SlideShare une entreprise Scribd logo
1  sur  138
Télécharger pour lire hors ligne
Hello	
  and	
  Welcome	
  to	
  Troubleshoo*ng	
  and	
  Debugging	
  Receiver	
  for	
  iOS	
  and	
  Android.	
  
This	
  presenta4on	
  will	
  show	
  you	
  the	
  tools	
  and	
  data	
  that	
  can	
  be	
  used	
  to	
  help	
  resolve	
  
problems	
  in	
  the	
  Receivers	
  for	
  iOS	
  and	
  Android.	
  
	
  
1	
  
Why	
  Mobility?	
  Mobility	
  can	
  make	
  employees	
  more	
  produc4ve	
  and	
  reac4ve	
  by	
  allowing	
  
them	
  to	
  access	
  any	
  resource,	
  anywhere	
  with	
  any	
  device.	
  
2	
  
Why	
  Now?	
  There	
  is	
  an	
  increasing	
  demand	
  for	
  employees	
  to	
  securely	
  access	
  these	
  
resources	
  on	
  the	
  device	
  of	
  their	
  choice	
  and	
  the	
  pressure	
  is	
  on	
  for	
  IT	
  to	
  adapt!	
  
	
  
3	
  
Here	
  is	
  a	
  look	
  at	
  this	
  fast	
  growing	
  and	
  rapidly	
  changing	
  mobile	
  market.	
  	
  From	
  these	
  
forecasts	
  from	
  Gartner,	
  we’ll	
  see	
  twice	
  as	
  many	
  smartphones	
  and	
  tablets	
  by	
  2015	
  as	
  
we	
  did	
  in	
  2012.	
  	
  
4	
  
Here	
  is	
  a	
  look	
  at	
  this	
  fast	
  growing	
  and	
  rapidly	
  changing	
  mobile	
  market.	
  	
  From	
  these	
  
forecasts	
  from	
  Gartner,	
  we’ll	
  see	
  twice	
  as	
  many	
  smartphones	
  and	
  tablets	
  by	
  2015	
  as	
  
we	
  did	
  in	
  2012.	
  	
  
5	
  
Mobility	
  is	
  a	
  top	
  priority	
  for	
  organiza4ons	
  AND	
  the	
  employees.	
  And	
  it	
  is	
  a	
  BIG	
  challenge	
  
for	
  IT.	
  	
  
	
  
6	
  
How	
  do	
  you	
  find	
  the	
  problem	
  when	
  dealing	
  with	
  the	
  Mobile	
  Receivers?	
  There	
  are	
  lots	
  
of	
  ones	
  and	
  zeroes	
  flowing,	
  how	
  do	
  we	
  know	
  which	
  ones	
  to	
  look	
  at?	
  There	
  has	
  not	
  
been	
  much	
  logging	
  in	
  the	
  Citrix	
  Mobile	
  Receivers	
  in	
  the	
  past	
  and	
  it	
  was	
  quite	
  difficult	
  to	
  
get	
  to.	
  Many	
  have	
  been	
  frustrated	
  looking	
  for	
  logging	
  within	
  the	
  Mobile	
  Receivers.	
  We	
  
have	
  added	
  some	
  exci4ng	
  new	
  and	
  convenient	
  tracing	
  methods	
  to	
  both	
  the	
  iOS	
  and	
  
Android	
  Receivers.	
  
7	
  
With	
  all	
  the	
  combina4ons	
  of	
  products	
  or	
  network	
  devices	
  between	
  your	
  Mobile	
  
Receivers	
  and	
  your	
  cri4cal	
  business	
  applica4ons	
  and	
  desktops,	
  First,	
  understand	
  the	
  
infrastructure	
  design	
  to	
  help	
  narrow	
  down	
  the	
  problem.	
  These	
  are	
  the	
  major	
  
components	
  considered	
  in	
  this	
  presenta4on.	
  The	
  Mobile	
  Receivers:	
  iOS	
  and	
  Android,	
  
the	
  Network	
  and	
  Web	
  components:	
  Netscaler,	
  Storefront	
  and	
  Web	
  Interface,	
  and	
  your	
  
business	
  resources	
  like	
  XenApp	
  published	
  applica4ons	
  and	
  XenDesktop	
  machines.	
  
	
  
See	
  the	
  big	
  picture	
  and	
  ISOLATE	
  the	
  issue	
  by	
  determining	
  which	
  connec4on	
  scenarios	
  
the	
  problem	
  does	
  and	
  does	
  not	
  occur.	
  Next,	
  SEPARATE	
  the	
  network	
  layers	
  from	
  the	
  
applica4ons	
  layer	
  by	
  checking	
  out	
  the	
  network	
  traffic.	
  Then,	
  GATHER	
  and	
  INVESTIGATE	
  
the	
  key	
  diagnos4c	
  data	
  from	
  the	
  applica4ons	
  layers.	
  	
  Here	
  is	
  how	
  to	
  get	
  the	
  most	
  useful	
  
data	
  from	
  the	
  XenDesktops	
  and	
  XenApp	
  Servers	
  and	
  the	
  Mobile	
  Receivers.	
  	
  	
  
	
  
	
  
8	
  
With	
  all	
  the	
  combina4ons	
  of	
  products	
  or	
  network	
  devices	
  between	
  your	
  Mobile	
  
Receivers	
  and	
  your	
  cri4cal	
  business	
  applica4ons	
  and	
  desktops,	
  First,	
  understand	
  the	
  
infrastructure	
  design	
  to	
  help	
  narrow	
  down	
  the	
  problem.	
  These	
  are	
  the	
  major	
  
components	
  considered	
  in	
  this	
  presenta4on.	
  The	
  Mobile	
  Receivers:	
  iOS	
  and	
  Android,	
  
the	
  Network	
  and	
  Web	
  components:	
  Netscaler,	
  Storefront	
  and	
  Web	
  Interface,	
  and	
  your	
  
business	
  resources	
  like	
  XenApp	
  published	
  applica4ons	
  and	
  XenDesktop	
  machines.	
  
	
  
See	
  the	
  big	
  picture	
  and	
  ISOLATE	
  the	
  issue	
  by	
  determining	
  which	
  connec4on	
  scenarios	
  
the	
  problem	
  does	
  and	
  does	
  not	
  occur.	
  Next,	
  SEPARATE	
  the	
  network	
  layers	
  from	
  the	
  
applica4ons	
  layer	
  by	
  checking	
  out	
  the	
  network	
  traffic.	
  Then,	
  GATHER	
  and	
  INVESTIGATE	
  
the	
  key	
  diagnos4c	
  data	
  from	
  the	
  applica4ons	
  layers.	
  	
  Here	
  is	
  how	
  to	
  get	
  the	
  most	
  useful	
  
data	
  from	
  the	
  XenDesktops	
  and	
  XenApp	
  Servers	
  and	
  the	
  Mobile	
  Receivers.	
  	
  	
  
	
  
	
  
9	
  
With	
  all	
  the	
  combina4ons	
  of	
  products	
  or	
  network	
  devices	
  between	
  your	
  Mobile	
  
Receivers	
  and	
  your	
  cri4cal	
  business	
  applica4ons	
  and	
  desktops,	
  First,	
  understand	
  the	
  
infrastructure	
  design	
  to	
  help	
  narrow	
  down	
  the	
  problem.	
  These	
  are	
  the	
  major	
  
components	
  considered	
  in	
  this	
  presenta4on.	
  The	
  Mobile	
  Receivers:	
  iOS	
  and	
  Android,	
  
the	
  Network	
  and	
  Web	
  components:	
  Netscaler,	
  Storefront	
  and	
  Web	
  Interface,	
  and	
  your	
  
business	
  resources	
  like	
  XenApp	
  published	
  applica4ons	
  and	
  XenDesktop	
  machines.	
  
	
  
See	
  the	
  big	
  picture	
  and	
  ISOLATE	
  the	
  issue	
  by	
  determining	
  which	
  connec4on	
  scenarios	
  
the	
  problem	
  does	
  and	
  does	
  not	
  occur.	
  Next,	
  SEPARATE	
  the	
  network	
  layers	
  from	
  the	
  
applica4ons	
  layer	
  by	
  checking	
  out	
  the	
  network	
  traffic.	
  Then,	
  GATHER	
  and	
  INVESTIGATE	
  
the	
  key	
  diagnos4c	
  data	
  from	
  the	
  applica4ons	
  layers.	
  	
  Here	
  is	
  how	
  to	
  get	
  the	
  most	
  useful	
  
data	
  from	
  the	
  XenDesktops	
  and	
  XenApp	
  Servers	
  and	
  the	
  Mobile	
  Receivers.	
  	
  	
  
	
  
	
  
10	
  
The	
  Agenda:	
  Start	
  with	
  common	
  Network	
  and	
  ICA	
  Connec4on	
  troubleshoo4ng	
  steps.	
  
This	
  sec4on	
  can	
  be	
  applied	
  to	
  connec4on	
  issues	
  from	
  any	
  Citrix	
  Receiver.	
  Look	
  at	
  
Network	
  Traces,	
  useful	
  Event	
  Logs	
  and	
  CDF	
  Tracing.	
  In	
  the	
  next	
  sec4on,	
  gert	
  into	
  all	
  
new	
  Advanced	
  Logs	
  in	
  the	
  Receiver	
  for	
  iOS.	
  Show	
  how	
  to	
  enable,	
  collect	
  and	
  debug	
  
these	
  logs.	
  	
  Then	
  the	
  same	
  for	
  LogCat	
  logging	
  in	
  the	
  Receiver	
  for	
  Android.	
  Cover	
  some	
  
supportability	
  concerns	
  for	
  these	
  Receivers.	
  Within	
  each	
  of	
  these	
  three	
  sec4ons,	
  cover	
  
some	
  Case	
  Studies.	
  	
  Wrap	
  it	
  up	
  and	
  provide	
  some	
  references.	
  
11	
  
12
Get	
  started	
  with	
  Network	
  and	
  ICA	
  Connec4on	
  Troubleshoo4ng	
  
	
  
13
It	
  is	
  a	
  common	
  prac4ce	
  in	
  iden4fying	
  an	
  issue	
  is	
  to	
  ISOLATE	
  the	
  problem	
  to	
  a	
  specific	
  
scenario.	
  	
  Does	
  the	
  issue	
  occur	
  for	
  XenApp	
  and	
  XenDesktop	
  connec4ons?	
  	
  
	
  
14
Is	
  there	
  a	
  difference	
  if	
  the	
  user	
  connects	
  from	
  StoreFront,	
  Web	
  Interface,	
  or	
  a	
  Services	
  
Site?	
  	
  
15
Is	
  the	
  issue	
  occurring	
  for	
  a	
  specific	
  user	
  base?	
  Or	
  certain	
  devices	
  only?	
  How	
  oeen	
  does	
  
the	
  issue	
  occur?	
  Every	
  4me?	
  1	
  out	
  of	
  10	
  4mes?	
  Or	
  the	
  second	
  4me	
  only?	
  	
