NetScaler Gateway 11 Virtual Server

Last Modified: Oct 17, 2016 @ 5:42 pm


💡 = Recently Updated

NetScaler Gateway Universal Licenses

For basic ICA Proxy connectivity to XenApp/XenDesktop, you don’t need to install any NetScaler Gateway licenses on the NetScaler appliance. However, if you need SmartAccess features (e.g. EPA scans) or VPN then you must install NetScaler Gateway Universal licenses. These licenses are included with the Platinum editions of XenApp/XenDesktop, Advanced or Enterprise Edition of XenMobile, and the Platinum version of NetScaler.

When you create a NetScaler Gateway Virtual Server, the ICA Only setting determines if you need NetScaler Gateway Universal licenses or not. If the Virtual Server is set to ICA Only then you don’t need licenses. But if ICA Only is set to false then you need a NetScaler Gateway Universal license for every user that connects to this NetScaler Gateway Virtual Server. Enabling ICA Only disables all SmartAccess, SmartControl, and VPN features.

If you don’t need any non-ICA Proxy features, then you don’t need any Gateway Universal licenses, and you can skip to the next section.

The Gateway Universal licenses are allocated to the case sensitive hostname of each appliance. If you have an HA pair, and if each node has a different hostname, allocate the Gateway Universal licenses to the first hostname, and then reallocate the same licenses to the other hostname.

To see the hostname, click the version info on the top right.

To change the hostname, click the gear icon on the top right.

To upload the allocated Gateway Universal licenses to the appliance, go to System > Licenses. A reboot is required.

After NetScaler Gateway Universal licenses are installed on the appliance, they won’t necessarily be available for usage until you make a configuration change as detailed below:

  1. On the left, expand System, and click Licenses.
  2. On the right, in the Maximum NetScaler Gateway Users Allowed field is the number of licensed users for NetScaler Gateway Virtual Servers that are not set to ICA Only.
  3. On the left, under NetScaler Gateway, click Global Settings.
  4. In the right column of the right pane, click Change authentication AAA settings.
  5. Change the Maximum Number of Users to your licensed limit. This field has a default value of 5, and administrators frequently forget to change it thus only allowing 5 users to connect.
  6. If desired, check the box for Enable Enhanced Authentication Feedback. Click OK.

    set aaa parameter -enableEnhancedAuthFeedback YES -maxAAAUsers 200
  7. Then edit the NetScaler Gateway Virtual Server.
  8. In the Basic Settings section, click the pencil icon near the top right.
  9. Click More.
  10. In the Max Users field, either enter 0 (for unlimited/maximum) or enter a number that is equal to or less than the number of licensed users. Click OK.

    set vpn vserver -maxAAAUsers 0

Create Gateway Virtual Server

  1. Create a certificate for the NetScaler Gateway Virtual Server. The certificate must match the name users will use to access the Gateway. For email discovery in Citrix Receiver, the certificate must have subject alternative names (SAN) for (use your email suffix domain name). If you have multiple email domains then you’ll need a SAN for each one.

