ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE ACCURATE, IT IS PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE ALL RESPONSIBILITY FOR THE USE OR APPLICATION OF
THE PRODUCT(S) DESCRIBED IN THIS MANUAL.
CITRIX SYSTEMS, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT
MAY OCCUR DUE TO THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN
THIS DOCUMENT. INFORMATION IN THIS DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. COMPANIES, NAMES, AND DATA USED IN EXAMPLES ARE FICTITIOUS
UNLESS OTHERWISE NOTED.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC
rules. These limits are designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment generates, uses, and can
radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct
the interference at their own expense.
Modifying the equipment without Citrix' written authorization may result in the equipment no longer
complying with FCC requirements for Class A digital devices. In that event, your right to use the
equipment may be limited by FCC regulations, and you may be required to correct any interference
to radio or television communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the NetScaler Request Switch™ 9000 Series equipment. If the
NetScaler equipment causes interference, try to correct the interference by using one or more of the
following measures:
Move the NetScaler equipment to one side or the other of your equipment.
Move the NetScaler equipment farther away from your equipment.
Plug the NetScaler equipment into an outlet on a different circuit from your equipment. (Make sure
the NetScaler equipment and your equipment are on circuits controlled by different circuit breakers
or fuses.)
Modifications to this product not authorized by Citrix Systems, Inc., could void the FCC approval
and negate your authority to operate the product.
BroadCom is a registered trademark of BroadCom Corporation. Fast Ramp, NetScaler, and NetScaler Request Switch are trademarks of Citrix Systems, Inc. Linux is a registered trademark of Linus
Torvalds. Internet Explorer, Microsoft, PowerPoint, Windows and Windows product names such as
Windows NT are trademarks or registered trademarks of the Microsoft Corporation. NetScape is a
registered trademark of Netscape Communications Corporation. Red Hat is a trademark of Red Hat,
Inc. Sun and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. Other brand
and product names may be registered trademarks or trademarks of their respective holders.
SSL VPN is a secure remote access solution that provides point-to-point communication between remote users, such as mobile employees, partners, or
resellers, and a private enterprise network. It does so by creating a secure
SSL-based tunnel between a user's computer and the SSL VPN gateway. This
allows authorized remote users to gain access to critical business resources
such as corporate intranets, shared file systems, native client/server applications, and terminal services.
1.1SSL VPN : Architecture
To log on to a remote network, you need to log on to the SSL VPN gateway. To
do this, you typically need to use a client provided by the service provider. For
instance, if you are trying to log on to your office network, you will first need
to install a VPN client on your home PC or laptop and then use it to log on.
Alternately, some service providers allow you to log on to the remote network
via an Internet portal. Once logged on, an SSL VPN plug-in is installed on your
computer. This plug-in then establishes a secure tunnel between your computer and the SSL VPN gateway.
Figure 1-1 Basic functioning of SSL VPN
The Citrix NetScaler SSL VPN solution provides both modes of access. These
are the agent and the plug-in. These modes, however, are configured by the
SSL VPN administrator on the gateway. If the SSL VPN administrator configures the gateway to allow the users access via the plug-in only, the plug-in is
downloaded every time the user logs on to the gateway.
SSL VPN User’s Guide1-1
SSL VPN Overview
The agent is installed on your computer when you log on for the first time. You
can configure it to log on directly to the gateway, without having to log on via
the Web portal. This is known as the native login mode. Alternately, you can
also log on to the gateway via the SSL VPN login page.
The SSL VPN browser plug-in is an ActiveX control. While the feature set supported by the plug-in is identical to that supported by the agent, it does not
support native login.
When either version of the SSL VPN client is downloaded on to your computer
and permitted to execute, it creates a secure channel of communication
between the local system and the SSL VPN gateway, and allows you to access
resources on the intranet that you are authorized to use. When a TCP or a UDP
application, like Telnet or Microsoft Outlook, tries to connect to a server in the
intranet, the client intercepts the connection, secures it using SSL encryption,
and redirects it to the server through the secure SSL VPN tunnel.This behavior
extends to several applications such as FTP clients, Web browsers, soft
phones, e-mail clients, etc. You can also use ping and traceroute. This behavior may vary based on the Split Tunneling configuration. For details, refer to
the Configuring Split Tunneling section.
Note By default, the TDI interception mechanism is used. When it fails, the client uses
the Winsock interception mechanism. This is also applicable for scenarios where
you do not have administrative privileges on the computer. As a result, TCP compression, UDP interception, NetBios interception, HTTP delta, etc., will not be
supported.
