-
Configuring the VPN User Experience
-
How to Configure Full VPN Setup on a Citrix Gateway Appliance
-
AlwaysOn VPN before Windows logon (Formally AlwaysOn service)
-
Maintaining and Monitoring the System
-
Deploying with Citrix Endpoint Management, Citrix Virtual Apps, and Citrix Virtual Desktops
-
Accessing Citrix Virtual Apps and Desktops Resources with the Web Interface
-
Integrating Citrix Gateway with Citrix Virtual Apps and Desktops
-
Deploying with the Web Interface
-
Configuring Additional Web Interface Settings on Citrix Gateway
-
Configuring Access to Applications and Virtual Desktops in the Web Interface
-
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
-
Configuring Settings for Your Citrix Endpoint Management Environment
-
Configuring Load Balancing Servers for Citrix Endpoint Management
-
Configuring Load Balancing Servers for Microsoft Exchange with Email Security Filtering
-
Configuring Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
-
Allowing Access from Mobile Devices with Citrix Mobile Productivity Apps
-
Configuring Domain and Security Token Authentication for Citrix Endpoint Management
-
Configuring Client Certificate or Client Certificate and Domain Authentication
-
-
Citrix Gateway Enabled PCoIP Proxy Support for VMware Horizon View
-
Proxy Auto Configuration for Outbound Proxy support for Citrix Gateway
-
Integrate Citrix Gateway with Citrix Virtual Apps and Desktops
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Deploying with the Web Interface
When you deploy Citrix Gateway to provide secure remote access to Citrix Virtual Apps and Desktops, Citrix Gateway works with the Web Interface and the Secure Ticket Authority (STA) to provide access to published applications and desktops hosted in a server farm.
Deploying Citrix Gateway in the DMZ is the most common configuration when Citrix Gateway operates with a server farm. In this configuration, Citrix Gateway provides a secure single point-of-access for the web browsers and Citrix Receiver that access the published resources through the Web Interface. This section covers the basic aspects of about this deployment option.
The configuration of your organization’s network determines where you deploy Citrix Gateway when it operates with a server farm. You have the following two options:
- If your organization protects the internal network with a single DMZ, deploy Citrix Gateway in the DMZ.
- If your organization protects the internal network with two DMZs, deploy one Citrix Gateway in each of the two network segments in a double-hop DMZ configuration. For more information, see Deploying Citrix Gateway in a Double-Hop DMZ. Note: You can also configure a double-hop DMZ with the second Citrix Gateway appliance in the secure network.
When you deploy Citrix Gateway in the DMZ to provide remote access to a server farm, you can implement one of the following three deployment options:
- Deploy the Web Interface behind Citrix Gateway in the DMZ. In this configuration, as shown in the following figure, both Citrix Gateway and the Web Interface are deployed in the DMZ. The initial user connection goes to Citrix Gateway and is then redirected to the Web Interface. Figure 1. Web Interface Behind Citrix Gateway in the DMZ
- Deploy Citrix Gateway parallel to the Web Interface in the DMZ. In this configuration, both Citrix Gateway and the Web Interface are deployed in the DMZ, but the initial user connection goes to the Web Interface instead of Citrix Gateway.
- Deploy Citrix Gateway in the DMZ and deploy the Web Interface in the internal network. In this configuration, Citrix Gateway authenticates user requests before relaying the request to the Web Interface in the secure network. The Web Interface does not perform authentication, but interacts with the STA and generates an ICA file to ensure that ICA traffic is routed through Citrix Gateway to the server farm.
The location in which you deploy the Web Interface depends on a number of factors, including:
- Authentication. When users log on, either Citrix Gateway or the Web Interface can authenticate user credentials. Where you place the Web Interface in your network is a factor that determines, in part, where users authenticate.
- User software. Users can connect to the Web Interface with either the Citrix Gateway plug-in or Citrix Receiver. You can limit the resources users can access by using Citrix Receiver only, or give users greater network access with the Citrix Gateway plug-in. How users connect, and the resources to which you allow users to connect can help determine where you deploy the Web Interface in your network.
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.