Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition

In preparation for their Access Gateway implementation, CME upgraded their Presentation Server farm to Presentation Server 4. All requisite service packs , patches, and hot-fixes were applied.

Note 

Differentiating between the two types of "farms" that are involved in a CAG with AAC deployment can be confusing. "Presentation Server farm" refers to the Citrix Presentation Server 4 server farm that delivers applications. "Access Server farm" refers to the collection of AAC Servers that are the intermediaries between the CAG and internal resources (including Presentation Server farms, Web servers, and other resources.)

Component Systems Requirements

The CAG/AAC architecture requires several basic building blocks: the Citrix Access Gateway Appliance, the AAC Server, the WI Server, and a back-end SQL database server, the STA component of the Presentation Server.

Citrix Access Gateway

Citrix Access Gateway appliance Version 4.2 or higher

AAC Server

AAC Server minimum requirements are

SQL Server

The database server for AAC must be one of the following:

Citrix Licensing Server

Citrix Presentation Server 4 Licensing Server is required. Licenses for CAG with AAC must be fulfilled and installed on the Licensing Server.

Citrix Presentation Server with Secure Ticketing Authority (STA)

At least one Presentation Server farm server (preferably the infrastructure server) must be designated as the STA.

Web Interface

Web Interface integration required Web Interface Version 4.2 and the matching Access Suite Console.

Clients

Basic connectivity to the Citrix Access Gateway requires only the familiar ICA Web client. This allows logon and enumeration of the resources provided by the Access Server farm, and to applications served up through the Access Server farm by the Web Interface and Presentation Server farm. Table 16-2 provides a list of supported platforms and associated browsers. Additionally, Windows 2000 or XP users must be members of the Administrators or Power Users group to download and install ActiveX controls, and the following browser requirements must be configured on all clients:

Table 16-2: Supported Web Browsers for AAC

Devices

Operating System

Web Browser

Desktop workstations

Microsoft Windows: Windows XP Home/Professional SP2 Windows 2000 Professional SP4

Internet Explorer 5.5 SP2 Internet Explorer 6.0 SP1 Netscape Navigator 8.0 Mozilla Firefox 1.0.4

 

Apple Macintosh OS X (English only) 1 0.3.9 or greater

Safari 1.2 Netscape Navigator 8.0 Mozilla Firefox 1.0.4

 

Red Hat Linux Netscape Navigator 8.0

Mozilla Firefox 1.0.4

PDAs and Smartphones

PalmOS 5.2.1 (Palm Tungsten C) PalmSource Web Browser Microsoft Pocket PC 2003 2.0 Internet Explorer Internet (HP iPaq Pocket PC h6300) Explorer Default Web Microsoft Windows Mobile 2003 Browser (Smartphone) RIM BlackBerry (BlackBerry 7100t)

PalmSource Web Browser 2.0 Internet Explorer Internet Explorer Default Web Browser

More advanced features require the following additional client components.

The Endpoint Analysis Client This client is required to support AAC scans . The End-point Analysis Client can be distributed as an ActiveX control, a browser plug-in, or a Windows 32-bit application. To use the Endpoint Analysis Client, the following client-side software is required:

Live Edit Client This client is required to support Live Edit. Live Edit requires

Web Site Viewer The Web Site Viewer requires Internet Explorer Version 5.5 SP2 or 6.0 SP1 with all service packs and critical updates and the ability to download and install the signed ActiveX control.

The Secure Access Client This client is required to support true VPN access to IP networks. The Secure Access Client acts as a proxy between the client computer and the Access Gateway appliance. The Secure Access Client can be distributed as a desktop application for Microsoft Windows or Linux operating systems or downloaded and installed automatically when users enter the secure Web address of the Access Gateway appliance and a logon point in a Web browser. In addition to the Administrative rights previously stipulated for Windows 2000 and XP users, Linux user must have the tcl and tk packages installed to use the Secure Access Client.