The SSL VPN client supports both SSL 2.0, SSL 3.0, and TLS 1.0 protocols.
Based on the cipher settings on the SSL VPN gateway, the client can perform
up to 2048 bit encryption. In addition, the SSL VPN administrator can also
configure the client to ensure that certain personal firewalls and AntiVirus
applications are running on your computer. You can configure the client to
delete cached Internet files, generated on your computer during the SSL VPN
session, after the session ends.
1-2SSL VPN User’s Guide
Chapter 2
Getting Started
The preceding chapter covered the architectural details of the SSL VPN client.
In this chapter you will learn to use both versions of the SSL VPN client and log
on to the gateway and access intranet resources.
2.1System Requirements
The system requirements for the SSL VPN client are:
Operating system: Microsoft Windows 98, Windows 2000, Windows NT, Windows XP, or Windows 2003 Server.
Web browser: Internet Explorer, Firefox, Mozilla, NetScape, and Opera.
Note When accessing the SSL VPN on Linux or Mac OS, your computer will automati-
cally download and install the multi-platform version of the plug-in. For details on
accessing the SSL VPN on these platforms, refer to the SSL VPN Users Guide for
Windows, LINUX, Mac OS, and UNIX Platforms.
2.2Using the SSL VPN Browser Plug-in
SSL VPN allows you to access authorized resources, on a remote intranet, over
a secure connection. To establish the secure connection, you must first log on
to the SSL VPN via the login page. Contact your SSL VPN administrator for the
URL and the login credentials. The typical format of such a URL is as follows:
https://companyname.com. The following procedure lists the steps to initiate
an SSL VPN session via the browser plug-in.
1. Type the URL of the SSL VPN login page in the browser window. If the SSL
VPN administrator has not configured a trusted SSL certificate that identifies the server, the browser will prompt you with a security alert asking
your permission to access the login page.
SSL VPN User’s Guide2-1
Getting Started
Figure 2-1 Security Alert window
The security alert indicates that there might be discrepancies in the certificate.
The possible issues are:
•The certificate has expired.
•The domain name in the certificate does not match the domain name of the
server.
•The certificate is not trusted.
Click
No and contact your SSL VPN administrator. If the SSL VPN administrator
instructs you to click Yes, this alert is again displayed after you log on as
shown in Figure 2-5.
2. The login page is displayed as shown in the following figure.
2-2SSL VPN User’s Guide
Getting Started
Figure 2-2 SSL VPN Login page
3. Enter your user name and password and click Login. When you log on to
the SSL VPN gateway for the first time, a security warning is displayed as
shown in the following figure. This warning prompts you to download the
browser plug-in.
Figure 2-3 Security warning
SSL VPN User’s Guide2-3
Getting Started
Note On a Windows XP-based system, the following dialog box is displayed.
Figure 2-4 Security warning on a Windows XP-based computer
4. Click Yes. The Secure Remote Access Session window is displayed as
shown in the following figure, and the plug-in begins to download. A "Loading..." message is also displayed in this window.
Figure 2-5 Browser plug-in being loaded
2-4SSL VPN User’s Guide
Getting Started
5. When the download has completed, the Secure Remote Access Session
window displays the following message: "Closing this window will exit SSL
VPN Session". This indicates that the SSL VPN session is now active. The
portal page configured by the SSL VPN administrator is displayed in the
main browser window, as shown in the following figure.
Figure 2-6 Session window with the portal page in the background
Note If you are not automatically prompted to download the plug-in after successfully
logging in, click the "Click here" hyperlink in the alternative page that is displayed. This alternative page is shown in the following figure.
SSL VPN User’s Guide2-5
Figure 2-7 Download prompt page
Getting Started
Note For details on working with a pop-up blocker, especially for a computer running
Windows XP with SP2, consult the SSL VPN administrator.
You can now access resources on the remote site. For example, if you have
logged on to your office network, you can launch your e-mail client and access
your messages.
2.3Using the SSL VPN Agent
SSL VPN allows you to access authorized resources, on a remote intranet, over
a secure connection. To establish the secure connection, you must first log on
to the SSL VPN via the login page. Contact the SSL VPN administrator for the
URL and the login credentials. The typical format of such a URL is as follows:
https://companyname.com. The following procedure lists the steps to initiate
an SSL VPN session via the agent.