  2. On the left, right-click NetScaler Gateway and click Enable Feature.
  3. On the left, expand NetScaler Gateway and click Virtual Servers.
  4. On the right, click Add.
  5. Name it or similar.
  6. Enter a new VIP that will be exposed to the Internet. Note: new to NetScaler 11.0 is the ability to set it to Non Addressable, which means you can place it behind a Content Switching Virtual Server.
  7. Click More.
  8. In the Max Users field enter 0.
  9. In the Max Login Attempts field, enter your desired number. Then enter a timeout in the Failed Login Timeout field.
  10. Check the box next to ICA Only. This option disables SmartAccess and VPN features but does not require any additional licenses.
  11. Check the box next to DTLS and click OK. DTLS enables UDP Audio and Framehawk. Note: DTLS is not yet supported for double-hop ICA.
  12. In the Certificates section, click where it says No Server Certificate.
  13. Click the arrow next to Click to select.
  14. Select a previously created certificate that matches the NetScaler Gateway DNS name, and click Select.
  15. Click Bind.
  16. If you see a warning about No usable ciphers, click OK.
  17. Click Continue.
  18. In the Authentication section, click the plus icon in the top right.
  19. Note: it’s also possible to disable authentication on Gateway and make StoreFront do it instead as described in Citrix CTX200066 How to Log On to StoreFront When Authentication is Disabled on NetScaler Gateway VIP. However, it’s more secure to require Gateway to authenticate the users before the user can communicate with StoreFront.
  20. Select LDAP, select Primary and click Continue.
  21. If you used the authentication dashboard to create the LDAP server then you probably haven’t create the corresponding policy yet. Click the plus icon to create a new policy.
  22. Use the Server drop-down to select the previously created LDAP server.
  23. Give the policy a name. It can match the LDAP Server name.
  24. In the Expression box, enter ns_true or select it from the Saved Policy Expressions drop-down. Click Create.
  25. Click Bind.
  26. Or for two-factor authentication, you will need to bind two policies to Primary and two polices to Secondary:
    • Primary = LDAP for Browsers (User-Agent does not contain CitrixReceiver)
    • Primary = RADIUS for Receiver Self-Service (User-Agent contains CitrixReceiver)
    • Secondary = RADIUS for Browsers (User-Agent does not contain CitrixReceiver)
    • Secondary = LDAP for Receiver Self-Service (User-Agent contains CitrixReceiver)
  27. Click Continue.
  28. Scroll down to the Profiles section and click the pencil icon.
  29. In the TCP Profile drop-down select nstcp_default_XA_XD_profile and click OK.
  30. In the Policies section, click the plus icon near the top right.
  31. Select Session, select Request and click Continue.
  32. Click the arrow next to Click to select.
  33. Select one of the Receiver session policies and click Select. It doesn’t matter which order you bind them.
  34. There’s no need to change the priority number. Click Bind.
  35. Repeat these steps to bind the second policy. In the Policies section, click the plus icon near the top right.
  36. Select Session, select Request and click Continue.
  37. Click Add Binding.
  38. Click the arrow next to Click to select.
  39. Select the other Receiver session policy and click Select.
  40. There’s no need to change the priority number. Click Bind.
  41. The two policies are mutually exclusive so there’s no need to adjust priority. Click Close.
  42. On the right, in the Advanced Settings section, click Published Applications.
  43. Click where it says No STA Server.
  44. Add a Controller in the https://<Controller_FQDN> or http://<Controller_FQDN> format, depending on if SSL is enabled on the XenApp Controller or not. This must be a FQDN or IP address. Short names don’t work.
  45. For the Address Type, select IPV4. Click Bind.
  46. To bind another Secure Ticket Authority server, on the left, in the Published Applications section, click where it says 1 STA Server.
  47. Click Add Binding. Enter the URL for the second controller.
  48. The State is probably down. Click Close.
  49. In the Published Applications section, click STA Server.
  50. Now they should be up and there should be a unique Auth ID for each server. Click OK.

    add vpn vserver SSL 443 -icaOnly ON -dtls ON -tcpProfileName nstcp_default_XA_XD_profile
    bind vpn vserver -policy "Receiver Self-Service" -priority 100
    bind vpn vserver -policy "Receiver for Web" -priority 110
    bind vpn vserver -policy Corp-Gateway -priority 100
    bind vpn vserver -staServer "http://xdc01.corp.local"
    bind vpn vserver -staServer "http://xdc02.corp.local"
    bind vpn vserver -portaltheme X1
  51. If you haven’t enabled the Default SSL Profile, then perform other normal SSL configuration including: disable SSLv3, bind a Modern Cipher Group, and enable Strict Transport Security.
    bind ssl vserver MyvServer -certkeyName MyCert
    set ssl vserver MyvServer -ssl3 DISABLED -tls11 ENABLED -tls12 ENABLED
    unbind ssl vserver MyvServer -cipherName ALL
    bind ssl vserver MyvServer -cipherName Modern
    bind ssl vserver MyvServer -eccCurveName ALL
    bind vpn vserver MyvServer -policy insert_STS_header -priority 100 -gotoPriorityExpression END -type RESPONSE

Verify SSL Settings

After you’ve created the Gateway Virtual Server, run the following tests:

  1. Citrix CTX200890 – Error: “1110” When Launching Desktop and “SSL Error” While Launching an Application Through NetScaler Gateway: You can use OpenSSL to verify the certificate. Run the command: openssl s_client -connect Replace the FQDN with your FQDN. OpenSSL is installed on the NetScaler or you can download and install it on any machine.
  2. Go to to verify the certificate chain.
  3. Go to and check the security settings of the website. Citrix Blogs – Scoring an A+ at with Citrix NetScaler – 2016 update

Gateway Portal Theme

Citrix Blog Post Branding your Deployment Part 2: Matching NetScaler to StoreFront explains NetScaler Gateway Portal Themes, how to edit the Portal Theme CSS, and warns about GUI changes overwriting CSS file changes.

If you want the logon page for NetScaler Gateway to look more like StoreFront 3.0, NetScaler 11.0 build 62 and newer have a built-in X1 theme:

  1. Go to NetScaler Gateway > Virtual Servers and edit an existing Virtual Server.

  2. On the right, in the Advanced Settings section, click Portal Themes.
  3. On the left, click where it says No Portal Theme.
  4. Click to select.
  5. Select the built-in X1 theme and click Select.
  6. Click Bind.
  7. Click Done.

    bind vpn vserver -portaltheme X1
  8. When you access the NetScaler Gateway login page you’ll see the theme.