  
16
It	
  is	
  very	
  important	
  to	
  get	
  clear,	
  sequen4al	
  steps	
  that	
  a	
  user	
  takes	
  to	
  reproduce	
  the	
  
problem	
  and	
  include	
  approximate	
  4mes	
  while	
  collec4ng	
  data.	
  For	
  example,	
  here	
  we	
  
started	
  the	
  tracing	
  about	
  6:09	
  on	
  April	
  2nd,	
  the	
  user	
  logged	
  on	
  to	
  Web	
  Interface	
  from	
  
the	
  Browser	
  at	
  about	
  6:10	
  and	
  launched	
  a	
  XenApp	
  Desktop	
  at	
  6:11.	
  Include	
  the	
  
Expected	
  Behavior	
  as	
  well	
  as	
  the	
  Unexpected	
  Behavior	
  which	
  is	
  the	
  problem	
  you	
  are	
  
experiencing.	
  	
  	
  
	
  
17
If	
  the	
  infrastructure	
  is	
  too	
  complex	
  or	
  requires	
  a	
  proprietary	
  soeware	
  backend,	
  may	
  
rely	
  on	
  an	
  External	
  Reproduc4on,	
  we	
  may	
  ask	
  for	
  need	
  test	
  user	
  access	
  to	
  your	
  
environment.	
  	
  This	
  would	
  give	
  our	
  engineers	
  an	
  opportunity	
  to	
  test,	
  create	
  and	
  
recreate	
  private	
  Receiver	
  builds	
  on	
  the	
  spot	
  to	
  find	
  the	
  solu4on	
  the	
  fastest.	
  We	
  would	
  
ask	
  for	
  the	
  StoreFront	
  or	
  Account	
  configura4on,	
  usually	
  a	
  URL	
  and	
  a	
  Test	
  user	
  account.	
  	
  
Of	
  course,	
  one	
  without	
  a	
  Security	
  Token	
  would	
  be	
  ideal	
  but	
  if	
  it	
  is	
  required,	
  we	
  will	
  s4ll	
  
work	
  with	
  you.	
  	
  
	
  
18
For	
  client	
  side	
  issues,	
  compare	
  with	
  other	
  Receivers.	
  	
  Did	
  the	
  issue	
  occur	
  with	
  a	
  
previous	
  Receiver	
  version?	
  This	
  tells	
  us	
  that	
  is	
  may	
  be	
  a	
  Regression.	
  	
  Or	
  if	
  available,	
  
does	
  the	
  issue	
  occur	
  in	
  the	
  Beta	
  Version	
  of	
  the	
  Receiver?	
  Here	
  is	
  the	
  Beta	
  for	
  Android	
  
and	
  iOS	
  has	
  an	
  Early	
  Adopter	
  Program	
  that	
  you	
  subscribe	
  to	
  by	
  contac4ng	
  Citrix.	
  	
  A	
  
Beta	
  version	
  will	
  help	
  determine	
  if	
  we	
  have	
  already	
  resolved	
  the	
  issue.	
  Determine	
  if	
  the	
  
issue	
  occurs	
  when	
  launching	
  the	
  connec4on	
  from	
  the	
  Device’s	
  Browser	
  or	
  within	
  the	
  
configured	
  Receiver.	
  	
  Also	
  the	
  iOS	
  and	
  Android	
  Receivers	
  have	
  a	
  rela4vely	
  common	
  
feature	
  set,	
  so	
  it	
  is	
  good	
  to	
  know	
  if	
  it	
  happens	
  with	
  both	
  of	
  these	
  plagorms.	
  	
  Finally,	
  the	
  
real	
  litmus	
  test	
  for	
  Receiver	
  issues	
  is	
  does	
  it	
  occur	
  with	
  the	
  latest	
  Receiver	
  for	
  Window?	
  
This	
  could	
  indicate	
  the	
  problem	
  is	
  on	
  the	
  server.	
  	
  
	
  
19
For	
  client	
  side	
  issues,	
  compare	
  with	
  other	
  Receivers.	
  	
  Did	
  the	
  issue	
  occur	
  with	
  a	
  
previous	
  Receiver	
  version?	
  This	
  tells	
  us	
  that	
  is	
  may	
  be	
  a	
  Regression.	
  	
  Or	
  if	
  available,	
  
does	
  the	
  issue	
  occur	
  in	
  the	
  Beta	
  Version	
  of	
  the	
  Receiver?	
  Here	
  is	
  the	
  Beta	
  for	
  Android	
  
and	
  iOS	
  has	
  an	
  Early	
  Adopter	
  Program	
  that	
  you	
  subscribe	
  to	
  by	
  contac4ng	
  Citrix.	
  	
  A	
  
Beta	
  version	
  will	
  help	
  determine	
  if	
  we	
  have	
  already	
  resolved	
  the	
  issue.	
  Determine	
  if	
  the	
  
issue	
  occurs	
  when	
  launching	
  the	
  connec4on	
  from	
  the	
  Device’s	
  Browser	
  or	
  within	
  the	
  
configured	
  Receiver.	
  	
  Also	
  the	
  iOS	
  and	
  Android	
  Receivers	
  have	
  a	
  rela4vely	
  common	
  
feature	
  set,	
  so	
  it	
  is	
  good	
  to	
  know	
  if	
  it	
  happens	
  with	
  both	
  of	
  these	
  plagorms.	
  	
  Finally,	
  the	
  
real	
  litmus	
  test	
  for	
  Receiver	
  issues	
  is	
  does	
  it	
  occur	
  with	
  the	
  latest	
  Receiver	
  for	
  Window?	
  
This	
  could	
  indicate	
  the	
  problem	
  is	
  on	
  the	
  server.	
  	
  
	
  
20
For	
  client	
  side	
  issues,	
  compare	
  with	
  other	
  Receivers.	
  	
  Did	
  the	
  issue	
  occur	
  with	
  a	
  
previous	
  Receiver	
  version?	
  This	
  tells	
  us	
  that	
  is	
  may	
  be	
  a	
  Regression.	
  	
  Or	
  if	
  available,	
  
does	
  the	
  issue	
  occur	
  in	
  the	
  Beta	
  Version	
  of	
  the	
  Receiver?	
  Here	
  is	
  the	
  Beta	
  for	
  Android	
  
and	
  iOS	
  has	
  an	
  Early	
  Adopter	
  Program	
  that	
  you	
  subscribe	
  to	
  by	
  contac4ng	
  Citrix.	
  	
  A	
  
Beta	
  version	
  will	
  help	
  determine	
  if	
  we	
  have	
  already	
  resolved	
  the	
  issue.	
  Determine	
  if	
  the	
  
issue	
  occurs	
  when	
  launching	
  the	
  connec4on	
  from	
  the	
  Device’s	
  Browser	
  or	
  within	
  the	
  
configured	
  Receiver.	
  	
  Also	
  the	
  iOS	
  and	
  Android	
  Receivers	
  have	
  a	
  rela4vely	
  common	
  
feature	
  set,	
  so	
  it	
  is	
  good	
  to	
  know	
  if	
  it	
  happens	
  with	
  both	
  of	
  these	
  plagorms.	
  	
  Finally,	
  the	
  
real	
  litmus	
  test	
  for	
  Receiver	
  issues	
  is	
  does	
  it	
  occur	
  with	
  the	
  latest	
  Receiver	
  for	
  Window?	
  
This	
  could	
  indicate	
  the	
  problem	
  is	
  on	
  the	
  server.	
  	
  
	
  
21
Next,	
  check	
  out	
  the	
  Network	
  connec4on,	
  is	
  there	
  an	
  Access	
  Gateway	
  in	
  the	
  mix	
  and	
  is	
  it	
  
in	
  ICA	
  Proxy	
  mode	
  or	
  Full	
  VPN	
  mode?	
  	
  Or	
  using	
  a	
  third	
  party	
  VPN?	
  	
  Does	
  the	
  issue	
  occur	
  
for	
  Internal	
  users	
  or	
  External	
  users	
  or	
  both?	
  	
  For	
  the	
  Mobile	
  plagorms	
  does	
  the	
  issue	
  
occurs	
  from	
  both	
  the	
  4G	
  network	
  and	
  from	
  a	
  Wi-­‐fi	
  connec4on?	
  	
  Since	
  Authen4ca4on	
  is	
  
oeen	
  done	
  on	
  the	
  network	
  devices,	
  is	
  single	
  or	
  dual	
  authen4ca4on?	
  	
  Cer4ficates	
  tends	
  
to	
  be	
  a	
  common	
  set	
  back	
  with	
  the	
  Receivers.	
  Have	
  a	
  public	
  or	
  private	
  cer4ficate?	
  Is	
  the	
  
private	
  cer4ficate	
  on	
  the	
  end	
  device?	
  	
  Is	
  the	
  intermediate	
  cer4ficate	
  on	
  the	
  Gateway	
  
device?	
  Also,	
  ensure	
  using	
  a	
  supported	
  cer4ficate	
  or	
  authen4ca4on	
  method.	
  	
  	
  
	
  
22
Preparing	
  for	
  Network	
  traces,	
  note	
  the	
  IP	
  Addresses	
  of	
  all	
  the	
  network	
  devices	
  used	
  for	
  
the	
  connec4on.	
  	
  Look	
  for	
  any	
  unique	
  or	
  custom	
  configura4ons.	
  	
  Check	
  for	
  logging	
  in	
  
any	
  Third	
  Party	
  products	
  used	
  for	
  the	
  connec4on.	
  	
  And	
  iden4fy	
  the	
  closest	
  working	
  
scenario.	
  Then,	
  if	
  suspect	
  that	
  there	
  may	
  be	
  something	
  wrong	
  at	
  the	
  Network	
  level,	
  	
  
Collect	
  working	
  and	
  non-­‐working	
  Network	
  Traces.	
  	
  	
  
	
  
23
Specific	
  to	
  the	
  Citrix	
  ICA	
  Connec4on,	
  ICA	
  is	
  Citrix’s	
  primary	
  TCP	
  Protocol	
  and	
  it	
  uses	
  port	
  
1494.	
  Session	
  Reliability	
  uses	
  CGP	
  over	
  2598,	
  which	
  is	
  basically	
  a	
  reliability	
  buffer	
  
around	
  ICA.	
  It	
  is	
  good	
  to	
  determine	
  if	
  your	
  issue	
  occurs	
  during	
  enumera4on	
  or	
  the	
  
connec4on	
  aiempt.	
  Authen4ca4on	
  issues	
  may	
  occur	
  during	
  Enumera4on	
  	
  The	
  
connec4on	
  issues	
  occur	
  during	
  the	
  Session	
  launch.	
  With	
  the	
  Mobile	
  Receivers,	
  the	
  
enumera4on	
  occurs	
  during	
  the	
  ini4al	
  authen4ca4on.	
  	
  With	
  Web	
  Interface	
  enumera4on	
  
occurs	
  each	
  4me.	
  	
  and	
  the	
  App	
  can	
  be	
  launch	
  from	
  the	
  Desktop	
  browser	
  or	
  from	
  the	
  
Receiver.	
  	
  
	
  
Network	
  Traces	
  Analysis-­‐	
  Here	
  are	
  some	
  quick	
  analysis	
  4ps	
  to	
  find	
  the	
  ICA	
  traffic	
  in	
  a	
  
Network	
  Trace.	
  Wireshark	
  and	
  several	
  other	
  network	
  tools	
  have	
  the	
  same	
  type	
  of	
  
features.	
  	
