GBorror,
We have almost exactly as you describe, SecureID and Nfuse on a Metaframe 1.8 Server running W2K. With Nfuse on the Citrix server itself, it means I have 443 and my ICA port exposed through the firewall.
NFuse does not require SecureID to retrieve published applications, which we brought to the attention of Citrix. They dismissed it saying because local access required Token authentication it did not matter if username/password was cracked (I of coarse disagreed), afterall token would block any access to the server, and auditing would show signs of dictionary attacks.
We also brought to thier attention the whole 1494 is open and if they know the public IP address they can custom an ICA file to bypass Nfuse. They admitted this, and as others have told you Nfuse does not serve as a security boundry to prevent direct connection.
Secure Gateway is supposed to be thier answer to all of this, making it so that 1494 is not open directly to the internet. Only problem with that from our perspective is that Secure Gateway requires Metaframe XP from what I understand, which means our Metaframe 1.8 box would have to be upgraded to use this feature. We are supposed to begin testing in Jan. so I can let you know what we find.
Bottom line, you will stay exposed, and SecureID is your first line of defense. Best practices for a Citrix server with sensitive information (I am in the Health/Medical industry) almost requires you to make sure that all access to the server is with SecureID. For example, we require all ICA connections to be only for the SDLocal group, which requires any authenticated user to have a SecureID token for authentication. Then we just put all of our application groups in the SDLocal group.
Other best practices include publishing applications only with ICA connnections, deny any RDP, lock the server down tight with permissions, use appsec.exe from the resource Kit, and set up a strong Group Policy that locks down as much as you can get away with. Why lock down the desktop if you only allow published applications? Because even if you require published applications in ICA properties a savy user can still easily get to the desktop.
Because you are directly on the web with 1494, SecureID is your first and best defense. You are using AD to protect your servers on the DMZ right? Securing Citrix on the DMZ almost requires W2K with AD, and is a real pain in the *#@ without it (I know from experience).
There is one last thing you can do, you can change the default ICA port or the Metaframe server, and of coarse change the settings in NFUSE to reflect the port change. While changing the port # still leaves the server exposed to the net, at least you require extra work for the hacker to determine what service is using the exposed port.
To change the default ICA port on Metaframe use the ICAPORT command line utility. To configure a new port, type icaport from the command line on the metaframe server and you will see all the available options. To change the port in NFUSE you will need to use the Customizing_NFuse.pdf supplied with NFUSE. It will address a couple ways to do it, depending upon how customized your NFUSE is and what is the best way for you.
More security help for this issue can be found at the following links:
Let me know if this helps.
Galrahn
galrahn@galrahn.com