Citrix Access Gateway Enterprise Port Configuration

I have put together this blog post about Citrix Access Gateway Enterprise Port Configuration to assist people in setting up their firewalls for implementing Access Gateway in one-arm mode.

I have found that almost all of Citrix’s documentation covers the Access Gateway / NetScaler straddling the DMZ and the Internal LAN E.G the VIP sits in the DMZ and the SNIP sits in the internal LAN.

In Enterprise deployments firewalls are firewalls and NetScalers are NetScalers and security do not like NetScalers trying to be firewalls; although I’m sure they do perfectly fine job of it.

So the below article describes what firewall rules you will need to have in place to get a NetScaler working when all its interfaces reside in the DMZ (one-arm single subnet). You should find the diagram useful even if you are not using the model described above.

This is a diagram I like to use to explain NetScalers in an HA pair. It shows all the possible routes that traffic could take, not the way traffic flows during normal operation. The VIP and SNIP “float” between the two devices, in reality they exist on both devices but at any given time are only active on whichever node is the primary in the HA pair.


 Firewall rule table

Source IP

Destination IP




Client IPs Access Gateway VIP TCP 443 Secure traffic from internet clients to AGEE VIP
NetScaler NSIP LDAP Servers 1 TCP 389 LDAP authentication traffic from NetScaler IP to LDAP servers.
NetScaler NSIP RADIUS servers TCP/UDP 1812 RADIUS traffic from Access Gateway to RADIUS server (for RSA dual factor authentication)
NetScaler VIP2 DNS Servers TCP 53 DNS traffic from VIP to DNS servers
NetScaler SNIP Web Interface Servers TCP 80/4433 Traffic from Access Gateway to Web Interface servers
Web Interface Servers Access Gateway VIP TCP 443 Web Interface call back traffic to Access Gateway VIP4
NetScaler SNIP All XenApp session host servers and all XenDesktop Desktops (virtual, physical etc) TCP 1494 & 25986 ICA traffic from the Access Gateway to all Citrix XenApp or XenDesktop endpoints
Management Server NetScaler SNIP TCP 80/3010 Console and Java Applet traffic to NetScaler (for management



1.       In most cases these will be your Active Directory domain controllers – always use more than one.

2.       Normally this comes from the NSIP but due to the fact that ICMP is used to verify if the DNS servers are available the DNS servers will show as down unless your security team allow ICMP through the firewall which is very unlikely. Therefore, setup an internal DNS load balancer with a DNS lookup monitor and point your NetScalers at the internal load balancer.

3.       Normally port 80. Port 443 if you secure your Web Interface servers with a certificate

4.       Ensure that from a browser on your Web Interface server you can type the FQDN of the AGEE and get the logon page with NO errors

5.       Normally port 80. Port 443 if you secure your Web Interface servers with a certificate.

6.        Port 2598 is for session reliability

Remember that if you have your NetScalers configured in an HA pair traffic originating from the NSIP can come from either NetScaler depending on which one is hosting the AGEE VIP at the time. For anything that comes from the NSIP you can load balance it using a VIP if you want the traffic to originate from one IP.



Book a free consultation
and discuss your IT challenges with us