1. What will happen if Data store down in Citrix?
If Data store is down then MetaFrame administrators will not be able to edit any configurations in
the Management Console such as publishing applications and new MetaFrame Presentation or
xenapp Servers cannot be added to the farm.
2. What are different load evaluators are available in Citrix?
Load evaluators managing the load and load balancing, we have Advance and default load
evaluators by default.
3. What is the requirement for Citrix server installation?
Os, terminal server, and citrix presentation or xenapp server dump.
4. What are the query commands in Citrix?
1) qfarm
2) querydc
3) queryds
4) queryhr
5) qfarm /App………etc……..
5. What are the different ports uses in Citrix?
Function Ports
ICA (Default) TCP: 1494
IMA TCP: 2512
CMC TCP: 2513
SSL TCP: 443
STA (IIS) TCP: 80
TCP Browsing UDP: 1604
XML (Default) TCP: 80
Citrix License Management Console TCP: 8082
Presentation Server Licensing TCP: 27000
ICA session w/ Session Reliability enabled TCP: 2598
RDP 3389
Network Manager SNMP UDP: 161, 162
SQL(named pipes) TCP: 1443
Oracle 2049
6. What will you check when any user is not able to launch Citrix application?
1) First we will identify it is single user issue or multiple users issue.
2) If it is multiple users issue launch same application from Citrix server (on which you installed and
published) if it is working on citrix servers or Xenapp servers then add same application to admin ID
and try to launch application thru client, if it is working for administrators then
3) Check user permissions for Applications.
4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then
5) Verify that latest Citrix client software installed at user PC.
7. How do you repair the IMA localhost cache?
The data store server must be available dsmaintrepairlhc command if fails to repair then we will
create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA
service cannot start.
8. What will happen if Citrix License server goes down?
If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of
the Citrix License server. To know the grace period edit the license file in notepad and type GP= then
you will get the grace period of the license.
9. What is DC and DS
Data Collector:- Data collector is responsible to collect all dynamic information like user login
information, which server is having least load, number of active sessions and number of
disconnected sessions etc…
Data Store:- Data Store is a static collection of data like Server Farm Name, List of published
application, policies, servers in the farm, administrators of the farm and their rights, installable
packages, load balancing rulesect.. . All server farm configurations are maintained in the data store
which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE
and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of
accessing the database is indirect. For all other databases it is direct.
10. What is IMA and what is ICA
Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that
communicate with each other to provide the services/ functions of the Presentation Server. It uses two
ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a
port to communicate with the CMC.
Or
Independent Management Architecture is configuration database which holds static data.
Independent Computing Architecture:-ICA is communication protocol between client and xenapp
servers.
11. What are the parameter of Resource Manager
Resources manager database summary, realtime monitoring, creating historical reports, billing
reports, alerts, report center and dashboards, calculating summary database sign
12. What is Farm
Collection of servers sharing the same data store
13. What is Zone
Logical subgrouping of xenapp servers in a farm.
14. Web interface process
1. A user launches a Web browser then connects to Web Interface.
1. The Web Interface returns the logon page.
1. The user types in credentials.
1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.
1. The IMA then forwards them to local Lsass.exe.
1. The Lsass.exe encrypts the credentials then passes them to the domain controller.
1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.
1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group
Preference policy for that authenticated user.
1. The list of the applications together with the user’s worker group preference policy are returned to the Web
Interface.
1. The Web Interface returns the web page to the web browser. (This completes the application enumeration
process).
The application launch process is as follows:
1. User selects the application by clicking the application icon (such as Microsoft Word).
1. The selected application data (Microsoft Word) is passed back to Web Interface.
1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference
policy back to Web Interface then to IMA on the XML broker server.
1. It then forwards to the IMA service on the Zone Data Collector.
1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify
whether the server has the required application installed, if the answer is yes, it then provides this server’s
host ID to the XML broker.
1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.
1. The IP address is then provided to Web Interface (this completes the application resolution).
1. Web Interface uses this IP address to create the ICA file.
1. The ICA file is then returned to Web browser on the client machine.
1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
1. The XenApp server launches the application for the user
15. Differences between 4.0 and 4.5
1. IMA encryption
2. Configuration login
3. Farm settings, application publishing etc.. have been moved to CMC to AMC console
4. Load throttling feature has been added
5. Appearance has been changed from java to .net.
6. Application streaming.
7. Health monitoring and recovery..etc…
16. Error: ICA File Not Found
Users may receive the ICA File Not Found error when launching published applications through
NFuse (Web Interface).
The following scenarios are known to produce the ICA File Not Found error:
1. Web pages are served with HTTPS and client can not save encrypted pages to disk
When a user clicks an application icon, the launch.ica file is downloaded from the web server
and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and
your browser is configured not to save encrypted pages to disk, the launch.ica file can not be
written to disk and the ICA client has no file to open.
To resolve this issue, at the client machine:
In Internet Explorer select go Tools > Internet Options
Select the Advanced tab Beneath the Security section of options, uncheck the option called Do
Not save encrypted pages to disk
2. Excessive internet cache
On Windows computers with large hard drives, the Temporary Internet Files folder used by
Internet Explorer can become excessively large, causing too much of a delay in the time required
to save the launch.ica file and then retrieve it for use by the ICA client.
To resolve this isue, clear the browser cache:
In Internet Explorer select go Tools > Internet Options
Select the General tab
In the Temporary Internet files section of options, click the Delete Files button.
17. How to change XML port number
Open a ‘Command Prompt’ window
Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port
number.
18. How do I remove a dead server from the Citrix Management Console?
dscheck /full servers Hostname /deleteall
19. Changing Farm Membership of Servers
Using chfarm
Executing chfarm
Executing chfarm does the following on the host server:
1. Attempts to remove the server from the farm.
2. Stops the IMA service.
3. Uninstalls the IMA service and removes the local IMA settings.
4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup
program is a wizard that gathers farm configuration information:
Data store setup includes the choices Create a new server farm or Join an existing server farm.
To create a new server farm, the Data Store Configuration page presents options for the data
store database.
To join an existing server farm, the Data Store Type page presents options for direct or indirect
connection to the data store.
When creating a new server farm, you enter the farm nSame. When joining an existing server
farm, you enter the information necessary to connect to the farm data store.
The wizard asks for the name of the zone in which to install the server.
5. Reinstalls and starts the IMA service.
19. Creating isolation environment.
For each application you want to isolate you need to create a separate Isolation Environment. This is
done from “Isolation Environments” node in the Presentation Server Management Console. Right click
it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.
You are now ready to either install or run an application in the AIE.
Installing into and Running from an AIE
There are two ways to install an application into an AIE. This can be done in an automated way via
Installation Manager or manually using the AIESETUP executable with the appropriate parameters.
Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like
you would normally do and in the “Schedule Job” screen you now have the option to select in which
“Isolation Environment” you want to install the application to.
Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The
syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I
will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named
“c:\AdbeRdr70_enu.exe”.
AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe
The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\
I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an
Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under
C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application
files actually are present:
The reason you see 3 folders here is because this application installs files outside the entered installation
path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof
that everything an application tries to do is redirected and not only the installation path of an
application.
Now that the application has been installed, you need to run it. There are two ways this can be done:
You can publish AIE applications
You can run them via a special command line
Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation
Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on
settings, select the correct AIE, select “Application was installed into environment” and select the
appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.
Now you can run the application from a Citrix client.
The second way of running the application is through the AIERUN executable command. This is the way
you would run an AIE application from the console or .from a published desktop
To do this I run the application using the AIERUN executable command with a very long parameter:
AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program
Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”
If you want to provide your users access to this application from a published desktop then simply create
a shortcut to the AIERUN command as shown above.
The application starts. Now from within the application I browse (through File -> Open) to C:\Program
Files\ and here I see the Virtualized (redirected) folder Adobe.
From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.
The Isolation Environment is actually a basic form of application virtualization since the AIE makes the
OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of
virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)
Running a “normally” installed application in an AIE
The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a
lot of multi-user application issues such as when an application stores user-specific settings in Local
Machine registry. AIE really can help you with these kinds of situations.
First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you
won’t install any application code. Then you can either publish the application or run it with the AIERUN
command. When publishing through the PSC in the “Specify what to publish” screen simply browse to
the already installed executable and then select in which AIE you want it to run.
For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe
and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from
the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local
Machine registry is the same from the server console as from within a published application as long
you’re running on the same server, which I am.) During the logon script for the published application I
create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what
a “bad” application could do during startup or while working with the application. The following is the
result:
The left is the registry editor running on the server console. The right is the registry editor running
through a published application on the same server .at the same time
The new registry keys I just created are actually saved in the user’s registry under
HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the
HKLM\Software registry. This means machine settings are saved per user from now on and multiple
concurrent users on the same server can have different machine settings.
What will not work with ISOLATION?
AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find
out in the field the hard way what the “real” limitations are.)
OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing
into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across
have some sort of limitations like these.)
What can Isolation solve?
Application Conflicts
Run multiple version of the same application
Run multiple version of the same DLL
Multi User Issues
Solves configuration issues with hard coded path to .INI files
Solves configuration issues with HKLM registry keys
Give users more “virtual” rights to an application
20. What is presentation\ Xenapp server.
Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to
applications that are actually installed on a remote computer. It uses a mix of technology that results in
that remote application looking and behaving just as though it was installed on the local machine.
Presentation Server is used to make applications available to users and can be managed and configured
centrally. The other features include load balancing, resource manager, network manager, installation
manager.
21. Function of the Local Host Cache
Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs
two primary functions:
1. Permits a server to function in the absence of a connection to the data store.
2. Improves performance by caching information used by ICA Clients for enumeration and
application resolution.