  First,	
  filter	
  the	
  trace	
  to	
  the	
  most	
  useful	
  data.	
  	
  Iden4fy	
  the	
  Citrix	
  connec4ons	
  
by	
  filtering	
  on	
  ports	
  1494	
  and	
  2598.	
  	
  If	
  you	
  have	
  the	
  IP	
  informa4on	
  of	
  the	
  client	
  and	
  
server,	
  filter	
  on	
  the	
  IP	
  addresses	
  to	
  view	
  the	
  en4re	
  conversa4on.	
  	
  	
  
	
  
24	
  
Network	
  Traces	
  Analysis-­‐	
  Here	
  are	
  some	
  quick	
  analysis	
  4ps	
  to	
  find	
  the	
  ICA	
  traffic	
  in	
  a	
  
Network	
  Trace.	
  Wireshark	
  and	
  several	
  other	
  network	
  tools	
  have	
  the	
  same	
  type	
  of	
  
features.	
  	
  First,	
  filter	
  the	
  trace	
  to	
  the	
  most	
  useful	
  data.	
  	
  Iden4fy	
  the	
  Citrix	
  connec4ons	
  
by	
  filtering	
  on	
  ports	
  1494	
  and	
  2598.	
  	
  If	
  you	
  have	
  the	
  IP	
  informa4on	
  of	
  the	
  client	
  and	
  
server,	
  filter	
  on	
  the	
  IP	
  addresses	
  to	
  view	
  the	
  en4re	
  conversa4on.	
  	
  	
  
	
  
25	
  
A	
  nice	
  feature	
  in	
  Wireshark	
  from	
  readability	
  is	
  to	
  add	
  a	
  common	
  name	
  to	
  the	
  IP	
  
Addresses	
  or	
  	
  allow	
  the	
  automa4c	
  Name	
  Resolu4on	
  if	
  on	
  the	
  internal	
  network.	
  	
  For	
  
4ming	
  or	
  performance	
  issues,	
  it	
  helps	
  to	
  set	
  the	
  Time	
  Format	
  	
  to	
  something	
  more	
  
readable.	
  	
  
	
  
26	
  
Once	
  formaied	
  and	
  filtered	
  the	
  output,	
  find	
  the	
  beginning	
  of	
  the	
  ICA	
  conversa4on.	
  
This	
  can	
  be	
  done	
  by	
  looking	
  for	
  the	
  TCP	
  Handshake	
  –	
  SYN,	
  SYN/ACK,	
  and	
  ACK.	
  These	
  
three	
  messages	
  start	
  every	
  TCP/IP	
  network	
  connec4on.	
  Once	
  the	
  ICA	
  conversa4on	
  is	
  
found,	
  use	
  Follow	
  the	
  TCP	
  Stream	
  and	
  then	
  iden4fy	
  the	
  ICA	
  Sounder,	
  which	
  shows	
  up	
  
as	
  7F	
  7F	
  in	
  the	
  data.	
  	
  
	
  
27	
  
Once	
  formaied	
  and	
  filtered	
  the	
  output,	
  find	
  the	
  beginning	
  of	
  the	
  ICA	
  conversa4on.	
  
This	
  can	
  be	
  done	
  by	
  looking	
  for	
  the	
  TCP	
  Handshake	
  –	
  SYN,	
  SYN/ACK,	
  and	
  ACK.	
  These	
  
three	
  messages	
  start	
  every	
  TCP/IP	
  network	
  connec4on.	
  Once	
  the	
  ICA	
  conversa4on	
  is	
  
found,	
  use	
  Follow	
  the	
  TCP	
  Stream	
  and	
  then	
  iden4fy	
  the	
  ICA	
  Sounder,	
  which	
  shows	
  up	
  
as	
  7F	
  7F	
  in	
  the	
  data.	
  	
  
	
  
28	
  
Once	
  formaied	
  and	
  filtered	
  the	
  output,	
  find	
  the	
  beginning	
  of	
  the	
  ICA	
  conversa4on.	
  
This	
  can	
  be	
  done	
  by	
  looking	
  for	
  the	
  TCP	
  Handshake	
  –	
  SYN,	
  SYN/ACK,	
  and	
  ACK.	
  These	
  
three	
  messages	
  start	
  every	
  TCP/IP	
  network	
  connec4on.	
  Once	
  the	
  ICA	
  conversa4on	
  is	
  
found,	
  use	
  Follow	
  the	
  TCP	
  Stream	
  and	
  then	
  iden4fy	
  the	
  ICA	
  Sounder,	
  which	
  shows	
  up	
  
as	
  7F	
  7F	
  in	
  the	
  data.	
  	
  
	
  
29	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
30	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
31	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
32	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
33	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
34	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
35	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
36	
  
Aeer	
  finding	
  the	
  ICA	
  network	
  traffic,	
  look	
  for	
  the	
  most	
  common	
  problems.	
  One	
  method	
  
of	
  finding	
  the	
  problem	
  is	
  to	
  simply	
  use	
  the	
  4ming	
  of	
  the	
  failed	
  behavior.	
  Perhaps	
  the	
  
issue	
  occurs	
  5-­‐10	
  seconds	
  aeer	
  the	
  beginning	
  of	
  the	
  connec4on	
  aiempt	
  so	
  focus	
  on	
  
that	
  area	
  of	
  the	
  trace.	
  	
  Wireshark	
  has	
  an	
  excellent	
  Expert	
  Info	
  feature,	
  located	
  in	
  the	
  
Analyze	
  Menu,	
  you	
  can	
  get	
  some	
  useful	
  data	
  from	
  the	
  Details	
  tab.	
  	
  Here	
  you	
  can	
  
iden4fy	
  Network	
  Satura4on,	
  see	
  these	
  TCP	
  Dup	
  ACK	
  messages	
  and	
  Retransmission	
  or	
  
Resets.	
  If	
  one	
  of	
  these	
  issues,	
  look	
  at	
  the	
  traffic	
  and	
  determine	
  which	
  side	
  of	
  the	
  
conversa4on	
  ini4ated	
  the	
  drops.	
  Look	
  at	
  the	
  trace	
  of	
  a	
  working	
  scenario	
  to	
  iden4fy	
  
differences.	
  Use	
  at	
  these	
  clues	
  from	
  the	
  trace	
  analysis	
  to	
  determine	
  if	
  any	
  par4cular	
  
node	
  within	
  the	
  network	
  connec4on	
  is	
  causing	
  a	
  problem	
  and	
  then	
  try	
  to	
  confirm	
  by	
  
elimina4ng	
  or	
  avoiding	
  that	
  component.	
  	
  
	
  
37	
  
There	
  are	
  a	
  couple	
  of	
  ways	
  to	
  get	
  a	
  Network	
  trace	
  from	
  a	
  Netscaler	
  device.	
  The	
  
command	
  line	
  way	
  with	
  secure	
  shell	
  tools	
  like	
  PuTTY	
  and	
  secure	
  copy	
  tools	
  u4lizing	
  the	
  
nstrace	
  command.	
  	
  Or	
  a	
  trace	
  can	
  be	
  gathered	
  from	
  the	
  Netscaler	
  web	
  console	
  under	
  
System	
  Diagnos4cs,	
  select	
  Start	
  new	
  trace.	
  Dealing	
  with	
  Secure	
  traffic,	
  to	
  decrypt	
  an	
  
SSL	
  Trace	
  obtain	
  the	
  Private	
  Key.	
  	
  See	
  CTX116557	
  for	
  further	
  details.	
  
	
  
38	
  
There	
  are	
  a	
  couple	
  of	
  ways	
  to	
  get	
  a	
  Network	
  trace	
  from	
  a	
  Netscaler	
  device.	
  The	
  
command	
  line	
  way	
  with	
  secure	
  shell	
  tools	
  like	
  PuTTY	
  and	
  secure	
  copy	
  tools	
  u4lizing	
  the	
  
nstrace	
  command.	
  	
  Or	
  a	
  trace	
  can	
  be	
  gathered	
  from	
  the	
  Netscaler	
  web	
  console	
  under	
  
System	
  Diagnos4cs,	
  select	
  Start	
  new	
  trace.	
  Dealing	
  with	
  Secure	
  traffic,	
  to	
  decrypt	
  an	
  
SSL	
  Trace	
  obtain	
  the	
  Private	
  Key.	
  	
  See	
  CTX116557	
  for	
  further	
  details.	
  
	
  
39	
  
There	
  are	
  a	
  couple	
  of	
  ways	
  to	
  get	
  a	
  Network	
  trace	
  from	
  a	
  Netscaler	
  device.	
  The	
  
command	
  line	
  way	
  with	
  secure	
  shell	
  tools	
  like	
  PuTTY	
  and	
  secure	
  copy	
  tools	
  u4lizing	
  the	
  
nstrace	
  command.	
  	
  Or	
  a	
  trace	
  can	
  be	
  gathered	
  from	
  the	
  Netscaler	
  web	
  console	
  under	
  
System	
  Diagnos4cs,	
  select	
  Start	
  new	
  trace.	
  Dealing	
  with	
  Secure	
  traffic,	
  to	
  decrypt	
  an	
  
SSL	
  Trace	
  obtain	
  the	
  Private	
  Key.	
  	
  See	
  CTX116557	
  for	
  further	
  details.	
  
	
  
40	
  
There	
  are	
  a	
  couple	
  of	
  ways	
  to	
  get	
  a	
  Network	
  trace	
  from	
  a	
  Netscaler	
  device.	
  The	
  
command	
  line	
  way	
  with	
  secure	
  shell	
  tools	
  like	
  PuTTY	
  and	
  secure	
  copy	
  tools	
  u4lizing	
  the	
  
nstrace	
  command.	
  	
  Or	
  a	
  trace	
  can	
  be	
  gathered	
  from	
  the	
  Netscaler	
  web	
  console	
  under	
  
System	
  Diagnos4cs,	
  select	
  Start	
  new	
  trace.	
  Dealing	
  with	
  Secure	
  traffic,	
  to	
  decrypt	
  an	
  
SSL	
  Trace	
  obtain	
  the	
  Private	
  Key.	
  	
  See	
  CTX116557	
  for	
  further	
  details.	
  
	
  
41	
  
42
Some	
  other	
  data	
  to	
  collect	
  for	
  ICA	
  Connec4on	
  Issues.	
  First	
  check	
  the	
  System	
  and	
  
Applica4on	
  Event	
  Logs	
  for	
  your	
  XenApp	
  Server	
  or	
  XenDesktop	
  host.	
  Could	
  discover	
  
Licensing	
  issues	
  or	
  Authen4ca4on	
  issues	
  indicated	
  there.	
  	
  Check	
  the	
  Event	
  Logs	
  of	
  the	
  
Authen4ca4ng	
  Server,	
  whether	
  it	
  is	
  the	
  Web	
  Interface	
  Server	
  or	
  the	
  XML	
  Broker.	
  	
  For	
  
4cke4ng	
  issues,	
  there	
  are	
  STA	
  Logs	
  that	
  can	
  be	
  enabled.	
  	
  Enable	
  Web	
  Interface	
  tracing	
  
in	
  the	
  web.config	
  file	
  	
  There	
  are	
  several	
  tracing	
  categories	
  that	
  you	
  can	
  enable	
  for	
  Web	
  
Interface	
  Issues.	
  	
