Creating an ICA listener¶
- Select > .
- Click .

- Enter listener’s unique name.
- Select Blocked option to disable access to servers through this listener after it’s created.
- Select
ICA
from the Protocol drop-down list. - In the Permissions section, add users allowed to manage this object.
- In the Connection section, select desired connection mode.
bastion
Note
- User connects to the target host by including its name in the login string, e.g.
john_smith#mail_server
.- For details on bastion connection mode, refer to Connection modes topic.
- Select
bastion
from the Mode drop-down list.- Select the the IP address from the Local address drop-down list and enter port number.
gateway
Note
User connects to the target host by providing its actual IP address. Fudo PAM moderates the connection with the remote host using own IP address. This option requires deploying Fudo PAM in the bridge mode.
- Select
gateway
from the Mode drop-down list.- Select the network interface used for handling connections over this listener.
proxy
Note
- User connects to the target host by providing Fudo PAM IP address and port number which unambiguously identifies target host.
- Proxy mode is not supported by dynamically added hosts.
- Select
proxy
from the Mode drop-down list.- Select the the IP address from the Local address drop-down list and enter port number.
Note
- The Local address drop-down list elements are IP address defined in the Network configuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP addresses).
- Selecting the
Any
option will result in Fudo listening on all configured IP addresses.- In case of cluster configuration, select a labeled IP address from the Local address drop-down list and make sure that other nodes have IP addresses assigned to this label. For more information refer to the Labeled IP addresses topic.
transparent
Note
User connects to the target host by providing its actual IP address. Fudo PAM moderates the connection with the remote host using user’s IP address. This option requires deploying Fudo PAM in the bridge mode.
- Select
transparent
from the Mode drop-down list.- Select the network interface used for handling connections over this listener.
- Select Use TLS option to enable encryption.
- Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024), RSA(1024)) when establishing connections.
- In the TLS certificate field, click i to generate TLS certificate, or click i to upload server certificate file with private key pasted at the end of the file. The rest of the required fields will be filled automatically. Allowed format of the server certificate file is PEM, although besides
.pem
, accepted file extensions are.txt
and.cert
.
Note
In case of TLS encrypted connections, Fudo returns an .ica configuration file to the Citrix client, which has the FQDN server address (Address) set to the common name defined in the TLS certificate.
- Click .
Related topics: