Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Published Citrix application do not launch through ISA2004

Posted on 2006-11-14
11
228 Views
Last Modified: 2010-04-12
Bought access to an external applications which i'm reaching from LAN (Behind ISA2004). Works fine. A user has to reach the same apps from home through a Microsoft VPN (configured on same ISA). Used same rules through firewall but:

- access to external is OK
-application set is available
- Application doesn't launch - hangs at "negotiating capabilities".

ISA logs doesn't give me clue.

ICA client is V8

Help me :-)
0
Comment
Question by:Balltown
  • 5
  • 4
11 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17939905
ICA client? Are you running a Citrix solution?

What rule have you put in to allow VPN users to access the Internet?
0
 

Author Comment

by:Balltown
ID: 17942424
We are running a Citrix solution.

It's running on specific ports and I created a Firewall rule on the ISA2004 that gives access to these ports.

It's working well from my LAN - from Internal to External

From VPN clients to External the scenery is as described above.

 
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17945078
OK, so what rule have you put in place for the VPN users to get to external?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:Balltown
ID: 17954000
I created a Firewall policy, where I opened for TCP 7040 to 7044 Outbound and UDP 7040 Send. These ports are opened according to the informations I received from the vendor. It works fine from the LAN with this policy.

0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17954008
and you have this rule applied  FROM VPN Clients TO external   as well as  FROM internal TO external?
0
 

Author Comment

by:Balltown
ID: 17963781
Yep
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17967736
OK, so open the isa gui, click monitoring - logging - click start query.

What do you see in the realtime log when they try and make a connection?
0
 

Author Comment

by:Balltown
ID: 18114193
Found the problem. Was testing the remote solution through a Homeoffice Linksys router. The router was the problem
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18116995
Thanks. Will change to a PAQ - Refund
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18136462
PAQed with points refunded (125)

Computer101
EE Admin
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can't locate my firewall, not sure if one is in place 2 68
firewall rule terminology 3 45
SONICWALL tz100 PASS THROUGHT TO SBS 2 60
SSH over http/https 8 136
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question