It is sometimes necessary to permit Citrix port access through a PIX, so that remote connections can be established. By default, such connections are denied, so the PIX must be configured to allow Citrix traffic from the outside interface to the inside interface.
To permit the connections, ensure that you have appropriate static mapping between the private IP address and public IP address of the server.
Make sure there are enough appropriate ports opened on the outside interface of the PIX to let the traffic pass through the PIX.
Issue the static translation command to establish mapping between private and public IP addresses of the server.
Issue the access-list command to open the ports on the outside.
For information about all the known TCP/IP ports (TCP and/or UDP) that are used by Citrix services, refer to Citrix Ports.
Hi,This is the return of our long usage of ISE and MAB for IoT/OT devices on segmented networks. All our "important" devices as company desktops and such are EAP/TLS auth.We have for a few years used an external LDAP cluster for MAB auth, and are now look...
I have a Cisco Router 2921 which i am using to establish a VPN Connection to a remote site. I would like to access the internal network but most especially the server ip 192.168.90.222. I have managed to establish the vpn connection and i have also been a...
Hello Community,we are in process of migrating our ASA's to FTDs and manage them through FMC but we have noticed that the current "Cisco Firepower Migration Tool" is just transforming the codes as is without any optimization or intelligence. for example, ...
Hi everyone, we heard about the cisco new advanced phishing protection and domain protection features. but we can't find any ordering guide for these features. do they come as a bundle with the ESA existing licensing schema or we have to order t...
Hi ,We are having a scenario where we need to go with Temporal agent.Below are the road blocks and seeking support to move forward.1. What all posturing condition are available in temporal agent solution.?2. What are challenge we face while we implement t...