Basic Installation

The installation procedures in the following paragraphs are presented as a high-level sequence of events. They are neither all inclusive nor are they intended to accurately detail configuration processes and procedures for CAG with AAC. Implementation of Citrix Access Gateway with Advanced Access Controls in a production environment requires extensive planning and a full understanding the business' access strategy and needs, particularly when the full capabilities of the Citrix Access Gateway are to be effectively leveraged. Capabilities such as endpoint analysis and policy-based access based on identity, endpoint scan results, roles, and similar variables should never be undertaken without a carefully planned process and specific requirements and goals. Administrators are encouraged to read the complete design and implementation guidance for CAG and AAC available on Citrix's Web site before proceeding with any CAG implementation. Once a full understanding is achieved, administrators should work to define a corporate access strategy.

Citrix Access Gateway

Configuring the CAG for integration with AAC is a multistep process. First, the CAG must be set up for basic management and connectivity via the serial console, and then additional settings are configured via the Administration Portal. Next , the downloadable Administration Tool is use for more complex configurations, and finally (after completing Advanced Access Control installation), the Administration Tool is used to transfer CAG control to the AAC server.

Basic Console-Based Setup For initial configuration of the CAG, complete the following steps:

  1. Connect the CAG interfaces to the appropriate switch ports (internal and external).

  2. Connect a computer running terminal emulation software (9600 bps, 8 data bits, no parity, 1 stop bit) to the CAG console (serial) port with a null-modem cable.

  3. Once the CAG serial console opens, enter the default administrator credentials (username = root, password = rootadmin). Set the IP address and subnet mask and the default gateway device for Interface 0 (external) by typing and pressing ENTER to choose Express Setup. Respond to the prompts and then commit your changes by typing y; the Citrix Access Gateway will then restart.

  4. After the Gateway has rebooted, verify that the Access Gateway can ping a connected network device on the external interface (the management workstation) by typing 1 and entering the IP address of the computer as shown here.

Note 

At this point in setup, the CAG has not been configured with additional routes. The management workstation must be in the same subnet as the external interface of the CAG.

Making Changes via the Access Gateway Administration Portal The Access Gateway Administration Portal allows the user to make basic configuration changes to the CAG, including

Although these basic CAG settings can be configured using the Access Gateway Administration Portal, the downloadable (from the Administration Portal page) Administration Desktop utility provides a simpler user interface. Only the password change need be executed from the Access Gateway Administration Portal.

Complete the following steps to prepare for administration with the Access Gateway Administration Tool:

  1. Access the Portal with a Web browser at https ://www.new_internal_ip_address:9001.

  2. Since a certificate has not yet been installed on the Access Gateway, a security alert dialog box appears. Click Yes and the Access Gateway Administration Portal will appear.

  3. Change the default "root" password by navigating to the Admin Users section and entering a new password.

  4. In the Access Gateway Administration Portal, navigate to the Downloads, and under Administration, click Download Access Gateway Administration Tool Installer. Run the installer to install the Administration Tool on the management computer, and then open the Administration Tool by double-clicking the icon.

Note 

The downloaded Administration Tool is version-specific. You cannot install more than one version (4.1 or 4.2) on the management workstation at a time. Previous versions must be uninstalled through "Add or Remove Programs" before installing a different version.

Making Changes via the Access Gateway Administration Tool The Access Gateway Administration Tool provides the interface needed to make the CAG accessible, manageable, and secure. Complete the following steps:

  1. Log on to the CAG from the Access Gateway Administration Tool using the external interface address previously assigned.

  2. Navigate to the General Networking tab and assign IP parameters for the internal (Interface 1) connection.

  3. Navigate to the Name Service Providers tab and assign the internal DNS and WINS servers (as a minimum, DNS is needed).

  4. Navigate to the Routes tab and assign the static route to the internal network (ultimately the CAG will be managed from this network and provide secure connectivity for resources in this network). Based on CME's hierarchical address scheme, a single aggregate route defines all internal destinations.

  5. Navigate to the "Generate CSR" tab and enter the required information for the CAG certificate. This certificate will secure all traffic to, from, or through the CAG. Submit the CSR to the selected Certificate Authority (CA). When the certificate is received, use the Administration tab to upload the certificate.

Tip 

Always request the certificate in Base-64 format as a ".crt format." Other formats must be converted before they can be uploaded to the CAG. If the CA requires additional intermediate certificates, these must also be in Base-64 format and uploaded to the CAG.