  And	
  for	
  Web	
  Site	
  issues	
  examine	
  the	
  IIS	
  Logs.	
  I	
  have	
  referenced	
  all	
  the	
  
Citrix	
  KB	
  Ar4cles	
  that	
  you	
  need	
  for	
  these	
  steps	
  in	
  this	
  slide	
  deck.	
  	
  
	
  
Receiver	
  for	
  iOS	
  Troubleshoo4ng	
  
hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐
troubleshoo4ng.html	
  
Enable	
  STA	
  Logging	
  
hip://support.citrix.com/ar4cle/CTX120589	
  
Web	
  Interface	
  tracing	
  	
  
hip://support.citrix.com/ar4cle/CTX122427	
  
	
  
43
Some	
  other	
  data	
  to	
  collect	
  for	
  ICA	
  Connec4on	
  Issues.	
  First	
  check	
  the	
  System	
  and	
  
Applica4on	
  Event	
  Logs	
  for	
  your	
  XenApp	
  Server	
  or	
  XenDesktop	
  host.	
  Could	
  discover	
  
Licensing	
  issues	
  or	
  Authen4ca4on	
  issues	
  indicated	
  there.	
  	
  Check	
  the	
  Event	
  Logs	
  of	
  the	
  
Authen4ca4ng	
  Server,	
  whether	
  it	
  is	
  the	
  Web	
  Interface	
  Server	
  or	
  the	
  XML	
  Broker.	
  	
  For	
  
4cke4ng	
  issues,	
  there	
  are	
  STA	
  Logs	
  that	
  can	
  be	
  enabled.	
  	
  Enable	
  Web	
  Interface	
  tracing	
  
in	
  the	
  web.config	
  file	
  	
  There	
  are	
  several	
  tracing	
  categories	
  that	
  you	
  can	
  enable	
  for	
  Web	
  
Interface	
  Issues.	
  	
  And	
  for	
  Web	
  Site	
  issues	
  examine	
  the	
  IIS	
  Logs.	
  I	
  have	
  referenced	
  all	
  the	
  
Citrix	
  KB	
  Ar4cles	
  that	
  you	
  need	
  for	
  these	
  steps	
  in	
  this	
  slide	
  deck.	
  	
  
	
  
Receiver	
  for	
  iOS	
  Troubleshoo4ng	
  
hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐
troubleshoo4ng.html	
  
Enable	
  STA	
  Logging	
  
hip://support.citrix.com/ar4cle/CTX120589	
  
Web	
  Interface	
  tracing	
  	
  
hip://support.citrix.com/ar4cle/CTX122427	
  
	
  
44
Some	
  other	
  data	
  to	
  collect	
  for	
  ICA	
  Connec4on	
  Issues.	
  First	
  check	
  the	
  System	
  and	
  
Applica4on	
  Event	
  Logs	
  for	
  your	
  XenApp	
  Server	
  or	
  XenDesktop	
  host.	
  Could	
  discover	
  
Licensing	
  issues	
  or	
  Authen4ca4on	
  issues	
  indicated	
  there.	
  	
  Check	
  the	
  Event	
  Logs	
  of	
  the	
  
Authen4ca4ng	
  Server,	
  whether	
  it	
  is	
  the	
  Web	
  Interface	
  Server	
  or	
  the	
  XML	
  Broker.	
  	
  For	
  
4cke4ng	
  issues,	
  there	
  are	
  STA	
  Logs	
  that	
  can	
  be	
  enabled.	
  	
  Enable	
  Web	
  Interface	
  tracing	
  
in	
  the	
  web.config	
  file	
  	
  There	
  are	
  several	
  tracing	
  categories	
  that	
  you	
  can	
  enable	
  for	
  Web	
  
Interface	
  Issues.	
  	
  And	
  for	
  Web	
  Site	
  issues	
  examine	
  the	
  IIS	
  Logs.	
  I	
  have	
  referenced	
  all	
  the	
  
Citrix	
  KB	
  Ar4cles	
  that	
  you	
  need	
  for	
  these	
  steps	
  in	
  this	
  slide	
  deck.	
  	
  
	
  
Receiver	
  for	
  iOS	
  Troubleshoo4ng	
  
hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐
troubleshoo4ng.html	
  
Enable	
  STA	
  Logging	
  
hip://support.citrix.com/ar4cle/CTX120589	
  
Web	
  Interface	
  tracing	
  	
  
hip://support.citrix.com/ar4cle/CTX122427	
  
	
  
45
Citrix	
  Diagnos4c	
  Facility	
  (CDF)	
  is	
  Citrix’s	
  primary	
  data	
  capturing	
  method.	
  It	
  is	
  the	
  best	
  
way	
  to	
  trace	
  most	
  of	
  our	
  server	
  products.	
  It	
  does	
  require	
  parsing	
  with	
  symbols	
  and	
  we	
  
have	
  a	
  public	
  Citrix	
  Symbol	
  server	
  if	
  you	
  want	
  to	
  analyzing	
  a	
  CDF	
  Trace.	
  CDF	
  is	
  based	
  off	
  
Event	
  Tracing	
  for	
  Windows	
  with	
  Providers,	
  Controllers	
  and	
  Consumers.	
  This	
  just	
  means	
  
that	
  you	
  must	
  enable	
  the	
  Citrix	
  modules	
  to	
  trace	
  (providers)	
  and	
  then	
  collect	
  them	
  with	
  
a	
  u4lity	
  (controller	
  and	
  consumer).	
  	
  But	
  first,	
  we	
  must	
  determine	
  where	
  to	
  collect	
  the	
  
CDF	
  Trace.	
  	
  For	
  session	
  launching	
  issues,	
  collect	
  the	
  CDF	
  trace	
  from	
  the	
  server	
  hos4ng	
  
the	
  applica4on	
  or	
  the	
  XenDesktop	
  VDA.	
  	
  If	
  you	
  are	
  dealing	
  with	
  Applica4on	
  
enumera4on	
  or	
  Load-­‐balancing	
  issues,	
  trace	
  all	
  IMA/XML	
  modules	
  on	
  the	
  Zone	
  Data	
  
Collector	
  and	
  XML	
  Brokers.	
  	
  
	
  
46
There	
  are	
  a	
  couple	
  of	
  Citrix	
  u4li4es	
  that	
  can	
  be	
  used	
  to	
  gather	
  a	
  CDF	
  Trace	
  file	
  while	
  the	
  
issue	
  occurs,	
  	
  Scout	
  and	
  CDF	
  Control.	
  Both	
  of	
  these	
  u4li4es	
  will	
  provide	
  Tracing	
  
Categories	
  of	
  Citrix	
  modules	
  to	
  enable	
  specific	
  to	
  the	
  issue.	
  	
  For	
  issues	
  that	
  are	
  
intermiient	
  or	
  hard	
  to	
  reproduce,	
  leave	
  a	
  circular	
  CDF	
  trace	
  running,	
  un4l	
  the	
  issue	
  
occurs	
  and	
  then	
  collect	
  the	
  etl	
  file.	
  While	
  we	
  do	
  not	
  recommend	
  leaving	
  CDF	
  Traces	
  
running	
  under	
  normal	
  opera4ng	
  circumstances,	
  CDF	
  Traces	
  can	
  be	
  taken	
  with	
  a	
  
minimal	
  performance	
  impact	
  on	
  the	
  host.	
  	
  Submit	
  the	
  .etl	
  file	
  to	
  Citrix	
  Technical	
  
Support	
  for	
  a	
  detailed	
  analysis.	
  	
  
	
  
A	
  Demo	
  of	
  the	
  CDF	
  Control	
  u4lity	
  at	
  work	
  on	
  a	
  Citrix	
  XenDesktop	
  VDA	
  and	
  on	
  a	
  Citrix	
  
XenApp	
  Server.	
  	
  
<PLAY>	
  To	
  use	
  CDF	
  Control	
  for	
  gathering	
  a	
  CDF	
  Trace,	
  download	
  the	
  u4lity	
  on	
  the	
  VDA	
  
from	
  our	
  KB	
  at	
  CTX111961.	
  This	
  will	
  download	
  a	
  compressed	
  zip	
  file	
  of	
  the	
  execu4bles	
  
for	
  32-­‐bit	
  and	
  64-­‐bit.	
  Next	
  simply	
  drill	
  down	
  and	
  run	
  the	
  executable.	
  There	
  is	
  no	
  install	
  
process,	
  which	
  makes	
  it	
  easy	
  to	
  move	
  this	
  u4lity	
  around.	
  Here	
  are	
  the	
  Op4ons	
  for	
  the	
  
ways	
  to	
  gather	
  the	
  trace	
  file,	
  like	
  that	
  circular	
  log	
  I	
  men4oned	
  earlier.	
  Here	
  are	
  the	
  
Trace	
  Categories,	
  which	
  allows	
  us	
  to	
  only	
  trace	
  the	
  Citrix	
  modules	
  (providers)	
  specific	
  to	
  
the	
  issue.	
  	
  If	
  your	
  issue	
  clearly	
  falls	
  into	
  one	
  of	
  these	
  categories	
  it	
  could	
  save	
  4me	
  but	
  if	
  
you	
  are	
  in	
  doubt	
  select	
  All	
  Modules.	
  You	
  can	
  also	
  Clear	
  All	
  Selected.	
  And	
  you	
  can	
  select	
  
mul4ple	
  categories	
  and	
  it	
  will	
  choose	
  both	
  sets	
  of	
  modules.	
  When	
  you	
  are	
  ready	
  to	
  
reproduce	
  the	
  issue,	
  select	
  Start	
  Tracing.	
  If	
  you	
  are	
  tracing	
  an	
  event	
  that	
  occurs	
  during	
  
the	
  logon	
  of	
  a	
  disconnected	
  session,	
  simply	
  leave	
  this	
  trace	
  running,	
  disconnect	
  the	
  
session	
  and	
  reconnect	
  to	
  the	
  session.	
  Stop	
  the	
  trace	
  once	
  the	
  logon	
  process	
  is	
  
completed.	
  By	
  default,	
  the	
  etl	
  file	
  will	
  be	
  located	
  in	
  the	
  same	
  folder	
  as	
  the	
  CDF	
  Control	
  
executable.	
  Send	
  this	
  etl	
  file	
  into	
  Citrix	
  Technical	
  Support	
  for	
  analysis.	
  This	
  works	
  the	
  
same	
  from	
  the	
  XenApp	
  Server.	
  You	
  can	
  run	
  a	
  CDF	
  Trace	
  from	
  an	
  Administrators	
  session	
  
and	
  it	
  collect	
  all	
  the	
  session’s	
  data	
  and	
  it	
  will	
  grow	
  very	
  fast.	
  	
  	
  
47	
  
To	
  Summarize	
  some	
  of	
  the	
  Data	
  Collected	
  in	
  this	
  sec4on,	
  For	
  Network	
  problems,	
  get	
  
the	
  Network	
  Traces	
  in	
  pcap	
  or	
  cap	
  file	
  and	
  the	
  Network	
  IP	
  informa4on	
  	
  Make	
  sure	
  to	
  
note	
  the	
  IP	
  Addresses	
  of	
  all	
  the	
  important	
  devices,	
  like	
  the	
  XenApp	
  Server	
  and	
  Citrix	
  
Receiver.	
  	
