Bury Access Gateway

Bury Access Gateway

Bury MBC

Citrix Access Gateway

User Instructions

Table of Contents

Introduction

Prerequisites (What you need)

Configuring your PC

Create a System Restore Point

Changes to Internet Explorer

Using the Gateway

Applications

Web Sites

File Shares

Logging out of the Gateway

Introduction

The Gateway allows you to access Bury MBC resources whilst you are away from your normal office environment. You will be able to gain access to a number of resources, allowing for more flexible working. Examples of what you can access are:

  • Files on your network (Q) drive;
  • Bury’s Intranet Pages
  • Intranet Telephone Directory
  • TASK, RAISE, IBS, SBS, Wintegrate, Anite etc
  • Many other user-specific applications that you may have access to

It is the responsibility of Bury MBC employees with remote access privileges to Bury MBC’s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Bury MBC

Bury MBC employees must ensure that any access to the Bury MBC network does not violate any Bury MBC policy, is not considered to be an illegal activity, and that the access is not used for outside business interests. The Bury MBC employee bears full responsibility for the consequences should the access be misused.

Please review the Bury MBC Remote Access Working Policy for further details of protecting information when accessing the corporate network, and acceptable use of Bury MBC’s network.

By using the Gateway, you agree to the terms and conditions set out in the above policy.

Prerequisites (What you need)

Please ensure that the PC that you use meets all of the following criteria – if it does not then you maynot be able to accessthe Gateway:

  • Your internet connection must be ADSL, Cable or Broadband, running at 512Kbps or higher. The Gateway is not supported for PCs connecting through a slower connection than this. Dial-up/56k modem connections are not supported
  • The PC being used to connect must be running one of the following operating systems:
  • Windows 2000 (all versions) with Service Pack 4 or higher
  • Windows XP (all versions) with Service Pack 2 or higher
  • Windows Vista
  • All other operating systems are unsupported
  • All Critical and Security Windows Updates must be applied the PC.
  • Your PC must have anti virus software installed, and it must be fully updated.
  • You must have one of the following Internet browsers installed:
  • Microsoft Internet Explorer 6.0 or higher – please note additional instructions for IE7
  • Mozilla Firefox 3 or higher

Configuring your PC

Your PC will need configuring in order to utilize all the functions of the Gateway

Create a System Restore Point

As software has to be installed and your PC needs configuration changes, it is good practice that you create a System Restore Point to enable you to restore your PC to a previous configuration should you wish to. Please refer to the Help on your PC to find out how to create a System Restore Point. System Restore is only available on PCs running Windows XP and is usually found in All Programs->Accessories->System Tools. .

Changes to Internet Explorer

When you first browse to the Gateway, some software needs to be installed into your browser. This software allows the Gateway to check your PC for the existence of various updates, and also allows you to use the Gateway applications once you have logged on.

If you are using Internet Explorer version 6 or higher, you will need to make a change to your Internet Security settings to allow a clean installation of any software. PLEASE FOLLOW THESE INSTRUCTIONS VERY CAREFULLY:

Add the Gateway to your Trusted Sites

Open up Internet Explorer

Click on Tools->Internet Options->Security

Click on ‘Trusted sites’ and then click ‘Sites’


Figure 1.0 – Internet Options

Add the Gateway’s address to the trusted sites list – , (Please note the‘s’ at the end of http) - and then click Add. Click OK, and then OK again to return to Internet Explorer:

Fig 1.1 – Trusted Sites

Internet Explorer 7 Changes

In Internet Explorer 7 only, the Trusted Sites Zone needs to be adjusted to allow the installation of necessary software: Once this software is installed and you have successfully connected to the Gateway, you canchange this setting back if necessary.

Click once on Trusted Sites (From the screen indicated in Figure 1.0), and then click on Custom Level

Change the setting ‘Download signed ActiveX controls’ from ‘Prompt’ to ‘Enable’ and click OK

Figure 1.1a – IE7 Trusted Sites Zone Changes

Logging on for the first time

The Access Gateway website can be accessed by typing the following address into the address box in your browser. Please note the‘s’ at the end of http.