Once these changes are submitted and the CAG restarted, CME will be able to access the CAG from any internal network and specifically manage the CAG from the AAC Server. Once the CAG is reconfigured for administration from Advanced Access Controls, most on-box management features are used only for CAG appliance maintenance tasks, and not for configuration tasks .

Obtaining an SSL Certificate for the Citrix Access Gateway A Digital ID, also known as a digital certificate or SSL certificate, is the electronic equivalent of a passport or business license. It is a credential issued by a trusted authority that individuals or organizations can present electronically to prove their identity or their right to access information.

When a Certification Authority (CA) such as VeriSign issues Digital IDs, it verifies that the owner is not claiming a false identity. Just as when a government issues a passport and officially vouches for the identity of the holder, when a CA gives your business a digital certificate, it is putting its name behind your right to use your company name and Web address.

This section describes the basic process for obtaining a third-party server certificate from a well-known CA such as VeriSign or Thawte. The processes for obtaining a certificate may differ slightly between CAs, but the steps are basically the same. Most CAs will include a variety of services and extras with their certificate offerings. These services may include 40-or 128-bit SSL (Global Server) IDs; business authentication; and protection against economic loss resulting from the theft, corruption, impersonation, or loss of a certificate. Services may also include trials of a security analysis or security auditing service, accelerated certificate delivery, and certificate revocation and replacement periods. Be sure to check with each potential CA for details on their individual services.

CME has chosen to use a 128-bit SSL Server ID from VeriSign for their Citrix Access Gateway. This will secure the traffic and packets from the Internet to the CAG.

In order to complete the certificate request, CME needs to provide the following documentation to the Certificate Authority:

Domain Services

AAC requires a Domain Account with Local Administrator rights on all component platforms (AAC, Presentation Server servers, etc.). To simplify the process, CME will create a new user account "svc_aac_admin" as a member of the Windows "Domain Admins" security group.

Additionally, internal and external DNS entries are required to match the new FQDN of the Citrix Access Gateway, while new internal records are required for the AAC server and associated suite components.

SQL Server

To allow simplified installation of the AAC, the existing SQL server used for the Citrix Datastore must have an additional user and associated database created for AAC. The actual AAC installation will create this database, provided the minimum prerequisites are met.

Citrix Licensing Server

The existing Citrix Licensing Server will be used for AAC and CAG, but the "Citrix Access Gateway with Advanced Access Controls" licenses must be fulfilled (from the Citrix Licensing Web site) and uploaded to the Citrix Licensing Server. In keeping with Citrix's best practices for survivability , the Licensing Server was deployed (during CME's upgrade to Citrix Presentation Server 4) in a clustered configuration on an existing internal Windows Server 2003 Cluster.

AAC Server

Before installing AAC, the host server must meet all prerequisites in terms of service packs, hotfixes, patches, and MDAC versions, and must be a Domain Member. The IIS installation on the host server must be properly configured in terms of Web Services Extensions (Figure 16-3). Specifically,

Figure 16-3: IIS Web Services Extensions

Tip 

As of this writing, the AAC installation prerequisite CD ships with a file called "NDP1.1sp1-KB867460-X86.exe." This is the ASP.NET service pack for Windows 2000 Server. If installing on Windows Server 2003, the current version for Windows Server 2003 (Win2k3-net11sp1.exe) must be downloaded and installed instead.

AAC Installation CME's installation will not (initially) employ additional features such as Live Edit, HTML Preview, Web e-mail via Microsoft Exchange, or PDA Synchronization. Each of these requires additional software such as Microsoft Office or Exchange Systems Manager to be installed on every server in the Access Server farm (AAC servers). During AAC installation, warnings with regard to these services can be ignored.

To install AAC (the CME hostname is ORD-AAC01), in CME's case on Windows Server 2003, Run "AutoRun.exe" from the AAC media CD and select the Advanced Access Controls Server and Management Console components for installation (Figure 16-4). When the installation completes, accept the default value to launch the Advanced Access Controls Server Configuration Wizard.

Figure 16-4: AAC component selection

Tip 

If the AAC server will support HTML preview, deselect the Run Server Configuration check box on the last screen. Two optional open source components, GhostScript and a PDF-to-HTML converter, should be installed prior to configuring the server. See the Citrix Access Gateway with Advanced Access Control Administrator's Guide for details on how to download and install these components.