  
	
  
48	
  
To	
  Summarize	
  some	
  of	
  the	
  Data	
  Collected	
  in	
  this	
  sec4on,	
  For	
  Network	
  problems,	
  get	
  
the	
  Network	
  Traces	
  in	
  pcap	
  or	
  cap	
  file	
  and	
  the	
  Network	
  IP	
  informa4on	
  	
  Make	
  sure	
  to	
  
note	
  the	
  IP	
  Addresses	
  of	
  all	
  the	
  important	
  devices,	
  like	
  the	
  XenApp	
  Server	
  and	
  Citrix	
  
Receiver.	
  	
  
	
  
49	
  
To	
  Summarize	
  some	
  of	
  the	
  Data	
  Collected	
  in	
  this	
  sec4on,	
  For	
  Network	
  problems,	
  get	
  
the	
  Network	
  Traces	
  in	
  pcap	
  or	
  cap	
  file	
  and	
  the	
  Network	
  IP	
  informa4on	
  	
  Make	
  sure	
  to	
  
note	
  the	
  IP	
  Addresses	
  of	
  all	
  the	
  important	
  devices,	
  like	
  the	
  XenApp	
  Server	
  and	
  Citrix	
  
Receiver.	
  	
  
	
  
50	
  
The	
  CDF	
  Trace	
  come	
  in	
  a	
  etl	
  file	
  along	
  with	
  the	
  repro	
  steps	
  during	
  that	
  collec4on.	
  	
  Here	
  
is	
  the	
  files	
  and	
  Good	
  reproduc4on	
  steps	
  with	
  4mes	
  added.	
  
51	
  
The	
  CDF	
  Trace	
  come	
  in	
  a	
  etl	
  file	
  along	
  with	
  the	
  repro	
  steps	
  during	
  that	
  collec4on.	
  	
  Here	
  
is	
  the	
  files	
  and	
  Good	
  reproduc4on	
  steps	
  with	
  4mes	
  added.	
  
52	
  
The	
  CDF	
  Trace	
  come	
  in	
  a	
  etl	
  file	
  along	
  with	
  the	
  repro	
  steps	
  during	
  that	
  collec4on.	
  	
  Here	
  
is	
  the	
  files	
  and	
  Good	
  reproduc4on	
  steps	
  with	
  4mes	
  added.	
  
53	
  
And	
  finally	
  include	
  the	
  other	
  important	
  logs	
  like	
  Applica4on	
  and	
  System	
  Event	
  Logs	
  of	
  
the	
  appropriate	
  servers.	
  	
  
54	
  
And	
  finally	
  include	
  the	
  other	
  important	
  logs	
  like	
  Applica4on	
  and	
  System	
  Event	
  Logs	
  of	
  
the	
  appropriate	
  servers.	
  	
  
55	
  
This	
  is	
  some	
  of	
  the	
  key	
  Diagnos4c	
  Data	
  from	
  the	
  Network	
  and	
  Server-­‐side	
  for	
  any	
  ICA	
  
Connec4on	
  issues	
  	
  
	
  
56	
  
First	
  Case	
  Study!	
  	
  	
  
	
  
57	
  
58
In	
  this	
  Case,	
  the	
  Long	
  Commmand	
  Line	
  Parameter	
  	
  which	
  allows	
  you	
  to	
  send	
  an	
  
argument,	
  like	
  an	
  hip	
  page	
  or	
  file	
  to	
  the	
  published	
  applica4on	
  was	
  failing	
  
intermiiently	
  from	
  the	
  iOS	
  Receiver.	
  	
  So	
  we	
  started	
  Troubleshoo4ng	
  by	
  isola4ng	
  the	
  
issue.	
  	
  It	
  turns	
  out	
  that	
  the	
  issue	
  occurred	
  for	
  all	
  non-­‐windows	
  Receivers	
  that	
  they	
  
tested	
  like	
  Android	
  and	
  Mac.	
  	
  Also	
  we	
  no4ced	
  that	
  it	
  worked	
  on	
  the	
  first	
  launch	
  but	
  
when	
  launching	
  addi4onal	
  sessions	
  which	
  we	
  determines	
  the	
  issue	
  only	
  occurs	
  when	
  
session	
  sharing.	
  	
  Also	
  we	
  determined	
  that	
  it	
  occurs	
  from	
  any	
  method	
  of	
  launching	
  the	
  
session,	
  Internal,	
  External,	
  Web	
  Interface	
  or	
  StoreFront.	
  	
  
59
It	
  was	
  preiy	
  clear	
  that	
  this	
  was	
  not	
  a	
  Network	
  issue,	
  so	
  we	
  went	
  right	
  to	
  the	
  CDF	
  
Traces.	
  	
  We	
  also	
  collected	
  client	
  side	
  logs	
  which	
  I	
  will	
  show	
  you	
  how	
  to	
  do	
  in	
  the	
  next	
  
sec4ons,	
  but	
  they	
  were	
  not	
  useful	
  in	
  this	
  case.	
  	
  We	
  gathered	
  a	
  CDF	
  Trace	
  with	
  both	
  a	
  
Successful	
  and	
  Failed	
  launch	
  and	
  found	
  the	
  Host	
  Launch	
  Request	
  marking	
  the	
  launching	
  
of	
  the	
  session.	
  	
  A	
  few	
  messages	
  later	
  in	
  the	
  successful	
  trace,	
  we	
  could	
  see	
  the	
  long	
  
command	
  parameter	
  being	
  sent,	
  which	
  was	
  a	
  URL	
  for	
  Internet	
  Explorer.	
  	
  	
  
60
In	
  the	
  bad	
  launch	
  of	
  the	
  trace,	
  we	
  were	
  able	
  to	
  locate	
  the	
  Host	
  Launch	
  Request	
  and	
  
then	
  no4ced	
  that	
  the	
  Long	
  Command	
  Parameters	
  was	
  NULL	
  therefore	
  not	
  gesng	
  sent	
  
into	
  the	
  session.	
  	
  
61
	
  With	
  this	
  data,	
  the	
  developer	
  found	
  a	
  defect	
  in	
  all	
  non-­‐windows	
  Receivers.	
  	
  We	
  fixed	
  
the	
  problem	
  in	
  each	
  of	
  these	
  plagorms	
  and	
  the	
  Long	
  Command	
  Line	
  parameter	
  now	
  
gets	
  properly	
  sent	
  into	
  the	
  session	
  during	
  every	
  launch.	
  	
  
Advanced	
  Logging	
  for	
  the	
  Citrix	
  Receiver	
  for	
  iOS	
  	
  
	
  
62	
  
Citrix	
  introduced	
  Advanced	
  Logs	
  to	
  the	
  Receiver	
  for	
  iOS	
  in	
  version	
  5.7.	
  This	
  is	
  a	
  first	
  
edi4on	
  of	
  this	
  tracing	
  so	
  there	
  are	
  improvements	
  to	
  come.	
  	
  Advanced	
  Logs	
  are	
  based	
  of	
  
AeTracing	
  or	
  Advanced	
  Extensible	
  Tracing.	
  	
  It	
  produces	
  an	
  interpreted	
  plain	
  text	
  log	
  file	
  
that	
  you	
  can	
  look	
  at	
  with	
  any	
  text	
  editor.	
  	
  Each	
  log	
  entry	
  includes	
  a	
  Time	
  and	
  Date	
  
stamp	
  and	
  	
  each	
  message	
  will	
  also	
  be	
  one	
  of	
  the	
  following	
  Types	
  –	
  INFO,	
  WARN,	
  
VERBOSE,	
  or	
  ERROR.	
  ERROR	
  messages	
  are	
  clearly	
  something	
  to	
  pay	
  aien4on	
  to.	
  You	
  
may	
  see	
  this	
  par4cular	
  applica4on	
  Significant	
  Time	
  Change	
  warning	
  whenever	
  there	
  is	
  
new	
  ac4vity	
  in	
  the	
  Receiver	
  aeer	
  some	
  4me.	
  So	
  this	
  message	
  appears	
  at	
  the	
  beginning	
  
of	
  any	
  logging	
  ac4vity.	
  	
  
	
  
63	
  
 Enabling	
  the	
  Advanced	
  Logs	
  is	
  done	
  from	
  the	
  Sesngs	
  of	
  the	
  Receiver.	
  	
  
64	
  
 To	
  access	
  the	
  Receiver	
  Sesngs,	
  click	
  on	
  the	
  gear	
  icon	
  in	
  the	
  top	
  right	
  corner.	
  	
  Next	
  
Click	
  on	
  the	
  Advanced	
  op4on	
  and	
  	
  enable	
  or	
  disable	
  the	
  Advanced	
  Logs	
  by	
  toggling	
  the	
  
ON/OFF	
  switch.	
  	
  Simply	
  as	
  that.	
  	
  
65	
  
 To	
  access	
  the	
  Receiver	
  Sesngs,	
  click	
  on	
  the	
  gear	
  icon	
  in	
  the	
  top	
  right	
  corner.	
  	
  Next	
  
Click	
  on	
  the	
  Advanced	
  op4on	
  and	
  	
  enable	
  or	
  disable	
  the	
  Advanced	
  Logs	
  by	
  toggling	
  the	
  
ON/OFF	
  switch.	
  	
  Simply	
  as	
  that.	
  	
  
66	
  
 To	
  access	
  the	
  Receiver	
  Sesngs,	
  click	
  on	
  the	
  gear	
  icon	
  in	
  the	
  top	
  right	
  corner.	
  	
  Next	
  
Click	
  on	
  the	
  Advanced	
  op4on	
  and	
  	
  enable	
  or	
  disable	
  the	
  Advanced	
  Logs	
  by	
  toggling	
  the	
  
ON/OFF	
  switch.	
  	
  Simply	
  as	
  that.	
  	
  
67	
  
Run	
  the	
  failing	
  condi4on	
  on	
  the	
  Receiver	
  for	
  iOS	
  while	
  the	
  Log	
  is	
  enabled,	
  and	
  then	
  
collect	
  the	
  logs.	
  The	
  Advanced	
  Logs	
  are	
  stored	
  in	
  the	
  Shared	
  Documents	
  sec4ons	
  of	
  the	
  
Citrix	
  Receiver	
  on	
  the	
  iOS	
  device.	
  There	
  are	
  two	
  ways	
  to	
  get	
  those	
  logs	
  from	
  the	
  
Receiver.	
  	
  From	
  the	
  Receiver	
  Sesngs,	
  you	
  can	
  send	
  an	
  email	
  that	
  includes	
  a	
  
compressed	
  archive	
  of	
  all	
  the	
  Advanced	
  Logs	
  on	
  the	
  device	
  as	
  well	
  as	
  some	
  version	
  
informa4on	
  about	
  your	
  device.	
  	
  
68	
  
From	
  the	
  Sesngs	
  icon	
  on	
  the	
  Receiver,	
  click	
  on	
  Send	
  Feedback	
  at	
  the	
  boiom	
  and	
  	
  then	
  
Request	
  Help	
  from	
  Support.	
  	
  
69	
  
Here	
  you	
  can	
  see	
  the	
  email	
  that	
  pops	
  up	
  with	
  your	
  device	
  informa4on	
  and	
  the	
  logs	
  
aiached	
  in	
  a	
  zip.	
  	
