Академический Документы
Профессиональный Документы
Культура Документы
dsmaint
dsmaint config [/user:username] [/pwd:password] [/dsn:filename]
dsmaint backup destination_path
dsmaint failover direct_server
dsmaint compactdb [/ds] [/lhc]
dsmaint migrate [{ /srcdsn:dsn1 /srcuser:user1 /srcpwd:pwd1}] [{/dstdsn:dsn2
/dstuser:user2 /dstpwd:pwd2}]
dsmaint publishsqlds {/user:username /pwd:password}
dsmaint recover
dsmaint recreatelhc
dsmaint verifylhc
driveremap
driveremap /drive:M
driveremap /u
driveremap /noreboot
driveremap /IME
dscheck
dscheck [Options] [ /full | /clean]
[ Servers | Apps | Printers | Groups | MSLicense | Folders | Licenses ]
dscheck /full Servers [Options] Verify/Clean or Delete the server. May be left blank.
Defaults to all servers.
/Clean Modify the data store to correct the errors.
/DeleteAll Delete the server entries from the data store.
/DeleteMF Delete the MetaFrame Server entry from the data store.
/DeleteComSrv Delete the Common Server entry from the data store.
dscheck /full Apps [Options]
< AppName> Verify/Clean or Delete the application. May be left blank. Defaults to
all applications.
/Clean Modify the data store to correct the errors.
/ServerCheck Verify that all applications are hosted by valid servers.
/DeleteMF Delete the MetaFrame Application entry from the data store.
/DeleteComApp Delete the Common Application entry from the data store.
dscheck /full Printers [Options]
/purge_replications Removes all printer replications from the data store.
auditlog is used to view the report of users logoff and logon activity. With
auditlog /time we can get time the users spent in the servers
Then we need to select the base (master) image and decide how many VMs we would
like to provision and the desktops base resources like the amount of vCPU, memory
and the hard disk size need to assign per VM. Choose either new AD computer
accounts need to be created automatically, or we will use existing ones instead.
On the Create accounts page, the next step, we can select the OU where these VMs
to be created in Active Directory and we need Administrative permissions to do this.
Finally we click Finish on the summary screen. Now MCS will create the number of
machines specified, it will add two disks to each machine: an identity disk (16 MB)
which provides the VM with a unique identity, also used for Active Directory, and a
differencing disk used to store all writes made to the virtual machine, which is linked
to the read only copy of the master VM or otherwise, the snapshot taken from it. If it
is supported by the storage solution then this disk can be thin provisioned, otherwise
it will be as big as the base (master) virtual machine mentioned before. Note that
each VM provisioned by MCS will get its own ID and differencing disk.
During the process MCS will take a snapshot of the base (master) VM, unless you
manually created and selected a snapshot while doing one of the previous steps.
Doing it this way, gives you the option to give it a name, otherwise XD will name it
automatically.
Next, MCS creates a full copy (or clone) of the snapshot and places this in storage
repository. This is a read only copy shared by all VMs. If we have multiple storage
repositories then each repository used by the catalog will receive its own copy. In
short, these are the steps needed to set up your Pooled or Dedicated desktop catalog.
We might have left out some smaller steps in between, for example, the machines
will also get registered in Active Directory, and this gives us the big picture.
Storage and Management
When managing hundreds of Pooled desktops, used at the same time, all these can
potentially grow as big as the base (master) image, thats a lot of storage. In practice
this probably wont happen that much, because when a Pooled desktop gets rebooted
all changes made to the VM (stored on the underlying differencing disk) will get
deleted. So we need to make sure that we have enough free space available.
When we use dedicated desktops, we start out the exact same way, but when the VM
gets a reboot all the writes to the underlying differencing disk wont get deleted. The
user re-logs in everyday, again and again making changes to the underlying base
(master) image (written to the differencing disk) and updating regularly it wont get
deleted. When VM gets rebooted, the underlying differencing disk will keep
expanding and consume more free space. So these dedicated machines will consume
more storage than their Pooled machines.