The LHC is an Access database, Imalhc.mdb, stored, by default, in the
c:\ProgramFiles\Citrix\Independent Management Architecture folder.
The following information is contained in the local host cache:
All servers in the farm, and their basic information.
All applications published within the farm and their properties.
(Or)
All Windows network domain trust relationships within the farm.
All information specific to itself. (Product code, SNMP settings, licensing information)
On the first startup of the member server, the LHC is populated with a subset of information from the
data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data
store. The IMA service performs this task through change notifications and periodic polling of the data
store.
If the data store is unreachable, the LHC contains enough information about the farm to allow normal
operations for an indefinite period of time, if necessary. However, no new static information can be
published, or added to the farm, until the farm data store is reachable and operational again.
22. Citrix commands
acrcfg - Configure auto reconnect settings
altaddr - Specify server alternate IP address
app - Run application execution shell
apputil - Add servers to Configured Servers list for published applications (FR3 Only)
auditlog - Generate server logon/logoff reports
change client - Change ICA Client device mapping
chfarm - Change the server farm membership of the server
clicense - Maintain MetaFrame XP licenses
cltprint - Set the number of ICA Client printer pipes
ctxxmlss - Change the XML Service port number
driveremap - Remap the server’s drive letters
dscheck - Validate the server farm’s data store’s integrity
dsmaint - Configure the server farm’s data store
dsverify - Clean errors in the farm’s data store
icaport - Configure TCP/IP port number
imaport - Change IMA ports
23. Xenapp server editions.
Presentation Server comes in three editions. They are:
1. Standard – Application Management (presentation server) (not available in 6.0 and 6.5)
2. Advanced – Application Management (presentation server)& Load Balancing
3. Enterprise - Application Management (presentation server), Load Balancing, Installation
Manager, Resource Manager, Network Manager
4. Platinum - Provides an end-to-end application delivery system for all Windows applications. It
includes all the features of the Enterprise Edition, including streaming enabled Client-side
Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,
enable performance management.
1. Application Performance Monitoring powered by Citrix EdgeSight
2. Smart Access™, powered by Citrix Access Gateway™
3. Single Sign-On, powered by Citrix Password Manager™
4. Smart Auditor
5. EasyCall
Briefly, the various functions of the editions can be described as follows:
1. Application Management – Application Management is the core functionality of the
Presentation Server and is available across all its editions. It allows for deploying, configuring and
managing applications and making them available to multiple users. The feature has been enhanced
to also make single-user applications multi-user friendly.
2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is
directed towards the least loaded server. The server load is calculated on a set of criteria that are
completely configurable by the administrators.
3. Installation Manager – It is the feature which is used to package and deploy applications to all
servers in a server farm
4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.
Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource
Manager also tracks things like disk space, network cards, and connection to the data store etc. All
the monitoring data can be collected for trend analysis in a database.
5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.
6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix
EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and
troubleshoot server, network and application issues impacting the user experience.
7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line
of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated
endpoint analysis.
8. Single Sign-On, for strongest application security. Secure logons to desktop and virtualized
applications with Single Sign-On, powered by Citrix Password Manager. Withautomated
application logons, password policy control, and self-service password reset, you can enhance
the security ofall password-protected Windows applications delivered by XenApp.
9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk
management.
SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions
automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure
regulatory compliance and conduct successful security audits of applications – including financial
operations and healthcare patient information systems.SmartAuditor also improves technical
support through fasterproblem identification and time-to-resolution
10. EasyCall, for communication-enabling applications. Imagineproviding remote communications
capability without having to install and support softphones. EasyCall, powered by the Citrix
EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the
directory, or justtype in a number and make a call using the regular telephone network. Users
specify the originating phone number that EasyCall will call before making the outbound call to
the desired party.
To provide any or all the above functionality of the Presentation Server, the following
components may or may not be required (the requirement of the component depends upon the
functionality that is to be provided):
1. Presentation Server
2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,
Web Client, Java Client)
3. Web Interface Server
4. Data Store Server (may be on the same server as the Presentation Server but not
preferred)
5. License Server (may be on the same server as the Presentation Server but not preferred)
The above components of the Presentation Server can be managed by the following tools:
1. Citrix Management Console – Used to publish applications, delegate administrators, define load
balancing parameters, deploy packed applications, configure policies, track the resource usage of
the servers in a server farm. All the configuration made through the Citrix Management console is
stored in a data store. This console can be installed on any workstation and used by the
administrator.
2. Access Suite Console – It is a java based console. This console is primarily used to view alerts
generated by applications and server, configure web interface server, configure program
neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the
products of the Citrix Access Suite from a single console. This console can be installed on any
workstation and used by the administrator.
3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide
settings. Client update database, connection configuration tool, Shadow Taskbar etc are made
available to the administrator through this toolbar.
4. License Management Console - Used to manage licenses being used by the various products of
the Citrix Access Suite Console.
Before we proceed further with the detailed discussion on the features of Presentation Server it is
mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief
description of the same
24. What is Client Lock Down
Lockdown greatly enhances security by preventing unauthorized executables from running on
your Terminal Servers
25. What is Speed Screen
Use this toll to configure local text echo, it improves user preforms in low networks
26. What is Printer driver replicationa and mapping
Two different printers can use same drivers, we can use drivemapping to reduce number driver
copies in citrix server
27. What is the requirement of Installation Manager and what kind of extension its
support.
Installation manager is a tool where we can distribute simple applications, hot fixes, patches,
and file/registry updates
It supports extensions like ADF, MSI and MSP
28. What do you mean by Content Redirection in Citrix?
It allows us to specify whether clients open published contact, applications, browsers and
media players locally or remotely. There are two types of content redirection: From server to
Client and from client to Server.
Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server
running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally
installed browser is used to play the URL. Users cannot disable this feature.
Note: If the client device fails to connect to a URL, the URL is redirected back to the server.
Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open
all files of the associated type encountered in locally running applications with applications
published on the server. We must use the Web Interface to allow users to connect to published
applications with the PN Agent.
Note: Content Redirection from client to server is available only with MFPS Advanced or
Enterprise Editions. Not working on MFPS Standard version.
29. What is ICA file? What it contents? Where is it located?
A text file(.ica) containing information about a published application. ICA files are written in
Windows Ini files format and organize published application information in a standard way that
MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the
specified application on the server specified in the file.
30. What is Citrix SSL Relay?
A Windows service that runs on a server to support an SSL, secure connection between a server
running the Web Interface for MFPS and a server running MFPS.
31. Citrix force removal command.
msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes
You need to execute this command where MPS.msi file location.
To uninstall, complete the following steps:
1. Exit all applications running on the server.
1. Select Start>Control Panel>Add/Remove Programs.
1. Select Change or Remove Programs.
1. Select Citrix Presentation Server.
1. Select Change.
1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen
instructions.
Citrix recommends that you uninstall the Citrix Server and its components in the following
order:
a. Citrix Presentation Server—Presentation Server Reports.
b. Citrix Access Management Console—Presentation Server Report Center.
c. All Citrix Access Management Console extensions, as follows:
Citrix Access Management Console—Diagnostics
Citrix Access Management Console—Hotfix Management
Citrix Access Management Console Knowledge Base
Citrix Access Management Console Legacy Tools
Citrix Access Management Console—Web Interface
d. Citrix Presentation Server Administration Snap-In.
e. Citrix License Server Administration.
f. Citrix Access Management Console Framework.
g. Presentation Server Console, which is also known as the Management Console for
Presentation Server.
h. Citrix Presentation Server.
i. Citrix Web Interface.
j. Citrix Licensing.
k. Citrix Presentation Server Document Center, if installed.
1. Stop and disable all Citrix services.
1. Open Computer Management > Local Users and Groups and delete all local user accounts
created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and
ctx_cpsvcuser.
1. Search the drive for the following Citrix files and delete them:
CDM
CTX **see note below
ICA
IMA
MF
MFXP
If there is a question about whether or not the file belongs to Citrix, view the Version tab within
the property settings of the file. When in doubt, it is better not to delete the file.
Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry
and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.
When you reboot the computer, the system then defaults to the msgina. By default, these keys
do not exist before the installation of Presentation Server.
1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if
required):
HKEY_CURRENT_USER\SOFTWARE\Citrix
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star
t Menu\Programs\Citrix
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)
HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.
HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices
HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,
and ImUtil)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail
1. Edit the computer environment variables and remove Citrix references from paths. Then run the
Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the
server.
1. Delete the following folders, if present:
\Programs Files\Citrix
\Programs Files\Common Files\Citrix
\Windows\System32\Citrix
\Documents and Settings\All Users\Start Menu\Programs\Citrix
1. Search the drive for *.del* and delete all files marked for deletion.
Note: When you attempt to delete some files, you might receive the following error message:
“Cannot delete file: The specified file is being used by Windows.”
1. Restart the server before you reinstall Presentation Server. When you delete all the files and
registry entries listed in the previous step, new installation proceeds normally. Restart the
server.
1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add
or Remove Programs. If Citrix components still appear, download and run the Windows Installer
Cleanup utility from Microsoft.
1. Verify if any Citrix services still appear. If so, use the sc command to remove them.
For example: sc delete “1. What will happen if Data store down in Citrix?
If Data store is down then MetaFrame administrators will not be able to edit any configurations in
the Management Console such as publishing applications and new MetaFrame Presentation or
xenapp Servers cannot be added to the farm.
2. What are different load evaluators are available in Citrix?
Load evaluators managing the load and load balancing, we have Advance and default load
evaluators by default.
3. What is the requirement for Citrix server installation?
Os, terminal server, and citrix presentation or xenapp server dump.