  
70	
  
Or	
  you	
  can	
  get	
  the	
  Advanced	
  Logs	
  from	
  the	
  Shared	
  Documents	
  sec4on	
  of	
  a	
  synced	
  
iTunes.	
  Here	
  is	
  a	
  very	
  brief	
  video	
  on	
  what	
  that	
  looks	
  like.	
  	
  	
  
<PLAY>	
  Once	
  the	
  device	
  is	
  synced	
  to	
  the	
  PC	
  or	
  Mac,	
  you	
  will	
  see	
  the	
  Receiver	
  in	
  the	
  File	
  
Sharing	
  sec4on	
  of	
  the	
  Apps	
  tab.	
  Highlight	
  the	
  Log	
  folder	
  and	
  Save	
  As.	
  Then	
  pull	
  up	
  a	
  
Finder	
  window	
  and	
  open	
  the	
  Logs	
  directory	
  and	
  there	
  you	
  will	
  see	
  a	
  series	
  of	
  Advanced	
  
Logs	
  files.	
  	
  
71	
  
Or	
  you	
  can	
  get	
  the	
  Advanced	
  Logs	
  from	
  the	
  Shared	
  Documents	
  sec4on	
  of	
  a	
  synced	
  
iTunes.	
  Here	
  is	
  a	
  very	
  brief	
  video	
  on	
  what	
  that	
  looks	
  like.	
  	
  	
  
<PLAY>	
  Once	
  the	
  device	
  is	
  synced	
  to	
  the	
  PC	
  or	
  Mac,	
  you	
  will	
  see	
  the	
  Receiver	
  in	
  the	
  File	
  
Sharing	
  sec4on	
  of	
  the	
  Apps	
  tab.	
  Highlight	
  the	
  Log	
  folder	
  and	
  Save	
  As.	
  Then	
  pull	
  up	
  a	
  
Finder	
  window	
  and	
  open	
  the	
  Logs	
  directory	
  and	
  there	
  you	
  will	
  see	
  a	
  series	
  of	
  Advanced	
  
Logs	
  files.	
  	
  
72	
  
Couple	
  of	
  items	
  to	
  note	
  regarding	
  Advanced	
  Logs.	
  The	
  Advanced	
  Logs	
  will	
  get	
  disabled	
  
aeer	
  you	
  use	
  the	
  Send	
  Feedback	
  feature.	
  So	
  you	
  must	
  re-­‐enable	
  them	
  to	
  collect	
  more.	
  
This	
  feature	
  will	
  send	
  all	
  the	
  logs	
  on	
  the	
  device	
  in	
  a	
  compressed	
  archive	
  	
  So	
  it	
  is	
  
important	
  to	
  know	
  approximately	
  when	
  the	
  issue	
  has	
  occurred	
  to	
  help	
  find	
  the	
  right	
  log	
  
file.	
  	
  There	
  are	
  a	
  couple	
  of	
  common	
  keywords	
  that	
  you	
  can	
  look	
  for	
  that	
  may	
  indicate	
  a	
  
problem.	
  ERROR	
  is	
  a	
  popular	
  one,	
  you	
  will	
  see	
  NOT	
  oeen	
  in	
  errors	
  and	
  FAIL	
  
occasionally.	
  	
  
	
  
73	
  
Make	
  sure	
  that	
  you	
  are	
  not	
  trying	
  to	
  use	
  an	
  unsupported	
  feature.	
  You	
  can	
  ALWAYS	
  look	
  
at	
  the	
  Citrix	
  Client	
  Feature	
  Matrix	
  located	
  here.	
  This	
  document	
  is	
  frequently	
  updated	
  
and	
  it	
  the	
  final	
  word	
  on	
  supportability.	
  	
  
74	
  
75	
  
76	
  
Advanced	
  Logs	
  Messages	
  
	
  
77	
  
The	
  user	
  in	
  this	
  case	
  discovered	
  the	
  Store	
  configura4on	
  by	
  entering	
  an	
  email	
  address.	
  	
  
This	
  prompted	
  a	
  ChangeStore	
  message	
  that	
  indicates	
  the	
  Store	
  configura4on	
  has	
  been	
  
saved	
  on	
  the	
  Receiver.	
  	
  
78	
  
Here	
  we	
  have	
  a	
  user	
  enumera4ng	
  applica4on	
  from	
  Web	
  Interface.	
  you	
  may	
  see	
  this	
  
Get	
  Mobile	
  App	
  Enum	
  for	
  Store	
  messages	
  duplicated	
  and	
  that	
  is	
  normal,	
  	
  Here	
  you	
  can	
  
see	
  some	
  of	
  the	
  metadata	
  contained	
  in	
  that	
  message	
  	
  
79	
  
Next	
  we	
  have	
  a	
  user	
  that	
  has	
  selected	
  a	
  Published	
  Desktop	
  icon	
  that	
  was	
  already	
  
enumerated	
  from	
  the	
  XenApp	
  Farm.	
  You	
  will	
  see	
  the	
  App	
  Clicked	
  message.	
  	
  
80	
  
This	
  is	
  how	
  the	
  ICA	
  File	
  appears	
  in	
  the	
  Advanced	
  Logs.	
  	
  You	
  will	
  see	
  a	
  “The	
  ICA”	
  
message	
  for	
  that.	
  	
  
81	
  
These	
  are	
  the	
  messages	
  that	
  you	
  may	
  see	
  when	
  the	
  Session	
  starts	
  to	
  launch,	
  the	
  Set	
  
Session	
  View	
  messages.	
  	
  
82	
  
You	
  can	
  find	
  the	
  Session	
  Width	
  in	
  the	
  Advanced	
  Logs	
  if	
  you	
  are	
  dealing	
  with	
  a	
  Display	
  
issue.	
  	
  	
  
83	
  
This	
  can	
  be	
  very	
  useful	
  because	
  oeen	
  connec4on	
  issues	
  occur	
  while	
  the	
  No4fica4ons	
  
are	
  running	
  by	
  and	
  the	
  user	
  can	
  tell	
  where	
  it	
  has	
  failed.	
  	
  You	
  will	
  see	
  the	
  series	
  of	
  
Launch	
  Status	
  Messages.	
  	
  
84	
  
Here	
  is	
  a	
  message	
  that	
  you	
  hope	
  to	
  see,	
  it	
  is	
  a	
  successful	
  session	
  loaded	
  message	
  	
  and	
  
yes	
  that	
  successful	
  typo	
  does	
  appear	
  in	
  the	
  message.	
  	
  
85	
  
This	
  update	
  video	
  out	
  message	
  appears	
  whenever	
  the	
  user	
  changes	
  the	
  view	
  away	
  
from	
  the	
  ICA	
  Session	
  into	
  the	
  Receiver	
  main	
  area	
  or	
  some	
  other	
  applica4on.	
  	
  
86	
  
And	
  finally,	
  this	
  a	
  the	
  session	
  close	
  down	
  messages	
  when	
  a	
  user	
  Disconnects	
  the	
  
session.	
  	
  
87	
  
Another	
  important	
  thing	
  to	
  know	
  is	
  how	
  to	
  get	
  an	
  Applica4on	
  dump	
  if	
  the	
  Receiver	
  
crashes.	
  iOS	
  uses	
  CrashReporter	
  to	
  collect	
  crash	
  dumps.	
  The	
  Crash	
  report	
  includes	
  the	
  
Stack	
  Trace	
  which	
  is	
  one	
  of	
  the	
  more	
  cri4cal	
  parts	
  of	
  the	
  dump.	
  The	
  crash	
  report	
  is	
  
located	
  in	
  the	
  following	
  loca4ons	
  from	
  an	
  iTunes	
  synced	
  PC,	
  Mac	
  or	
  Windows.	
  	
  
88	
  
To	
  Summarize	
  the	
  data	
  Collected	
  from	
  Receiver	
  for	
  iOS,	
  the	
  Advanced	
  Logs	
  come	
  in	
  a	
  
zip	
  of	
  text	
  files.	
  	
  Since	
  this	
  zip	
  includes	
  all	
  the	
  logs	
  files	
  on	
  the	
  device	
  ,	
  it	
  is	
  important	
  to	
  
get	
  the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred	
  in	
  thorough	
  Repro	
  Steps	
  	
  
89	
  
To	
  Summarize	
  the	
  data	
  Collected	
  from	
  Receiver	
  for	
  iOS,	
  the	
  Advanced	
  Logs	
  come	
  in	
  a	
  
zip	
  of	
  text	
  files.	
  	
  Since	
  this	
  zip	
  includes	
  all	
  the	
  logs	
  files	
  on	
  the	
  device	
  ,	
  it	
  is	
  important	
  to	
  
get	
  the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred	
  in	
  thorough	
  Repro	
  Steps	
  	
  
90	
  
To	
  Summarize	
  the	
  data	
  Collected	
  from	
  Receiver	
  for	
  iOS,	
  the	
  Advanced	
  Logs	
  come	
  in	
  a	
  
zip	
  of	
  text	
  files.	
  	
  Since	
  this	
  zip	
  includes	
  all	
  the	
  logs	
  files	
  on	
  the	
  device	
  ,	
  it	
  is	
  important	
  to	
  
get	
  the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred	
  in	
  thorough	
  Repro	
  Steps	
  	
  
91	
  
To	
  Summarize	
  the	
  data	
  Collected	
  from	
  Receiver	
  for	
  iOS,	
  the	
  Advanced	
  Logs	
  come	
  in	
  a	
  
zip	
  of	
  text	
  files.	
  	
  Since	
  this	
  zip	
  includes	
  all	
  the	
  logs	
  files	
  on	
  the	
  device	
  ,	
  it	
  is	
  important	
  to	
  
get	
  the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred	
  in	
  thorough	
  Repro	
  Steps	
  	
  
92	
  
If	
  a	
  crash	
  occurred	
  provide	
  the	
  .crash	
  and	
  .log	
  file.	
  	
  
93	
  
If	
  a	
  crash	
  occurred	
  provide	
  the	
  .crash	
  and	
  .log	
  file.	
  	
  
94	
  
This	
  is	
  the	
  key	
  Diagnos4c	
  Data	
  from	
  the	
  Receiver	
  for	
  iOS.	
  	
  
95	
  
Case	
  study	
  2,Problems	
  connec4ng	
  through	
  Citrix	
  Access	
  Gateway	
  	
  	
  
	
  
96	
  
97
In	
  this	
  Case,	
  iPad	
  users	
  were	
  able	
  to	
  enumerate	
  their	
  XenDesktops	
  but	
  unable	
  to	
  
connect	
  to	
  them	
  through	
  Access	
  Gateway	
  	
  Users	
  from	
  Receiver	
  for	
  Windows	
  were	
  able	
  
to	
  access	
  their	
  Desktops	
  through	
  AG	
  	
  The	
  issue	
  only	
  occurred	
  for	
  Access	
  Gateway	
  
connec4ons,	
  Internal	
  iPad	
  users	
  were	
  able	
  to	
  connect.	
  	
  On	
  the	
  Netscaler	
  they	
  were	
  
using	
  FIPS	
  and	
  the	
  SHA2	
  cer4ficate	
  was	
  on	
  the	
  iPad.	
  	