We need to manage these dedicated desktops on an individual basis, because with
dedicated desktops will not update the underlying base (master) image without
destroying the accompanying differencing disk.
Updating the Base Image
For Pooled desktop when we update the base image, we need to point the (new)
updated image to the Pooled desktops and reboot the machines.
When we update the base image of the dedicated desktops it works a bit differently.
Once a differencing disk is pointing to one of the master or the base (clone) image, it
cannot be changed. So when we update the base image, it will create a complete new
copy or clone. The newly provisioned dedicated desktops will use this new or updated
base image. The other dedicated desktops will continue to use the old base image.
So for dedicated desktops, management is not easier like pooled desktops.
Conclusion
Pooled desktops: Management is easy and the need for storage is less, but users will
only get what is on the base image and cant make any changes. In dedicated
desktops users can save their work and changes as they want but the management is
harder and can consume more storage. So most of the companies prefer Pooled
desktops for overall use and only offer dedicated desktops when really needed.
the route, it will use it to pass-through the network traffic using the SNIP address as
its source address.
A SNIP address is not mandatory as NSIP. If we have multiple subnet we will have to
configure a SNIP address for each subnet separately. Also, when multiple SNIP
addresses are configured on the same subnet, they will be used in a Round Robin
fashion.
The Mapped IP Address (MIP) is similar to the SNIP. The MIP addresses are used
when a SNIP address isnt not available or when USNIP (Use SNIP) is disabled. It
will also be used as the source IP address as SNIP. Only when the configured MIP
address is the first in the subnet the Netscaler will add a route entry to its routing
table.
The Virtual IP Address (VIP) is the IP address of a vServer that the end users will
connect to, and through which they will eventually be authenticated etc. The VIP
address is never used as the source IP and so it is not involved in back-end server
communication, instead this will always be handled by a SNIP and MIP address.
An external user will contact the Netscaler Gateway over port 80 or 443 and connect
to the externally accessible virtual IP (VIP) address of the Netscaler (Gateway)
vServer. In the diagram above refer 1.VIP and 1. vServer. Once a connection is
established there are few options, for example, using a SNIP address the
(unauthenticated) user will connect to the StoreFront server located on the internal
network where authentication takes place.
If authentication takes place on the Netscaler, the users credentials are forwarded
using the NSIP, shown in 2. NSIP, to the internal authentication services (AD),
where they will be validated. Once validated, we may have two factor authentications
2. NSIP using SMS passcode tokens. In this way every user will have to fill the
username and password plus an additional auto generated token code which will
expire every few minutes, which is extremely secure.
Once the user is authenticated, the authentication services will pass through the user
credentials to the StoreFront server. The already authenticated user will connect to
the StoreFront server, 3. SNIP where it will enumerate the user applications.
Then this information will travel back into the Netscaler and through the Netscaler
Gateway vServer to the users screen as shown in 4. vServer
At last, when the user starts an application, the StoreFront server will generate a .ICA
file which is send back to the users device and is used to connect the user directly to
the requested resource on one of the XenDesktop / XenApp servers. During the last
phase of setting up this connection the Gateway server will check up on the earlier
generated STA file to validate the session, after that the application or Desktop will
be launched as shown in 5. App launch
Prerequisites:
Install XenDesktop 7.1 and configure with a Site.
Install PVS 7.1 and configure with a farm.
Install and configure vCenter 5.1 and configure with XenDesktop Studio.
Create appropriate security group to make the members of local admins.
Create a Windows 7 VM to be used as the Master image and optimize as per the
recommendation.
Create appropriate a Group Policy and link to the OU that will contain the computer
accounts created by the XenDesktop Setup Wizard.
The Write Cache drive is always created as Drive D and the Personal vDisk is created
with the drive letter assigned during the Wizard.
1. Add 2 hard drives of difference sizes to the VM. For example, Write Cache: 10GB
and PvD: 20GB.
