Citrix SSLVPN CPS DeploymentGuide
Citrix SSLVPN CPS DeploymentGuide
Deployment Guide
Notice:
The information in this publication is subject to change without notice.
THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NONINFRINGEMENT. CITRIX SYSTEMS, INC. (CITRIX), SHALL NOT BE LIABLE FOR
TECHNICAL OR EDITORIAL ERRORS OR OMISSIONS CONTAINED HEREIN, NOR FOR DIRECT,
INCIDENTAL, CONSEQUENTIAL OR ANY OTHER DAMAGES RESULTING FROM THE FURNISHING,
PERFORMANCE, OR USE OF THIS PUBLICATION, EVEN IF CITRIX HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES IN ADVANCE.
This publication contains information protected by copyright. Except for internal distribution, no part
of this publication may be photocopied or reproduced in any form without prior written consent from
Citrix.
The exclusive warranty for Citrix products, if any, is stated in the product documentation accompanying
such products. Citrix does not warrant products other than its own.
Product names mentioned herein may be trademarks and/or registered trademarks of their respective
companies.
Copyright 2007 Citrix Systems, Inc., 851 West Cypress Creek Road, Ft. Lauderdale, Florida 333092009 U.S.A. All rights reserved.
Table of Contents
Introduction...........................................................................................................................................4
Prerequisites..........................................................................................................................................5
Network Diagram..................................................................................................................................6
NetScaler Configuration.........................................................................................................................7
Deployment Model: Netscaler Two-Arm Mode..................................................................................7
Important NetScaler IP Addresses..................................................................................................10
IP Addresses, Interfaces and VLANs...............................................................................................11
Configuring NetScaler SSL VPN.....................................................................................................12
Creating the SSL VPN Policy..........................................................................................................15
Installing the NetScaler Root Certificate..........................................................................................19
Citrix Presentation Server Configuration...............................................................................................20
Setting up the backend applications...............................................................................................20
Publish the Application on Citrix Presentation Server......................................................................29
Add Users and Groups to Presentation Server................................................................................30
CPS Host VLAN Tagging compatibility............................................................................................35
Connecting a second Citrix Presentation Server..............................................................................35
Routing users based on authentication credentials.........................................................................35
Securing Traffic Flows between portals/users..................................................................................36
Save your configurations.................................................................................................................37
Appendix A - NetScaler Application Switch Configuration....................................................................38
Appendix B - Layer 2 Switch Configuration..........................................................................................46
Introduction
Citrix Presentation Server is the de facto standard for delivering Windows applications at the lowest
costanywhere. It offers both application virtualization and application streaming delivery methods
to enable the best access experience for any user, with any device, working over any network. By
centralizing applications and data in secure data centers, IT can reduce costs of management and
support, increase data security, and facilitate business continuity. Presentation Server allows IT to deliver
applications as a serviceproviding on-demand access to users, while affording IT the flexibility to
leverage future application architectures.
Citrix NetScaler optimizes the delivery of web applications increasing security and improving
performance and Web server capacity. This approach ensures the best total cost of ownership (TCO),
security, availability, and performance for Web applications. The Citrix NetScaler solution is a comprehensive
network system that combines high-speed load balancing and content switching with state-of-the-art
application acceleration, layer 4-7 traffic management, data compression, dynamic content caching,
SSL acceleration, network optimization, and robust application security into a single, tightly integrated
solution. Deployed in front of application servers, the system significantly reduces processing overhead
on application and database servers, reducing hardware and bandwidth costs.
