Remote PC Access 编辑
Remote PC Access
Note:
This article describes how to configure Remote PC Access using the Full Configuration interface. If you’re using the Quick Deploy interface, follow the guidance in Remote PC Access in Quick Deploy.
Remote PC Access is a feature of Citrix Virtual Apps and Desktops that enables organizations to easily allow their employees to access corporate resources remotely in a secure manner. The Citrix platform makes this secure access possible by giving users access to their physical office PCs. If users can access their office PCs, they can access all the applications, data, and resources they need to do their work. Remote PC Access eliminates the need to introduce and provide other tools to accommodate teleworking. For example, virtual desktops or applications and their associated infrastructure.
Remote PC Access uses the same Citrix Virtual Apps and Desktops components that deliver virtual desktops and applications. As a result, the requirements and process of deploying and configuring Remote PC Access are the same as those required for deploying Citrix Virtual Apps and Desktops for the delivery of virtual resources. This uniformity provides a consistent and unified administrative experience. Users receive the best user experience by using Citrix HDX to deliver their office PC session.
The feature consists of a machine catalog of type Remote PC Access that provides the following functionality:
- Ability to add machines by specifying OUs. This ability facilitates the addition of PCs in bulk.
- Ability to add machines by using CSV files. This ability facilitates the addition of PCs in bulk in scenarios with OU structure restrictions.
- Automatic user assignment based on the user that logs into the office Windows PC. We support single user and multiple users assignments. By default, automatic assignment is restricted to a single user. To automatically assign multiple users to the next unassigned machine, navigate to Full Configuration > Settings and turn on the Enable automatic assignment of multiple users for Remote PC Access setting.
Citrix Virtual Apps and Desktops can accommodate more use cases for physical PCs by using other types of machine catalogs. These use cases include:
- Physical Linux PCs
- Pooled physical PCs (that is, randomly assigned, not dedicated)
Notes:
For details on the supported OS versions, see the system requirements for the VDA for single-session OS and Linux VDA.
For on-premises deployments, Remote PC Access is valid only for Citrix DaaS Advanced or Premium licenses. Sessions consume licenses in the same way as other Citrix Virtual Desktops sessions. For Citrix Cloud, Remote PC Access is valid for Citrix DaaS and Workspace Premium Plus.
Considerations
While all the technical requirements and considerations that apply to Citrix Virtual Apps and Desktops and Citrix DaaS in general also apply to Remote PC Access, some might be more relevant or exclusive to the physical PC use case.
Deployment considerations
While planning the deployment of Remote PC Access, make a few general decisions.
- You can add Remote PC Access to an existing Citrix Virtual Apps and Desktops and Citrix DaaS deployment. Before choosing this option, consider the following:
- Are the current Delivery Controllers or Cloud Connectors appropriately sized to support the additional load associated with the Remote PC Access VDAs?
- Are the on-premises site databases and database servers appropriately sized to support the additional load associated with the Remote PC Access VDAs?
- Will the existing VDAs and the new Remote PC Access VDAs exceed the number of maximum supported VDAs per site?
- You must deploy the VDA to office PCs through an automated process. The following are two of options available:
- Electronic Software Distribution (ESD) tools such as SCCM: Install VDAs using SCCM.
- Deployment scripts: Install VDAs using scripts.
- Review the Remote PC Access security considerations.
Machine catalog considerations
The type of machine catalog required depends on the use case:
- Remote PC Access machine catalog
- Windows dedicated PCs
- Windows dedicated multi-user PCs. This use case applies to physical office PCs that multiple users can access remotely in different shifts.
- Pooled Windows PCs. This use case applies to physical PCs that multiple random users can access, such as computer labs.
- Single-session OS machine catalog
- Static - Dedicated Linux PCs
- Random - Pooled Linux PCs
Once you identify the type of machine catalog, consider the following:
- A machine can be assigned to only one machine catalog at a time.
- To facilitate delegated administration, consider creating machine catalogs based on geographic location, department, or any other grouping that eases delegating administration of each catalog to the appropriate administrators.