2. Login to the VM, in Disk Management initialize the 2 new drives with MBR
partition type. The two drives will be shown as unallocated disks, do not format the
disks.
3. Mount the PVS 7.1 ISO to the VM and install Target Device.
4. After installing Target Device disconnect the PVS ISO and launch Imaging Wizard.
5. Create a vDisk and optimize the device. So now the vDisk has been created in the
PVS and a Target Device is created with the MAC address of the VM.
6. Shutdown the VM and configure to boot from the network first and the hard drive
second.
7. When the VM is powered on, login with the same account to continue the Imaging
Wizard.
8. Once it is completed the Imaging Wizard has now copied the contents of the VMs
C drive into the vDisk.
9. Now detach the C drive from the VM. So the VM has no C drive.
10. Go to PVS console, in the Target Devices properties; change the Boot from order
to vDisk.
11. Do power on the VM and you can see the 10GB Write Cache and 20GB PvD drives
and the C drive (vDisk) in the Disk Management.
12. Now install XenDesktop 7.1 Virtual Delivery Agent (VDA) for PVS and shutdown
the VM.
13. Detach the XenDesktop 7.1 ISO and login to the VM.
14. Install PvD update 7.1.1, i.e., Personal vDisk 7.1.1 and reboot the VM.
By default, PvD uses two drive letters: V and P. V is hidden and is a merged view of
the C drive with the PvD drive. If drive V is already used, the drive letter can be
changed.
15. Now run the PvD Inventory, Click Start, All Programs, Citrix, Update personal
vDisk and then shut down the VM.
16. Make a copy of the VM for safer side and create a template from the VM.
17. In the PVS console, go to vDisk properties and change the Access mode to
Standard image and Cache type to Cache on device hard drive.
18. Do right-click the Site and select XenDesktop setup wizard.
19. While setup select The same (static) desktop, and also select Save changes and
store them on a separate personal vDisk and click Next.
20. Provide the number of VMs to be created by the setup and you can also see the
Local write cache disk and PvD disk.
21. Once you complete the Wizard it will start creating VMs and target devices. You
can see the target devices in the Device Collect in PVS Console and the VMs in the
AD OU.
22. In the XenDesktop Citrix Studio, you can see the new Machine Catalog which has
been created now.
23. Create a Delivery Group with appropriate Machine Catalog, User Groups and the
StoreFront server.
24. Now you can edit the Delivery Group to make it online according to your
requirement.
25. It is ready for the users to login. The users can customize their desktop and after
the reboot the customizations persist.
9. Convert the backup into a VM template and stored in the hypervisor. The VM
template should only have the Write Cache drive attached.
10. Power on the XenApp Master Image VM template, and launch the Citrix XenApp
Server Role Manager to Prepare this server for imaging and provisioning.
11. Now we need to capture the XenApp Master Image to a PVS vDisk.
12. Install XenConvert in the XenApp Master Image server, launch XenConvert and
select options This Machine and Provisioning Services vDisk.
13. Remove the Write Cache disk and select Autofit to automatically adjust the vDisk
space.
14. After conversion process is finished, shut down the XenApp Master Image server.
15. Launch PVS Service console, change the vDisk access mode from Private to
Standard and the cache type to Cache on device hard drive.
16. Launch the Streamed VM Setup wizard enter the hypervisor and the
credentials.
17. Select the VM template created which we created earlier, PVS Collection where
the XenApp VMs are to be created and the XenApp vDisk to assign to them.
18. Specify number of virtual machines to be created with hardware specification and
provide the Active Directory OU, where the accounts will be created.
19. After finishing the build process, we can see new XenApp VMs in the hypervisor.
20. Now everything is completed. Power on the VM. We should assign a new IP
address if we use static IP for the VM Template.
2. TD uses Bootstrap file to request that PVS to send the boot sector from the
vDisk.
