Outbound ICA Proxy support 编辑
Outbound ICA Proxy support
Outbound ICA Proxy support for Citrix Gateway enables the network administrators to avail SmartControl functionalities even when Receiver and Citrix Gateway are deployed in different organizations.
The following scenario illustrates the use of the Outbound ICA Proxy solution:
A network administrator requires control over the ICA session related capabilities when Receiver and Citrix Gateway are deployed in different organizations.
Understanding the Outbound ICA Proxy support
To bring the SmartControl functionality to the enterprise organization, company A, which has the receiver, we need to add a Citrix ADC appliance which acts as a LAN Proxy. The Citrix ADC LAN Proxy enforces SmartControl and proxies the traffic to the Citrix Gateway of Company B. In this deployment scenario, the Receiver forwards the traffic to the Citrix ADC LAN Proxy which allows the network administrator of Company A to enforce SmartControl. The deployment is depicted in the following figure.
In this scenario, the traffic between the LAN Proxy and the Citrix Gateway is over SSL.
Note: Do not enable client certificate based authentication on the Citrix Gateway.
SSL support on Citrix ADC LAN proxy
From release 13.0 build xx.xx, traffic between Citrix Workspace app and Citrix ADC LAN proxy is supported over SSL as well. The Citrix Workspace app encrypts the traffic it sends to LAN Proxy over SSL. SSL support on LAN proxy can co-exist with the existing deployment.
To enable traffic encryption over SSL between Citrix Workspace app and Citrix ADC LAN proxy, you must perform the following on the Citrix ADC LAN proxy:
- Disable authentication and enable double-hop on the VPN virtual server.
- Set the host on the Windows client to the IP address of the VPN virtual server.
- Enable SNI and certificate validation.
- Add appropriate CA certificates and enable them globally.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论