4. What are the query commands in Citrix?
1) qfarm
2) querydc
3) queryds
4) queryhr
5) qfarm /App………etc……..
5. What are the different ports uses in Citrix?
Function Ports
ICA (Default) TCP: 1494
IMA TCP: 2512
CMC TCP: 2513
SSL TCP: 443
STA (IIS) TCP: 80
TCP Browsing UDP: 1604
XML (Default) TCP: 80
Citrix License Management Console TCP: 8082
Presentation Server Licensing TCP: 27000
ICA session w/ Session Reliability enabled TCP: 2598
RDP 3389
Network Manager SNMP UDP: 161, 162
SQL(named pipes) TCP: 1443
Oracle 2049
6. What will you check when any user is not able to launch Citrix application?
1) First we will identify it is single user issue or multiple users issue.
2) If it is multiple users issue launch same application from Citrix server (on which you installed and
published) if it is working on citrix servers or Xenapp servers then add same application to admin ID
and try to launch application thru client, if it is working for administrators then
3) Check user permissions for Applications.
4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then
5) Verify that latest Citrix client software installed at user PC.
7. How do you repair the IMA localhost cache?
The data store server must be available dsmaintrepairlhc command if fails to repair then we will
create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA
service cannot start.
8. What will happen if Citrix License server goes down?
If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of
the Citrix License server. To know the grace period edit the license file in notepad and type GP= then
you will get the grace period of the license.
9. What is DC and DS
Data Collector:- Data collector is responsible to collect all dynamic information like user login
information, which server is having least load, number of active sessions and number of
disconnected sessions etc…
Data Store:- Data Store is a static collection of data like Server Farm Name, List of published
application, policies, servers in the farm, administrators of the farm and their rights, installable
packages, load balancing rulesect.. . All server farm configurations are maintained in the data store
which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE
and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of
accessing the database is indirect. For all other databases it is direct.
10. What is IMA and what is ICA
Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that
communicate with each other to provide the services/ functions of the Presentation Server. It uses two
ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a
port to communicate with the CMC.
Or
Independent Management Architecture is configuration database which holds static data.
Independent Computing Architecture:-ICA is communication protocol between client and xenapp
servers.
11. What are the parameter of Resource Manager
Resources manager database summary, realtime monitoring, creating historical reports, billing
reports, alerts, report center and dashboards, calculating summary database sign
12. What is Farm
Collection of servers sharing the same data store
13. What is Zone
Logical subgrouping of xenapp servers in a farm.
14. Web interface process
1. A user launches a Web browser then connects to Web Interface.
1. The Web Interface returns the logon page.
1. The user types in credentials.
1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.
1. The IMA then forwards them to local Lsass.exe.
1. The Lsass.exe encrypts the credentials then passes them to the domain controller.
1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.
1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group
Preference policy for that authenticated user.
1. The list of the applications together with the user’s worker group preference policy are returned to the Web
Interface.
1. The Web Interface returns the web page to the web browser. (This completes the application enumeration
process).
The application launch process is as follows:
1. User selects the application by clicking the application icon (such as Microsoft Word).
1. The selected application data (Microsoft Word) is passed back to Web Interface.
1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference
policy back to Web Interface then to IMA on the XML broker server.
1. It then forwards to the IMA service on the Zone Data Collector.
1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify
whether the server has the required application installed, if the answer is yes, it then provides this server’s
host ID to the XML broker.
1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.
1. The IP address is then provided to Web Interface (this completes the application resolution).
1. Web Interface uses this IP address to create the ICA file.
1. The ICA file is then returned to Web browser on the client machine.
1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
1. The XenApp server launches the application for the user
15. Differences between 4.0 and 4.5
1. IMA encryption
2. Configuration login
3. Farm settings, application publishing etc.. have been moved to CMC to AMC console
4. Load throttling feature has been added
5. Appearance has been changed from java to .net.
6. Application streaming.
7. Health monitoring and recovery..etc…
16. Error: ICA File Not Found
Users may receive the ICA File Not Found error when launching published applications through
NFuse (Web Interface).
The following scenarios are known to produce the ICA File Not Found error:
1. Web pages are served with HTTPS and client can not save encrypted pages to disk
When a user clicks an application icon, the launch.ica file is downloaded from the web server
and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and
your browser is configured not to save encrypted pages to disk, the launch.ica file can not be
written to disk and the ICA client has no file to open.
To resolve this issue, at the client machine:
In Internet Explorer select go Tools > Internet Options
Select the Advanced tab Beneath the Security section of options, uncheck the option called Do
Not save encrypted pages to disk
2. Excessive internet cache
On Windows computers with large hard drives, the Temporary Internet Files folder used by
Internet Explorer can become excessively large, causing too much of a delay in the time required
to save the launch.ica file and then retrieve it for use by the ICA client.
To resolve this isue, clear the browser cache:
In Internet Explorer select go Tools > Internet Options
Select the General tab
In the Temporary Internet files section of options, click the Delete Files button.
17. How to change XML port number
Open a ‘Command Prompt’ window
Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port
number.
18. How do I remove a dead server from the Citrix Management Console?
dscheck /full servers Hostname /deleteall
19. Changing Farm Membership of Servers
Using chfarm
Executing chfarm
Executing chfarm does the following on the host server:
1. Attempts to remove the server from the farm.
2. Stops the IMA service.
3. Uninstalls the IMA service and removes the local IMA settings.
4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup
program is a wizard that gathers farm configuration information:
Data store setup includes the choices Create a new server farm or Join an existing server farm.
To create a new server farm, the Data Store Configuration page presents options for the data
store database.
To join an existing server farm, the Data Store Type page presents options for direct or indirect
connection to the data store.
When creating a new server farm, you enter the farm nSame. When joining an existing server
farm, you enter the information necessary to connect to the farm data store.
The wizard asks for the name of the zone in which to install the server.
5. Reinstalls and starts the IMA service.
19. Creating isolation environment.
For each application you want to isolate you need to create a separate Isolation Environment. This is
done from “Isolation Environments” node in the Presentation Server Management Console. Right click
it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.
You are now ready to either install or run an application in the AIE.
Installing into and Running from an AIE
There are two ways to install an application into an AIE. This can be done in an automated way via
Installation Manager or manually using the AIESETUP executable with the appropriate parameters.
Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like
you would normally do and in the “Schedule Job” screen you now have the option to select in which
“Isolation Environment” you want to install the application to.
Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The
syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I
will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named
“c:\AdbeRdr70_enu.exe”.
AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe
The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\
I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an
Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under
C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application
files actually are present:
The reason you see 3 folders here is because this application installs files outside the entered installation
path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof
that everything an application tries to do is redirected and not only the installation path of an
application.
Now that the application has been installed, you need to run it. There are two ways this can be done:
You can publish AIE applications
You can run them via a special command line
Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation
Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on
settings, select the correct AIE, select “Application was installed into environment” and select the
appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.
Now you can run the application from a Citrix client.
The second way of running the application is through the AIERUN executable command. This is the way
you would run an AIE application from the console or .from a published desktop
To do this I run the application using the AIERUN executable command with a very long parameter:
AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program
Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”
If you want to provide your users access to this application from a published desktop then simply create
a shortcut to the AIERUN command as shown above.
The application starts. Now from within the application I browse (through File -> Open) to C:\Program
Files\ and here I see the Virtualized (redirected) folder Adobe.
From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.
The Isolation Environment is actually a basic form of application virtualization since the AIE makes the
OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of
virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)
Running a “normally” installed application in an AIE
The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a
lot of multi-user application issues such as when an application stores user-specific settings in Local
Machine registry. AIE really can help you with these kinds of situations.
First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you
won’t install any application code. Then you can either publish the application or run it with the AIERUN
command. When publishing through the PSC in the “Specify what to publish” screen simply browse to
the already installed executable and then select in which AIE you want it to run.
For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe
and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from
the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local
Machine registry is the same from the server console as from within a published application as long
you’re running on the same server, which I am.) During the logon script for the published application I
create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what
a “bad” application could do during startup or while working with the application. The following is the
result:
The left is the registry editor running on the server console. The right is the registry editor running
through a published application on the same server .at the same time
The new registry keys I just created are actually saved in the user’s registry under
HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the
HKLM\Software registry. This means machine settings are saved per user from now on and multiple
concurrent users on the same server can have different machine settings.
What will not work with ISOLATION?
AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find
out in the field the hard way what the “real” limitations are.)
OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing
into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across
have some sort of limitations like these.)
What can Isolation solve?
Application Conflicts
Run multiple version of the same application
Run multiple version of the same DLL
Multi User Issues
Solves configuration issues with hard coded path to .INI files
Solves configuration issues with HKLM registry keys
Give users more “virtual” rights to an application
20. What is presentation\ Xenapp server.
Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to
applications that are actually installed on a remote computer. It uses a mix of technology that results in
that remote application looking and behaving just as though it was installed on the local machine.
Presentation Server is used to make applications available to users and can be managed and configured
centrally. The other features include load balancing, resource manager, network manager, installation
manager.
21. Function of the Local Host Cache
Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs
two primary functions:
1. Permits a server to function in the absence of a connection to the data store.
2. Improves performance by caching information used by ICA Clients for enumeration and
application resolution.
The LHC is an Access database, Imalhc.mdb, stored, by default, in the
c:\ProgramFiles\Citrix\Independent Management Architecture folder.
The following information is contained in the local host cache:
All servers in the farm, and their basic information.
All applications published within the farm and their properties.
(Or)
All Windows network domain trust relationships within the farm.
All information specific to itself. (Product code, SNMP settings, licensing information)
On the first startup of the member server, the LHC is populated with a subset of information from the
data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data
store. The IMA service performs this task through change notifications and periodic polling of the data
store.