3. PVS access the vDisk from the Store (storage) and dynamically merges the
boot sector with the SQL server data to apply appropriate SID based on the
MAC address of the TD.
As the target device starts up, further requests for additional sectors from the vDisk
are access in the same method. With PVS the entire vDisk is not streamed instead
sectors are sent to the target device as needed.
The XenApp 7.5 now moves to the FlexCast Management Architecture (FMA) as
same as XenDesktop, brings conceptual and more flexible architecture. Here are the
differences between XenApp 6 entities and terminology in a XenApp 7.5 world.
FlexCast Management Architecture
The FlexCast Management Architecture (FMA) is a service-oriented architecture that
allows interoperability and management modularity across Citrix technologies. FMA
provides a platform for application delivery, mobility, services, flexible provisioning,
and cloud management.
FMA replaces the Independent Management Architecture (IMA) used in XenApp 6.x
Elements in the new architecture
Delivery Sites
Farms were the top level objects in XenApp 6.x. In XenApp 7.5, the Delivery Site is
the highest level item. Sites offer applications and desktops to groups of users.
The FMA requires that you must be in a domain to deploy a site. For example, to
install the XenApp servers, your account must have both local administrator
privileges and be a Domain Administrator in the Active Directory.
Session Machine Catalogs and Delivery Groups
Machines hosting applications in XenApp 6.x belonged to Worker Groups for
efficient management of the applications and server software. Administrators could
manage all machines in a Worker Group as a single unit for their application
management and load balancing needs. Folders were used to organize applications
and machines.
In XenApp 7.5 we use a combination of Session Machine Catalogs and Delivery
Groups to manage machines, load balancing, and hosted applications or desktops.
A Session Machine Catalog is a collection of machines that are configured and
managed alike. A machine belongs to only one catalog. The same applications or
desktops are available on all machines of the catalog.
Delivering applications
XenApp 6.x used the Publish Application wizard to prepare applications and deliver
them to users. In XenApp 7.5, you use Studio to create and add applications to make
them available to users who are included in a Delivery Group. Using Studio, you first
configure a site, create and specify machine catalogs, and then create Delivery
Groups within those machine catalogs. The Delivery Groups determine which users
have access to the applications you deliver.
Database
XenApp 7.5 does not use the IMA data store for configuration information. It uses a
Microsoft SQL Server database to store configuration and session information and
no more support for MS Access and Oracle databases.
Load Management Policy
In XenApp 6.5, load evaluators use predefined measurements to determine the load
on a machine. User connections can be matched to the machines with lesser load. In
XenApp 7.5, use load management policies for balancing load across machines.
Delegated Administrators
In XenApp 6.5, we created custom administrators and assigned them permissions
based on folders and objects. In XenApp 7.5, custom administrators are based on
role and scope pairs. A role represents a job function and has defined permissions
associated with it to allow delegation. A scope represents a collection of objects.
Built-in administrator roles have specific permissions sets, such as help desk,
applications, hosting, and catalog. For example, help desk administrators can work
only with individual users on specified sites, while full administrators can monitor
the entire deployment and resolve system-wide IT issues.
altaddr
app
auditlog
change client
chfarm
clicense
clrprint
ctxxmlss
dsmaint
icaport
query
query farm
query user
twconfig
subsystems that define and control the execution of products in a server farm. IMA
enables servers to be arbitrarily grouped into server farms that do not depend on the
physical locations of the servers or whether the servers are on different network
subnets.
IMA runs on all servers in the farm. IMA subsystems communicate through
messages passed by the IMA Service through default TCP ports 2512 and 2513. The
IMA Service starts automatically when a server is started. The IMA Service can be
manually started or stopped through the operating system Services utility.
IMA can be defined as a SERVICE, PROTOCAL and as a DATASTORE.
IMA Service: IMA Service is the central nervous system of Presentation Servers. This
service is responsible for just about everything server-related, including tracking
users, sessions, applications, licenses, and server load.
