cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
588
Views
0
Helpful
2
Replies

A Simple Question about Cut Through Proxy

tdhb..hiq
Level 1
Level 1

Hi All,

We are looking at using Cut Through Proxy authentication, but I have a question about shared computers, ie Citrix. How does the firewall open up access once the user is authenticated? Is it by host MAC address, in which case would open up the Citrix server to have the same access as the user which authenticated.

If anyone can shed some light on this it would be appreciatd.

Scott

1 Accepted Solution

Accepted Solutions

mirober2
Cisco Employee
Cisco Employee

Hi Scott,

The cut through proxy feature creates an authenticated session between the source IP address and the authenticated username. Therefore, if one user logs in to the Citrix server and successfully authenticates, all connections from that server's IP address will be considered authenticated as well. You can see these sessions in the 'show uauth' output on the ASA.

Hope that helps.

-Mike

View solution in original post

2 Replies 2

mirober2
Cisco Employee
Cisco Employee

Hi Scott,

The cut through proxy feature creates an authenticated session between the source IP address and the authenticated username. Therefore, if one user logs in to the Citrix server and successfully authenticates, all connections from that server's IP address will be considered authenticated as well. You can see these sessions in the 'show uauth' output on the ASA.

Hope that helps.

-Mike

Thanks Mike.

I thought something like that would be the case, but I could not find in the Cisco docs.

Cheers

Scott

Review Cisco Networking for a $25 gift card