nelson esteves npg escalation

Post on 17-Jan-2016

42 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Nelson Esteves NPG Escalation. TECH304: Integrating and Troubleshooting Citrix Access Gateway Enterprise Edition. Agenda. Integrating Repeater with Access Gateway Enterprise. Integration with Microsoft SharePoint. Security Expressions and Smart Access. Including Advanced Troubleshooting. - PowerPoint PPT Presentation

TRANSCRIPT

Nelson Esteves

NPG Escalation

TECH304: Integrating and Troubleshooting Citrix Access Gateway Enterprise Edition

Integrating Repeater with Access Gateway Enterprise

Agenda

Integration with Microsoft SharePoint

Security Expressions and Smart Access

Including Advanced Troubleshooting

Integrating Repeater with Access Gateway Enterprise

Integrating Repeater with Access Gateway Enterprise

Integration with Microsoft SharePoint

Security Expressions and Smart Access

Including Advanced Troubleshooting

Branch Repeater Integration

Traffic between the client and the secure network is optimized before passing through the VPN tunnel

Optimized

Not Optimized

Deployment Architecture

Access Gateway Plugin

Branch Repeater Plugin

Remote and Mobile Workspaces

Data Center and Corporate Offices

Access GatewaySecure access to:•Applications•Desktops•Networks

Branch Repeater•Compression•Acceleration

File Shares and Web Applications

Branch Repeater Integration

Repeater integration is enabled/disabled through a Traffic Profile

Branch Repeater Integration

Redirector mode: A traffic policy expression must be created for the signaling IP address of the Repeater appliance

Transparent mode: A traffic policy must be created which covers all backend servers the client is accessing

Only one Repeater traffic policy will be evaluated when bound at the virtual server level or globally

Enabling Repeater in a traffic policy will disallow Single Sign-On, File Type Association and HTTP authorization features

Integrating Repeater with Access Gateway Enterprise

Integration with Microsoft SharePoint

Integration with Microsoft SharePoint

Security Expressions and Smart Access

Including Advanced Troubleshooting

Integration with Microsoft SharePoint

Access Gateway Enterprise Edition 9.0 can rewrite content from a SharePoint site so that it is available to users without requiring the Access Gateway Plug-in.

This avoids administrators having to deploy VPN access to users that require access to SharePoint.

For the rewrite process to complete successfully, the Access Gateway must be configured with the Web address for each SharePoint server in your network.

In most environments where SharePoint is accessed externally administrators have to configure what is called Alternate Address Mapping

Integration with Microsoft SharePoint

Alternate Address Mapping in SharePoint 2007

TOO COMPLEX!!!

Integration with Microsoft SharePoint

New with Access Gateway Enterprise is the full support of Microsoft SharePoint via clientless access.

This basically means that no longer administrators will have to configure internet, intranet, etc.. addresses for a SharePoint site.

With Access Gateway Enterprise Edition you now have full access to SharePoint and its features without having to deploy VPN access.

How to implement it? All it takes is one single configuration entry and the powerful rewrite engine will make the necessary changes to the SharePoint pages.

Integration with Microsoft SharePoint

Powerful rewrite engine at work

Sample source page from original SharePoint page:

Same page via Access Gateway Enterprise on clientless access:

Clientless Access to SharePoint

Version Supported

SharePoint Portal Server 2007 Yes

SharePoint Portal Server 2003 Yes

SharePoint Services for Windows 2003 Server R2 Yes

SharePoint Services Service Pack 2 Yes

Clientless Access to SharePoint

WISP Check-In

Check-Out Version History

View Properties Edit Properties

Delete Alert Me

Document download Document upload (single file)

Document upload (multiple files) Document check-out

Document check-in Single sign-on and graceful logout

Integrating Repeater with Access Gateway Enterprise

Security Expressions and Smart Access

Integration with Microsoft SharePoint

Security Expressions and Smart Access

Including Advanced Troubleshooting

Policy Expressions

allow_ftp DESTIP == 10.9.13.60 Allow DESTPORT == Port 21

Expression

Expressions:• Can be single or Compound• Consist of a Name, Qualifier and Operator• Evaluated by AGEE to determine if a policy is applied