  
98
What	
  debug	
  data	
  can	
  we	
  collect	
  in	
  this	
  case?	
  	
  Looking	
  at	
  the	
  State	
  of	
  the	
  VDA	
  from	
  the	
  
Console,	
  there	
  was	
  no	
  indica4on	
  of	
  the	
  connec4on	
  aiempt	
  on	
  the	
  VDA.	
  Therefore	
  a	
  
CDF	
  Trace	
  from	
  the	
  VDA	
  would	
  not	
  be	
  useful.	
  	
  So	
  we	
  gathered	
  Advanced	
  Logs	
  from	
  the	
  
iPad	
  device.	
  	
  
99
In	
  the	
  Advanced	
  Logs	
  we	
  could	
  see	
  this	
  host	
  error	
  183	
  –	
  You	
  have	
  not	
  chosen	
  to	
  trust	
  
“Entrust	
  Cer4fica4on	
  Authority”	
  the	
  issuer	
  of	
  the	
  server’s	
  security	
  cer4ficate.	
  So	
  this	
  
tells	
  me	
  that	
  it	
  appears	
  that	
  the	
  cer4ficate	
  is	
  not	
  trusted	
  on	
  the	
  device.	
  We	
  checked	
  the	
  
device	
  and	
  no4ced	
  that	
  the	
  cer4ficate	
  was	
  trusted	
  on	
  the	
  device	
  	
  
100
So	
  next	
  we	
  checked	
  the	
  Citrix	
  Client	
  Feature	
  Matrix	
  	
  and	
  no4ced	
  that	
  FIPS	
  140/SHA2	
  	
  is	
  
not	
  supported	
  with	
  iOS.	
  FIPS/SHA2	
  was	
  recently	
  added	
  to	
  the	
  Windows	
  and	
  Mac	
  
Receivers	
  and	
  it	
  is	
  on	
  the	
  roadmap	
  for	
  support	
  in	
  the	
  Receiver	
  for	
  iOS	
  later	
  this	
  year.	
  	
  
Case	
  Study	
  3	
  Receiver	
  for	
  iOS	
  disconnect	
  issues	
  	
  
	
  
101	
  
102
In	
  this	
  case	
  the	
  iOS	
  Receiver	
  has	
  causing	
  problems	
  reconnec4ng	
  to	
  a	
  disconnected	
  
session	
  that	
  4med	
  out.	
  What	
  we	
  had	
  observed	
  was	
  if	
  you	
  let	
  the	
  session	
  4me	
  out	
  on	
  an	
  
iPad	
  and	
  then	
  aiempt	
  to	
  click	
  on	
  the	
  applica4ons	
  that	
  appears	
  successfully	
  
enumerated,	
  we	
  would	
  see	
  the	
  following	
  session	
  expired	
  message.	
  	
  the	
  problem	
  only	
  
occurred	
  on	
  iOS,	
  really	
  Android	
  was	
  the	
  only	
  comparable	
  scenario	
  in	
  this	
  case.	
  	
  And	
  it	
  
only	
  happened	
  with	
  Access	
  Gateway	
  Connec4ons.	
  	
  	
  
103
For	
  this	
  issue,	
  we	
  obtained	
  an	
  Advanced	
  Log	
  from	
  the	
  iPad	
  Receiver	
  and	
  	
  it	
  show	
  the	
  
App	
  no	
  longer	
  available	
  message.	
  	
  
104
We	
  discovered	
  a	
  problem	
  in	
  the	
  way	
  we	
  were	
  caching	
  the	
  users	
  creden4als	
  on	
  the	
  
Receiver.	
  	
  We	
  fixed	
  this	
  issue	
  in	
  version	
  5.7	
  of	
  the	
  iOS	
  Receiver	
  and	
  aeer	
  authen4ca4on	
  
4mes	
  out	
  the	
  user	
  returns	
  to	
  the	
  logon	
  screen	
  instead	
  of	
  gesng	
  an	
  error.	
  	
  
Receiver	
  for	
  Android	
  Logging.	
  	
  
	
  
105	
  
LogCat	
  is	
  Android’s	
  inherent	
  logging	
  system,	
  which	
  allows	
  for	
  collec4ng	
  and	
  viewing	
  of	
  
system	
  debug	
  output.	
  	
  LogCat	
  uses	
  the	
  Log	
  class.	
  	
  The	
  Receiver	
  for	
  Android	
  always	
  
outputs	
  debug	
  messages	
  to	
  LogCat	
  by	
  default.	
  The	
  output	
  is	
  a	
  plain	
  text	
  file	
  readable	
  
file.	
  and	
  it	
  does	
  contain	
  a	
  4me	
  stamp,	
  although	
  with	
  some	
  logging	
  u4li4es	
  you	
  must	
  
enable	
  4me	
  stamps.	
  	
  Some	
  problema4c	
  keywords	
  that	
  you	
  may	
  find	
  in	
  a	
  Logcat	
  log	
  are	
  
ERROR,	
  FAIL	
  and	
  FATAL	
  EXCEPTION	
  for	
  crashes,	
  which	
  we	
  will	
  talk	
  about	
  more	
  shortly.	
  	
  
106	
  
There	
  are	
  several	
  priority	
  tags	
  that	
  are	
  used	
  to	
  indicate	
  the	
  kind	
  of	
  message.	
  These	
  are	
  
the	
  tags	
  in	
  priority	
  order.	
  	
  
107	
  
There	
  are	
  two	
  ways	
  of	
  gathering	
  Logcat	
  logs	
  from	
  an	
  Android	
  device.	
  we	
  have	
  made	
  it	
  
very	
  simply	
  to	
  collect	
  and	
  send	
  just	
  the	
  Logcat	
  regarding	
  Citrix	
  by	
  Clicking	
  on	
  the	
  
Sesngs	
  dots	
  in	
  the	
  top	
  right	
  corner.	
  	
  The	
  second	
  way	
  is	
  a	
  bit	
  more	
  cumbersome	
  and	
  
will	
  also	
  include	
  Logcat	
  messages	
  for	
  all	
  products	
  running	
  on	
  the	
  Android	
  device	
  and	
  
that	
  is	
  with	
  a	
  third	
  party	
  u4lity.	
  	
  
108	
  
There	
  are	
  two	
  ways	
  of	
  gathering	
  Logcat	
  logs	
  from	
  an	
  Android	
  device.	
  we	
  have	
  made	
  it	
  
very	
  simply	
  to	
  collect	
  and	
  send	
  just	
  the	
  Logcat	
  regarding	
  Citrix	
  by	
  Clicking	
  on	
  the	
  
Sesngs	
  dots	
  in	
  the	
  top	
  right	
  corner.	
  	
  The	
  second	
  way	
  is	
  a	
  bit	
  more	
  cumbersome	
  and	
  
will	
  also	
  include	
  Logcat	
  messages	
  for	
  all	
  products	
  running	
  on	
  the	
  Android	
  device	
  and	
  
that	
  is	
  with	
  a	
  third	
  party	
  u4lity.	
  	
  
109	
  
Sending	
  LogCat	
  logs	
  from	
  the	
  Receiver	
  is	
  from	
  the	
  Sesngs	
  -­‐>	
  Send	
  Feedback	
  buion.	
  	
  
Click	
  on	
  Request	
  help	
  from	
  Support.	
  	
  
110	
  
Sending	
  LogCat	
  logs	
  from	
  the	
  Receiver	
  is	
  from	
  the	
  Sesngs	
  -­‐>	
  Send	
  Feedback	
  buion.	
  	
  
Click	
  on	
  Request	
  help	
  from	
  Support.	
  	
  
111	
  
That	
  will	
  popup	
  an	
  email	
  with	
  the	
  single	
  Logfile	
  included	
  as	
  an	
  aiachment	
  	
  
112	
  
This	
  Send	
  Feedback	
  feature	
  will	
  also	
  collect	
  informa4on	
  about	
  the	
  Android	
  device	
  that	
  
it	
  was	
  sent	
  from	
  	
  
113	
  
You	
  can	
  see	
  it	
  will	
  provide	
  versioning	
  informa4on	
  including	
  that	
  of	
  the	
  Citrix	
  Receiver	
  	
  
114	
  
The	
  second	
  way	
  to	
  gather	
  LogCat	
  logs	
  from	
  Android	
  is	
  with	
  a	
  third	
  party	
  u4lity	
  like	
  
aLogcat.	
  	
  
115	
  
You	
  can	
  use	
  aLogcat	
  for	
  collec4ng	
  LogCat	
  logs	
  from	
  an	
  Android	
  device.	
  	
  It	
  uses	
  Regular	
  
Expression	
  filtering	
  with	
  ANDs	
  and	
  ORs.	
  	
  A	
  filter	
  for	
  Citrix	
  Receiver	
  issues	
  is	
  simply	
  
com.citrix.	
  	
  and	
  you	
  can	
  also	
  send	
  the	
  logs	
  directly	
  from	
  aLogcat	
  via	
  email	
  or	
  ShareFile	
  
or	
  more.	
  	
  
116	
  
117	
  
Citrix	
  Receiver	
  in	
  an	
  LogCat	
  log.	
  	
  	
  
	
  
118	
  
Here	
  a	
  user	
  discovers	
  a	
  StoreFront	
  configua4on	
  via	
  email	
  so	
  you	
  see	
  the	
  Discovery	
  
document	
  URL.	
  	
  
119	
  
Next	
  a	
  user	
  successfully	
  logging	
  on	
  to	
  a	
  Services	
  Site.	
  You	
  will	
  see	
  a	
  Authen4ca4on	
  
successful	
  message.	
  	
  
120	
  
Next	
  these	
  onLoadResource	
  messages	
  is	
  what	
  you	
  will	
  see	
  in	
  the	
  LogCat	
  when	
  a	
  Web	
  
Interface	
  Site	
  is	
  loading	
  on	
  a	
  Receiver	
  for	
  Android	
  	
  
121	
  
Next	
  you	
  will	
  see	
  the	
  Download	
  ICA	
  File	
  and	
  Launch	
  Engine	
  Task	
  message	
  at	
  the	
  
beginning	
  of	
  the	
  ICA	
  session	
  launching	
  from	
  StoreFront	
  	
  
122	
  
Here	
  is	
  the	
  ICA	
  session	
  launch	
  from	
  a	
  Service	
  Site	
  and	
  you	
  will	
  see	
  the	
  common	
  
Download	
  ICA	
  File	
  and	
  Launch	
  Engine	
  Task	
  message	
  followed	
  by	
  the	
  URL	
  and	
  in	
  this	
  
case	
  you	
  can	
  see	
  it	
  is	
  a	
  PNAgent	
  or	
  Services	
  Site	
  URL	
  	
  	
  
123	
  
This	
  message	
  can	
  me	
  a	
  liile	
  misleading	
  but	
  this	
  Process	
  Citrix	
  Receiver	
  wfica	
  has	
  died	
  
message	
  does	
  appear	
  on	
  a	
  graceful	
  user	
  disconnect.	
  	
  	
  
124	
  
Finally,	
  	
  unlike	
  iOS	
  the	
  Stack	
  Trace	
  is	
  included	
  in	
  the	
  LogCat	
  if	
  the	
  Receiver	
  does	
  crash.	
  
