Solved

Citrix Proxy

Posted on 2008-06-18
4
549 Views
Last Modified: 2012-05-05
Hi, I have a network set up using Citrix. I want to run a proxy server. What I want is an easily configurable proxy that can set different access rights for different Citrix users and monitor in all user activity in a log file that will show me what sites etc each citrix user has been to visit and when. Does anybody have any suggestions - I have already began the set up using dansguardian and squid though I have not really got the time to investigate how to integrate this system with citrix, perhaps there is a solution I can buy that is easier to set up?
0
Comment
Question by:xrayroom
  • 3
4 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811837
Sophos has a great proxy product that can do exactly what your wanting, and in addition it does virus scanning and malware detection, much like DansGuardian or SafeSquid + ClamAV.
ccProxy is a cheaper but lacks AV/Malware protection, but works well: http://www.youngzsoft.net/ccproxy/accmgr.htm Squid is great, but it's a lot more work than most others.
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811850
I've not used ISA, but M$ has a proxy product, http://www.microsoft.com/isaserver/default.mspx
-rich
0
 

Author Comment

by:xrayroom
ID: 21872796
I have CCProxy - It will detect other machines on the network. It detects my citrix server as a  user, is it possible to detect the individual usernames and passwords that are logged on to citrix from individual thin clients?
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 21873586
You have to use Socks 5 proxy settings if you want users to auth as individuals
http://www.youngzsoft.net/ccproxy/client-others.html
http://www.youngzsoft.net/ccproxy/accmgr.htm
-rich
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
deduplication > shared folder size weirdness? 1 43
QoS for Voip 7 38
Windows 2012 PKI in a hybrid org 3 47
VMware ESXi vswitch - performance question 2 41
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question