IMA Data store: Which stores Presentation server configuration information, such as
published applications, total licenses, load balancing configuration, security rights,
Administrator Accounts, Printer configuration, etc?
IMA Protocol: Which is used for transferring the ever-changing background
information between Presentation servers, including server load, current users and
connections, and licenses in use.
Ports used by IMA:
2512: Used for Server to Server Communication
2513: Used for CMC to Data store Communication
Independent Management Architecture is a term Citrix uses to describe the various
back-end components that make up a CPS environment. In the real world, IMA
consists of three components that we actually care about.
It is a database (called the IMA Data Store) used for storing Citrix Presentation
server configuration information, such as published applications, load balancing
configuration, security rights, policies, printer configuration, etc.
A Windows service (called the IMA Service) that runs on every Presentation Server
that handles things like server-to-server communication.
A protocol (called the IMA Protocol) for transferring the ever-changing background
information between Presentation Servers, including server load, current users and
connections, licenses in use, etc.
In Presentation Server, the IMA protocol does not replace the ICA protocol. The ICA
protocol is still used for client-to-server user sessions. The IMA protocol is used for
server-to-server communication in performing functions such as licensing and server
load updates, all of which occur behind the scenes.
If we open IMA data store database with SQL Enterprise Manager, well see it has
four tables:
DATATABLE
DELETETRACKER
INDEXTABLE
KEYTABLE
IMA data store is not a real relational database. Its actually an LDAP database. IMA
Data Store Size 1MB per server.
We cant access the IMA data store directly through SQL Enterprise Manager.
(technically you can, but if you run a query youll get meaningless hex results.) If we
try to edit any of the contents of the data store directly in the database, it will be
definitely corrupt.
Theres a tool on the Presentation Server installation CD called dsview. There is
another tool called dsedit a write-enabled version of dsview
There are many reasons that the IMA Service doesnt start
1. IMA Service load time
2. IMA Service subsystem
3. Missing Temp directory
4. Print spooler service
5. ODBC configuration
6. Roaming Profile
Check the Windows Registry setting:
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\IMARuntime\CurrentlyLoadingPlu
gin
If there is no value specified in the CurrentlyLoadingPlugin portion of the above
Windows Registry entry then the IMA service could not connect to the data store or
the local host cache is missing or corrupt.
If a CurrentlyLoadingPlugin value is specified the IMA Service made a connection to
the data store and the value displayed is the name of the IMA Service subsystem that
failed to load.
If administrators see an IMA Service Failed error message with an error code of
2147483649 when starting the Presentation Server the local system account might be
missing a Temp directory which is required for the IMA Service to run.
Change the IMA service startup account to the local administrator and restart the
server. If the IMA Service is successful in starting under the local administrator
account then it is likely that a missing Temp directory for the local system account is
causing the problem.
If the Temp directory is not present then manually create one as >Temp. For
example: C:\Windows\Temp
Also verify that the TMP and TEMP system environment variables point to the
temporary directory. Restart the server to restart the IMA Service
Preferred Load balancing is the feature in XenApp Platinum edition, which allows
you to configure preference for the particular users to access the applications in the
XenApp farm.
We can see this in Server properties in Advanced Management Console. In
Memory/CPU > CPU Utilization Management, there will be the third option called
CPU sharing based on Resource Allotments
To give more resources to particular application in the server, we can configure in
Application properties > Advanced > Limits and Application important in Access
Management Console. So if you set the Application importance to High, then when
those application is used by the users will get more CPU cycles than the users
accessing other applications
To give more resources to the users, we can configure it in Citrix Policies in XenApp
Advanced Configuration. To enable it go to the policy properties > Service Level >
Session Importance > enable, and assign preferred Importance Level (High,
Medium, Low)
The Load Throttling rule can be applied only to a server, not to an individual
application.
Advanced: This load evaluator contains the CPU Utilization, Memory Usage, Page
Swaps, and Load Throttling rules.