To provide the initial configuration, step through the screens of the AAC Server Configuration Wizard:

  1. Define a new Access Server farm (not Presentation Server farm) as shown here. When CME expands their access platform (adding the second CAG and additional AAC servers in the Access Server Farm) they will select Join An Existing Access Server Farm and the new AAC server will "pull" settings from the original server.

  2. Provide the previously assigned AAC service account (Domain Admin account) and credentials.

  3. CME will use the existing SQL server and create a new database for AAC through the wizard, shown here.

  4. Provide the appropriate SQL credentials and server identity as shown next. The Access Server Farm name is the name of the farm to which this (and future) AAC servers will belong.

    Note 

    Identify CME's existing Citrix Licensing Server (which runs on the default TCP port 27000) as the selected Licensing Server for AAC, shown here.

  5. Assign the server roles with HTML Preview deselected. The HTML Preview role may be added later, but the Agent server and Web server roles are mandatory for creating the Access Server farm. The Agent server role provides policy management and enforcement and supports legacy Content Delivery Agents (aka MetaFrame Secure Access Manager). The Web server role provides the user interface functionality and authentication processing.

  6. Use the default Web site path .

  7. An installation summary window appears. Click Next to accept the listed configurations and complete the installation.

Verifying the Basic Installation Once AAC installation is completed, verify the AAC server status (Figure 16-5).

  1. Click StartProgramsCitrixAccess GatewayServer Configuration to launch the Advanced Access Control Configuration utility.

    Note 

    Verify that AAC configuration data is correctly reflected by checking the Service Account, Server Farm Information, Configured Logon Points (a sample logon point should have been created), and Authentication Server Details sections.

  2. Verify that all services are started under the Services section. Checking the services can eliminate needless troubleshooting during ensuing setupit is quite common that at least one service doesn't automatically start after the initial installation.

Figure 16-5: Advanced Access Control configuration ( post-install )

Tip 

The "AuthService.asmx" listed on the "Authentication Server Details" is not a Windows service visible through the Services Control Panel applet. If it is ever necessary to change the Authentication Server for the Access Server farm (such as troubleshooting or distributing services across Access Server farm members), you must change/verify the settings in three locations: the "Authentication Server Details" in the Advanced Access Control Configuration utility already mentioned; the Access Gateway Settings window of the AAC Server's Access Suite Console (see the note in the later section "Finalizing Management Settings for the CAG in AAC"); and on the Web Interface (see the note in the later section "Web Interface").

Switching CAG Control to the AAC Server The final step in initial CAG and AAC integration is to reconnect to the CAG with the Access Gateway Administration Tool, navigate to the Advanced Options tab, and change the option for Administer The Access Gateway Using: to "Advanced Access Controlsincludes an access server farm." The display changes and requires identification of the AAC as shown in Figure 16-6. When you "submit" this data, the CAG registers with the AAC server.

Figure 16-6: Changing CAG control to AAC

Finalizing Management Settings for the CAG in AAC Once the CAG has rebooted, it should automatically register with the AAC server. From this point forward, configuration of CAG behavior is accomplished through the Access Suite Console on the AAC Server. Note that the Access Suite Console installed on an AAC Server is different than the console version on a typical Presentation Server server. Complete the following steps:

  1. Launch the Access Suite Console. Select first the Access Gateway heading and then Run Discovery as shown in Figure 16-7.

    Figure 16-7: AAC Access Suite Console

  2. Once the Gateway Appliance is discovered , select Edit Gateway Appliance Properties.

    Note 

    Under Accessible Networks deselect Split Tunneling. CME does not allow clients connected to the corporate network to be concurrently connected to Internet resources.

  3. Under Secure Ticketing Authority add the Presentation Server Farm Infrastructure Servers as shown here; then click OK to finish.

    Note 

    A minor annoyance, when adding the STA servers, is that if you enter the new XML service port first and then tab to the IP Address field, the XML value returns to the default port 80.

  4. In the Console, select the named AAC farm and then Edit Farm Properties.

  5. Select the Presentation Server Farms and click New to add the existing CME Presentation Server farm.

  6. In the pop-up windows select General and enter the farm name and XML service port.

  7. Click on Servers and then Add Server and enter the IP address or FQDN of the Presentation Server farm's infrastructure servers.