You can also create your own theme by starting from one of the built-in themes:

  1. Go to NetScaler Gateway > Portal Themes.
  2. On the right, click Add.
  3. Give it a name and select X1 as the Template Theme.

  4. In the Look and Feel section there are two sub-sections: one for Home Page and one for Other Pages. In each of these sections is an Attribute Legend link that shows you what you can edit.
  5. The Home Page is for Unified Gateway (aka VPN Clientless Access).

  6. If you want to modify the logon page, use the Other Pages sub-section.

  7. Make changes as desired and click OK.
  8. In the Locale section, select a language and click OK.
  9. On the right, in the Advanced Settings section, click Login Page.
  10. Make changes as desired (e.g. Password Field Titles) and click OK.
  11. At the top of the screen, click the link to Click to bind and view configured theme.
  12. Select a Gateway Virtual Server and click Preview.
  13. The logon page is displayed.
  14. You could go to /var/netscaler/logon/themes/StoreFront3/css and make more changes to custom.css but this file gets overwritten any time you make a change in the Portal Themes section of the NetScaler GUI.
  15. Citrix CTX209526 NetScaler; How to Copy a Portal Theme from the Device running version 11.0 to another Device running 11.0.  💡

Jason Samuel – How to fix Green Bubble theme after upgrading to NetScaler 11 Unified Gateway details the following:

  • Change the NetScaler Unified Gateway logo to match the older Citrix Receiver logo.
  • Restore the older favicon.
  • And other observations regarding the Green Bubbles theme in NetScaler 11.0

SSL Redirect – Down vServer Method

This procedure details the Down vServer method of performing an SSL redirect. An alternative is to use the Responder method.

  1. On the left, expand Traffic Management, expand Load Balancing, and click Virtual Servers.

  2. On the right, click Add.
  3. Give it a name of Gateway-HTTP-SSLRedirect or similar.
  4. Set the IP Address so it matches the VIP of the NetScaler Gateway vServer. Click OK.
  5. Do not select any services. This redirect only works if the vServer is Down. Click Continue.
  6. On the right, in the Advanced Settings column, click Protection.
  7. Enter or similar into the Redirect URL Click Save.
  8. Then click Done.

    add lb vserver HTTP 80 -redirectURL ""
  9. All SSL Redirect Virtual Servers are supposed to be Down. They don’t work if they are not down. By contrast, the Responder method uses redirect Virtual Servers that are Up.

Public DNS SRV Records

For email-based discovery, add a SRV record to each public email suffix DNS zone. Here are sample instructions for a Windows DNS server:

  1. In Server Manager, click Tools > DNS Manager
  2. In the left pane of DNS Manager, select your DNS domain in the forward or reverse lookup zones. Right-click the domain and select Other New Records.
  3. In the Resource Record Type dialog box, select Service Location (SRV) and then click Create Record.
  4. In the New Resource Record dialog box, click in the Service box and enter the host value _citrixreceiver.
  5. Click in the Protocol box and enter the value _tcp.
  6. In the Port number box, enter 443.
  7. In the Host offering this service box, specify the fully qualified domain name (FQDN) for your NetScaler Gateway Virtual Server in the form servername.domain (e.g.

Block Citrix VPN for iOS

Andrew Morgan Blocking the new Citrix VPN iOS connection to Netscaler gateway and Citrix CTX201129 Configuration for Controlled Access to Different VPN Plugin Through NetScaler Gateway for XenMobile Deployments: do one or both of the following:

  • Create an AppExpert > Responder > Policy with Action = DROP and Expression = HTTP.REQ.HEADER("User-Agent").CONTAINS("CitrixReceiver/NSGiOSplugin"). Either bind the Responder Policy Globally or bind it to the Gateway vServers.
  • In your Gateway Session Policies, do not set the Plugin type to Windows/Mac OS X.

View ICA Sessions

To view active ICA sessions, click the NetScaler Gateway node on the left and then click ICA Connections on the right.

show vpn icaconnection

Customize Logon Page

Logon Page Labels

When two factor authentication is configured on NetScaler Gateway, the user is prompted for User name, Password, and Password 2.

The Password field labels can be changed to something more descriptive, such as Active Directory or RSA:

To change the labels, edit a Portal Theme:

  1. Go to NetScaler Gateway > Portal Themes and edit an existing theme. You can’t edit the built-in themes so you’ll have to create one if you haven’t already.
  2. On the right, in the Advanced Settings column, click Login Page.
  3. In the Login Page section, change the two Password fields to your desired text.
  4. Click OK.
  5. In the Portal Theme section you can Click to bind and view configured theme to Preview your changes.
  6. On Platinum Edition appliances, you might have to invalidate the loginstaticobjects Content Group (Optimization > Integrated Caching > Content Groups) before the changes appear. This seems to be true even if Integrated Caching is disabled.