The first time you browse to the gateway, the ‘Citrix Endpoint Analysis Client’ will install. The Endpoint Analysis client is required to allow the system to check your PC for required software. . Depending on how your PC is setup, you may see the following screens. Click ‘Download’ and then ‘Run’to install the Endpoint Analysis Client if prompted:

Bury MBCPage 1© Duncan Walker

Fig 1.2a– Citrix Endpoint Install

Fig 1.2b– Citrix Endpoint Install

Bury MBCPage 1© Duncan Walker

Once the client has successfully installed you will be prompted to accept the Endpoint Analysis Client Check. Click ‘Yes’ to run the Scan. If you click ‘Always’ you will not be prompted to run the scan again, as it will run automatically:

Figure 1.2c – Citrix Endpoint Install

If the scan is successful, you will now be prompted to enter your username and password, and enter your Entrust password if you have been allocated with one. If you are using an Entrust Token, before you attempt to login, please have the token ready in front of you, but don't press any buttons yet.

Fig 1.3 – Logon Screen

1. First, enter your username and password in the normal way.

2. Press and hold the button on the token until dashes fill the LCD screen, then let go.

3. Enter the number shown on your token in the RADIUS Password box and click Log On.

You will now be logged in as normal.

Please avoid pressing the button on the token unnecessarily as this can make the token lose its ability to synchronise with the server.

If you're having problems please contact the Service Desk on x5050 who can resync your token, or they can assign you a temporary PIN to use if necessary.

After Logging In

After you have logged in, depending on how your PC is configured, youmaybe prompted to install the ‘Citrix XenApp Web Plugin – this allows you to use any Citrix Applications that you may have access to. Click ‘Download’ to install the Web Plugin if you are prompted to do so:

Fig 1.4a – Citrix XenApp Web Plugin Installation

Click Run when prompted

Fig 1.4b - Citrix XenApp Web Plugin Installation

Please note: Your PC may already have an older version of the Citrix Web Client installed. You will be notified of this when you try to install the Web Client. If this happens, you are advised to exit from Internet Explorer, open Add/Remove Programs from the Control Panel, and remove the Citrix Presentation Server Client you already have installed. Reboot, and log back in to the Gateway to complete the installation successfully.

You may be prompted to accept the license agreement once the Citrix Web Client has installed, click ‘Yes’ to accept the License Agreement

You are now ready to access your files using the gateway.

Using the Gateway

The Gateway web page is split into three sections, Applications, Web Sites, and File Shares

Figure 2.0 – Access Gateway Web Page

Applications

The Applications section contains any Citrix Applications that you have access to. For example some users may have access to Microsoft Office 2003, including Word, Outlook, Access and PowerPoint. Simply click the folder that you wish to access, and then click the application inside it. This will launch the Citrix Application. When you have finished using your application, exit it in the normal way.

You may be prompted to enter Citrix File Security settings the first time you attempt to access an application. In the top half of the dialogue box, click ‘No Access’ and in the bottom half of the box, click ‘Never ask me again’

Figure 2.01 – Citrix Client File Security

As an example, if you have access to Office Applications, to open up Microsoft Word 2003, click on the ‘Microsoft Office 2003’ folder, and then click on ‘Microsoft Word 2003’:

2.1 – Applications inside a folder

This will open up a Word 2003 session for you. You will be able to access files located on your Q:\ drive or any other of your mapped drives from this application. Do not attempt to access the local drive on your PC.

When you have finished using Microsoft Word, exit the application in the normal way, ie, close the application.

Web Sites

The Web Sites section contains Web Sites that may not be accessible from the outside world such as the Intranet and the Bury Town Centre Website. Web Sites will be added to this section from time-to-time. Click the Web Site you wish to access – this will open up a new browser window for you.

File Shares

The File Shares section contains any folders and files that you normally access at work. These files and folders would for instance be items in your Q:\ drive and/or any other folders that you may have access to as part of your job. To access a folder, click the link in the web page.

When you click the link, a new browser session will open and from here you can browse your files and folders within Internet Explorer:

Figure 2.2 – Browsing a File Share

Launching a file/Opening a document

To launch a file, click on it, hold down the CTRL key and choose ‘Launch’. From here you can edit the document in the normal way with a Citrix application that is associated with that file. Currently Microsoft Office documents and Adobe Acrobat files can be opened in this way

Logging out of the Gateway

When you have finished your session on the Gateway, you should log out. From the main page, select Logout from the right hand corner of the screen:

Figure 2.5 – Logout

Confirm that you wish to logout on the next screen. Click ‘Log Off’ to confirm:

Figure 2.6 – Logout Confirmation

Bury MBCPage 1© Duncan Walker