- When choosing the OUs in which the machine accounts reside, select lower-level OUs for greater granularity. If such granularity is not required, you can choose higher-level OUs. For example, in the case of Bank/Officers/Tellers, select Tellers for greater granularity. Otherwise, you can select Officers or Bank based on the requirement.
- Moving or deleting OUs after being assigned to a Remote PC Access machine catalog affects VDA associations and causes issues with future assignments. Therefore, make sure to plan accordingly so that OU assignment updates for machine catalogs are accounted for in the Active Directory change plan.
- You can choose OUs to add machines to the machine catalog in bulk. In some scenarios, doing that is not easy because of OU structure restrictions. Instead, you can add machines in bulk by using CSV files. That feature gives you more flexibility to bulk add machines. You can add only machines (for use with user auto-assignments) or add machines along with user assignments.
- Integrated Wake on LAN is available only with the Remote PC Access type machine catalog.
Linux VDA considerations
These considerations are specific to the Linux VDA:
- Use the Linux VDA on physical machines only in non-3D mode. Due to limitations on NVIDIA’s driver, the local screen of the PC cannot be blacked out and displays the activities of the session when HDX 3D mode is enabled. Showing this screen is a security risk.
- Use machine catalogs of type single-session OS for physical Linux machines.
- The integrated Wake on LAN functionality is not available for Linux machines.
Technical requirements and considerations
This section contains the technical requirements and considerations for physical PCs.
- The following are not supported:
- KVM switches or other components that can disconnect a session.
- Hybrid PCs, including All-in-One and NVIDIA Optimus laptops and PCs.
- Dual boot machines.
- Connect the keyboard and mouse directly to the PC. Connecting to the monitor or other components that can be turned off or disconnected, can make these peripherals unavailable. If you must connect the input devices to components such as monitors, do not turn those components off.
- The PCs must be joined to an Active Directory Domain Services domain.
- Secure Boot is supported on Windows 10 only.
- The PC must have an active network connection. A wired connection is preferred for greater reliability and bandwidth.
- If using Wi-Fi, do the following:
- Set the power settings to leave the wireless adapter turned on.
- Configure the wireless adapter and network profile to allow automatic connection to the wireless network before the user logs on. Otherwise, the VDA does not register until the user logs on. The PC isn’t available for remote access until a user has logged on.
- Ensure that the Delivery Controllers or Cloud Connectors can be reached from the Wi-Fi network.
- You can use Remote PC Access on laptop computers. Ensure the laptop is connected to a power source instead of running on the battery. Configure the laptop power options to match the options of a desktop PC. For example:
- Disable the hibernate feature.
- Disable the sleep feature.
- Set the close lid action to Do Nothing.
- Set the “press the power button” action to Shut Down.
- Disable video card and NIC energy-saving features.
- Remote PC Access is supported on Surface Pro devices with Windows 10. Follow the same guidelines for laptops mentioned previously.
If using a docking station, you can undock and redock laptops. When you undock the laptop, the VDA reregisters with the Delivery Controllers or Cloud Connectors over Wi-Fi. However, when you redock the laptop, the VDA doesn’t switch to use the wired connection unless you disconnect the wireless adapter. Some devices provide built-in functionality to disconnect the wireless adapter upon establishing a wired connection. The other devices require custom solutions or third-party utilities to disconnect the wireless adapter. Review the Wi-Fi considerations mentioned previously.
Do the following to enable docking and undocking for Remote PC Access devices:
- In the Start menu, select Settings > System > Power & Sleep, and set Sleep to Never.
- Under the Device Manager > Network adapters > Ethernet adapter go to Power Management and clear Allow the computer to turn off this device to save power. Ensure that Allow this device to wake the computer is checked.
- Multiple users with access to the same office PC see the same icon in Citrix Workspace. When a user logs on to Citrix Workspace, that resource appears as unavailable if already in use by another user.
- Install the Citrix Workspace app on each client device (for example, a home PC) that accesses the office PC.
Configuration sequence
This section contains an overview of how to configure Remote PC Access when using the Remote PC Access type machine catalog. For information on how to create other types of machine catalogs, see the Create machine catalogs.