If the data store is unreachable, the LHC contains enough information about the farm to allow normal
operations for an indefinite period of time, if necessary. However, no new static information can be
published, or added to the farm, until the farm data store is reachable and operational again.
22. Citrix commands
acrcfg - Configure auto reconnect settings
altaddr - Specify server alternate IP address
app - Run application execution shell
apputil - Add servers to Configured Servers list for published applications (FR3 Only)
auditlog - Generate server logon/logoff reports
change client - Change ICA Client device mapping
chfarm - Change the server farm membership of the server
clicense - Maintain MetaFrame XP licenses
cltprint - Set the number of ICA Client printer pipes
ctxxmlss - Change the XML Service port number
driveremap - Remap the server’s drive letters
dscheck - Validate the server farm’s data store’s integrity
dsmaint - Configure the server farm’s data store
dsverify - Clean errors in the farm’s data store
icaport - Configure TCP/IP port number
imaport - Change IMA ports
23. Xenapp server editions.
Presentation Server comes in three editions. They are:
1. Standard – Application Management (presentation server) (not available in 6.0 and 6.5)
2. Advanced – Application Management (presentation server)& Load Balancing
3. Enterprise - Application Management (presentation server), Load Balancing, Installation
Manager, Resource Manager, Network Manager
4. Platinum - Provides an end-to-end application delivery system for all Windows applications. It
includes all the features of the Enterprise Edition, including streaming enabled Client-side
Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,
enable performance management.
1. Application Performance Monitoring powered by Citrix EdgeSight
2. Smart Access™, powered by Citrix Access Gateway™
3. Single Sign-On, powered by Citrix Password Manager™
4. Smart Auditor
5. EasyCall
Briefly, the various functions of the editions can be described as follows:
1. Application Management – Application Management is the core functionality of the
Presentation Server and is available across all its editions. It allows for deploying, configuring and
managing applications and making them available to multiple users. The feature has been enhanced
to also make single-user applications multi-user friendly.
2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is
directed towards the least loaded server. The server load is calculated on a set of criteria that are
completely configurable by the administrators.
3. Installation Manager – It is the feature which is used to package and deploy applications to all
servers in a server farm
4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.
Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource
Manager also tracks things like disk space, network cards, and connection to the data store etc. All
the monitoring data can be collected for trend analysis in a database.
5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.
6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix
EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and
troubleshoot server, network and application issues impacting the user experience.
7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line
of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated
endpoint analysis.
8. Single Sign-On, for strongest application security. Secure logons to desktop and virtualized
applications with Single Sign-On, powered by Citrix Password Manager. Withautomated
application logons, password policy control, and self-service password reset, you can enhance
the security ofall password-protected Windows applications delivered by XenApp.
9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk
management.
SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions
automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure
regulatory compliance and conduct successful security audits of applications – including financial
operations and healthcare patient information systems.SmartAuditor also improves technical
support through fasterproblem identification and time-to-resolution
10. EasyCall, for communication-enabling applications. Imagineproviding remote communications
capability without having to install and support softphones. EasyCall, powered by the Citrix
EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the
directory, or justtype in a number and make a call using the regular telephone network. Users
specify the originating phone number that EasyCall will call before making the outbound call to
the desired party.
To provide any or all the above functionality of the Presentation Server, the following
components may or may not be required (the requirement of the component depends upon the
functionality that is to be provided):
1. Presentation Server
2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,
Web Client, Java Client)
3. Web Interface Server
4. Data Store Server (may be on the same server as the Presentation Server but not
preferred)
5. License Server (may be on the same server as the Presentation Server but not preferred)
The above components of the Presentation Server can be managed by the following tools:
1. Citrix Management Console – Used to publish applications, delegate administrators, define load
balancing parameters, deploy packed applications, configure policies, track the resource usage of
the servers in a server farm. All the configuration made through the Citrix Management console is
stored in a data store. This console can be installed on any workstation and used by the
administrator.
2. Access Suite Console – It is a java based console. This console is primarily used to view alerts
generated by applications and server, configure web interface server, configure program
neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the
products of the Citrix Access Suite from a single console. This console can be installed on any
workstation and used by the administrator.
3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide
settings. Client update database, connection configuration tool, Shadow Taskbar etc are made
available to the administrator through this toolbar.
4. License Management Console - Used to manage licenses being used by the various products of
the Citrix Access Suite Console.
Before we proceed further with the detailed discussion on the features of Presentation Server it is
mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief
description of the same
24. What is Client Lock Down
Lockdown greatly enhances security by preventing unauthorized executables from running on
your Terminal Servers
25. What is Speed Screen
Use this toll to configure local text echo, it improves user preforms in low networks
26. What is Printer driver replicationa and mapping
Two different printers can use same drivers, we can use drivemapping to reduce number driver
copies in citrix server
27. What is the requirement of Installation Manager and what kind of extension its
support.
Installation manager is a tool where we can distribute simple applications, hot fixes, patches,
and file/registry updates
It supports extensions like ADF, MSI and MSP
28. What do you mean by Content Redirection in Citrix?
It allows us to specify whether clients open published contact, applications, browsers and
media players locally or remotely. There are two types of content redirection: From server to
Client and from client to Server.
Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server
running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally
installed browser is used to play the URL. Users cannot disable this feature.
Note: If the client device fails to connect to a URL, the URL is redirected back to the server.
Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open
all files of the associated type encountered in locally running applications with applications
published on the server. We must use the Web Interface to allow users to connect to published
applications with the PN Agent.
Note: Content Redirection from client to server is available only with MFPS Advanced or
Enterprise Editions. Not working on MFPS Standard version.
29. What is ICA file? What it contents? Where is it located?
A text file(.ica) containing information about a published application. ICA files are written in
Windows Ini files format and organize published application information in a standard way that
MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the
specified application on the server specified in the file.
30. What is Citrix SSL Relay?
A Windows service that runs on a server to support an SSL, secure connection between a server
running the Web Interface for MFPS and a server running MFPS.
31. Citrix force removal command.
msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes
You need to execute this command where MPS.msi file location.
To uninstall, complete the following steps:
1. Exit all applications running on the server.
1. Select Start>Control Panel>Add/Remove Programs.
1. Select Change or Remove Programs.
1. Select Citrix Presentation Server.
1. Select Change.
1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen
instructions.
Citrix recommends that you uninstall the Citrix Server and its components in the following
order:
a. Citrix Presentation Server—Presentation Server Reports.
b. Citrix Access Management Console—Presentation Server Report Center.
c. All Citrix Access Management Console extensions, as follows:
Citrix Access Management Console—Diagnostics
Citrix Access Management Console—Hotfix Management
Citrix Access Management Console Knowledge Base
Citrix Access Management Console Legacy Tools
Citrix Access Management Console—Web Interface
d. Citrix Presentation Server Administration Snap-In.
e. Citrix License Server Administration.
f. Citrix Access Management Console Framework.
g. Presentation Server Console, which is also known as the Management Console for
Presentation Server.
h. Citrix Presentation Server.
i. Citrix Web Interface.
j. Citrix Licensing.
k. Citrix Presentation Server Document Center, if installed.
1. Stop and disable all Citrix services.
1. Open Computer Management > Local Users and Groups and delete all local user accounts
created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and
ctx_cpsvcuser.
1. Search the drive for the following Citrix files and delete them:
CDM
CTX **see note below
ICA
IMA
MF
MFXP
If there is a question about whether or not the file belongs to Citrix, view the Version tab within
the property settings of the file. When in doubt, it is better not to delete the file.
Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry
and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.
When you reboot the computer, the system then defaults to the msgina. By default, these keys
do not exist before the installation of Presentation Server.
1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if
required):
HKEY_CURRENT_USER\SOFTWARE\Citrix
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star
t Menu\Programs\Citrix
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)
HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.
HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices
HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,
and ImUtil)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail
1. Edit the computer environment variables and remove Citrix references from paths. Then run the
Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the
server.
1. Delete the following folders, if present:
\Programs Files\Citrix
\Programs Files\Common Files\Citrix
\Windows\System32\Citrix
\Documents and Settings\All Users\Start Menu\Programs\Citrix
1. Search the drive for *.del* and delete all files marked for deletion.
Note: When you attempt to delete some files, you might receive the following error message:
“Cannot delete file: The specified file is being used by Windows.”
1. Restart the server before you reinstall Presentation Server. When you delete all the files and
registry entries listed in the previous step, new installation proceeds normally. Restart the
server.
1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add
or Remove Programs. If Citrix components still appear, download and run the Windows Installer
Cleanup utility from Microsoft.
1. Verify if any Citrix services still appear. If so, use the sc command to remove them.
For example: sc delete “Citrix SMA service”
1. Restart the server again.
1. Open Event Viewer and ensure that the Application and System logs do not contain events
referring to Citrix.
1. If imaging software is used, this is the moment to create a new image or backup of the server,
because at this point the server is as clear as technically possible of all Citrix software.
1. Reinstall the product normally, or create a log of the installation.
Example msiexec command:
msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt
32. What will happen if LHC in Citrix corrupted?
If LHC is corrupted,IMA service would fail to start and server communication with the datastore
would be affected ; as a result, server will not be able to handle user requests for applications,
you will have recreate LHC using this commanddsmaintrecreatelhc. SMA service”
1. Restart the server again.
1. Open Event Viewer and ensure that the Application and System logs do not contain events
referring to Citrix.
1. If imaging software is used, this is the moment to create a new image or backup of the server,
because at this point the server is as clear as technically possible of all Citrix software.
