Configure NetScaler Gateway to use with StoreFront 2.6 and XenDesktop 7.6
Website Visitors:We have an article from citrix which explains how to configure netscaler gateway to use with storefront and xendesktop. Below are the steps given in article CTX200287.
Network Diagram
The NetScaler will use the following network addresses
NetScaler IP Subnet IP Virtual IP
192.168.18.20 192.168.18.21 192.168.18.22
NetScaler Configuration
This section assumes that you will be creating a NetScaler VPX virtual appliance and hosting it on XenServer.
The processes for configuring a physical NetScaler appliance, or a NetScaler VPX virtual appliance hosted on another Hypervisor is similar.
Initial setup from XenCenter Console
- Download the latest NetScaler VPX virtual appliance from www.citrix.com and import it into XenServer.
- Using XenCenter, start the new NetScaler VM and go to the VM console.
- Enter the following information into the first time wizard. IPv4 address Netmask Default Gateway 192.168.18.20 255.255.255.0 192.168.18.1
- Select 4 to Save and quit. The NetScaler will reboot.
Continue setup from NetScaler GUI
- From a convenient PC, workstation, or server, launch a browser and point to http://192.168.18.20
- Log on using the following credentials: Username nsroot Password nsroot The NetScaler “Welcome Wizard” now walks you through the configuration of the Subnet IP Address, Host Name, DNS details, Time Zone and Licenses
- Add your licenses (the preceding are Citrix test licenses. Your experience will probably differ).
- Click Reboot.
- After logging back in to the GUI it can be seen that some features are disabled by default.
- Enable NetScaler Gateway and SSL by selecting the feature, and using right-click and Enable.
- You might need to change the nsroot password.
Server Certificates, CA Certificates, and SSL
The System 3 test team try to build environments which reflect real world cases and generally server certificates are created for all servers, and use SSL to communicate whenever possible. To create these certificates, engineers use their Microsoft Certificate Server, rather than using public Certificate Authorities which would be expensive for multiple test environments. Because they do not use one of the well-known public Certificate Authorities, they have to ensure that they are installed on trusted CA certificate on all client devices.
Because the Microsoft Certificate Server is known to Active Directory the trusted CA certificate is automatically installed on all domain-joined systems. The engineers then have to manually add the trusted CA certificate to non-domain-joined systems including domestic PCs, thin clients, tablets and smart phones.
This section describes how to create server certificates for NetScaler Gateways using the tools on the NetScaler appliance. It will be seen that the NetScaler is using an exported root CA from our Microsoft Certificate Server so that we do not have to distribute additional CA certificates to our client systems.
On the Microsoft Certificate Server
- Run mmc and load the Certification Authority Snap-in.
- Right click the authority > All Tasks > Back up CA.
- Back up the Private key and CA certificate to a convenient location.
- Create a password.
- Click Next.
- Click Finish.
The backup creates a .p12 file with the name of your Certificate authority.
On the NetScaler GUI
To import the backed up key and certificate, complete the following steps:
- Go to Traffic Management > SSL > Tools > Import PKCS#12.
- Output file name is xxxxx.pem in the /flash/nsconfig/ssl folder on the appliance. PKCS12 File is the p12 backup file created. Password is the password used during the backup
Notes:
Create the server certificate
To create the server certificate, complete the following steps:
- By using the dropdown arrows next to the browse buttons, it is possible to read the .p12 file from the local PC/Server where you did the Backup, and output the new .pem file to NetScaler appliance.
- The .pem file output by this process will contain both the RSA Private Key and the CA Certificate required to create server certificates on the NetScaler.
-
Go to Traffic Management > SSL > Getting Started > Server Certificate Wizard.
-
Go to Traffic Management > SSL > Getting Started > Server Certificate Wizard.
-
Create a Certificate Signing Request. Request File Name is a name of your choice. Key Filename is carried forward from the previous step. Common name is the name that must match the FQDN of the NetScaler Gateway that you will create in a later section of this document.
-
Create the Certificate.
-
Install the certificate. Important! The GUI also shows a Done button as shown in the following screen shot. Do not click this before you click Create.
-
All the steps are complete and click Done. (Optional) Install the CA certificate
Install the CA certificate if you want to use SSL to communicate from the NetScaler Gateway to your StoreFront and XenDesktop farm.
- Go to Traffic Management > SSL > Certificates > Install.
- Browse and select the imported .pem file at Certificate File Name and the Key File Name fields.
- Click Install.
Review the installed certificates
- Go to Traffic Management > SSL > Certificates.
- Press the refresh icon.
NTP Server
You can use an NTP server to keep time on the NetScaler. SSL is so much easier when all the clocks are in step with each other.