Match All Expressions

Match All Expression will use the AND operator to form the expressionMatch All Expression will use the AND operator to form the expression

Resulting Expression:av_5_TrendMicro_11_25 && av_5_TrendMicroOfficeScan_7_3Resulting Expression:av_5_TrendMicro_11_25 && av_5_TrendMicroOfficeScan_7_3

Tabular Expressions

Tabular Expressions let you create custom compound expressions with the aid of graphical operators and a preview display

Tabular Expressions let you create custom compound expressions with the aid of graphical operators and a preview display

Advanced Free-Form

Expressions can be created and edited manuallyExpression must however be a valid rule

Expressions can be created and edited manuallyExpression must however be a valid rule

Useful for creating complex expressions, using custom qualifiers, using additional operators, and previewing an expression built using the other

methods

Useful for creating complex expressions, using custom qualifiers, using additional operators, and previewing an expression built using the other

methods

Virtual ServerVirtual Server

Policy APriority 10Policy A

Priority 10

Policy BPriority 20Policy B

Priority 20

Home pagewww.citrixsynergy.com

Home pagewww.citrix.com

Resulting Configuration

Resulting Configuration

Home pagewww.citrixsynergy.com

Split TunnelOFF

Single Sign-on-not set-

Split TunnelON

Single Sign-onON

Split Tunnel OFF

Single Sign-onON

Why?

Policy results are aggregated from all policies that are true

When the policy settings conflict, priority wins

When policy settings do not conflict, the results are cumulative

from all policies that are true

GlobalGlobal

Policy APriority 0Policy APriority 0

Home pagewww.citrix.com

Resulting ConfigurationResulting ConfigurationHome page

www.sales.com

Split TunnelON

Single Sign-on-not set-

Split Tunnel OFF

Single Sign-onON

Virtual ServerVirtual Server

Policy BPriority 0Policy BPriority 0

Home pagewww.citrixsynergy.com

Split Tunnel-not set-

Single Sign-onOFF

GroupGroup

Policy CPriority 0Policy CPriority 0

Home pagewww.sales.com

Split TunnelOFF

Single Sign-onON

GlobalGlobal

Policy APriority 0Policy APriority 0

Home pagewww.citrix.com

Resulting Configuration

Resulting Configuration

Home pagewww.sales.com

Split TunnelON

Single Sign-on-not set-

Split Tunnel OFF

Single Sign-onON

Virtual ServerVirtual Server

Policy BPriority 0Policy BPriority 0

Home pagewww.citrixsynergy.com

Split Tunnel-not set-

Single Sign-onOFF

GroupGroup

Policy CPriority 0Policy CPriority 0

Home pagewww.sales.com

Split TunnelOFF

Single Sign-onON

Why?

When policies are bound to different bind points with the same priority the lowest bind point wins

Global

Virtual Server

Group

User

GlobalGlobal

Policy APriority 10Policy A

Priority 10Home page

www.citrix.com

Resulting ConfigurationResulting ConfigurationHome page

www.citrix.com

Split Tunnel-not set-

Single Sign-on-not set-

Split Tunnel OFF

Single Sign-onOFF

Virtual ServerVirtual Server

Policy BPriority 20Policy B

Priority 20Home page

www.citrixsynergy.comSplit Tunnel

-not set-Single Sign-on

OFF

GroupGroup

Policy CPriority 30Policy C

Priority 30Home page

www.sales.comSplit Tunnel

OFFSingle Sign-on

ON

GlobalGlobal

Policy APriority 10Policy A

Priority 10Home page

www.citrix.com

Resulting Configuration

Resulting Configuration

Home pagewww.citrix.com

Split Tunnel-not set-

Single Sign-on-not set-

Split Tunnel ON

Single Sign-onOFF

Virtual ServerVirtual Server

Policy BPriority 20Policy B

Priority 20

Home pagewww.citrixsynergy.co

m

Split Tunnel-not set-

Single Sign-onOFF

GroupGroup

Policy CPriority 30Policy C

Priority 30Home page

www.sales.comSplit Tunnel

ONSingle Sign-on

ON

Why?