  8. Once the Infrastructure Servers are listed, ensure the Set Failover Sequence Of Unavailable Servers is selected and set the Bypass Interval For Failed Server value to 30 minutes.

  9. Select Address Mode and then edit the default (*.*.*.*) value, change the Server Address Mode: to Access Gateway, and click OK.

  10. Click the Access Gateway button. In the Access Gateway Settings window, Check the Configure Access Gateway For Communication With The Citrix Presentation Server Farm box and then enter the FQDN of the CAG (the name on the CSR). Verify that the AAC Server hostname is correctly listed in the "Authentication Service URLs" area and then click OK.

    Note 

    This is the second location mentioned under the earlier "AuthService.asmx" Tip.

  11. Click Finish then OK to complete the sequence.

Citrix Presentation Server with Secure Ticketing Authority (STA)

Unlike previous versions of Citrix Presentation Server and the legacy WI/SG deployment, Citrix Presentation Server 4 installs the STA service on every Presentation Server Farm server by default. CME followed best practices and changed the default XML port from TCP 80 to TCP 8081 to avoid conflicts with IIS. Every Presentation Server farm server runs the STA service; however, CME has identified their Presentation Server farm infrastructure servers as the logical target for STA connectivity from the Web Interface, AAC, and associated access center components. The CME infrastructure servers are otherwise normal Presentation Server farm members but do not deliver applications. These servers are reserved for tasks such as Zone Data Collectors, STA services, Farm Metric Services, and the like. Keeping infrastructure maintenance workload insulated from application delivery workload ensures anomalies related to application delivery workload (such as a misbehaving application or server resource issue) cannot degrade infrastructure service or availability.

Web Interface

To use the Web Interface (WI) as a Web resource and deliver Presentation Server farm applications to the CAG via AAC, the Web Interface Version 4.2 must be installed in accordance with Citrix's Web Interface Administrators Guide.

Once installation is complete, some default configurations must be changed through the Web Interface's Access Suite Console. Launch the Access Suite Console and complete the following steps:

  1. Navigate to Suite ComponentsConfiguration ToolsWeb Interface and select Create Site.

  2. Select the site type "Citrix Presentation Server" and click Next.

  3. For Specify The IIS Location, accept the default and check the Set As The Default Page of rte IIS Site box and click Next.

    Note 

    Under Specify The Configuration Source select the Use Local Configuration File(s) radio button and click Next.

  4. Under Specify The Access Method select the Using Advanced Access Controls radio button and enter the URL as http://www.<AAC-Hostname>:<Port> and click Next.

    Note 

    This is the third location mentioned under the earlier "AuthService.asmx" Tip above.

  5. Under Specify The Server Farm add the CME Presentation Server Farm name and the IP addresses of the Infrastructure Servers. Ensure the XML service port is correct, and then click Next. The settings are shown here.

    Caution 

    Web Interface should only be managed using the Access Suite Console. The Console will apply necessary changes to IIS through the Console API. Do not attempt to change any settings directly within IIS unless you plan to rebuild the IIS server anyway.

  6. Review the site configuration information screen and complete the site creation.

Presentation Server Farm Servers (All Servers)

For the Presentation Server farm to work correctly with the AAC Server, only one change is required in normal Presentation Server configuration. From the Presentation Server Console of a Presentation Server farm member server, navigate to Servers, select each server, and right-click to access the context menu. Select Properties, and when the properties window appears, navigate to XML Service and check Trust Requests Sent To The XML Service as shown in Figure 16-8. This step must be repeated for every server; there is no global farm setting.

Figure 16-8: Configuring the Presentation Server XML service

Basic Configuration

While detailed configuration instructions are beyond the scope of this chapter, basic concepts are necessary before delving in to the complexity of Citrix Access Gateway with Advanced Access Control Administrator's Guide. Configuring the AAC for users to access resources is a simple sequence with complex steps based on the requirements of the access strategy. At the most fundamental level,

The combination of policies and filters are the key to the flexibility of the CAG/AAC combination. Several important factors should always be considered when building the policies and filters needed to support client access:

Категории