Go to System > NTP Servers > Add.
Backups - and why you might want one
The NetScaler appliance now has its network configuration, licences and certificates in place, and the next stage is to run a wizard to create the NetScaler Gateway Virtual Server and its associated elements.
A point to note about the wizard used to establish the NetScaler Gateway Virtual Server is that it is really a series of sub-wizards, and the NetScaler configuration is updated after each sub-wizard. By having a backup or snapshot at this point one has an option to:
- Accept the resulting configuration and move forward
- Rerun parts of the wizard
- Fall back to this point and start again
First save the configuration by using the Save button at the top right of the GUI.
The NetScaler Backup and Restore tool is at System > Backup and Restore.
Create a NetScaler Gateway Virtual Server
To create a virtual server, complete the following steps:
- Go to NetScaler > NetScaler Gateway > Integrate with Citrix Products > XenApp and XenDesktop.
- Click Get Started.
- Enter the IP for your NetScaler Gateway Virtual Server.
- Click Continue.
- Chose the Server Certificate created before.
- Click Continue. In this example, users are authenticated against Active Directory. The IP Address 192.168.80.1 is the address of the Domain Controller.
- Enter details and click Continue.
- Leave Xen Farm > Configure = Blank. Note: This section relates to load balancing the XenDesktop Controllers and XenApp servers, which is not covered in this document. However, this sub-wizard can be revisited at any time.
- Click Continue.
- Do not click Apply. Note: Optimization is not covered by this document. However, this section can be revisited at any time.
- Review settings and click Done. A dashboard page is displayed. You can close this and return to the Configuration GUI.
(Optional) Add the CA certificate to the NetScaler Gateway Virtual Server
If you want to use SSL to communicate from the NetScaler Gateway to StoreFront and XenDesktop, you will need to add the CA certificate to the NetScaler Gateway Virtual Server.
- Go to NetScaler > NetScaler Gateway > NetScaler Gateway Virtual Server.
- Select _TestGW and click Edit.
- Click No CA Certificate.
- Click Bind.
- Select the CA certificate imported and click Insert.
- Click Save.
- Scroll down to the bottom of the screen and click Done.
- Save your work to date by clicking on the Save icon on the upper right corner.
If you do not save after making changes to the NetScaler configuration, there is a risk that those changes will be lost when the NetScaler reboots.
StoreFront
DNS
Check that the DNS entries for the NetScaler Gateway Virtual Server (testgw.hopto.org) point to the correct place.
- On Internet - DNS needs to point to a public address that is accessible from the Internet. This will typically be a public address on a firewall/router that is forwarded to the NetScaler Gateway Virtual Server IP
- On the private internal LAN – DNS needs to point to the local address of the NetScaler Gateway Virtual Server in the DMZ – 192.168.18.22
StoreFront – Configuring a new installation
- Install StoreFront from your distribution media.
- On completion, click Finish and open the StoreFront Management Console.
- When opened, the Management Console will notice that this is a new installation and will offer a choice of options.
- Click Create a new deployment.
- Accept the default Base URL and click Next.
- Enter a store name of Store.
- Click Next.
- Enter Delivery Controllers.
- Click Next.
- Select No VPN tunnel.
- Add a NetScaler Gateway appliance.
- Fill out the details of the NetScaler Gateway Appliance. Unless you have a complex environment, the Subnet IP address may be left blank.
- Click Next.
- Add a Secure Ticket Authority.
- Ensure that any STA referenced here is also included in the NetScaler Gateway Virtual Server list of STAs.
- Click Create.
- There appears a warning symbol indicating that enabling remote access will automatically enable pass-through authentication from the NetScaler Gateway. This is what is expected. Click Create.
- Click Finish.
Test the deployment from a Windows PC connected to the Internet
On the Windows PC
- Confirm that a recent Citrix Receiver is installed.
- Confirm that the Trusted Root CA Certificate has been installed into the Trusted Root Certification Authorities > Certificates container.
- Turn off certificate revocation checking in Internet Explorer. This is required because our private certificate server is unknown on the Internet. a. Go to Internet Explorer > Internet Options > Advanced. b. Check for publisher’s certificate revocation = Off c. Check for server certificate revocation = Off
- If you use a browser other than Internet Explorer (such as Firefox) you might need to import the Trusted Root CA Certificate into its Certificate Manager, and turn off Online Certificate Status Protocol checking.
- Use Internet Explorer to browse to your NetScaler Gateway. You should be presented with the NetScaler logon page.
- When logged in you should be presented with the StoreFront page, and be able to launch Apps and Desktops.
All the above steps with screenshots are given in the pdf document here: CTX200287
Want to learn more on Citrix Automations and solutions???
Subscribe to get our latest content by email.