 Logon Security Message (Disclaimer, EULA)

You can force users to agree to a EULA before they are allowed to login.

Clicking the Terms & Conditions link allows the user to view the EULA text that you have entered.

Do the following to configure the EULA:

  1. Go to NetScaler Gateway > Resources > EULA.
  2. On the right, click Add.
  3. Give the EULA a name and enter some text. You can even enter HTML code. See the example posted by Chris Doran at Citrix Discussions.
  4. Click Create.
  5. Edit a Gateway Virtual Server.
  6. On the right, in the Advanced Settings column click EULA.
  7. Click where it says No EULA.
  8. Click the arrow next to Click to select.
  9. Select the EULA and click Select.
  10. Click Bind.
  11. Mike Roselli at Automatic EULA Acceptance by Cookie Rewrite Guide at Citrix Discussions details Rewrite policies that change the behavior so that users only have to accept the EULA once. It records acceptance in a cookie.  💡

Citrix CTX202444 How to Customize NetScaler Gateway 11 logon Page with Links shows how to add links to the NetScaler Gateway 11 logon page.

  1. In WinSCP, go to /netscaler/ns_gui/vpn/js and edit the file gateway_login_form_view.js.
  2. Scroll down to line 40 and insert the code copied from the article. Feel free to change the link.
  3. Scroll down to line 140 and insert the line form.append(link_container);
  4. Since this is an if block, insert the line in both the if section and the else section (line 148). Both should be after the append field_login line and before the append(form) line.
  5. Save the file and verify your results.
  6. If you reboot your appliance then your changes will be lost. To preserve your changes after a reboot, copy the modified file to /var.

  7. Then edit /nsconfig/rc.netscaler and add a cp line to copy the modified file from /var to /netscaler/ns_gui/vpn/js. This is the same procedure as older NetScaler firmware. Feel free to reboot your appliance to confirm that the changes are still applied.

Other Customizations

Citrix CTX215817 NetScaler : How to Customize Footer of NetScaler Gateway Login Page.  💡

Mike Roselli at Netscaler 11 Theme Customization – How to Add Links and Verbiage at has sample rewrite policies to customize the NetScaler Gateway logon page with additional HTML.


Craig Tolley Customising the NetScaler 11 User Interface – Adding Extra Content: add new sections to login page. These sections pull content from local HTML files.


Daniel Ruiz Set up a maintenance page on Netscaler Gateway: configure a Responder policy (see the blog post for sample HTML code). During maintenance, manually bind the Responder policy to the Gateway. Manually remove the policy after maintenance is complete.  💡

 UDP Audio Through Gateway

From John Crawford at Citrix Discussions and Marius Sandbu Enabling Citrix Receiver audio over Netscaler Gateway with DTLS

Note: If you have NetScaler 11 build 62 or newer then enabling DTLS on the Gateway also enables Framehawk. See VDA > Framehawk for Framehawk configuration.

Requirements for UDP Audio:

  • Citrix Receiver 4.2 or newer
  • NetScaler Gateway 10.5.e (enhancement build) or NetScaler 11
  • UDP 443 allowed to NetScaler Gateway Virtual Server
  • UDP 16500-16509 allowed from NetScaler SNIP to VDAs


To enable UDP Audio through Gateway, make changes on both the NetScaler Gateway Virtual Server and in Receiver:

  1. Edit the NetScaler Gateway Virtual Server. In the Basic Settings section click the edit (pencil) icon.
  2. Click More.
  3. Enable the DTLS option and click OK.
  4. After enabling DTLS, it probably won’t work until you unbind the Gateway certificate and rebind it.

Client-side configuration

There are two methods of enabling RTP on the client side:

  • Edit default.ica on the StoreFront server
  • Use GPO to modify the client-side config

To edit the default.ica file on the StoreFront server (h/t Vipin Borkar): Edit the file C:\inetpub\wwwroot\Citrix\Store\App_Data\default.ica and add the following lines to the Application section:


To use GPO to modify the client-side config:

  1. Copy the receiver.admx (and .adml) policy template into PolicyDefinitions if you haven’t already.
  2. Edit a GPO that applies to Receiver machines. You can also edit the local GPO on a Receiver machine.
  3. Go to Computer Configuration > Policies > Administrative Templates > Citrix Components > Citrix Receiver.
  4. Edit the setting Client audio settings.
  5. Enable the setting.
  6. Set audio quality as desired. Higher quality = higher bandwidth.
  7. Check to Enable Real-Time Transport.
  8. Check to Allow Real-Time Transport through Gateway. Click OK.