On-premises site only - To use the integrated Wake on LAN feature, configure the prerequisites outlined in Wake on LAN.
If a new Citrix Virtual Apps and Desktops site was created for Remote PC Access:
- Select the Remote PC Access site type.
- On the Power Management page, choose to enable or disable power management for the default Remote PC Access machine catalog. You can change this setting later by editing the machine catalog properties. For details on configuring Wake on LAN, see Wake on LAN.
- Complete the information on the Users and Machine Accounts pages.
Completing these steps creates a machine catalog named Remote PC Access Machines and a delivery group named Remote PC Access Desktops.
If adding to an existing Citrix Virtual Apps and Desktops site:
- Create a machine catalog of type Remote PC Access (Operating System page of the wizard). For details on how to create a machine catalog, see Create machine catalogs. Make sure to assign the correct OU so that the target PCs are made available for use with Remote PC Access.
- Create a delivery group to provide users access to the PCs in the machine catalog. For details on how to create a delivery group, see Create delivery groups. Make sure to assign the delivery group to an Active Directory group that contains the users that require access to their PCs.
Deploy the VDA to the office PCs.
- We recommend using the single-session OS core VDA installer (
VDAWorkstationCoreSetup.exe
). - You can also use the single-session full VDA installer (
VDAWorkstationSetup.exe
) with the/remotepc /physicalmachine
option, which achieves the same outcome as using the core VDA installer. - Consider enabling Windows Remote Assistance to allow help desk teams to provide remote support through Citrix Director. To do so, use the
/enable_remote_assistance
option. For details, see Install using the command line. - To be able to see logon duration information in Director, you must use the single-session full VDA installer and include the Citrix User Profile Management WMI Plugin component. Include this component by using the
/includeadditional
option. For details, see Install using the command line. - For information about deploying the VDA using SCCM, see Install VDAs using SCCM.
- For information about deploying the VDA through deployment scripts, see Install VDAs using scripts.
After you successfully complete steps 2–4, users are automatically assigned to their own machines when they log in locally on the PCs.
- We recommend using the single-session OS core VDA installer (
Instruct users to download and install Citrix Workspace app on each client device that they use to access the office PC remotely. Citrix Workspace app is available from the Citrix download site or the application stores for supported mobile devices.
Features managed through the registry
Caution:
Editing the registry incorrectly can cause serious problems that might require you to reinstall your operating system. Citrix cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Be sure to back up the registry before you edit it.
Sleep mode (minimum version 7.16)
To allow a Remote PC Access machine to go into a sleep state, add this registry setting on the VDA, and then restart the machine. After the restart, the operating system power saving settings are respected. The machine goes into sleep mode after the preconfigured idle timer passes. After the machine wakes up, it reregisters with the Delivery Controller.
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\PortICA
- Name: DisableRemotePCSleepPreventer
- Type: DWORD
- Data: 1
Session management
By default, a remote user’s session is automatically disconnected when a local user initiates a session on that machine (by pressing CTRL+ATL+DEL). To prevent this automatic action, add the following registry entry on the office PC, and then restart the machine.
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\PortICA\RemotePC
- Name: SasNotification
- Type: DWORD
- Data: 1
By default, the remote user has preference over the local user when the connection message is not acknowledged within the timeout period. To configure the behavior, use this setting:
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\PortICA\RemotePC
- Name: RpcaMode
- Type: DWORD
- Data:
- 1 - The remote user always has preference if he or she does not respond to the messaging UI in the specified timeout period. This behavior is the default if this setting is not configured.
- 2 - The local user has preference.
The timeout for enforcing the Remote PC Access mode is 30 seconds by default. You can configure this timeout, but do not set it lower than 30 seconds. To configure the timeout, use this registry setting:
HKLM\SOFTWARE\Citrix\PortICA\RemotePC
- Name: RpcaTimeout
- Type: DWORD
- Data: number of seconds for timeout in decimal values
When a user wants to forcibly get the console access: The local user can press Ctrl+Alt+Del twice in a gap of 10 seconds to get local control over a remote session and force a disconnect event.