We cannot delete the Citrix-provided Advanced or Default load evaluators and can
create new load evaluators based on the rules available. Each server or published
application can have only one load evaluator attached to it.
qfarm /load command displays the load for all servers in the farm
The qfarm /app command displays the load for all applications and servers in the
farm. The load, 99999 means there is no load evaluator assigned to the application.
To look the contents of the in-memory dynamic store on the data collector, use
queryds command. QueryDS can be found in the support\debug folder of your
Presentation Server installation source files.
To determine which server is acting as the data collector in the zone run query
farm /zone from the command line
To see the Host ID number and its version, run queryhr.exe utility (with no
parameters).
Each server in the zone has a rank assigned to it. The administrator can configure
such that the servers in a zone can be ranked to make the server as the most desired
to serve as the zone master or ZDC. The ties between servers with the same
administrative ranking are broken by using the HOST IDs assigned to the servers.
When a Presentation Server starts or when the IMA service starts, the IMA service
starts trying to contact other servers via the IMA protocol on port 2512 until it finds
one thats online. When it finds, it queries it to find out which server is acting as the
data collector. The winner of this Zone Data Collector election is determined by the
newest version of the IMA service. We can control which server will act as data
collector by keeping that server the most up-to-date.
Data Collection Election Priority
Whichever server has the most recent version of the IMA Service running. (This may
include hotfixes) and the server with the highest preference set in the data store
Basically data collectors and data store are not really related. The Data Store holds
permanent farm configuration information in a database, and the data collector
tracks dynamic session information in its RAM.
In addition to their primary role to provide dynamic farm information for admin
consoles or for incoming connection requests, data collectors also take part in the
distribution of configuration changes to Presentation Servers in the farm. When we
make a changes in a presentation server that change is written to the local host cache
of whichever server we connected to, and then immediately replicated to the data
store. Presentation Server only looks for changes in the central data store every 30
minutes. Whenever a change is made to the Data Store, that change is sent to the
data collector for the zone.
The Data Collector then distributes that change (via IMA port 2512) to all of the
servers in its zone, allowing each server to update its own local host cache
accordingly. Furthermore, if we have more than one zone, the initial data collector
contacts the data collectors in the other zones. It sends its change to them, and in
turn those data collectors forward the change to all of the servers in their zones.
Coolest part is if the change is larger than 64k, the data collectors dont send the
actual change out to its zone. Instead they send out a notification which causes the
servers in the zone to perform an on demand sync with the central data store.
However its rare for a single change to be more than 64k in size.
The data collector election priority settings in the management console:
Presentation Server Java Management Console > Right-click on farm
name >Properties > Zones > highlight server > Set Election Preference
We can totally control which server is our data collector by manually setting the
preferences in the Java console. We can manually configure four levels of Zones
Data Collector election preference options:
Most Preferred
Preferred
Default Preferred
Not Preferred
The important thing to remember is that these preferences will be ignored if a newer
server is up for election.
Zone is subset of Farm. It is a grouping of Presentation Servers that shares the common Data
Collector. Zones are very helpful in controlling traffics. It collects data from member servers
and distributes changes to all servers in the farm. A zone in the Presentation Server farm
elects a zone data collector for the zone and it is responsible to communicates between other
ZDCs in the farm. It is used to redirect the users to least busy server. The ZDC maintains all
load and session information for every server in the zone. ZDCs keep open connections to
other ZDCs changes in the member servers of a zone and are immediately propagated to the
other ZDCs in the farm. Zone has server members and one of them is ZDC (Zone Data
Collectors) in each zone. These ZDCs communicate between zones. Zones are very help full
in controlling traffic. We can move the servers among the zones and after moving the servers
from one Zone to another the servers must be restarted to get settings and configurations
from the Data Store.
This article will give you a vast idea about many common client drive mapping
inquiries and issues along with their respective explanation or resolution.