As enterprises and service providers move toward the path of consolidation, they will continue to look
for ways to do more with less. The most efficient piece of equipment in the datacenter to perform this
task is the Citrix NetScaler. The Citrix NetScaler acts as a secure portal to direct traffic based on users
authentication credentials, into specific Citrix Presentation Server farms on the backend, all coming out
of the same physical NetScaler port. By adding Citrix Presentation Server to the backend, this not only
extends the value of both products, but increases the capability for cost savings exponentially. While the
SSL VPN provides front end security and serves as an access gateway into the server farms, it continues
to provide multi-scalable capabilities in a single, tightly integrated solution because it sends all backend
traffic out one port on the back of the NetScaler. On the backend, we can have a myriad installation
of CPS farms installed in either physical or virtual machines ready to accept the traffic coming from the
NetScaler. This deployment guide walks through the configuration details of how-to configure the Citrix
NetScaler and Citrix Presentation Server to provide this type of integration and scalability, while keeping
the traffic separate and secure.
Prerequisites
NetScaler running version 8.0+. (Qty 1 for single deployment, Qty 2 for HA deployment).
Citrix Presentation Server, version 4.5+.
Windows Server 2003, SP2, NIC w/ VLAN Tag Support.
Windows Domain Controller, Active Directory (optional).
Client laptop/workstation running Internet Explorer 6.0+.
Layer 2 switch w/VLAN support.
Network Diagram
The following is the Network that was used to develop this deployment guide, and is representative of a solution implemented at a customer site.
VLAN Legend
Primary NetScaler
Primary/Secondary NetScaler
IP Addresses:
NSIP 10.217.104.100
SNIP 10.217.104.103
SNIP 169.145.91.239
SNIP 169.145.92.239
VLAN 1
VLAN 91
VLAN 92
Shared IP Addresses:
VIP 10.217.104.102
VLAN 91:
Interface 1/4, Tagged
IP: 169.145.91.240
Secondary NetScaler
IP Addresses:
NSIP 10.217.104.105
SNIP 10.217.104.105
SNIP 169.145.91.241
SNIP 169.145.92.241
TRUNK
VLAN92:
Interface 1/4, Tagged
IP: 169.145.92.240
VLAN 4:
Interface 1/4, Untagged
VLAN 1:
Interface 1/2, No Tag.
Citrix
Presentation
Server
Citrix
NetScaler
https://10.217.104.102
VLAN 1
Vlan
Trunk
VLAN 91
user1
10.217.104.0
Interface 1/2
Interface1/4
srv1.citrixlabs.com
169.145.91.151
0x91
user2
VLAN 92
srv2.citrixlabs.com
169.145.92.152
0x92
Admin
NetScaler Configuration
Deployment Model: Netscaler Two-Arm Mode
NetScalers can be deployed alone or as a pair to provide high availability. Always start with the first
NetScaler. The NetScalers in Two-Arm mode provide the utmost is site security, as they provide a full
reverse-proxy gateway to intercept incoming traffic before it is sent to the Application servers (CPS). The
NetScaler acts as an authentication point and an enforcement point using its own internal database, but
can also be integrated with third party authentication/authorization systems for highly granular security.
The sample deployment in this guide will make use of the NetScalers own internal authentication database
combined with Session Policies for authorization and portal traffic direction.
There are three main components that require installation in this environment, the Citrix NetScaler(s), the
Layer 2 switch with VLAN trunking and tagging, and the Citrix Presentation Servers on the backend. We
will start with the NetScaler configuration, step-by-step.
Serial: 9600, n, 8, 1
1) Configure NSIP.
Connect via serial port.
Default login nsroot,
nsroot. Run the configns
command (nsconfig if at a
shell prompt), and set the
NetScaler IP (NSIP). In this
example: 10.217.104.100.
Note: Changing the
NSIP requires a reboot.
2) Connect to the
NetScaler via the NSIP
using a web browser.
In this example:
http://10.217.104.100
Ethernet
3) Confirm licenses
are installed.
Navigate to NetScaler
> System > Licenses.
Description
Usage
10
NSIP
NetScaler IP Address
MIP
Mapped IP Address
SNIP
Subnet IP Address
VIP
Virtual IP Address
DFG
Default Gateway
11
8) Disable unused
interfaces, and HA
monitoring.
9b) Next.
