Solved

Published Citrix application do not launch through ISA2004

Posted on 2006-11-14
11
236 Views
Last Modified: 2010-04-12
Bought access to an external applications which i'm reaching from LAN (Behind ISA2004). Works fine. A user has to reach the same apps from home through a Microsoft VPN (configured on same ISA). Used same rules through firewall but:

- access to external is OK
-application set is available
- Application doesn't launch - hangs at "negotiating capabilities".

ISA logs doesn't give me clue.

ICA client is V8

Help me :-)
0
Comment
Question by:Balltown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
11 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17939905
ICA client? Are you running a Citrix solution?

What rule have you put in to allow VPN users to access the Internet?
0
 

Author Comment

by:Balltown
ID: 17942424
We are running a Citrix solution.

It's running on specific ports and I created a Firewall rule on the ISA2004 that gives access to these ports.

It's working well from my LAN - from Internal to External

From VPN clients to External the scenery is as described above.

 
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17945078
OK, so what rule have you put in place for the VPN users to get to external?
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 

Author Comment

by:Balltown
ID: 17954000
I created a Firewall policy, where I opened for TCP 7040 to 7044 Outbound and UDP 7040 Send. These ports are opened according to the informations I received from the vendor. It works fine from the LAN with this policy.

0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17954008
and you have this rule applied  FROM VPN Clients TO external   as well as  FROM internal TO external?
0
 

Author Comment

by:Balltown
ID: 17963781
Yep
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17967736
OK, so open the isa gui, click monitoring - logging - click start query.

What do you see in the realtime log when they try and make a connection?
0
 

Author Comment

by:Balltown
ID: 18114193
Found the problem. Was testing the remote solution through a Homeoffice Linksys router. The router was the problem
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18116995
Thanks. Will change to a PAQ - Refund
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18136462
PAQed with points refunded (125)

Computer101
EE Admin
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall NSA failover & LB 4 70
Fortinet FWs backdoor vulnerability 3 103
Watchguard Firewall monitoring 1 855
Need assistance with Windows Firewall rules 6 121
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question