Next step

Configure StoreFront to use NetScaler Gateway

Unified Gateway

Unified Gateway FAQ at

The Unified Gateway wizard in NetScaler 11 relies on Clientless Access and the built-in portal. See Jens Trendelkamp NetScaler Gateway Single Sign-On to Storefront in Clientless Access Mode and Citrix CTX202890 How to Integrate StoreFront into Clientless Access Page from NetScaler When Using CVPN to learn how to enable iFrame in StoreFront so it can be embedded in the Clientless Access portal.

Unified Gateway means Content Switching for NetScaler Gateway. There are two methods of Content Switching:

  • Create a Content Switching Virtual Server that has a Content Switching policy that directs requests to a NetScaler Gateway
  • Create a NetScaler Gateway Virtual Server that has Content Switching policies that direct requests to Load Balancing Virtual Servers.

In either case you can only have one Gateway Virtual Server in the Content Switching configuration.

Content Switching vServer with Gateway as Target

  1. When creating a Gateway Virtual Server, you can change the IP Address Type to Non Addressable. This means you can only access the Gateway through a Content Switching Virtual Server.
  2. On the left, go to Traffic management > Content Switching > Policies.
  3. On the right click Add.
  4. Give the policy a name.
  5. Click the plus icon next to the Action field.
  6. Give the Action a name.
  7. Change the selection to NetScaler Gateway Virtual Server.
  8. Click the arrow to select a Gateway Virtual Server and click Create.
  9. Back in the policy screen, enter an expression. There are several options for selecting traffic that should be directed to the Gateway:
    • Hostname
    • The built-in is_vpn_url expression
    • Any path that starts with /Citrix/.
  10. Click Create when done.
  11. Add or Edit a Content Switching Virtual Server.
  12. Click where it says No Content Switching Policy Bound.
  13. Click the arrow to select a Content Switching policy and click Bind.

Gateway vServer with Load Balancing vServer as Target

Another option is to bind Content Switching policies to a Gateway Virtual Server:

  1. On the left, go to Traffic Management > NetScaler Gateway > Policies > Content Switching.
  2. On the right, click Add to create a Content Switching Policy with an Action that points to a Load Balancing Virtual Server.
  3. On the left, go to NetScaler Gateway > Virtual Servers.
  4. On the right, edit an existing NetScaler Gateway Virtual Server.
  5. On the right in the Advanced Settings section, click Content Switching Policies.
  6. Click where it says No Content Switching Policies.
  7. Select a Content Switching policy that sends traffic to a Load Balancing Virtual Server and click Bind.
  8. Repeat for additional Content Switching policies that redirect to Load Balancing Virtual Servers. You cannot bind Content Switching policies that redirect to NetScaler Gateway Virtual Servers.

StoreFront – Rewrite X-Citrix-Via

When NetScaler Gateway communicates with StoreFront, it adds a header called X-Citrix-Via that contains the FQDN entered in the user’s address bar. StoreFront uses this header to find a matching Gateway object so StoreFront knows how to handle the authentication. In NetScaler 11.0 and newer, you can create a rewrite policy to change this header. This is useful when changing URLs or using DNS aliases for Gateways. See CTX202442 FAQ: Modify HTTP Header X-Citrix-Via on NetScaler for more details.

Here’s a sample rewrite policy for this header:

enable ns feature REWRITE

add rewrite action rwact_storefront replace "HTTP.REQ.HEADER(\"X-Citrix-Via\")" "\"\""

add rewrite policy rwpol_storefront "HTTP.REQ.HEADER(\"X-Citrix-Via\").NE(\"\")" rwact_storefront

bind vpn vserver mygateway-vs -policy rwpol_storefront -priority 100 -type REQUEST

Email this to someonePrint this pageTweet about this on TwitterShare on LinkedInShare on FacebookPin on PinterestShare on RedditShare on StumbleUpon

75 thoughts on “NetScaler Gateway 11 Virtual Server”

  1. Carl, do you know if it is possible to default to the Applications tab after logging into Unified gateway? Currently I have Web Apps, Applications, and Email Tab. I would like it to default to the applications tab (Storefront). Thanks

    1. I know RfWebUI theme in 11.1 can definitely default to Apps tab by configuring StoreFront to default to the Apps tab.

  2. Carl,
    I used to modify the logon page to add multiple domain drop down menu options for choices in 10.x version that has been changed in 11.x. The labeling modification was also much simpler and I had changed it from “Domain” to Connection Type since the choices were VPN or Apps and such.

    I have now used CTX203873 to add multiple Domain drop down menu successfully. The Themes give you the options of changing the Second Password in case of 2 Factor. Where do I change the label for Domain? so the three fields could look like User name, Password, Connection Type?