1. Type the URL of the SSL VPN login page in the browser window. If the SSL
VPN administrator has not configured a trusted SSL certificate that identifies the server, the browser will prompt you with a security alert asking
your permission to access the login page.
2-6SSL VPN User’s Guide
Getting Started
Figure 2-8 The Security Alert window
The security alert indicates that there might be discrepancies in the certificate.
The possible issues are:
•The certificate has expired.
•The domain name in the certificate does not match the domain name of the
server.
•The certificate is not trusted.
Click
No and contact the SSL VPN administrator. If the SSL VPN administrator
instructs you to click Yes, this alert is again displayed after you log on as
shown in Figure 2-5.
2. The login page is displayed as shown in the following figure.
SSL VPN User’s Guide2-7
Figure 2-9 SSL VPN Login page
Getting Started
3. Enter your user name and password and click Login. When you log on for
the first time, the following download page is displayed. Click the link to
download and install the agent.
2-8SSL VPN User’s Guide
Getting Started
Figure 2-10 Download page
4. When the agent is successfully installed, a security alert is displayed as
shown in the following figure.
Figure 2-11 Security warning
SSL VPN User’s Guide2-9
Getting Started
5. Click Yes. The portal page configured by the SSL VPN administrator is displayed in the main browser window with the agent displayed in the system
tray, as shown in the following figure.
Figure 2-12 Portal page
You can now access resources on the remote site. For example, if you have
logged on to your office network, you can launch your e-mail client and access
your messages.
2.4Terminating the SSL VPN Session
You can choose to terminate the SSL VPN session by either logging out or by
closing the client application. If you are using the browser plug-in, you can
close the plug-in window to terminate the session.
The temporary files generated on the client computer during an SSL VPN session could pose a security threat. These files can be misused to obtain confidential information. To eliminate this threat, the client supports the cleanup of
the files after the session is closed. This feature, however, needs to be enabled
by the SSL VPN administrator. The following procedures list the steps to termi-
2-10SSL VPN User’s Guide
Getting Started
nate an SSL VPN session.
2.4.1Terminating the Session for the Agent
The following procedure covers the steps to terminate the session for the
agent.
1. Check the Windows system tray for the icon. This indicates that the
agent is active and that you are currently logged on. Right-click the icon
and select
shown in the following figure.
Figure 2-13 Confirmation message box
2. Click Yes. The Citrix Windows Cleanup dialog box is displayed as shown in
the following figure.
Logout from the short-cut menu. A message box is displayed as
Figure 2-14 Citrix Windows Cleanup dialog box
SSL VPN User’s Guide2-11
Getting Started
3. Select a cleanup option from the Select Cleanup Level box and click
Cleanup. The cleanup process is initiated and the status is displayed on the
dialog box as shown in the following figure.
Figure 2-15 Cleanup dialog box with details
4. Once the cleanup process is completed successfully, click Exit. The follow-
ing message is displayed and the icon changes to in the Windows sys-
tem tray.
Figure 2-16 Exit message
2-12SSL VPN User’s Guide
Getting Started
2.4.2Terminating the Session for the Browser Plug-in
The following procedure covers the steps to terminate the session for the
agent.
1. Click
Figure 2-17 Confirmation message box
2. Click OK. The Citrix Windows Cleanup dialog box is displayed as shown in
3. Select a cleanup option from the Select Cleanup Level box and click
4. Once the cleanup process is completed successfully, click
Logout on the plug-in window. The following message box is dis-
played.
Figure 2-14.
Cleanup. The cleanup process is initiated and the status is displayed on the
dialog box as shown in Figure 2-15.
Exit.
2.5Understanding the Cleanup Process
The administrator of the SSL VPN gateway controls the cleanup process. As a
result, the cleanup dialog box is displayed only if the SSL VPN administrator
has configured the gateway to do so. In addition, the SSL VPN administrator
can also configure the gateway to delete specific data sets, from your computer, when you exit the session. The options corresponding to these data sets
are disabled on the List pane of the Citrix Windows Cleanup dialog box. The
remaining options are either grayed out or activated based on the cleanup
level that you have chosen.
2.5.1Understanding the Data Sets
As mentioned earlier, the data generated during the SSL VPN session can be
misused to obtain confidential information. For example, you can configure the
client to delete all passwords and auto complete data stored by the browser.
To select the data set, you need to access the List pane on the Citrix Windows
Cleanup dialog box by clicking the List tab. The List pane is shown in the following figure.
SSL VPN User’s Guide2-13
Loading...
+ 46 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.