1. Reinstall the product normally, or create a log of the installation.
Example msiexec command:
msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt
32. What will happen if LHC in Citrix corrupted?
If LHC is corrupted,IMA service would fail to start and server communication with the datastore
would be affected ; as a result, server will not be able to handle user requests for applications,
you will have recreate LHC using this commanddsmaintrecreatelhc.
If Data store is down then MetaFrame administrators will not be able to edit any configurations in
the Management Console such as publishing applications and new MetaFrame Presentation or
xenapp Servers cannot be added to the farm.
2. What are different load evaluators are available in Citrix?
Load evaluators managing the load and load balancing, we have Advance and default load
evaluators by default.
3. What is the requirement for Citrix server installation?
Os, terminal server, and citrix presentation or xenapp server dump.
4. What are the query commands in Citrix?
1) qfarm
2) querydc
3) queryds
4) queryhr
5) qfarm /App………etc……..
5. What are the different ports uses in Citrix?
Function Ports
ICA (Default) TCP: 1494
IMA TCP: 2512
CMC TCP: 2513
SSL TCP: 443
STA (IIS) TCP: 80
TCP Browsing UDP: 1604
XML (Default) TCP: 80
Citrix License Management Console TCP: 8082
Presentation Server Licensing TCP: 27000
ICA session w/ Session Reliability enabled TCP: 2598
RDP 3389
Network Manager SNMP UDP: 161, 162
SQL(named pipes) TCP: 1443
Oracle 2049
6. What will you check when any user is not able to launch Citrix application?
1) First we will identify it is single user issue or multiple users issue.
2) If it is multiple users issue launch same application from Citrix server (on which you installed and
published) if it is working on citrix servers or Xenapp servers then add same application to admin ID
and try to launch application thru client, if it is working for administrators then
3) Check user permissions for Applications.
4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then
5) Verify that latest Citrix client software installed at user PC.
7. How do you repair the IMA localhost cache?
The data store server must be available dsmaintrepairlhc command if fails to repair then we will
create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA
service cannot start.
8. What will happen if Citrix License server goes down?
If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of
the Citrix License server. To know the grace period edit the license file in notepad and type GP= then
you will get the grace period of the license.
9. What is DC and DS
Data Collector:- Data collector is responsible to collect all dynamic information like user login
information, which server is having least load, number of active sessions and number of
disconnected sessions etc…
Data Store:- Data Store is a static collection of data like Server Farm Name, List of published
application, policies, servers in the farm, administrators of the farm and their rights, installable
packages, load balancing rulesect.. . All server farm configurations are maintained in the data store
which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE
and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of
accessing the database is indirect. For all other databases it is direct.
10. What is IMA and what is ICA
Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that
communicate with each other to provide the services/ functions of the Presentation Server. It uses two
ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a
port to communicate with the CMC.
Or
Independent Management Architecture is configuration database which holds static data.
Independent Computing Architecture:-ICA is communication protocol between client and xenapp
servers.
11. What are the parameter of Resource Manager
Resources manager database summary, realtime monitoring, creating historical reports, billing
reports, alerts, report center and dashboards, calculating summary database sign
12. What is Farm
Collection of servers sharing the same data store
13. What is Zone
Logical subgrouping of xenapp servers in a farm.
14. Web interface process
1. A user launches a Web browser then connects to Web Interface.
1. The Web Interface returns the logon page.
1. The user types in credentials.
1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.
1. The IMA then forwards them to local Lsass.exe.
1. The Lsass.exe encrypts the credentials then passes them to the domain controller.
1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.
1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group
Preference policy for that authenticated user.
1. The list of the applications together with the user’s worker group preference policy are returned to the Web
Interface.
1. The Web Interface returns the web page to the web browser. (This completes the application enumeration
process).
The application launch process is as follows:
1. User selects the application by clicking the application icon (such as Microsoft Word).
1. The selected application data (Microsoft Word) is passed back to Web Interface.
1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference
policy back to Web Interface then to IMA on the XML broker server.
1. It then forwards to the IMA service on the Zone Data Collector.
1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify
whether the server has the required application installed, if the answer is yes, it then provides this server’s
host ID to the XML broker.
1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.
1. The IP address is then provided to Web Interface (this completes the application resolution).
1. Web Interface uses this IP address to create the ICA file.
1. The ICA file is then returned to Web browser on the client machine.
1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
1. The XenApp server launches the application for the user
15. Differences between 4.0 and 4.5
1. IMA encryption
2. Configuration login
3. Farm settings, application publishing etc.. have been moved to CMC to AMC console
4. Load throttling feature has been added
5. Appearance has been changed from java to .net.
6. Application streaming.
7. Health monitoring and recovery..etc…
16. Error: ICA File Not Found
Users may receive the ICA File Not Found error when launching published applications through
NFuse (Web Interface).
The following scenarios are known to produce the ICA File Not Found error:
1. Web pages are served with HTTPS and client can not save encrypted pages to disk
When a user clicks an application icon, the launch.ica file is downloaded from the web server
and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and
your browser is configured not to save encrypted pages to disk, the launch.ica file can not be
written to disk and the ICA client has no file to open.
To resolve this issue, at the client machine:
In Internet Explorer select go Tools > Internet Options
Select the Advanced tab Beneath the Security section of options, uncheck the option called Do
Not save encrypted pages to disk
2. Excessive internet cache
On Windows computers with large hard drives, the Temporary Internet Files folder used by
Internet Explorer can become excessively large, causing too much of a delay in the time required
to save the launch.ica file and then retrieve it for use by the ICA client.
To resolve this isue, clear the browser cache:
In Internet Explorer select go Tools > Internet Options
Select the General tab
In the Temporary Internet files section of options, click the Delete Files button.
17. How to change XML port number
Open a ‘Command Prompt’ window
Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port
number.
18. How do I remove a dead server from the Citrix Management Console?
dscheck /full servers Hostname /deleteall
19. Changing Farm Membership of Servers
Using chfarm
Executing chfarm
Executing chfarm does the following on the host server:
1. Attempts to remove the server from the farm.
2. Stops the IMA service.
3. Uninstalls the IMA service and removes the local IMA settings.
4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup
program is a wizard that gathers farm configuration information:
Data store setup includes the choices Create a new server farm or Join an existing server farm.
To create a new server farm, the Data Store Configuration page presents options for the data
store database.
To join an existing server farm, the Data Store Type page presents options for direct or indirect
connection to the data store.
When creating a new server farm, you enter the farm nSame. When joining an existing server
farm, you enter the information necessary to connect to the farm data store.
The wizard asks for the name of the zone in which to install the server.
5. Reinstalls and starts the IMA service.
19. Creating isolation environment.
For each application you want to isolate you need to create a separate Isolation Environment. This is
done from “Isolation Environments” node in the Presentation Server Management Console. Right click
it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.
You are now ready to either install or run an application in the AIE.
Installing into and Running from an AIE
There are two ways to install an application into an AIE. This can be done in an automated way via
Installation Manager or manually using the AIESETUP executable with the appropriate parameters.
Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like
you would normally do and in the “Schedule Job” screen you now have the option to select in which
“Isolation Environment” you want to install the application to.
Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The
syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I
will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named
“c:\AdbeRdr70_enu.exe”.
AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe
The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\
I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an
Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under
C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application
files actually are present:
The reason you see 3 folders here is because this application installs files outside the entered installation
path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof
that everything an application tries to do is redirected and not only the installation path of an
application.
Now that the application has been installed, you need to run it. There are two ways this can be done:
You can publish AIE applications
You can run them via a special command line
Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation
Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on
settings, select the correct AIE, select “Application was installed into environment” and select the
appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.
Now you can run the application from a Citrix client.
The second way of running the application is through the AIERUN executable command. This is the way
you would run an AIE application from the console or .from a published desktop
To do this I run the application using the AIERUN executable command with a very long parameter:
AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program
Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”
If you want to provide your users access to this application from a published desktop then simply create
a shortcut to the AIERUN command as shown above.
The application starts. Now from within the application I browse (through File -> Open) to C:\Program
Files\ and here I see the Virtualized (redirected) folder Adobe.
From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.
The Isolation Environment is actually a basic form of application virtualization since the AIE makes the
OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of
virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)
Running a “normally” installed application in an AIE
The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a
lot of multi-user application issues such as when an application stores user-specific settings in Local
Machine registry. AIE really can help you with these kinds of situations.
First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you
won’t install any application code. Then you can either publish the application or run it with the AIERUN
command. When publishing through the PSC in the “Specify what to publish” screen simply browse to
the already installed executable and then select in which AIE you want it to run.
For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe
and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from
the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local
Machine registry is the same from the server console as from within a published application as long
you’re running on the same server, which I am.) During the logon script for the published application I
create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what
a “bad” application could do during startup or while working with the application. The following is the
result:
The left is the registry editor running on the server console. The right is the registry editor running
through a published application on the same server .at the same time
The new registry keys I just created are actually saved in the user’s registry under
HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the
HKLM\Software registry. This means machine settings are saved per user from now on and multiple
concurrent users on the same server can have different machine settings.
What will not work with ISOLATION?
AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find
out in the field the hard way what the “real” limitations are.)
OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing
into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across
have some sort of limitations like these.)
What can Isolation solve?
Application Conflicts
Run multiple version of the same application
Run multiple version of the same DLL
Multi User Issues
Solves configuration issues with hard coded path to .INI files
Solves configuration issues with HKLM registry keys
Give users more “virtual” rights to an application
20. What is presentation\ Xenapp server.
Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to
applications that are actually installed on a remote computer. It uses a mix of technology that results in
that remote application looking and behaving just as though it was installed on the local machine.
Presentation Server is used to make applications available to users and can be managed and configured
centrally. The other features include load balancing, resource manager, network manager, installation
manager.