After the registry change and machine restart, if a local user presses Ctrl+Alt+Del to log on to that PC while it is in use by a remote user, the remote user receives a prompt. The prompt asks whether to allow or deny the local user’s connection. Allowing the connection disconnects the remote user’s session.
Wake on LAN
Remote PC Access supports Wake on LAN, which gives users the ability to turn on physical PCs remotely. This feature enables users to keep their office PCs turned off when not in use to save energy costs. It also enables remote access when a machine has been turned off inadvertently.
With the Wake on LAN feature, the magic packets are sent directly from the VDA running on the PC to the subnet in which the PC resides when instructed by the delivery controller. This allows the feature to work without dependencies on additional infrastructure components or third-party solutions for delivery of magic packets.
The Wake on LAN feature differs from the legacy SCCM-based Wake on LAN feature. SCCM-integrated Wake on LAN is an alternative Wake on LAN option for Remote PC Access that is only available with on-premises Citrix Virtual Apps and Desktops. For information on the SCCM-based Wake on LAN, see Wake on LAN – SCCM-integrated.
System requirements
The following are the system requirements for using the Wake on LAN feature:
- Control plane:
- Citrix DaaS
- Citrix Virtual Apps and Desktops 2009 or later
- Physical PCs:
- VDA version 2009 or later
- Windows 10 or Windows 11. For supportability details, see the VDA system requirements.
- Wake on LAN enabled in BIOS/UEFI
- Wake on LAN enabled in network adapter’s properties within Windows configuration
Configure Wake on LAN
To configure Wake on LAN, you can use the Full Configuration management interface or PowerShell.
Configure Wake on LAN in the Full Configuration interface
To create the Wake on LAN connection:
- Navigate to the Hosting node on the left.
- Select Add Connection and Resources.
- In the Connection page of the wizard, provide the following:
- Connection type: Remote PC Wake on LAN
- Zone name: select the zone where the Remote PC Access catalog resides
- Connection name: enter a name for the Wake on LAN connection
- Finalize the remaining steps in the Add Connection and Resources wizard.
To add the Wake on LAN connection to a Remote PC Access machine catalog:
- If you are creating a new Remote PC Access machine catalog, you can add the connection on the Machine Type page of the Machine Catalog Setup wizard using the dropdown list.
- If you want to add the Wake on LAN connection to an existing machine catalog:
- Navigate to the Machine Catalogs node on the left.
- Select the appropriate Remote PC Access machine catalog.
- Right-click on the machine catalog or select the More menu above.
- Select Edit Machine Catalog.
- In the Power Management page, select Yes.
- Select the appropriate connection from the dropdown list.
- Select Save.
Note:
The configuration of Wake on LAN through the Full Configuration interface is only available with Citrix DaaS at this time.
Configure Wake on LAN through PowerShell
To configure Wake on LAN through PowerShell:
- Create the Remote PC Access machine catalog if you do not have one already.
- Create the Wake on LAN host connection if you do not have one already.
- Retrieve the Wake on LAN host connection’s unique identifier.
- Associate the Wake on LAN host connection with a machine catalog.
To create the Wake on LAN host connection:
# Load Citrix SnapIns
Add-PSSnapIn -Name "*citrix*"
# Provide the name of the Wake on LAN host connection
[string]$connectionName = "Remote PC Access Wake on LAN"
# Create the hypervisor connection
$hypHc = New-Item -Path xdhyp:\Connections `
-Name $connectionName `
-HypervisorAddress "N/A" `
-UserName "woluser" `
-Password "wolpwd" `
-ConnectionType Custom `
-PluginId VdaWOLMachineManagerFactory `
-CustomProperties "<CustomProperties></CustomProperties>" `
-Persist
$bhc = New-BrokerHypervisorConnection -HypHypervisorConnectionUid $hypHc.HypervisorConnectionUid
# Wait for the connection to be ready before trying to use it
while (-not $bhc.IsReady)
{
Start-Sleep -s 5
$bhc = Get-BrokerHypervisorConnection -HypHypervisorConnectionUid $hypHc.HypervisorConnectionUid
}
<!--NeedCopy-->
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论