I need help get our citrix server presentation 4.0 to be temporary access from outside. Internal we use 172.20.1.8 for citrix and outside we have ip 69.x.x.x
What is the best way to get this to working, thank you
The preferred way to do this is to use Citrix Access Gateway or Secure Gateway. Access Gateway is a hardware box that sits in the DMZ of your firewall and is an SSL VPN device.
Secure Gateway does a similar job but uses software installed on a Windows server. It acts as a broker between the server farm and the internet. This can be more costly and less secure (I think the entry price level for an Access Gateway is around $2000 US, whereas SG needs hardware, SSL certificates and more service time to configure etc.)
Alternatively, you could use VPN's if your firewall supports it, but this may require some software to be installed on each client device that needs access.
The only other option is to put the Citrix server on to the internet, either by assigning a public IP address to the NIC, or by opening ports on your firewall. This is not to be recommended!!!! It will leave your entire network open to attack.
The choice really comes down to price, but I would strongly recommend the Access Gateway. Not only will it give you the functionality you need (accessing a Citrix farm), it will also allow you to have secure acccess to the network for other services, e.g. mail, file servers, and even VoIP! It's cheap and secure and fairly easy to configure (and no, I'm not on commission from Citrix ;o))
right now we don't have a FQDN, Certificate or SG setup yet. Temporay i just want to user to have access to citrix via the web from outside with going thru VPN. We have a outside IP. Will altrddr will do the trick?
If you have VPN access, you should just be able to hit the internal IP of the Citrix server. No altaddr required! If you didn't have a VPN, you could setup the Citrix server with Web Interface and an alt address. Configure the altaddr to be the same as your external IP and configure the firewall to pass traffic on 1494/2598 (depending on whether you are using session reliability) to your Citrix farm. Then tell WI to return the altaddr instead of the real address. That will do it, but be warned that this is very insecure and you're leaving your network open to attack!
The Altaddr command should be altaddr /set 69.x.x.x
This will tell the CTX server what it's alternate address is. By setting the WI DMZ setting to Alternate, you tell the WI to request the alternate address from the CTX server when it asks for the location of the requested app.
As you have specified the client IP range and mask, you tell WI to only return the alternate address for clients that belong to that subnet (although by setting the mask to 255.255.255.255 you tell it to look at only that one host - presumably that is the IP of the firewall DMZ interface) This should mean that intranet users will be unaffected, as they will not belong to this range. You are then opening up the firewall for ports 1494 and 2598.
Provided the firewall is configured to tunnel the traffic to the alternate address, you should be set. It really depends on your firewall configuration, but from the CTX side, you should be fine with that config.
Are you happy with the firewall setup? There are lots of ways to do that, but I could send you a diagram if that would be helpful?
No problem, but could you send me a diagram with your current setup, indicating which ports are opened etc? (obviously remove the actual IP's and replace with dummy ones - can't be too careful these days! ;o))
Do you have an email address I can contact you on?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.