21. Function of the Local Host Cache
Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs
two primary functions:
1. Permits a server to function in the absence of a connection to the data store.
2. Improves performance by caching information used by ICA Clients for enumeration and
application resolution.
The LHC is an Access database, Imalhc.mdb, stored, by default, in the
c:\ProgramFiles\Citrix\Independent Management Architecture folder.
The following information is contained in the local host cache:
All servers in the farm, and their basic information.
All applications published within the farm and their properties.
(Or)
All Windows network domain trust relationships within the farm.
All information specific to itself. (Product code, SNMP settings, licensing information)
On the first startup of the member server, the LHC is populated with a subset of information from the
data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data
store. The IMA service performs this task through change notifications and periodic polling of the data
store.
If the data store is unreachable, the LHC contains enough information about the farm to allow normal
operations for an indefinite period of time, if necessary. However, no new static information can be
published, or added to the farm, until the farm data store is reachable and operational again.
22. Citrix commands
acrcfg - Configure auto reconnect settings
altaddr - Specify server alternate IP address
app - Run application execution shell
apputil - Add servers to Configured Servers list for published applications (FR3 Only)
auditlog - Generate server logon/logoff reports
change client - Change ICA Client device mapping
chfarm - Change the server farm membership of the server
clicense - Maintain MetaFrame XP licenses
cltprint - Set the number of ICA Client printer pipes
ctxxmlss - Change the XML Service port number
driveremap - Remap the server’s drive letters
dscheck - Validate the server farm’s data store’s integrity
dsmaint - Configure the server farm’s data store
dsverify - Clean errors in the farm’s data store
icaport - Configure TCP/IP port number
imaport - Change IMA ports
23. Xenapp server editions.
Presentation Server comes in three editions. They are:
1. Standard – Application Management (presentation server) (not available in 6.0 and 6.5)
2. Advanced – Application Management (presentation server)& Load Balancing
3. Enterprise - Application Management (presentation server), Load Balancing, Installation
Manager, Resource Manager, Network Manager
4. Platinum - Provides an end-to-end application delivery system for all Windows applications. It
includes all the features of the Enterprise Edition, including streaming enabled Client-side
Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,
enable performance management.
1. Application Performance Monitoring powered by Citrix EdgeSight
2. Smart Access™, powered by Citrix Access Gateway™
3. Single Sign-On, powered by Citrix Password Manager™
4. Smart Auditor
5. EasyCall
Briefly, the various functions of the editions can be described as follows:
1. Application Management – Application Management is the core functionality of the
Presentation Server and is available across all its editions. It allows for deploying, configuring and
managing applications and making them available to multiple users. The feature has been enhanced
to also make single-user applications multi-user friendly.
2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is
directed towards the least loaded server. The server load is calculated on a set of criteria that are
completely configurable by the administrators.
3. Installation Manager – It is the feature which is used to package and deploy applications to all
servers in a server farm
4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.
Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource
Manager also tracks things like disk space, network cards, and connection to the data store etc. All
the monitoring data can be collected for trend analysis in a database.
5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.
6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix
EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and
troubleshoot server, network and application issues impacting the user experience.
7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line
of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated
endpoint analysis.
8. Single Sign-On, for strongest application security. Secure logons to desktop and virtualized
applications with Single Sign-On, powered by Citrix Password Manager. Withautomated
application logons, password policy control, and self-service password reset, you can enhance
the security ofall password-protected Windows applications delivered by XenApp.
9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk
management.
SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions
automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure
regulatory compliance and conduct successful security audits of applications – including financial
operations and healthcare patient information systems.SmartAuditor also improves technical
support through fasterproblem identification and time-to-resolution
10. EasyCall, for communication-enabling applications. Imagineproviding remote communications
capability without having to install and support softphones. EasyCall, powered by the Citrix
EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the
directory, or justtype in a number and make a call using the regular telephone network. Users
specify the originating phone number that EasyCall will call before making the outbound call to
the desired party.
To provide any or all the above functionality of the Presentation Server, the following
components may or may not be required (the requirement of the component depends upon the
functionality that is to be provided):
1. Presentation Server
2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,
Web Client, Java Client)
3. Web Interface Server
4. Data Store Server (may be on the same server as the Presentation Server but not
preferred)
5. License Server (may be on the same server as the Presentation Server but not preferred)
The above components of the Presentation Server can be managed by the following tools:
1. Citrix Management Console – Used to publish applications, delegate administrators, define load
balancing parameters, deploy packed applications, configure policies, track the resource usage of
the servers in a server farm. All the configuration made through the Citrix Management console is
stored in a data store. This console can be installed on any workstation and used by the
administrator.
2. Access Suite Console – It is a java based console. This console is primarily used to view alerts
generated by applications and server, configure web interface server, configure program
neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the
products of the Citrix Access Suite from a single console. This console can be installed on any
workstation and used by the administrator.
3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide
settings. Client update database, connection configuration tool, Shadow Taskbar etc are made
available to the administrator through this toolbar.
4. License Management Console - Used to manage licenses being used by the various products of
the Citrix Access Suite Console.
Before we proceed further with the detailed discussion on the features of Presentation Server it is
mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief
description of the same
24. What is Client Lock Down
Lockdown greatly enhances security by preventing unauthorized executables from running on
your Terminal Servers
25. What is Speed Screen
Use this toll to configure local text echo, it improves user preforms in low networks
26. What is Printer driver replicationa and mapping
Two different printers can use same drivers, we can use drivemapping to reduce number driver
copies in citrix server
27. What is the requirement of Installation Manager and what kind of extension its
support.
Installation manager is a tool where we can distribute simple applications, hot fixes, patches,
and file/registry updates
It supports extensions like ADF, MSI and MSP
28. What do you mean by Content Redirection in Citrix?
It allows us to specify whether clients open published contact, applications, browsers and
media players locally or remotely. There are two types of content redirection: From server to
Client and from client to Server.
Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server
running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally
installed browser is used to play the URL. Users cannot disable this feature.
Note: If the client device fails to connect to a URL, the URL is redirected back to the server.
Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open
all files of the associated type encountered in locally running applications with applications
published on the server. We must use the Web Interface to allow users to connect to published
applications with the PN Agent.
Note: Content Redirection from client to server is available only with MFPS Advanced or
Enterprise Editions. Not working on MFPS Standard version.
29. What is ICA file? What it contents? Where is it located?
A text file(.ica) containing information about a published application. ICA files are written in
Windows Ini files format and organize published application information in a standard way that
MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the
specified application on the server specified in the file.
30. What is Citrix SSL Relay?
A Windows service that runs on a server to support an SSL, secure connection between a server
running the Web Interface for MFPS and a server running MFPS.
31. Citrix force removal command.
msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes
You need to execute this command where MPS.msi file location.
To uninstall, complete the following steps:
1. Exit all applications running on the server.
1. Select Start>Control Panel>Add/Remove Programs.
1. Select Change or Remove Programs.
1. Select Citrix Presentation Server.
1. Select Change.
1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen
instructions.
Citrix recommends that you uninstall the Citrix Server and its components in the following
order:
a. Citrix Presentation Server—Presentation Server Reports.
b. Citrix Access Management Console—Presentation Server Report Center.
c. All Citrix Access Management Console extensions, as follows:
Citrix Access Management Console—Diagnostics
Citrix Access Management Console—Hotfix Management
Citrix Access Management Console Knowledge Base
Citrix Access Management Console Legacy Tools
Citrix Access Management Console—Web Interface
d. Citrix Presentation Server Administration Snap-In.
e. Citrix License Server Administration.
f. Citrix Access Management Console Framework.
g. Presentation Server Console, which is also known as the Management Console for
Presentation Server.
h. Citrix Presentation Server.
i. Citrix Web Interface.
j. Citrix Licensing.
k. Citrix Presentation Server Document Center, if installed.
1. Stop and disable all Citrix services.
1. Open Computer Management > Local Users and Groups and delete all local user accounts
created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and
ctx_cpsvcuser.
1. Search the drive for the following Citrix files and delete them:
CDM
CTX **see note below
ICA
IMA
MF
MFXP
If there is a question about whether or not the file belongs to Citrix, view the Version tab within
the property settings of the file. When in doubt, it is better not to delete the file.
Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry
and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.
When you reboot the computer, the system then defaults to the msgina. By default, these keys
do not exist before the installation of Presentation Server.
1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if
required):
HKEY_CURRENT_USER\SOFTWARE\Citrix
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star
t Menu\Programs\Citrix
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)
HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.
HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices
HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,
and ImUtil)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail
1. Edit the computer environment variables and remove Citrix references from paths. Then run the
Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the
server.
1. Delete the following folders, if present:
1. Search the drive for *.del* and delete all files marked for deletion.
Note: When you attempt to delete some files, you might receive the following error message:
“Cannot delete file: The specified file is being used by Windows.”
1. Restart the server before you reinstall Presentation Server. When you delete all the files and
registry entries listed in the previous step, new installation proceeds normally. Restart the
server.
1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add
or Remove Programs. If Citrix components still appear, download and run the Windows Installer
Cleanup utility from Microsoft.
1. Verify if any Citrix services still appear. If so, use the sc command to remove them.
For example: sc delete “1. What will happen if Data store down in Citrix?
If Data store is down then MetaFrame administrators will not be able to edit any configurations in
the Management Console such as publishing applications and new MetaFrame Presentation or
xenapp Servers cannot be added to the farm.
2. What are different load evaluators are available in Citrix?
Load evaluators managing the load and load balancing, we have Advance and default load
evaluators by default.
3. What is the requirement for Citrix server installation?
Os, terminal server, and citrix presentation or xenapp server dump.
4. What are the query commands in Citrix?
1) qfarm
2) querydc
3) queryds
4) queryhr
5) qfarm /App………etc……..