Higher priority settings take precedence over bind point order

When policy settings do not conflict, the results are cumulative

from all policies that are true

External Internal DMZ

Basic Firewall and Port Rules

AGEE Admin

Remote End User

VIP

NSIP

XenApp WISTA

443,80* (HTTP/TCP)

NSIP

DNS

* Port 80 used for https redirect

NSIP

LDAP/LDAPS

SNIP or MIP

389/636 (TCP)

53 (UDP)

443,80 (TCP/HTTP) 3010, 3008 ,22 (TCP)

80, 8080, 443 (HTTP/TCP) 1494, 2598 (TCP)

External

Remote End User

LDAP

WI

Internal DMZ

STA and XML

44380/443

389/636

SmartAccess Workflow

EE returns EPA results to WI

Session policy EPA check results returned to AGEE

Web Interface sends credentials & EPA results to Citrix XML Service which validates them and returns user’s “smart access” application set to Web Interface.

Web Interface generates “Smart Access” application set page and sends the web page back to user.

Access Gateway passes credentials to Directory Service for validation.

EPA ActiveX sends results back to AGEEOn Pre-Authentication EPA success

AGEE returns login page

Post-AuthN AGEE Session policy EPA checks done with the existing EPA ActiveX

Web Interface Authenticates credentials provided via custom SSO AGCitrixBasic Header

AGEE Pre-AuthN EPA ActiveX download & client scan

1) AGEE does a HTTP redirect to the website configured in ‘-homepage’ option

2) Web Interface returns a 401 and AGEE detects that this is a Web Interface server.

User supplies credentials to logon page.User accesses AGEE VPN Virtual Server

3) Access Gateway next performs pass-through SSO to Web Interface via a custom AGCitrixBasic HTTP Header

4) A SessionToken is also provided

WI makes a XML callback to a preconfigured-on-WI AGEE VPN Virtual Server URL with the previously provided SessionToken to get the EPA Results

XenApp

Deeper Look at Security Scans – Pre-Auth

• Redirect to /epa/epa.html

• EPA client sends a GET for /epaq which causes the

• Access Gateway to return a 200 OK response with a HTTP header called CSE

• If the security scan passes, the very next GET from the client will contain a value of 0 for the CSEC header. If the scan fails, the value will be 3. Example:

• Web Interface then validates the credentials via a POST back to Access Gateway

• If that connection succeeds, the Access Gateway then returns a 200 OK containing all the Smart Access information needed by Web Interface. Example:

Deeper Look Into Smart Access• Client logs in to Access Gateway and is redirected to Web Interface

• During this redirection the client sends a request to /auth/agesso.aspx

• Web interface denies access and requests credentials. Access Gateway then sends another request to /auth/agesso.aspx but this time with an authentication header

How Did I Do That ????

Decrypting a Network Trace• In order to be able to analyze the data on the previous slide I had to run a network trace on the Access Gateway

appliance. This can easily be done via GUI:

• Or via the command line:

• Once the network trace has run it will be placed under /var/nstrace/

*** important: since this is SSL traffic the trace has to start before any request is made ***

• Once the trace is downloaded to a workstation that has Wireshark installed, open Wireshark click on Edit and then Preferences. Select SSL under Protocols:

• Under RSA Key List you enter: <target IP>,<port>,<protocol>,<path to private key>

• Once that is done the traffic will be decrypted and you will be able to analyze it.

What if private key is not available?

How to create a HTTP debug virtual server:

What if private key is secured?

If the private key was created with a passphrase, it can be decrypted via openssl:

External

Remote End User

XenApp

WI

Internal DMZ

STA and XML

443

80/443

80/443

1494/2598

User clicks application icon. Request is sent to Web Interface.

