Creating an ICA listener

  1. Click + icon in the main menu next to the Listeners tab, or

Select Management > Listeners and then click Add.

  1. Enter listener’s unique name.
  1. Select Blocked option to disable access to servers through this listener after it’s created.
  1. Select ICA from the Protocol drop-down list.
  2. In the Permissions section, add users allowed to manage this object.
  3. In the Connection section, select desired connection mode.

bastion

Note

  • User connects to the target host by including its name in the login string, e.g. john_smith#mail_server.
  • For details on bastion connection mode, refer to Connection modes topic.
  • Select bastion from the Mode drop-down list.
  • Select the the IP address from the Local address drop-down list and enter port number.

gateway

Note

User connects to the target host by providing its actual IP address. Fudo PAM moderates the connection with the remote host using own IP address. This option requires deploying Fudo PAM in the bridge mode.

  • Select gateway from the Mode drop-down list.
  • Select the network interface used for handling connections over this listener.

proxy

Note

  • User connects to the target host by providing Fudo PAM IP address and port number which unambiguously identifies target host.
  • Proxy mode is not supported by dynamically added hosts.
  • Select proxy from the Mode drop-down list.
  • Select the the IP address from the Local address drop-down list and enter port number.

Note

  • The Local address drop-down list elements are IP address defined in the Network configuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP addresses).
  • Selecting the Any option will result in Fudo listening on all configured IP addresses.
  • In case of cluster configuration, select a labeled IP address from the Local address drop-down list and make sure that other nodes have IP addresses assigned to this label. For more information refer to the Labeled IP addresses topic.

transparent

Note

User connects to the target host by providing its actual IP address. Fudo PAM moderates the connection with the remote host using user’s IP address. This option requires deploying Fudo PAM in the bridge mode.

  • Select transparent from the Mode drop-down list.
  • Select the network interface used for handling connections over this listener.
  1. Select Use TLS option to enable encryption.
  • Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024), RSA(1024)) when establishing connections.
  • In the TLS certificate field, click i to generate TLS certificate, or click i to upload server certificate file with private key pasted at the end of the file. The rest of the required fields will be filled automatically. Allowed format of the server certificate file is PEM, although besides .pem, accepted file extensions are .txt and .cert.

Note

In case of TLS encrypted connections, Fudo returns an .ica configuration file to the Citrix client, which has the FQDN server address (Address) set to the common name defined in the TLS certificate.

  1. Click Save.

Related topics: