1Y0-351 Free Dumps Study Materials
Question 15: Scenario: A call center has deployed Access Gateway Enterprise to provide its employees with
access to work resources from home. Due to the number of available licenses, only selected
employees should access the environment remotely based on their user account information.
How could the engineer configure access to meet the needs of this scenario?
A. Configure a Pre-authentication Policy.
B. Configure an Authentication Server using a search filter.
C. Configure an Authentication Policy using Client based expressions.
D. Add the selected employee accounts to the Local Authentication policy.
Correct Answer: B
Explanation:
http://support.citrix.com/article/CTX111079
When you type log in credentials on the log in page of the NetScaler VPN and press Enter, the
credentials are sent to the Active Directory for validation. If the user name and password are valid,
then the Active Directory sends the user attributes to the NetScaler appliance. The memberOf
attribute is one of the attributes that the Active Directory sends to the NetScaler appliance. This
attribute contains the group name of which you are defined as a member in the Active Directory. If
you are a member of more than one Active Directory group, then multiple memberOf attributes are
sent to the NetScaler appliance.
The NetScaler appliance then parses this information to determine if the memberOf attribute
matches the Search filter parameter set on the appliance. If attribute matches, then you are allowed
to log in to the network.
The following are the sample attributes that the Active Directory can send to NetScaler appliance:
dn: CN=johnd,CN=Users,DC=citrix,DC=com
changetype: add
memberOf: CN=VPNAllowed,OU=support,DC=citrix,DC=com
cn: johnd
givenName: john
objectClass: user
sAMAccountName: johnd
Configuring a NetScaler Appliance to Extract the Active Directory Group To configure a NetScaler
appliance to extract the Active Directory group and enable clients to access the NetScaler VPN based
on the Active Directory groups by using the Lightweight Directory Access Protocol (LDAP)
authentication, compete the following procedure:
Determine the Active Directory Group that has access permission. To configure the NetScaler
appliance for Group Extraction, you must define the group a user needs to be a member of to allow
access to the network resources. Note: To determine that exact syntax, you might need to refer to
the Troubleshooting Group Extraction on the NetScaler appliance section.
Determine the Search Filter syntax.
Enter the appropriate syntax in the Search Filter field of the Create Authentication Server dialog box,
as shown in the following sample screenshot:
Note: Ensure that you start the value to the Search Filter filed with memberOf= and do not have any
embedded spaces in the value.
To configure the LDAP authentication with Group Extractions from the command line interface of the
NetScaler appliance with the values similar to the ones in the preceding screenshot, run the following
command:
add authentication ldapaction LDAP-Authentication
-serverip 10.3.4.15
-ldapBase "CN=Users,DC=citrix,DC=com"
-ldapBindDn "CN=administrator,CN=Users,DC=citrix,DC=com" -ldapBindDnPassword
..dd2604527edf70
-ldapLoginName sAMAccountName
-searchFilter "memberOf=CN=VPNAllowed,OU=support,DC=citrix,DC=com" -
groupAttrName memberOf
-subAttributeName CN
Note: Ensure that you set the subAttributeName parameter to CN. Troubleshooting Group Extraction
on the NetScaler appliance To troubleshoot group extraction on the NetScaler appliance, consider the
following points:
If the LDAP policy fails after configuring it for Group Extraction, it is best to create a policy that does
not have the group extraction configured to ensure that LDAP is configured appropriately. You might
need to use the LDAP Data Interchange Format Data Exchange (LDIFDE) utility from Microsoft that
extracts the attributes from the Active Directory server to determine the exact content of the
memberOf group.
You need to run this utility on the Active Directory server. The following is the syntax for the
command to run the LDIFDE utility:
ldifde -f <File_Name> -s <AD_Server_Name> -d "dc=<Domain_Name>,dc=com" -p subtree -r
"(&(objectCategory=person)(objectClass=User)(givenname=*))" -l
"cn,givenName,objectclass,samAccountName,memberOf"
When you run the preceding command, a text file, with the name you specified for File_Name
parameter, is created. This file contains all objects from the Active Directory.
The following is an example from a text file so created:
dn: CN=johnd,CN=Users,DC=citrix,DC=com
changetype: add
memberOf: CN=VPNAllowed,OU=support,DC=citrix,DC=com
cn: johnd
givenName: john
objectClass: user
sAMAccountName: johnd