5. What are the different ports uses in Citrix?
Function Ports
ICA (Default) TCP: 1494
IMA TCP: 2512
CMC TCP: 2513
SSL TCP: 443
STA (IIS) TCP: 80
TCP Browsing UDP: 1604
XML (Default) TCP: 80
Citrix License Management Console TCP: 8082
Presentation Server Licensing TCP: 27000
ICA session w/ Session Reliability enabled TCP: 2598
RDP 3389
Network Manager SNMP UDP: 161, 162
SQL(named pipes) TCP: 1443
Oracle 2049
6. What will you check when any user is not able to launch Citrix application?
1) First we will identify it is single user issue or multiple users issue.
2) If it is multiple users issue launch same application from Citrix server (on which you installed and
published) if it is working on citrix servers or Xenapp servers then add same application to admin ID
and try to launch application thru client, if it is working for administrators then
3) Check user permissions for Applications.
4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then
5) Verify that latest Citrix client software installed at user PC.
7. How do you repair the IMA localhost cache?
The data store server must be available dsmaintrepairlhc command if fails to repair then we will
create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA
service cannot start.
8. What will happen if Citrix License server goes down?
If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of
the Citrix License server. To know the grace period edit the license file in notepad and type GP= then
you will get the grace period of the license.
9. What is DC and DS
Data Collector:- Data collector is responsible to collect all dynamic information like user login
information, which server is having least load, number of active sessions and number of
disconnected sessions etc…
Data Store:- Data Store is a static collection of data like Server Farm Name, List of published
application, policies, servers in the farm, administrators of the farm and their rights, installable
packages, load balancing rulesect.. . All server farm configurations are maintained in the data store
which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE
and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of
accessing the database is indirect. For all other databases it is direct.
10. What is IMA and what is ICA
Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that
communicate with each other to provide the services/ functions of the Presentation Server. It uses two
ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a
port to communicate with the CMC.
Or
Independent Management Architecture is configuration database which holds static data.
Independent Computing Architecture:-ICA is communication protocol between client and xenapp
servers.
11. What are the parameter of Resource Manager
Resources manager database summary, realtime monitoring, creating historical reports, billing
reports, alerts, report center and dashboards, calculating summary database sign
12. What is Farm
Collection of servers sharing the same data store
13. What is Zone
Logical subgrouping of xenapp servers in a farm.
14. Web interface process
1. A user launches a Web browser then connects to Web Interface.
1. The Web Interface returns the logon page.
1. The user types in credentials.
1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.
1. The IMA then forwards them to local Lsass.exe.
1. The Lsass.exe encrypts the credentials then passes them to the domain controller.
1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.
1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group
Preference policy for that authenticated user.
1. The list of the applications together with the user’s worker group preference policy are returned to the Web
Interface.
1. The Web Interface returns the web page to the web browser. (This completes the application enumeration
process).
The application launch process is as follows:
1. User selects the application by clicking the application icon (such as Microsoft Word).
1. The selected application data (Microsoft Word) is passed back to Web Interface.
1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference
policy back to Web Interface then to IMA on the XML broker server.
1. It then forwards to the IMA service on the Zone Data Collector.
1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.
1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify
whether the server has the required application installed, if the answer is yes, it then provides this server’s
host ID to the XML broker.
1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.
1. The IP address is then provided to Web Interface (this completes the application resolution).
1. Web Interface uses this IP address to create the ICA file.
1. The ICA file is then returned to Web browser on the client machine.
1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.
1. The XenApp server launches the application for the user
15. Differences between 4.0 and 4.5
1. IMA encryption
2. Configuration login
3. Farm settings, application publishing etc.. have been moved to CMC to AMC console
4. Load throttling feature has been added
5. Appearance has been changed from java to .net.
6. Application streaming.
7. Health monitoring and recovery..etc…
16. Error: ICA File Not Found
Users may receive the ICA File Not Found error when launching published applications through
NFuse (Web Interface).
The following scenarios are known to produce the ICA File Not Found error:
1. Web pages are served with HTTPS and client can not save encrypted pages to disk
When a user clicks an application icon, the launch.ica file is downloaded from the web server
and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and
your browser is configured not to save encrypted pages to disk, the launch.ica file can not be
written to disk and the ICA client has no file to open.
To resolve this issue, at the client machine:
In Internet Explorer select go Tools > Internet Options
Select the Advanced tab Beneath the Security section of options, uncheck the option called Do
Not save encrypted pages to disk
2. Excessive internet cache
On Windows computers with large hard drives, the Temporary Internet Files folder used by
Internet Explorer can become excessively large, causing too much of a delay in the time required
to save the launch.ica file and then retrieve it for use by the ICA client.
To resolve this isue, clear the browser cache:
In Internet Explorer select go Tools > Internet Options
Select the General tab
In the Temporary Internet files section of options, click the Delete Files button.
17. How to change XML port number
Open a ‘Command Prompt’ window
Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port
number.
18. How do I remove a dead server from the Citrix Management Console?
dscheck /full servers Hostname /deleteall
19. Changing Farm Membership of Servers
Using chfarm
Executing chfarm
Executing chfarm does the following on the host server:
1. Attempts to remove the server from the farm.
2. Stops the IMA service.
3. Uninstalls the IMA service and removes the local IMA settings.
4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup
program is a wizard that gathers farm configuration information:
Data store setup includes the choices Create a new server farm or Join an existing server farm.
To create a new server farm, the Data Store Configuration page presents options for the data
store database.
To join an existing server farm, the Data Store Type page presents options for direct or indirect
connection to the data store.
When creating a new server farm, you enter the farm nSame. When joining an existing server
farm, you enter the information necessary to connect to the farm data store.
The wizard asks for the name of the zone in which to install the server.
5. Reinstalls and starts the IMA service.
19. Creating isolation environment.
For each application you want to isolate you need to create a separate Isolation Environment. This is
done from “Isolation Environments” node in the Presentation Server Management Console. Right click
it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.
You are now ready to either install or run an application in the AIE.
Installing into and Running from an AIE
There are two ways to install an application into an AIE. This can be done in an automated way via
Installation Manager or manually using the AIESETUP executable with the appropriate parameters.
Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like
you would normally do and in the “Schedule Job” screen you now have the option to select in which
“Isolation Environment” you want to install the application to.
Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The
syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I
will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named
“c:\AdbeRdr70_enu.exe”.
AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe
The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\
I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an
Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under
C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application
files actually are present:
The reason you see 3 folders here is because this application installs files outside the entered installation
path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof
that everything an application tries to do is redirected and not only the installation path of an
application.
Now that the application has been installed, you need to run it. There are two ways this can be done:
You can publish AIE applications
You can run them via a special command line
Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation
Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on
settings, select the correct AIE, select “Application was installed into environment” and select the
appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.
Now you can run the application from a Citrix client.
The second way of running the application is through the AIERUN executable command. This is the way
you would run an AIE application from the console or .from a published desktop
To do this I run the application using the AIERUN executable command with a very long parameter:
AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program
Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”
If you want to provide your users access to this application from a published desktop then simply create
a shortcut to the AIERUN command as shown above.
The application starts. Now from within the application I browse (through File -> Open) to C:\Program
Files\ and here I see the Virtualized (redirected) folder Adobe.
From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.
The Isolation Environment is actually a basic form of application virtualization since the AIE makes the
OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of
virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)
Running a “normally” installed application in an AIE
The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a
lot of multi-user application issues such as when an application stores user-specific settings in Local
Machine registry. AIE really can help you with these kinds of situations.
First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you
won’t install any application code. Then you can either publish the application or run it with the AIERUN
command. When publishing through the PSC in the “Specify what to publish” screen simply browse to
the already installed executable and then select in which AIE you want it to run.
For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe
and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from
the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local
Machine registry is the same from the server console as from within a published application as long
you’re running on the same server, which I am.) During the logon script for the published application I
create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what
a “bad” application could do during startup or while working with the application. The following is the
result:
The left is the registry editor running on the server console. The right is the registry editor running
through a published application on the same server .at the same time
The new registry keys I just created are actually saved in the user’s registry under
HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the
HKLM\Software registry. This means machine settings are saved per user from now on and multiple
concurrent users on the same server can have different machine settings.
What will not work with ISOLATION?
AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find
out in the field the hard way what the “real” limitations are.)
OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing
into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across
have some sort of limitations like these.)
What can Isolation solve?
Application Conflicts
Run multiple version of the same application
Run multiple version of the same DLL
Multi User Issues
Solves configuration issues with hard coded path to .INI files
Solves configuration issues with HKLM registry keys
Give users more “virtual” rights to an application
20. What is presentation\ Xenapp server.
Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to
applications that are actually installed on a remote computer. It uses a mix of technology that results in
that remote application looking and behaving just as though it was installed on the local machine.
Presentation Server is used to make applications available to users and can be managed and configured
centrally. The other features include load balancing, resource manager, network manager, installation
manager.
21. Function of the Local Host Cache
Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs
two primary functions:
1. Permits a server to function in the absence of a connection to the data store.
2. Improves performance by caching information used by ICA Clients for enumeration and
application resolution.
The LHC is an Access database, Imalhc.mdb, stored, by default, in the
c:\ProgramFiles\Citrix\Independent Management Architecture folder.
The following information is contained in the local host cache:
All servers in the farm, and their basic information.
All applications published within the farm and their properties.
(Or)
All Windows network domain trust relationships within the farm.
All information specific to itself. (Product code, SNMP settings, licensing information)
On the first startup of the member server, the LHC is populated with a subset of information from the
data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data
store. The IMA service performs this task through change notifications and periodic polling of the data
store.
