal Services-like access to a server farm. This product allows desktop and application sharing, provides load balancing, Web gateway, and comprehensive access policies. For more detail, see Citrix ICA Client ICA stands for Independent Computing Architecture. The Citrix ICA Client is the client software that is now replaced by the Citrix XenApp plug-in and Citrix XenApp Web plug-in. Citrix Web Interface The Citrix Web Interface provides SonicWALL SSL VPN users with access to MetaFrame Presentation Server applications and content through a standard Web browser. The Web Interface uses Java and.net technology to dynamically create an HTML representation of server farms for MetaFrame Presentation Server sites. All applications published in the server farms can be made available and presented to users. The Citrix Web Interface also provides user access through the Program Neighborhood Agent, but this is not currently supported in SonicWALL SSL VPN. ICA file A configuration file that adheres to the INI format. This file is used to launch Citrix clients and contains all the options necessary for connection. Integrated Windows Authentication Integrated Windows Authentication (IWA) is more secure than basic authentication, and can be selected when configuring Microsoft IIS. IWA is used in environments where users have Windows domain accounts and the applications in use are Active Directory aware. When using IWA, the user's domain logon credentials are encrypted and sent to the Web server with Web page requests. The Kerberos authentication protocol is used, or if unavailable, NTLMSSP is used. If the domain Citrix Access on SonicWALL SSL VPN 25

26 Glossary logon credentials cannot be used, the user is prompted to enter a user name and password. IWA cannot be used over an HTTP proxy server, but works with most modern browsers. It can also be used with filesharing, Windows service programs, and Microsoft SQL Server. Java Applet A Java application that runs in a limited environment in the Web browser. Unlike ActiveX, it is platform independent. MetaFrame XP MetaFrame XP runs on a server and allows multiple users to log on and run applications in separate, protected sessions. You install and publish the applications or other resources that you want to deploy. You can group a number of servers together to form a MetaFrame XP server farm that you manage as a single entity. NFuse NFuse Classic is a Web-based application deployment system that provides users with access to MetaFrame applications through a standard Web browser. Each user sees all the applications published in the MetaFrame server farm for that user. NFuse provides centralized application management and places complete control over the application deployment process in the hands of the administrator. NTLM NT LAN Manager is a Microsoft authentication protocol similar to MS-CHAP. NTLM is used with the SMB protocol. The protocol uses a challenge-response sequence of three messages between a client that wishes to authenticate and the server that is requesting authentication. Presentation Server Presentation Server allows delivery of applications as a service, providing on-demand access to users. It provides application virtualization and application streaming delivery. Presentation Server runs on a server and allows multiple users to log on and run applications in separate, protected sessions. You install and publish the applications or other resources that you want to deploy. You can group a number of servers together to form a server farm that you manage as a single entity. Program Neighborhood Agent Program Neighborhood Agent is a feature in Citrix MetaFrame and Presentation Server products that allows applications to be assigned to users. The name was originally inspired by Windows Network Neighborhood and was changed to Citrix Applications in Citrix XenApp. The Program Neighborhood Agent client uses the Access Management Console and published application settings to provide centralized management of the client settings. It also provides pass-through authentication and integrates with the user's desktop and Start menu. It provides client to server content redirection, changing the local Windows File Type Association so that local files automatically launch the associated Citrix published application. Reverse Proxy Such a proxy is deployed between a remote user outside the intranet and a target Web server within the intranet. The proxy intercepts packets flowing across it. XenApp Server Citrix XenApp is the new name for Citrix Presentation Server. Citrix XenApp is an application virtualization solution. Virtualizing applications lets IT manage a single instance of each application in the data center. Applications can be run on high-powered servers in the data center for online access by remote clients, or delivered via application streaming directly to Windows PC s. XenApp Plug-in Users run the Citrix XenApp Plug-in on their client devices to access resources published on XenApp servers. The XenApp Plug-in requires the Citrix Web Interface. The Citrix XenApp Plug-in allows users to access published resources from a Windows desktop environment, including the Start menu and the Windows notification area, by icons that behave like local icons. XenApp Web Plug-in Citrix XenApp Web Plug-in is a smaller plugin that can be installed from the XenAppWeb.msi or the XenAppWeb.exe file. Users access published resources by clicking links on a Web page you publish on your corporate intranet or the Internet. 26 Citrix Access on SonicWALL SSL VPN

27 Glossary Solution Document Version History Version Number Date Notes 1 2/5/2009 This document was created by Susan Weigand. 2 10/15/2009 Added content from functional spec and screenshots. 3 11/6/2009 Incorporated feedback and added user bookmark access sections, Explicit auth section, deployment diagram, info from Citrix Support spec. Added supported browsers, glossary items. 4 7/12/2010 Changed existing text in Supported Platforms section to a note that SSO is not supported. Added info about NTLM. 5 11/3/10 Updated for SSL VPN 5.0, including Supported Platforms section, added ICA server IP address step, updated Virtual Office images. P/N Rev A Citrix Access on SonicWALL SSL VPN 27

28 Glossary 28 Citrix Access on SonicWALL SSL VPN

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

SonicWALL SSL VPN File Shares Applet

SonicWALL SSL VPN File Shares Applet SonicWALL SSL VPN File Shares Applet Document Scope This document describes how to use and manage the SonicWALL SSL VPN File Shares Applet feature. This document contains the following sections: Feature

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2? TM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access)... of 6 1/12/2013 11:46 PM Question/Title UTM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access) on SonicOS Enhanced (SonicOS 5.6 and

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Document Scope This document describes how to configure and use the Dell SonicWALL SRA Secure Virtual Meeting feature and the Dell