    Please advise


  3. Hello Carl,
    is it possible to bind multiple Netscaler Gateway vServer behind one Unified Gateway vServer or Content Switching vServer? We are a CSP with a Multi-Tenant Environment and I need that to migrate from CSG to Netscaler.

  4. Carl:
    Your articles, and documentations are so helpful, and very detail oriented, you are indeed a citrix Guru.
    You should be working for citrix, heading the documentation and training citrix group.
    There are many citrix Admins out there that are being benefit and becoming better because of you Carl.
    Once again very thankful!!!!!

  5. Carl,

    Is there a way for me to determine if there were any connections to the Netscaler Gateway over the last few days? I’m trying to decommission one of the netscalers but I’m unsure if there were any connections to the gateway recently.

    I’m able to check connections at the present moment but not over the pass day or two. I just want to be able to determine when the last connection happened.

  6. Hi Carl,

    I want configure the logon page based by language. If the browser is set to german the logon labels are in german as well. If the browser is in something else the labels are in english.

    Is that possible?

  7. Hi Carl,

    we are looking for a logon page by language, you know if the browser has language settings english prompting username and password. If the browser has another language netscaler presents the logon page based on the language. Nice would be if we can set a default language and if the browser doesn´t match present the logon page in english.

    Is this possible with 11 65.72?

    1. I think you can edit /var/netscaler/logon/themes/X1/css/base.css, find files-icon, and add display:none;. I used Chrome to Inspect Element, which tells me the style classes and the files they come from.

  8. Carl,

    It’s hard to find docs that clearly explain when the NS Gateway is required or not. Some references say when external access is required, but some not quite so clear. I want to provide secure access to internal users across multiple sites based on smart access or EPA scans and there is no external access requirement. Can you help me to understand when NS vs NSG deployment is needed or recommend a reference? Thank you for this site!!!

    1. StoreFront can’t do EPA scans on its own so you’ll need NetScaler Gateway for that. Then configure StoreFront to only accept Gateway authentication (no Explicit Auth).

      If there is any NAT between the client device and the VDA then you need NetScaler Gateway.

  9. Carl,
    Do you know the current stable version? Is it still 10.5 or is there a 11 build that is considered the stable build for a XenApp implementation?

  10. I am hoping that this is not a stupid question and would appreciate some tips. I am looking to deploy two virtual servers. One for ICA only, and one for Smart Mode, i.e. with the universal licenses. The reason is we have a lot more ICA connections that Universal.

    All of our users come in through a single domain name (IP address), which is then NATed to the VIP.

    How can we configure NetScaler to see if the connection is from a different domian name, or direct it to a particular VS.

    1. You can do it based on source IP. GSLB Static Proximity. Or NetScaler Gateway listener policies.

      However, it won’t know who the user is until the user logs in. By then it’s too late.

  11. Hi Carl. Wonder if you can help me with something. I have created a Unified Gateway vserver and added some internal web applications as bookmarks. The apps are working ok, you reach the application login prompt and can login by typing your credentials. I have then created single sign on traffic policies and bound them to the Unified Gateway vserver. SSO is not working however and I will not automatically login. Am I taking the wrong approach here? Do I need to configure something completely different?

  12. Carl,

    Thank you for the information and site. I am trying to front-end a small XenApp 7.x site with a Netscaler 11 VPX, using an Express license. When I attempt to use the “Configure XenApp/XenDesktop” link, I am confronted with the following message:

    “The following licenses are not available: SSL VPN Install the licenses and restart the appliance”

    I’m not looking to create an SSL_VPN, so I’m confused. Reading your notes above, it seems that I should be able to set an “ICA_ONLY” somewhere, but I’ve not yet found that.

    I am running 11.0 64.34

    The only feature that seems to be licensed with the Express license is “SSL Offloading”

    Is this not possible on version 11, or have I downloaded the incorrect OVA for ESX?

    1. I never use the wizards. Instead, I always create my Gateway vServer and policies manually.

      Did you verify it is licensed? In the top left of the webpage, it should say (5) instead of (1).

      1. Thank you for the reply. As I’m really green to the Netscaler (always used CSG + WI), I am going to let the wizard help me out this time around so I can learn.

        1. A problem with the wizards is lack of flexibility. And they hide the implementation details. They’re good for quick PoC but not for production.

    2. UPDATE – Kindly disregard this question. I had bungled up the host MAC. Relicensed Express and all is well now.

  13. Carl,
    Great article as always. This helped a ton customizing NetScaler Gateway 11. I have a customer requesting the ability to remove some of the choices all together or based on group. For example, access to storefront is available in either VPN or Client less access. There is no need to have a Citrix XenApp selection there…

    Or the client only allows VPN access to members of a particular group so does not want that choice available to all….

    Is this possible?