12
13
14
15
Note:
In this example, we are using
the SSL VPN to Proxy ICA
connections, that is, stop
the user, authenticate them
with the NetScaler web
interface, then pass their
sessions on to the backend
Citrix Presentation Server.
This adds an extra level of
security at the perimeter
of the Citrix Presentation
Server (CPS) farm.
16
Note:
i. We point the Client to the
backend Citrix Presentation
Server home page at http://
Srv1.citrixlabs.com/Citrix/
AccessPlatform/.
ii. ICA Proxy is set to ON,
because this SSL VPN is
proxying ICA connections
before they reach the CPS
on the backend.
iii. The Windows Domain is
set to Srv1, because we are
using local authentication
on the CPS Windows
Server.
To use Active Directory, insert
the name of the Windows
Domain Controller
17
18
19
Note:
Before beginning this step, it is advisable to find out what port the Citrix XML service is running on. To
do this, from the Access Management Console, navigate to Citrix Resources > Presentation Server >
<server name> > Servers > <server name>.
Right click on the server name, and select Properties.
At the bottom is XML service.
20
21
13d) Specify
Configuration Source.
For this example,
we use local files.
13e) Specify
Authentication Settings.
For this example we use
the built-in authentication
and access control.
22
13g) Finish.
23
24
13j) Select
Application Type.
25
26
27
28
29
Tip:
For a Local Authentication implementation on the Local Citrix Presentation Server, as we did in this
example, you do not need to add users and a group to the Domain Controller, but will add the users
and group to the local CPS. When logging into the Web Interface, instead of typing in a Domain, you
will type in the Server name. In this example, it would be Srv1 instead of Citrixlabs.
Note:
Be sure to add the cps1 group to be a member of Remote Desktop Users group, otherwise the
Application will not launch from CPS. The Terminal Services right is automatically a part of the Remote
Desktop Users group, which is necessary to launch CPS.
30
Note:
By default on Windows Server 2003, members of the Administrators and Remote Desktop Users
groups can connect using Windows Terminal Services. The Remote Desktop Users group contains
no users when it is initially created; you must manually add any users or groups who require Windows
Terminal Services access. If the users are not already members of the computers local group,
you must also add them. Unlike Windows 2000 Server policies, the Allow log on locally policy (a
Computer local policy under User rights) no longer provides access to Terminal Service connections.
For additional information, see the Windows Server 2003 online documentation.
31
32
Note:
If we were using Active
Directory, we would use
the domain Citrixlabs, and
add users from the Domain
Controller.
33
34
35
36
The effect of this is to prevent users/partners from portal1, or CPS farm1 from roaming or hacking over
into other portals or CPS farms, such as CPS farm2. In this example, user1 cannot access any server
resources on the CPS farm in user2s portal.
Citrix
Presentation
Server
Citrix
NetScaler
https://10.217.104.102
Vlan
Trunk
VLAN 91
user1
srv1.citrixlabs.com
169.145.91.151
0x91
user2
VLAN 92
user1 blocked
from VLAN 92
srv2.citrixlabs.com
169.145.92.152
0x92
37
38
add vlan 4
add vlan 91
add vlan 92
bind vlan 4 -ifnum 1/4 -tagged
bind vlan 91 -ifnum 1/4 -tagged
bind vlan 91 -IPAddress 169.145.91.240 255.255.255.0
bind vlan 92 -ifnum 1/4 -tagged
bind vlan 92 -IPAddress 169.145.92.240 255.255.255.0
add route 0.0.0.0 0.0.0.0 10.217.104.1 65535
set locationParameter -context geographic -q1label Continent -q2label Country -q3label Region -q4label City -q5label ISP -q6label
Organization
add cr policy sessionID -rule REQ.HTTP.HEADER Cookie CONTAINS sessionid=11*
add aaa user sslvpn -password cd3c1c5667c9 -encrypted
