Citrix Systems 9000 Series manual

Page 3

BroadCom is a registered trademark of BroadCom Corporation. Fast Ramp, NetScaler, and NetScal- er Request Switch are trademarks of Citrix Systems, Inc. Linux is a registered trademark of Linus Torvalds. Internet Explorer, Microsoft, PowerPoint, Windows and Windows product names such as Windows NT are trademarks or registered trademarks of the Microsoft Corporation. NetScape is a registered trademark of Netscape Communications Corporation. Red Hat is a trademark of Red Hat, Inc. Sun and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. Other brand and product names may be registered trademarks or trademarks of their respective holders.

Software covered by the following third party copyrights may be included with this product and will also be subject to the software license agreement: Copyright 1998 © Carnegie Mellon University. All rights reserved. Copyright © David L. Mills 1993, 1994. Copyright © 1992, 1993, 1994, 1997 Henry Spencer. Copyright © Jean-loup Gailly and Mark Adler. Copyright © 1999, 2000 by Jef Pos- kanzer. All rights reserved. Copyright © Markus Friedl, Theo de Raadt, Niels Provos, Dug Song, Aaron Campbell, Damien Miller, Kevin Steves. All rights reserved. Copyright © 1982, 1985, 1986, 1988-1991, 1993 Regents of the University of California. All rights reserved. Copyright © 1995 Tatu Ylonen, Espoo, Finland. All rights reserved. Copyright © UNIX System Laboratories, Inc. Copyright © 2001 Mark R V Murray. Copyright 1995-1998 © Eric Young. Copyright © 1995,1996,1997,1998. Lars Fenneberg. Copyright © 1992. Livingston Enterprises, Inc. Copyright © 1992, 1993, 1994, 1995. The Regents of the University of Michigan and Merit Network, Inc. Copyright © 1991-2, RSA Data Security, Inc. Created 1991. Copyright © 1998 Juniper Networks, Inc. All rights reserved. Copyright © 2001, 2002 Networks Associates Technology, Inc. All rights reserved. Copyright (c) 2002 Networks Associates Technology, Inc. Copyright 1999-2001© The Open LDAP Foundation. All Rights Reserved. Copyright © 1999 Andrzej Bialecki. All rights re- served. Copyright © 2000 The Apache Software Foundation. All rights reserved. Copyright (C) 2001-2003 Robert A. van Engelen, Genivia inc. All Rights Reserved. Copyright (c) 1997-2004 Uni- versity of Cambridge. All rights reserved. Copyright (c) 1995. David Greenman. Copyright (c) 2001 Jonathan Lemon. All rights reserved. Copyright (c) 1997, 1998, 1999. Bill Paul. All rights reserved. Copyright (c) 1994-1997 Matt Thomas. All rights reserved. Copyright © 2000 Jason L. Wright. Copyright © 2000 Theo de Raadt. Copyright © 2001 Patrik Lindergren. All rights re- served.

Part No. VPN-UG-AX-70-0806

Last Updated: August 2006

Image 3
Contents SSL VPN User’s Guide for the Windows Platform Page Page Page Contents Troubleshooting the SSL VPN Client SSL VPN Architecture SSL VPN OverviewSSL VPN Overview Using the SSL VPN Browser Plug-in Getting StartedSystem Requirements 1Security Alert window 2SSL VPN Login 5Browser plug-in being loaded 6Session window with the portal page in the background 7Download prompt Using the SSL VPN Agent8The Security Alert window 9SSL VPN Login 10Download 12 Portal Terminating the SSL VPN Session13Confirmation message box Terminating the Session for the Agent16 Exit message Understanding the Cleanup Process Terminating the Session for the Browser Plug-inUnderstanding the Data Sets 18 List pane NetScaler agent and activex browser plug-in Client authentication certificateApplications that have accessed Sslvpn services Passwords and autocomplete data stored by browserCleanup Level Cleanup LogsBrowser cache cookies and temporary files Portal Using the SSL VPN PortalBookmarks Pane Using Portal ToolsHome Ping Pane3Add Bookmark Remove a bookmark4Remove bookmark File Transfer5File Transfer Top PanelLeft panel Right Panel Left PanelRight panel To download a file from a remote server To log on to a file serverThemes To upload a file to the remote serverTo remove a folder, subfolder, or file Customizing your theme Selecting a theme for the SSL VPN session9Customize your theme Configuring the SSL VPN Client Configuring Login SettingsUsing Native Login 1Gateway Enterprise Edition dialog box 3Configuration dialog box Configuring Native LoginClick the Options tab. The Options pane is displayed 6Citrix Access Gateway Options dialog box Setting the SSL VPN GatewayConfiguring Security Settings Configuring Proxy SettingsConfiguring a Secondary Password Configuring Split Tunneling Configuring Interception Settings8List of IP addresses, ports, and applications Configuring Split DNS Managing Domain Conflicts 9Domain conflicts caused by identical domains 10List of networks on the remote intranet Managing Network Conflicts11Incorrect routing of traffic due to network conflicts Local LAN Access When Split Tunneling is DisabledConfiguring the SSL VPN Client Configuring the SSL VPN Client Debugging the SSL VPN Client Troubleshooting the SSL VPN ClientTrace Tab SSL VPN Session Error CodesCodes Message Explanation Action Permissions in the Windows Login failed SSL Accounts, the plug-in must Incorrect OS Version VPN Compression Statistics 2Compression Tab Connection Logs3Connection log FAQs Why does SSL VPN not work with MS Windows 9x?Does SSL VPN use a client side IP address? Why does NetBios not access data on my computer? What should the client do when Windows crashes?Uninstalling the Browser Plug-in Uninstalling the SSL VPN ClientsFigure A-2Settings dialog box Figure A-3Downloaded Program Files folder Uninstalling the Agent

9000 Series specifications

Citrix Systems is a leader in virtualization technology, known for its robust solutions that facilitate remote access and enhance productivity. One of its noteworthy offerings is the Citrix 9000 Series, which is designed to optimize application delivery and provide excellent user experiences in enterprise environments.

The Citrix 9000 Series is built on advanced technologies that ensure high performance and reliability. One of the standout features is its ability to intelligently manage and route application traffic, reducing latency and ensuring that users receive quick and efficient access to virtual applications and desktops. This is critical in today's fast-paced work environment, where every second counts regarding application response times.

Another key characteristic of the Citrix 9000 Series is its support for a wide range of protocols, including HDX (High Definition User Experience), which enhances the performance of virtual applications across various network conditions. This responsiveness ensures that graphical applications run smoothly, even in bandwidth-constrained environments, making it ideal for remote workers and those using mobile devices.

Security is a top priority for Citrix, and the 9000 Series includes several features to protect sensitive data and provide safe access to applications. With support for advanced encryption and multi-factor authentication, organizations can ensure that only authorized users access their virtualized environments. Additionally, the system offers comprehensive monitoring and analytics to help IT teams identify performance issues and potential security threats proactively.

Scalability is another significant advantage of the Citrix 9000 Series. Whether a company is expanding its workforce or requiring additional resources to manage seasonal demands, this system can efficiently scale to meet those needs. It supports a variety of workloads, from small businesses to large enterprises, which ensures that organizations can adapt and grow without needing to overhaul their entire infrastructure.

Lastly, the user experience is thoughtfully crafted in the Citrix 9000 Series. The solution provides customizable user interfaces, enabling organizations to tailor the look and feel of applications to align with corporate branding while offering a seamless experience across devices.

In conclusion, the Citrix 9000 Series combines advanced features, scalability, security, and user-centric design, making it an excellent choice for organizations looking to enhance their application delivery and remote access capabilities.