Client Drive Mappings Do Not Create For Any User
If the ICA-tcp port properties are set to Inherit User Config make sure the
Active Directory profile for the users having the issue have the Connect client
drives at logon box checked. (Which is the default setting.)
Ensure the option to disable client drive mappings on the ICA-tcp listener in Terminal
Services Configuration is not enabled. A Group Policy may gray out the check box selection.
For Windows 2000 and 2003 Terminal Server Installations, ensure the
following registry entry exists and that the process, wfshell.exe, is running
inside the
session:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\Cur
rentVersion\Winlogon
Key Name: AppSetup
Value: Cmstart.exe
CTX983798 What Does the CMSTART Command Do?
Ensure the Client Network Service is started. Do not attempt to restart the
Client Network Service when there is an existing ICA connection to the server.
If the Client Network Service does not appear within services, verify that the
key, CdmSerivce, and its subcatergories, Enum and networkProvider, along
with their values are present under:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\.
Check another working server for proper registry settings.
Ensure Microsoft files Mpr.dll, the Multiple Provider Router dll, and Mup.sys
(the Multiple UNC Provider driver) are present.
Does drive mapping fail for the administrator? If not, ensure users have
sufficient rights to the dlls, exes, and registry settings outlined in this section.
Does the command net use * \\client\c$ work? If it does not, a System
Error 67 appears.
For Terminal Server 4.0 installations, check to see if the following registry
entry exists:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVers
ion\Winlogon
Key Name: Userinit
Value: Ctxlogon.exe
If using Web Interface, does the template.ica or default.ica file have a value of
CDMAllowed=Off (for Presentation Server Client version 9.x or earlier) or
CDMAllowed=False (for Presentation Server Client version 10.x or later)
If the Citrix server drive letters do not conflict with client drive letters, the client
drive letters can be accessed with their existing drive letters. So that the Citrix server
drive letters do not conflict with the client drive letters, you need to change the server
drive letters to higher drive letters. For example, changing Citrix server drives C to M
and D to N allows client devices to access their C and D drives directly.
How to Map Client Workstation Network Drives in an ICA Session
Use the Net Use command in a logon script to map client network drives, even when
the Citrix Management Console policy is enabled. For design and performance
reasons, if the client mapped network drive is accessible on the network from the
Citrix server, Citrix prefers that you do not following the solution below and that the
network drive be mapped in a regular Windows NT logon script.
The below point items are valid for all versions of XenApp.
During logon, the ICA Client informs the server of the available client drives,
COM ports, and LPT ports.
Client drive mapping allows drive letters on the Citrix server to be redirected
to drives that exist on the client device; for example, drive H in a ICA user
session can be mapped to drive C of the local computer running the Citrix ICA
Client. These mappings can be used by the File Manager or Explorer and your
applications just like any other network mappings. Client drive mapping is
transparently built into the standard Citrix device redirection facilities. The
clients disk drives are displayed as share points to which a drive letter can be
attached. The Citrix server can be configured during installation to
automatically map client drives to a given set of drive letters. The default
installation mapping maps drive letters assigned to client drives starting with
V and works backwards, assigning a drive letter to each fixed disk and CDROM. (Floppy drives are assigned their existing drive letters.)
You can use the net use and change client commands to map client devices not
automatically mapped at logon.
Here is the command and syntax:
net use y: \\client\c$
where y is the drive letter in a session and c is the client drive letter you want
to map.
Presentation Server 4.0 with Hotfix Rollup Pack 1 automatically maps Network
Drives. [From PSE400W2K3R02][#127532]: Network drives for client devices
incorrectly map automatically as local client drives.
How to Disable Specific Client Drive Mappings such as the A: drive
Perform the following steps:
Open the Module.ini file in a text editor (for example, Notepad) on the client
device. In most cases, this file is in the \Program files\Citrix\ICA client
directory.
Restart the ICA Client and establish a connection to the Citrix server.