add aaa user user2 -password cb3c155225 -encrypted
add aaa user user_vpn -password cb3c155248d1322d -encrypted
add aaa user user11 -password cb3c15522696 -encrypted
add aaa user user12 -password cb3c15522695 -encrypted
add aaa user user1 -password cb3c155226 -encrypted
add aaa group partner1
add aaa group partner2
add aaa group grp3
add vpn trafficAction test1 tcp
add vpn trafficAction Flowprofile91 tcp
add vpn intranetApplication route_migrate_1 ANY 192.168.0.0 -netmask 255.255.0.0 -destPort 1-65535 -interception TRANSPARENT
add authorization policy sfg ns_true ALLOW
add authorization policy v91 REQ.VLANID == 91 ALLOW
add authorization policy v92 REQ.VLANID == 92 ALLOW
add authorization policy v92not REQ.VLANID != 92 DENY
add vpn trafficPolicy block-IP-10 REQ.IP.SOURCEIP == 10.1.0.0 -netmask 255.255.0.0 test1
add vpn trafficPolicy Flow91 REQ.IP.SOURCEIP == 0.0.0.0 -netmask 0.0.0.0 && REQ.IP.DESTIP == 169.145.91.0 -netmask 255.255.255.0
39
Flowprofile91
add vpn vserver coilgw.citrixlabs.com SSL 10.217.104.102 443 -maxAAAUsers 30 -downStateFlush DISABLED
set ns rpcNode 10.217.104.100 -password 8a7b474124957776a0cd31b862cbe4d72b5cbd59868a136d4bdeb56cf03b28 -encrypted srcIP 10.217.104.100
set responder param -undefAction NOOP
set rewrite param -undefAction NOREWRITE
add dns nameServer 10.217.120.2 -state DISABLED
add dns nameServer 10.217.104.10 -state DISABLED
set dns parameter -nameLookupPriority DNS
add dns addRec srv2.citrixlabs.com 169.145.92.152 -TTL 3600
add dns addRec srv1.citrixlabs.com 169.145.91.151 -TTL 3600
add ssl certKey ns-server-certificate -cert ns-server.cert -key ns-server.key
add ssl certKey citrix -cert /nsconfig/ssl/citrix.cert -key /nsconfig/ssl/citrix.key
add ssl certKey ssltest -cert /nsconfig/ssl/ssltest.cert -key /nsconfig/ssl/ssltest.key
add ssl certKey coilgw_citrixlabs_com.cer -cert /nsconfig/ssl/coilgw_citrixlabs_com.cer.cert -key /nsconfig/ssl/coilgw_citrixlabs_com.cer.key
set ssl service nshttps-169.145.92.239-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-169.145.92.239-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
DISABLED
set ssl service nshttps-169.145.92.240-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-169.145.92.240-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
DISABLED
set ssl service nshttps-10.217.104.103-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-10.217.104.103-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
DISABLED
set ssl service nshttps-169.145.91.239-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-169.145.91.239-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
DISABLED
set ssl service nshttps-169.145.91.240-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-169.145.91.240-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
DISABLED
set ssl service nshttps-10.217.104.101-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-10.217.104.101-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect
40
DISABLED
set ssl service nskrpcs-127.0.0.1-3009 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nshttps-127.0.0.1-443 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set ssl service nsrpcs-127.0.0.1-3008 -sessReuse ENABLED -sessTimeout 120 -cipherRedirect DISABLED -sslv2Redirect DISABLED
set cache parameter -memLimit 0 -via NS-CACHE-8.0: 100 -verifyUsing HOSTNAME_AND_IP -maxPostLen 0 -prefetchMaxPending
4294967294 -enableBypass YES
set cache contentGroup BASEFILE -relExpiry 86000 -maxResSize 256 -memLimit 2
set cache contentGroup DELTAJS -relExpiry 86000 -insertAge NO -maxResSize 256 -memLimit 1 -pinned YES
set aaa parameter -maxAAAUsers 25
add vpn sessionAction nssessionprofile1 -defaultAuthorizationAction ALLOW -homePage Citrix001 -icaProxy ON -ntDomain DEMO