Web Interface contacts Citrix XML Service to determine least loaded XenApp server hosting application. XML Service returns XenApp IP address.

Web Interface contacts STA to exchange XenApp IP address for ticket.

Web Interface generates ICA file that includes Access Gateway FQDN and STA ticket. ICA file is sent back to client device.

ICA Client sends ICA request to Access Gateway.

Access Gateway contacts STA to validate ticket and exchange the ticket for the XenApp IP address.

Access Gateway contacts XenApp to initiate ICA session. ICA session is established.

Published Application Launch Process

XenApp Integration: Web Interface Site Type

Specify the URL to the Virtual Server’s FQDNWeb Interface must be able to resolve the FQDN

Specify the URL to the Virtual Server’s FQDNWeb Interface must be able to resolve the FQDN

Web Interface

XenApp

Access Gateway

XenApp Integration: Web Interface DMZ Settings

Set the DMZ Access Method to Gateway DirectSet the DMZ Access Method to Gateway Direct

Web Interface

XenApp

Access Gateway

Specify the Access Gateway Virtual Server’s FQDN as the Gateway Server

Specify the Access Gateway Virtual Server’s FQDN as the Gateway Server

XenApp Integration: Web Interface Gateway Settings

Web Interface

XenApp

Access Gateway

Enter the STA server URL addressEnter the STA server URL address

XenApp Integration: Web Interface Gateway Settings

Web Interface

XenApp

Access Gateway

URL to the Web Interface site e.g. HTTP(S)://wiserver/citrix/accessplatform

URL to the Web Interface site e.g. HTTP(S)://wiserver/citrix/accessplatform

ICA Proxy ON tells AGEE not to launch the Secure Access Client

ICA Proxy ON enables SSO to WI

ICA Proxy ON tells AGEE not to launch the Secure Access Client

ICA Proxy ON enables SSO to WI

Single Sign-On Domain defines the users domain name

Single Sign-On Domain defines the users domain name

Embedded Web Interface display formatFull or Compact

Embedded Web Interface display formatFull or Compact

XenApp Integration: Session Profile Configuration

The STA Server ID and State are monitored by AGEE

Multiple STA Servers can be defined for failover

The STA Server ID and State are monitored by AGEE

Multiple STA Servers can be defined for failover

XenApp Integration: Defining STA Server

Web Interface

XenApp

Access Gateway

Troubleshooting SSL Related Errors

Play Video

Session Takeaways

Only One Traffic Policy Evaluated at a time

Integration with SharePoint requires all hostnames used internally

SmartAccess requires the name of the virtual server and policy for XenApp policy to be applied

When decrypting a network trace start the trace before sending the first request

Private keys can be decrypted is password is known

HTTP Access Gateway Virtual Server can used for debugging

Partner Training & Certification

Build your product expertise and maximize your sales potential with the latest Citrix training and certification:

Access Gateway• CAG-200 Implementing Citrix Access Gateway 9.0 Enterprise Edition• CMB-204 Implementing Citrix XenApp 5.0 for Windows Server 2008 with Access Gateway Enterprise

Edition

• CCA for Citrix Access Gateway 9 Enterprise Edition

WANScaler• CTX-1741AI Citrix WANScaler 4.3 and Citrix Branch Repeater: Administration

• CCA for Citrix WANScaler 4

Visit www.citrix.com/partnertraining to view a complete list of discounted Partner offerings and learn how to maintain compliance with Citrix Certification.

Before you leave…

• Recommended related Summit breakout sessions: • TECH307: Advanced troubleshooting of Citrix NetScaler

• Premier Ballroom 310 2:30pm

• TECH305: Troubleshooting tools and methodology for Citrix XenApp 5 environments• Premier Ballroom 310 4:30pm

• Session surveys are available online at www.citrixsummit.com starting Monday, May 4• Feedback is requested (giveaway provided)

• Download presentations starting Tuesday, May 12, from your My Schedule Tool located in your My Synergy Microsite event account

top related