This entry prevents the client side drive letters A, D, and F from being mapped. The
entry is not case-sensitive. If someone attempts to map a disabled drive through
the client network within an ICA session (that is, net use * \\client\D$), the
following error message appears: System Error 55 has occurred. The specified
network resource is no longer available.
The same restriction can be applied to an .ica file (used with published applications)
by adding DisableDrives= in the [Wfclient] section. Again, use a text editor to make
this change.
Another solution is to enable a policy through the management console.
How to Map Only One Client Drive at Logon
Click OK.
Note: Do not select Disable Client Drive Mapping; this will disable all future
client drive mappings.
information. The methodology explained in How to Map Only One Client Drive at
Logon can be used to create the mapping in ascending order.
How to Make the Server Drives Appear as a Client Drive When Using the
PassThrough Client
From the 6.20.986 ICA Win32 Client ReadMe:
Client drive mapping on the pass-through client was restricted to the drives on the
client device. The client could not map local or network drives configured on the
MetaFrame server in a pass-through session.
Local or network drives configured on the MetaFrame server can now be mapped by
the pass-through client.
For version 9.xx, open the Module.ini file in a text editor and add the following line
to the [ClientDrive] section of the file: NativeDriveMapping=TRUE
For version 10.xx
Run Regedit.
Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\ICA
Client\Engine\Configuration\Advanced\Modules\ClientDrive
When this flag is set, the client drives on the client device are not mapped and
are not available. The drives configured on the MetaFrame server are mapped
and are available to the pass-through client.
CTX126763 Client Drive is Not Mapped Using ICA Client Version 12 as PassThrough Client
@echo off
rem *
rem * Wait on redirector to connect client drive.
rem * In this case, we are using the V: drive as the client C:.
rem * We also need something to look for on the client drive.
rem * Adjust the settings accordingly.
rem * echo Connecting
:Delay
DIR %homedrive% /w > V:\tag.txt
IF EXIST V:\tag.txt GOTO :Connected
goto :Delay :Connected
DEL V:\tag.txt
START /NORMAL /WAIT Explorer.exe
Files saved to a client drive is successful but the file is corrupt or the
saved file reports an invalid memory location.
If the client drive or disk does not have enough space, the file copy passes but the file
is truncated or the file will not copy and gives an invalid memory location error.
Client Drives content may disappear in Windows Explorer and at a
command prompt when applications open more than 20 file handles
Add the bolded entry to the Module.ini [ClientDrive] section. The Module.ini is in the
\Program Files\Citrix\ICA Client directory.
MaxOpenContext = (A number ranging from 21 to 1024.)
Example:
[ClientDrive]
DriverName = VDCDM30.DLL
DriverNameWin16 = VDCDM30W.DLL
DriverNameWin32 = VDCDM30N.DLL
MaxWindowSize = 6276
MaxRequestSize = 1046
CacheTimeout = 600
CacheTimeoutHigh = 0
CacheTransferSize = 0
CacheDisable = FALSE
CacheWriteAllocateDisable = FALSE
MaxOpenContext = 50
DisableDrives =
Note: The default is 20 file handles per drive. If it becomes necessary to increase this
number, it is possible there is a handle leak with the applications accessing the client
drives.
Cannot Save Word97 Docs with Long Filenames to Citrix Drive A:
When the File Open or Save As dialog box is opened, Word brings up the last drive
letter used. If that drive was a remote share, Word starts a search for the correct
remote share at drives C through Z, because drive letters A or B are not usually
referenced as network shares. If Word cannot find the correct remote share, it makes
a new connection with a NULL local drive name.
Saving Long Filenames with the DOS Client
The standard 8.3 format must be used in saving to local drives with the ICA DOS
Client. The Citrix server does not physically write the file, rather, the ICA DOS client
is sent the file and the ICA Client writes it. Thus, the ICA Client cannot write a long
filename because the DOS operating system does not support long filenames.
Internet Explorer 5.0 saves HTML pages with all images by creating its own
directories and file names. These file names are long file names that are not
compatible with the DOS Client.