add vpn sessionAction nssessionprofile2 -defaultAuthorizationAction ALLOW -homePage Citrix002 -icaProxy ON -ntDomain DEMO
add vpn sessionAction SGProfile1 -homePage Citrix001 -icaProxy ON -ntDomain DEMO
add vpn sessionAction SessionProfileSrv1 -homePage http://srv1.citrixlabs.com/Citrix/AccessPlatform -icaProxy ON -ntDomain Srv1
add vpn sessionAction SessionProfileSrv2 -homePage http://Srv2.citrixlabs.com/Citrix/AccessPlatform -icaProxy ON -ntDomain Srv2
add vpn sessionPolicy name1 ns_true nssessionprofile1
add vpn sessionPolicy SessionPolicy1 ns_true SGProfile1
add vpn sessionPolicy SessionPolicySrv1 ns_true SessionProfileSrv1
add vpn sessionPolicy SessionPolicySrv2 ns_true SessionProfileSrv2
set aaa preauthenticationparameter -preauthenticationaction ALLOW -rule ns_true
set vpn parameter -splitDns BOTH -proxyLocalBypass DISABLED -forceCleanup none -clientOptions all -clientConfiguration all -SSO OFF
-windowsAutoLogon OFF -clientDebug OFF -icaProxy OFF -epaClientType PLUGIN
set audit syslogParams -serverIP 10.210.100.151 -logLevel ALL
bind aaa user user2 -policy SessionPolicySrv2
bind aaa user user_vpn -policy SessionPolicySrv1
bind aaa user user1 -policy SessionPolicySrv1
bind aaa group partner2 -userName user2
bind aaa group partner1 -userName user1
bind aaa group partner1 -policy Flow91 -priority 1
bind aaa group partner1 -policy SessionPolicySrv1 -priority 2
bind aaa group partner2 -policy v92
41
42
43
bind appfw profile Basic -denyURL ^[^?]*[.]htx -comment Microsoft IIS UNC path disclosure vulnerability -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*[.]id[aq] -comment Index server buffer overflow -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*(htaccess|access_log)([.][^/?]*)?([~])?([?].*)?$ -comment Access attacks -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*(passwd|passwords?)([.][^/?]*)?([?].*)?$ -comment Password file attacks -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*dvwssr[.]dll -comment Front Page server extensions buffer overflow-1 -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*fp30reg[.]dll -comment Front Page server extensions buffer overflow-2 -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*null[.]htw -comment Webhits source disclosure -state DISABLED
bind appfw profile Basic -denyURL debug[.][^/?]*(|[?].*)$ -comment Debug attacks -state DISABLED
bind appfw profile Basic -denyURL system( |\t|\n)*[(] -comment System command attacks -state DISABLED
bind appfw profile Basic -denyURL ^[^?]*/_vti_bin/shtml[.] -comment Front Page server extensions path disclosure vulnerability -state
DISABLED
bind appfw profile Advanced -denyURL /core(/.*)?$ -comment Unix core file attacks -state DISABLED
bind appfw profile Advanced -denyURL [\/]etc[\/](passwd|group|hosts) -comment Unix file attacks -state DISABLED
bind appfw profile Advanced -denyURL ([ /=]|\t|\n)(ls|rm|cat)([ ;\\\\&].*)?$ -comment Command injection attack -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[+][.]htr -comment HTR source disclosure -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/[?][SM]=[AD] -comment Apache possible directory index disclosure vulnerability -state
DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/[?]wp- -comment Netscape enterprise server directory indexing vulnerability -state
DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/NULL[.]printer -comment Printer buffer overflow -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/default[.]ida[?]N+ -comment CodeRed -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/publisher -comment Netscape enterprise server web publishing vulnerability -state
DISABLED