    1. You can certainly create different session policies for different groups. Configure your LDAP policy to extract groups. Add the group names to NetScaler Gateway > User Auth > AAA Groups. Bind the session policies to those groups. Keep in mind that session policies merge and conflicts are handled by the lowest priority number across all bind points. If the user gets two session policies where one enables client choices but you don’t want client choices then you’ll need to disable client choices in a lower priority number policy.

      1. Carl,
        Thanks for the quick reply, I was able to make this work for the client and it turned out better than they expected. Looks like they will be moving forward with a full implementation as a replacement to their current configuration.

        One more question, I am struggling getting the “Apps” tab to populate in the Clientless or VPN screen. I was able to get it to work at one point but cannot figure out what I am missing.

        I have tried creating a StoreFront app in Unified Gateway and adding the storefront information to the UG profile but its just gives me the option and does not add the tab. Any suggestions??

        Thanks again

          1. Carl,
            Thanks for your suggestion, this worked and I was able to populate StoreFront 3.0 and launch apps/desktop .

  14. Carl. I love your site, thank you for filling the gaps. I have a weird issue. I know it’s with NS11, and I’m sure it’s with 10.5 too but haven’t tested it.

    We cannot customize the LOGOUT page on the NetScaler for a Gateway Virtual Server. No matter what theme you apply, the logout page is always the X1 theme. I’ve looked in the entire NetScaler, and there are only two references to the X1-bg-img.jpg file. One in the /var/netscaler/vpn/media, and one in /netscaler/ns_gui/vpn/media. Changing both of those do not update the image. I even wrote an script to copy the modified image to the /netscaler directory upon reboot, and it didn’t update it.

    I tried updating the logout page on the StoreFront, and it works, but the logout page when you integrate StoreFront with NS goes back to the NetScaler.

    Can you help? Thanks.

    1. When I logoff of NetScaler Gateway 11 using the StoreFront portal, it pulls the logoff page from the StoreFront server, not the NetScaler. The text for the logoff screen is contained in /Citrix/StoreWeb/receiver/js/ctxs.core.min_12F0270C2FDA3CCD.js

      1. That’s what I thought as well. I found the background image on the StoreFront and changed it to gray. When I hit the Default storefront Store directly and login, then logout, it customized the page to gray. However, when I hit the NetScaler Gateway that accesses the same default Store, upon logging out it gives you the X1 default login page. That made me think that logging out from a NetScaler connection sends you to a page on the NetScaler. Which I cannot find.

          1. Same thing here…when I change the background image in “inetpub\wwwroot\Citrix\StoreWeb\receiver\images\common\ReceiverFullScreenBackground_blablabla.jpg” I get the updated image when accessing StoreFront directly and logging out…if I use the NetScaler to login, and then logout…I get the default of whatever theme I used when creating the new theme. The call back of the log off button in StoreFront states that it references the NSGW URL /StoreWeb/#.

            Anyone got an update on this? Just seems out of place after deploying an image theme all over a rollout and then the default images popup here and there.

  15. Hi Carl,

    We have a scenario in which the client would like to leverage Unified Gateway with a single FQDN to access the XenDesktop environment for all production users, however would only like to provide access to SSL VPN or clientless access for the admin group. They also want to ONLY allocate a certain amount of universal licenses for the admin group, and have the regular production users not leverage that licensing. Is this possible?

    Is there a way for at login to determine which user type can have access to FULL VPN/Unified Gateway, and which can only redirect directly into Storefront under a single FQDN?

    Thanks in advance!

    1. Separate licensing requires separate Gateway vServers. One has ICA Only checked and the other one does not.

      As for group-based access, create separate session policies for each use case. Go to Gateway > User Admin > AAA Groups and add a group that matches the AD group name (case sensitive). Bind the VPN session policy to the AAA group. Make sure the AAA Group bind point has a lower priority number than the Gateway vServer bind point.

  16. Hi Carl,

    We have setup NC11.0 with XD 7.6 and SF 3.0.1, there is no problem when use HTML5. However the full Receiver keeps on Connecting and never connects. If login to SF directly, the Receiver works without any problem. Do you have any hints on this? Thanks a lot.

    1. What type of client? I’ve seen several NetScaler 11 issues reported at Citrix Discussions, especially from iOS devices.

    2. What step of the process is failing? Are you clicking an icon in Receiver for Web? Then Receiver launches and tries to connect and then it fails? If so, that could be several issues (STA, ciphers, firewall, etc.).

  17. Hi Carl,

    We have a NS11.0 VPX setup with XD7.6 and SF3.0, there is no problem whrn connect with HTML5. But if choose full Receiver, the receiver just keeps on Connecting and never connected. Tested with SF directly, Receiver works without problem. Do you have any hints on that? Thanks a lot.