If the data store is unreachable, the LHC contains enough information about the farm to allow normal
operations for an indefinite period of time, if necessary. However, no new static information can be
published, or added to the farm, until the farm data store is reachable and operational again.
22. Citrix commands
acrcfg - Configure auto reconnect settings
altaddr - Specify server alternate IP address
app - Run application execution shell
apputil - Add servers to Configured Servers list for published applications (FR3 Only)
auditlog - Generate server logon/logoff reports
change client - Change ICA Client device mapping
chfarm - Change the server farm membership of the server
clicense - Maintain MetaFrame XP licenses
cltprint - Set the number of ICA Client printer pipes
ctxxmlss - Change the XML Service port number
driveremap - Remap the server’s drive letters
dscheck - Validate the server farm’s data store’s integrity
dsmaint - Configure the server farm’s data store
dsverify - Clean errors in the farm’s data store
icaport - Configure TCP/IP port number
imaport - Change IMA ports
23. Xenapp server editions.
Presentation Server comes in three editions. They are:
1. Standard – Application Management (presentation server) (not available in 6.0 and 6.5)
2. Advanced – Application Management (presentation server)& Load Balancing
3. Enterprise - Application Management (presentation server), Load Balancing, Installation
Manager, Resource Manager, Network Manager
4. Platinum - Provides an end-to-end application delivery system for all Windows applications. It
includes all the features of the Enterprise Edition, including streaming enabled Client-side
Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,
enable performance management.
1. Application Performance Monitoring powered by Citrix EdgeSight
2. Smart Access™, powered by Citrix Access Gateway™
3. Single Sign-On, powered by Citrix Password Manager™
4. Smart Auditor
5. EasyCall
Briefly, the various functions of the editions can be described as follows:
1. Application Management – Application Management is the core functionality of the
Presentation Server and is available across all its editions. It allows for deploying, configuring and
managing applications and making them available to multiple users. The feature has been enhanced
to also make single-user applications multi-user friendly.
2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is
directed towards the least loaded server. The server load is calculated on a set of criteria that are
completely configurable by the administrators.
3. Installation Manager – It is the feature which is used to package and deploy applications to all
servers in a server farm
4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.
Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource
Manager also tracks things like disk space, network cards, and connection to the data store etc. All
the monitoring data can be collected for trend analysis in a database.
5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.
6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix
EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and
troubleshoot server, network and application issues impacting the user experience.
7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line
of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated
endpoint analysis.
8. Single Sign-On, for strongest application security. Secure logons to desktop and virtualized
applications with Single Sign-On, powered by Citrix Password Manager. Withautomated
application logons, password policy control, and self-service password reset, you can enhance
the security ofall password-protected Windows applications delivered by XenApp.
9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk
management.
SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions
automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure
regulatory compliance and conduct successful security audits of applications – including financial
operations and healthcare patient information systems.SmartAuditor also improves technical
support through fasterproblem identification and time-to-resolution
10. EasyCall, for communication-enabling applications. Imagineproviding remote communications
capability without having to install and support softphones. EasyCall, powered by the Citrix
EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the
directory, or justtype in a number and make a call using the regular telephone network. Users
specify the originating phone number that EasyCall will call before making the outbound call to
the desired party.
To provide any or all the above functionality of the Presentation Server, the following
components may or may not be required (the requirement of the component depends upon the
functionality that is to be provided):
1. Presentation Server
2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,
Web Client, Java Client)
3. Web Interface Server
4. Data Store Server (may be on the same server as the Presentation Server but not
preferred)
5. License Server (may be on the same server as the Presentation Server but not preferred)
The above components of the Presentation Server can be managed by the following tools:
1. Citrix Management Console – Used to publish applications, delegate administrators, define load
balancing parameters, deploy packed applications, configure policies, track the resource usage of
the servers in a server farm. All the configuration made through the Citrix Management console is
stored in a data store. This console can be installed on any workstation and used by the
administrator.
2. Access Suite Console – It is a java based console. This console is primarily used to view alerts
generated by applications and server, configure web interface server, configure program
neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the
products of the Citrix Access Suite from a single console. This console can be installed on any
workstation and used by the administrator.
3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide
settings. Client update database, connection configuration tool, Shadow Taskbar etc are made
available to the administrator through this toolbar.
4. License Management Console - Used to manage licenses being used by the various products of
the Citrix Access Suite Console.
Before we proceed further with the detailed discussion on the features of Presentation Server it is
mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief
description of the same
24. What is Client Lock Down
Lockdown greatly enhances security by preventing unauthorized executables from running on
your Terminal Servers
25. What is Speed Screen
Use this toll to configure local text echo, it improves user preforms in low networks
26. What is Printer driver replicationa and mapping
Two different printers can use same drivers, we can use drivemapping to reduce number driver
copies in citrix server
27. What is the requirement of Installation Manager and what kind of extension its
support.
Installation manager is a tool where we can distribute simple applications, hot fixes, patches,
and file/registry updates
It supports extensions like ADF, MSI and MSP
28. What do you mean by Content Redirection in Citrix?
It allows us to specify whether clients open published contact, applications, browsers and
media players locally or remotely. There are two types of content redirection: From server to
Client and from client to Server.
Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server
running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally
installed browser is used to play the URL. Users cannot disable this feature.
Note: If the client device fails to connect to a URL, the URL is redirected back to the server.
Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open
all files of the associated type encountered in locally running applications with applications
published on the server. We must use the Web Interface to allow users to connect to published
applications with the PN Agent.
Note: Content Redirection from client to server is available only with MFPS Advanced or
Enterprise Editions. Not working on MFPS Standard version.
29. What is ICA file? What it contents? Where is it located?
A text file(.ica) containing information about a published application. ICA files are written in
Windows Ini files format and organize published application information in a standard way that
MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the
specified application on the server specified in the file.
30. What is Citrix SSL Relay?
A Windows service that runs on a server to support an SSL, secure connection between a server
running the Web Interface for MFPS and a server running MFPS.
31. Citrix force removal command.
msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes
You need to execute this command where MPS.msi file location.
To uninstall, complete the following steps:
1. Exit all applications running on the server.
1. Select Start>Control Panel>Add/Remove Programs.
1. Select Change or Remove Programs.
1. Select Citrix Presentation Server.
1. Select Change.
1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen
instructions.
Citrix recommends that you uninstall the Citrix Server and its components in the following
order:
a. Citrix Presentation Server—Presentation Server Reports.
b. Citrix Access Management Console—Presentation Server Report Center.
c. All Citrix Access Management Console extensions, as follows:
Citrix Access Management Console—Diagnostics
Citrix Access Management Console—Hotfix Management
Citrix Access Management Console Knowledge Base
Citrix Access Management Console Legacy Tools
Citrix Access Management Console—Web Interface
d. Citrix Presentation Server Administration Snap-In.
e. Citrix License Server Administration.
f. Citrix Access Management Console Framework.
g. Presentation Server Console, which is also known as the Management Console for
Presentation Server.
h. Citrix Presentation Server.
i. Citrix Web Interface.
j. Citrix Licensing.
k. Citrix Presentation Server Document Center, if installed.
1. Stop and disable all Citrix services.
1. Open Computer Management > Local Users and Groups and delete all local user accounts
created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and
ctx_cpsvcuser.
1. Search the drive for the following Citrix files and delete them:
CDM
CTX **see note below
ICA
IMA
MF
MFXP
If there is a question about whether or not the file belongs to Citrix, view the Version tab within
the property settings of the file. When in doubt, it is better not to delete the file.
Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry
and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.
When you reboot the computer, the system then defaults to the msgina. By default, these keys
do not exist before the installation of Presentation Server.
1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if
required):
HKEY_CURRENT_USER\SOFTWARE\Citrix
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star
t Menu\Programs\Citrix
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)
HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.
HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices
HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,
and ImUtil)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail
1. Edit the computer environment variables and remove Citrix references from paths. Then run the
Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the
server.
1. Delete the following folders, if present:
1. Search the drive for *.del* and delete all files marked for deletion.
Note: When you attempt to delete some files, you might receive the following error message:
“Cannot delete file: The specified file is being used by Windows.”
1. Restart the server before you reinstall Presentation Server. When you delete all the files and
registry entries listed in the previous step, new installation proceeds normally. Restart the
server.
1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add
or Remove Programs. If Citrix components still appear, download and run the Windows Installer
Cleanup utility from Microsoft.
1. Verify if any Citrix services still appear. If so, use the sc command to remove them.
For example: sc delete “Citrix SMA service”
1. Restart the server again.
1. Open Event Viewer and ensure that the Application and System logs do not contain events
referring to Citrix.
1. If imaging software is used, this is the moment to create a new image or backup of the server,
because at this point the server is as clear as technically possible of all Citrix software.
1. Reinstall the product normally, or create a log of the installation.
Example msiexec command:
msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt
32. What will happen if LHC in Citrix corrupted?
If LHC is corrupted,IMA service would fail to start and server communication with the datastore
would be affected ; as a result, server will not be able to handle user requests for applications,
you will have recreate LHC using this commanddsmaintrecreatelhc. SMA service”
1. Restart the server again.
1. Open Event Viewer and ensure that the Application and System logs do not contain events
referring to Citrix.
1. If imaging software is used, this is the moment to create a new image or backup of the server,
because at this point the server is as clear as technically possible of all Citrix software.
1. Reinstall the product normally, or create a log of the installation.
Example msiexec command:
msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt
32. What will happen if LHC in Citrix corrupted?
If LHC is corrupted,IMA service would fail to start and server communication with the datastore
would be affected ; as a result, server will not be able to handle user requests for applications,
you will have recreate LHC using this commanddsmaintrecreatelhc.
No comments:
Post a Comment