bind appfw profile Advanced -denyURL ^[^?]*Admin[.]dll -comment Nimbda-3 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/winnt/ -comment Nimbda-4 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[+]dir -comment IIS executable file parsing vulnerability-1 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/georgi[.]asp -comment IIS executable file parsing vulnerability-2 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[.](bat|ini|exe)(|[?].*)$ -comment IIS executable file parsing vulnerability-3 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[.](cgi|pl|php|bat)([/?].*)?[|] -comment Script exploit -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[.]asp\.* -comment Microsoft IIS UNC mapped virtual host vulnerability -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*[.]htx -comment Microsoft IIS UNC path disclosure vulnerability -state DISABLED
44
bind appfw profile Advanced -denyURL ^[^?]*[.]id[aq] -comment Index server buffer overflow -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*(htaccess|access_log)([.][^/?]*)?([~])?([?].*)?$ -comment Access attacks -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*(passwd|passwords?)([.][^/?]*)?([?].*)?$ -comment Password file attacks -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*dvwssr[.]dll -comment Front Page server extensions buffer overflow-1 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*fp30reg[.]dll -comment Front Page server extensions buffer overflow-2 -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*null[.]htw -comment Webhits source disclosure -state DISABLED
bind appfw profile Advanced -denyURL debug[.][^/?]*(|[?].*)$ -comment Debug attacks -state DISABLED
bind appfw profile Advanced -denyURL system( |\t|\n)*[(] -comment System command attacks -state DISABLED
bind appfw profile Advanced -denyURL ^[^?]*/_vti_bin/shtml[.] -comment Front Page server extensions path disclosure vulnerability -state
DISABLED
set ns hostName ns
Done
>
45
Name
Ports
46
default
Fa0/1...Fa0/10, Fa0/12...Fa0/14,
Fa0/15, Fa0/16
91
VLAN91-to-CPSSrvFarm1
Fa0/21
92
VLAN92-to-CPSSrvFarm2
Fa0/23
47
Citrix Worldwide
Worldwide headquarters
Citrix Systems, Inc.
851 West Cypress Creek Road
Fort Lauderdale, FL 33309
USA
T +1 800 393 1888
T +1 954 267 3000
Regional headquarters
Americas
Citrix Silicon Valley
4988 Great America Parkway
Santa Clara, CA 95054
USA
T +1 408 790 8000
Europe
Citrix Systems International GmbH
Rheinweg 9
8200 Schaffhausen
Switzerland
T +41 52 635 7700
Asia Pacific
Citrix Systems Hong Kong Ltd.
Suite 3201, 32nd Floor
One International Finance Centre
1 Harbour View Street
Central
Hong Kong
T +852 2100 5000
Citrix Online division
5385 Hollister Avenue
Santa Barbara, CA 93111
USA
T +1 805 690 6400
www.citrix.com
About Citrix
Citrix Systems, Inc. (Nasdaq:CTXS) is the global leader and the most trusted name in application delivery infrastructure. More than
200,000 organizations worldwide rely on Citrix to deliver any application to users anywhere with the best performance, highest
security and lowest cost. Citrix customers include 100% of the Fortune 100 companies and 98% of the Fortune Global 500, as well
as hundreds of thousands of small businesses and prosumers. Citrix has approximately 6,200 channel and alliance partners in more
than 100 countries. Annual revenue in 2006 was $1.1 billion.
Citrix, NetScaler, GoToMyPC, GoToMeeting, GoToAssist, Citrix Presentation Server, Citrix Password Manager, Citrix Access Gateway, Citrix Access
Essentials, Citrix Access Suite, Citrix SmoothRoaming and Citrix Subscription Advantage and are trademarks of Citrix Systems, Inc. and/or one or more of its
subsidiaries, and may be registered in the U.S. Patent and Trademark Office and in other countries. UNIX is a registered trademark of The Open Group in the U.S.
and other countries. Microsoft, Windows and Windows Server are registered trademarks of Microsoft Corporation in the U.S. and/or other countries. All other
trademarks and registered trademarks are property of their respective owners.
www.citrix.com