  18. Carl, on our Netscaler (version NS11.0: Build I have tried adding our 2 Delivery Controllers as STA Servers under Published Applications within our NetScaler Gateway Virtual Server using the following format https://FQDNofDDC. However the state of both is listed as Down and the Auth ID is listed as NA. If I unbind them both and add them back without using SSL (e.g. http://FQDNofDDC) their state is listed as Up and the Auth ID appears for both. The issue is that our environment requires us to use https instead of http wherever possible. I know this isn’t a firewall issue as I have successfully tested https (443) from the Netscaler to both Delivery Controllers by creating a test Load Balancing Service for both on the Netscaler And I know the SSL cert is correctly bound on the DDCs because our StoreFront servers have both the DDCs added in with https (443) and that works like a charm. There are SSL certificates installed and bound to 443 on both of our Delivery Controllers (Broker Service version

    1. Is your NetScaler a physical appliance? I wonder if it’s trying to use TLS 1.2 to connect the STAs. Try doing a network trace on the NetScaler and see if the SSL negotiation is failing.

      1. Correct, physical appliance (Netscaler MPX 5500). It appears to be using TLS 1.2 to connect to the STAs because I’m getting the following on both DDCs (Server 2012 R2) in the System Event Log:

        “An TLS 1.2 connection request was received from a remote client application, but none of the cipher suites supported by the client application are supported by the server. The SSL connection request has failed.”

        And a sample stream from the network trace shows multiple:

        1) TCP SYN from SNIP to DDC
        2) SSL Client Hello Handshake using TLS 1.2 from SNIP to DDC
        3) TCP SYN_ACK from DDC to SNIP
        4) TCP RST_ACK from DDC to SNIP

        1. Incorrect stream above, actually:

          1) TCP SYN from SNIP to DDC
          2) TCP SYN_ACK from DDC to SNIP
          3) SSL Client Hello Handshake using TLS 1.2 from SNIP to DDC
          4) TCP RST_ACK from DDC to SNIP

  19. Hi Carl, do you know a way to force Password 2 to come as a new page after you successfully login with username password. In example for Radius SMS messages this is very useful. For Netscaler 10.x this was accomplished by editing login.js.

    Great blog, and great post 🙂

    1. In other words you want to hide the 2nd password field and instead rely on RADIUS challenge. I have not seen any instructions for NetScaler 11 yet.

    2. In the file /netscaler/ns_gui/vpn/js/gateway_login_form_view.js, you can comment out the line form.append(field_pass2); . Not sure if this works with your 2FA solution. Not sure if this sticks after a reboot.

      1. Hi Carl,
        thanks for your quick replies. Unfortunately when i do this, it does not move to a new page where it asks for:
        Additional Information Required
        Please type your response below.
        Please respond to the challenge: SMS challenge sent to mobile device.

        Think i will go for a support ticket on this 🙂

  20. Hi Carl,

    thank you for amazing blog! It helps me every day in the IT life 🙂 My question is how can i in this NS 11.0 62.10 Build exchange two password fields Passw1 and Passw2? Earlier I could do this with login.js file and now? It seems no more working with this build. Thanks!

    1. I think the new Portal Theme method restricts the edits you can make in the actual theme files. I’m hoping somebody figures out the secret or this gets addressed in a newer build. I saw on the forums that it’s possible to revert to the older Custom Theme method with the customtheme.tar.gz file.

      1. Hi Carl, thank you for the answer. I have tried to change the /netscaler/ns_gui/vpn/js/gateway_login_form_view.js File but with no success. Also tried to change /var/netscaler/logon/themes/custom_cw_csc_X1/custom_theme.json file also with no success

          1. /netscaler/ns_gui/vpn/js/gateway_login_form_view.js contains the login form so if you want to swap the fields I assume you’d do it there.

          2. Correct. Here is my change in the /netscaler/ns_gui/vpn/js/gateway_login_form_view.js file:


            But it doesn not make an effect

          1. So, this code is functional and works:



            Then copy /netscaler/ns_gui/vpn/js/gateway_login_form_view.js to /var and modify /nsconfig/rc.netscaler Just add a line:
            cp /var/gateway_login_form_view.js /netscaler/ns_gui/vpn/js/gateway_login_form_view.js
            Now it is reboot persistent.

  21. Seems the new release has a bug in the EULA. Such that even if you don’t enable it it comes back.
    I have the login page set without an EULA. Login, go to the storefront, logout and poof EULA is there on next login.

  22. Called Citrix about the bug, but in the meantime, I would like to add some legal text to the login page, but using index.html does not work as in the past. Any ideas?

  23. Carl, I have entered logon changes as described, but they do not show up, and I don’t have integrated caching. Thanks.

Leave a Reply