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide

Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Copyright and Trademark Notices Use of the product documented herein is subject to your prior acceptance of the End

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Using SonicWALL NetExtender to Access FTP Servers

Using SonicWALL NetExtender to Access FTP Servers SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

VPN User Guide. For Mac

VPN User Guide. For Mac VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

SonicWALL SSL-VPN 2.1 User s Guide

SonicWALL SSL-VPN 2.1 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL-VPN 2.1 User s Guide Using This Guide About this Guide...................................................... 5 Organization

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB

MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB Last Updated: February 18, 2012. Med Access Support Alberta Netcare Portal Support Alberta Health Services

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

Using the FDO Remote Access Portal

Using the FDO Remote Access Portal Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Using the FDO Remote Access Portal

Using the FDO Remote Access Portal Using the FDO Remote Access Portal Introduction The ODS NITOAD Branch has implemented a Juniper Networks secure sockets layer (SSL) virtual private network (VPN) solution at the national gateways to provide

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

SonicWALL SSL VPN 5.0 User s Guide

SonicWALL SSL VPN 5.0 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SSL VPN 5.0 User s Guide Table of Contents Using This Guide About this Guide......................................................

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Release Notes. Contents. Platform Compatibility. Licensing on the SRA Appliances and Virtual Appliance. Secure Remote Access Dell SonicWALL SRA 7.

Release Notes. Contents. Platform Compatibility. Licensing on the SRA Appliances and Virtual Appliance. Secure Remote Access Dell SonicWALL SRA 7. Secure Remote Access Dell SonicWALL SRA 7.0 Contents Platform Compatibility... 1 Licensing on the SRA Appliances and Virtual Appliance... 1 Important Differences between the SRA Appliances... 2 Feature

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

ZyWALL SSL 10. User s Guide. Integrated SSL-VPN Appliance. www.zyxel.com. Version 2.00 12/2008 Edition 1

ZyWALL SSL 10. User s Guide. Integrated SSL-VPN Appliance. www.zyxel.com. Version 2.00 12/2008 Edition 1 ZyWALL SSL 10 Integrated SSL-VPN Appliance User s Guide Version 2.00 12/2008 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people

More information

SonicWALL GMS Aventail EX-Series Appliance Management Feature Module

SonicWALL GMS Aventail EX-Series Appliance Management Feature Module SonicWALL GMS Aventail EX-Series Appliance Management Feature Module Document Scope This document describes how to use the SonicWALL Global Management System (GMS) to manage single or multiple deployments

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting Virtual Learning Environment Internet Explorer Browser Connectivity Troubleshooting This document is for Ultimate Software use only. No part of this document may be reproduced in any form or by any means,

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Single Sign-On in SonicOS Enhanced 5.6

Single Sign-On in SonicOS Enhanced 5.6 Single Sign-On in SonicOS Enhanced 5.6 Document Scope This document describes how to install and configure the Single Sign-On feature in the SonicOS Enhanced 5.6 release. This document contains the following

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

UMMS SSL VPN Instructions

UMMS SSL VPN Instructions UMMS SSL VPN Instructions The document contains the following sections: 1. Introduction 2. Prerequisites 3. Supported software platforms 4. Browser configuration 5. Logon to the UMMS SSL VPN 6. Launching

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Chapter 5 Configuring the Remote Access Web Portal

Chapter 5 Configuring the Remote Access Web Portal Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts

More information

ARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only

ARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only ARCHER & GREINER Citrix Client Install Instructions - For ALL Citrix Users BigHand Client Install Instructions - For BigHand Users Only Table of Contents Citrix Client Install Instructions - For ALL Citrix

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

SINGLE SIGN-ON FOR MTWEB

SINGLE SIGN-ON FOR MTWEB SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame White Paper Version 20100716 2009 SATO CORPORATION. All rights reserved. http://www.satoworldwide.com softwaresupport@satogbs.com

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access. Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor

More information

SonicWALL SSL VPN 3.5 User s Guide

SonicWALL SSL VPN 3.5 User s Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL VPN 3.5 User s Guide Table of Contents Using This Guide About this Guide......................................................

More information

UAG715 Support Note. Revision 1.00. August, 2012. Written by CSO

UAG715 Support Note. Revision 1.00. August, 2012. Written by CSO UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance. SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Citrix Remote Access Work Instructions

Citrix Remote Access Work Instructions Work Instructions Version 1.0 15 January 2010 InTACT Shared Services Centre ACT Department of Treasury Quality Management System Service Management Tools Contents Introduction... 3 Purpose... 3 Scope...

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Citrix XenApp Fundamentals Administrator s Guide

Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals 3.1.0 for Windows Server 2008 Copyright and Trademark Notice Information in this document is subject to change without notice.

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG) Introduction Understanding Forefront Threat Management Gateway (TMG) Network Topology Understanding Forefront Threat Management

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

XenApp/Citrix Program Neighborhood Installation

XenApp/Citrix Program Neighborhood Installation 1. Download the XenApp Plugin (Citrix Presentation Server) Client Package Version 11.0 for Hosted Apps. Click on this LINK to obtain it. Once prompted, click RUN 2. 3. Save the file to your desktop. Once

More information

1. Accessing the LONZA network from a private PC or Internet Café

1. Accessing the LONZA network from a private PC or Internet Café Using SSL VPN from non Lonza PCs 1. Accessing the LONZA network from a private PC or Internet Café To work at home with your private PC or from an Internet Café, you can use your browser to connect to

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Login through Citrix

Login through Citrix Login through Citrix You can login to the Citrix Metaframe servers through the following url s: Internally (from Cebeo network): Externally (from f.i. home): Application Site http://cebeofarm/citrix/metaframe

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information