We	
  are	
  also	
  working	
  on	
  improving	
  the	
  log	
  messaging	
  from	
  the	
  Android	
  Receiver	
  so	
  we	
  
will	
  see	
  more	
  relevant	
  messages	
  in	
  the	
  future.	
  	
  	
  
125	
  
Data	
  Collected	
  from	
  Receiver	
  for	
  Android,	
  the	
  LogCat	
  log.	
  	
  And	
  again	
  Repro	
  Steps	
  with	
  
the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred.	
  The	
  stack	
  trace	
  of	
  any	
  crashes	
  will	
  be	
  
included	
  in	
  that	
  log.	
  	
  
126	
  
Data	
  Collected	
  from	
  Receiver	
  for	
  Android,	
  the	
  LogCat	
  log.	
  	
  And	
  again	
  Repro	
  Steps	
  with	
  
the	
  4me	
  and	
  date	
  that	
  the	
  issue	
  occurred.	
  The	
  stack	
  trace	
  of	
  any	
  crashes	
  will	
  be	
  
included	
  in	
  that	
  log.	
  	
  
127	
  
The	
  last	
  Case	
  Study	
  –	
  Unknown	
  error	
  connec4ng	
  from	
  Android	
  through	
  an	
  Access	
  
Gateway	
  site.	
  	
  
	
  
128	
  
129
The	
  user	
  is	
  able	
  to	
  launch	
  a	
  session	
  successfully	
  the	
  first	
  4me,	
  but	
  the	
  second	
  aiempt	
  
failed	
  with	
  the	
  following	
  Access	
  Gateway	
  error	
  message.	
  	
  The	
  problem	
  only	
  occurred	
  
on	
  Android	
  Receiver	
  and	
  	
  only	
  aeer	
  the	
  first	
  successful	
  connec4on.	
  	
  
130
First	
  	
  we	
  verified	
  with	
  network	
  with	
  a	
  network	
  trace	
  and	
  nothing	
  out	
  of	
  the	
  ordinary	
  
appeared.	
  	
  Then	
  we	
  gathered	
  aLogcat	
  log	
  while	
  this	
  issue	
  occurred.	
  	
  and	
  no4ced	
  the	
  is	
  
Receiver	
  403	
  response	
  from	
  gateway	
  authen4ca4on	
  error	
  	
  
131
We	
  had	
  discovered	
  a	
  defect	
  in	
  the	
  handling	
  of	
  the	
  authen4ca4on	
  in	
  the	
  Receiver	
  for	
  
Android.	
  	
  This	
  issue	
  was	
  fixed	
  in	
  the	
  3.1.2	
  version	
  of	
  the	
  Receiver	
  and	
  the	
  user	
  no	
  
longer	
  experienced	
  the	
  issue	
  	
  	
  
Wrap	
  it	
  up!	
  	
  
132	
  
133
For	
  common	
  Citrix	
  Connec4on	
  issues,	
  Isolate	
  the	
  reproduc4on,	
  Separate	
  the	
  failing	
  
components	
  and	
  gather	
  the	
  appropriate	
  data.	
  Don’t	
  forget	
  to	
  note	
  the	
  important	
  
metadata,	
  like	
  IP	
  Addresses	
  for	
  Network	
  traces.	
  Focus	
  on	
  diagnos4c	
  data	
  from	
  a	
  
working	
  and	
  non-­‐working	
  scenario.	
  	
  
134
Great	
  new	
  Logging	
  feature	
  have	
  been	
  added	
  to	
  the	
  Citrix	
  Mobile	
  Receivers	
  that	
  have	
  
made	
  it	
  quick	
  and	
  easy.	
  They	
  output	
  readable	
  messages.	
  Find	
  for	
  the	
  start	
  of	
  the	
  ICA	
  
Session	
  by	
  looking	
  for	
  these	
  messages	
  	
  
135
Search	
  for	
  some	
  of	
  the	
  more	
  problema4c	
  keywords.	
  And	
  then	
  search	
  the	
  same	
  
ques4onable	
  messages	
  in	
  working	
  logs	
  to	
  determine	
  if	
  they	
  are	
  normal	
  messages.	
  Take	
  
note	
  of	
  the	
  concise	
  and	
  thorough	
  steps	
  taken	
  to	
  reproduce	
  the	
  issue	
  and	
  include	
  4ming	
  
markers	
  when	
  collec4ng	
  data.	
  And	
  Finally	
  if	
  you	
  need	
  more	
  help,	
  zip	
  up	
  the	
  network	
  
traces,	
  CDF	
  Traces,	
  Receiver	
  Logs	
  and	
  Repro	
  info	
  and	
  send	
  it	
  into	
  Citrix	
  Technical	
  
Support.	
  We	
  this	
  data	
  in	
  hand,	
  we	
  will	
  certainly	
  have	
  a	
  huge	
  head	
  start	
  in	
  gesng	
  to	
  the	
  
boiom	
  of	
  your	
  issue.	
  	
  
All	
  Resources:	
  
	
  
Troubleshoo4ng	
  Citrix	
  Receiver	
  for	
  Mobile	
  Devices	
  
hip://support.citrix.com/ar4cle/CTX125533	
  
How	
  to	
  Record	
  a	
  Network	
  Packet	
  Trace	
  on	
  a	
  NetScaler	
  Appliance	
  
hip://support.citrix.com/ar4cle/CTX128655	
  	
  
Case	
  Study:	
  Troubleshoo4ng	
  ICA	
  Session	
  Disconnec4on	
  with	
  CDF	
  and	
  Network	
  Traces	
  
hip://support.citrix.com/ar4cle/CTX113251	
  	
  
How	
  to	
  Enable	
  and	
  Collect	
  Advanced	
  Logs	
  for	
  Receiver	
  for	
  iOS	
  
hip://support.citrix.com/ar4cle/CTX136380	
  	
  
Case	
  Study:	
  Unable	
  to	
  Launch	
  Applica4ons	
  from	
  Android	
  Device	
  
hip://support.citrix.com/ar4cle/CTX131827	
  
Receiver	
  for	
  Android	
  Troubleshoo4ng	
  
hip://support.citrix.com/proddocs/topic/receiver-­‐android-­‐33/android-­‐receiver-­‐admin-­‐
troubleshoo4ng.html	
  
Receiver	
  for	
  iOS	
  Troubleshoo4ng	
  
hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐
troubleshoo4ng.html	
  
Enable	
  STA	
  Logging	
  
hip://support.citrix.com/ar4cle/CTX120589	
  
	
  
136	
  
Web	
  Interface	
  tracing	
  	
  
hip://support.citrix.com/ar4cle/CTX122427	
  
How	
  to	
  Decrypt	
  SSL	
  and	
  TLS	
  Traffic	
  using	
  Wireshark	
  
hip://support.citrix.com/ar4cle/CTX116557	
  
How	
  to	
  Take	
  a	
  Network	
  Trace	
  on	
  a	
  Netscaler	
  or	
  Citrix	
  Access	
  Gateway	
  Enterprise	
  Edi4on	
  
Appliance	
  
hip://support.citrix.com/ar4cle/CTX114018	
  
How	
  to	
  Capture	
  a	
  Nstrace	
  from	
  the	
  Command	
  Line	
  Interface	
  in	
  Release	
  9.2	
  and	
  9.3	
  
hip://support.citrix.com/ar4cle/CTX120941	
  	
  
How	
  to	
  Record	
  a	
  Network	
  Packet	
  Trace	
  on	
  a	
  Netscaler	
  Appliance	
  (GUI	
  driven)	
  
hip://support.citrix.com/ar4cle/CTX128655	
  
How	
  to	
  Decrypt	
  Traces	
  Recorded	
  on	
  a	
  Netscaler	
  Appliance	
  
hip://support.citrix.com/ar4cle/CTX118266	
  
How	
  to	
  Export	
  and	
  use	
  SSL	
  Session	
  Keys	
  to	
  Decrypt	
  SSL	
  Trace	
  Without	
  Sharing	
  the	
  SSL	
  
Private	
  Key	
  
hip://support.citrix.com/ar4cle/CTX135889	
  
CDFControl	
  
hip://support.citrix.com/ar4cle/CTX111961	
  
Citrix	
  Scout	
  	
  
hip://support.citrix.com/ar4cle/CTX130147	
  
hip://support.apple.com/kb/ht4094	
  
hip://www.raywenderlich.com/1948/how-­‐integrate-­‐itunes-­‐file-­‐sharing-­‐with-­‐your-­‐ios-­‐app	
  
	
  
137	
  
138	
  

Contenu connexe

Tendances

Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...eG Innovations
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalapprize360
 
E G Innovations Vdi Monitoring
E G Innovations Vdi MonitoringE G Innovations Vdi Monitoring
E G Innovations Vdi MonitoringElisaBerneyBrown
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsTechWell
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Kenneth de Brucq
 
VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Digicomp Academy AG
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesJeff Stokes
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5solarisyougood
 
J Bdemo101215
J Bdemo101215J Bdemo101215
J Bdemo101215kgirt
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep diveMurugesan Arumugam
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application VirtualizationJames W. De Rienzo
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersKaseya
 

Tendances (19)

Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...
Citrix XenApp 6.5 Performance - How To Ensure a Great End User Experience Bef...
 
Comparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 finalComparative analysis of it monitoring tools october2015 final
Comparative analysis of it monitoring tools october2015 final
 
E G Innovations Vdi Monitoring
E G Innovations Vdi MonitoringE G Innovations Vdi Monitoring
E G Innovations Vdi Monitoring
 
Performance Testing Cloud-Based Systems
Performance Testing Cloud-Based SystemsPerformance Testing Cloud-Based Systems
Performance Testing Cloud-Based Systems
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
 
VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6Citrix Day 2014: XenApp / XenDesktop 7.6
Citrix Day 2014: XenApp / XenDesktop 7.6
 
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff StokesTips and tricks for optimizing windows virtual desktops final - Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
J Bdemo101215
J Bdemo101215J Bdemo101215
J Bdemo101215
 
Horizon view technical deep dive
Horizon view   technical deep diveHorizon view   technical deep dive
Horizon view technical deep dive
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersPatch Management: 4 Best Practices and More for Today’s Banking IT Leaders
Patch Management: 4 Best Practices and More for Today’s Banking IT Leaders
 

Similaire à Troubleshooting and debugging Citrix Receiver for iOS and Android

As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...Dana Gardner
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesThousandEyes
 
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...Dana Gardner
 
React Native Local Database For Super Smart Applications.pdf
React Native Local Database For Super Smart Applications.pdfReact Native Local Database For Super Smart Applications.pdf
React Native Local Database For Super Smart Applications.pdfKaty Slemon
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...Dana Gardner
 
Selje_Fox on the Run.pdf
Selje_Fox on the Run.pdfSelje_Fox on the Run.pdf
Selje_Fox on the Run.pdfEric Selje
 
Top-10-Java-Performance-Problems.pdf
Top-10-Java-Performance-Problems.pdfTop-10-Java-Performance-Problems.pdf
Top-10-Java-Performance-Problems.pdfKiranChinnagangannag
 
Prototyping with the Internet of Things
Prototyping with the Internet of ThingsPrototyping with the Internet of Things
Prototyping with the Internet of ThingsSarah Ritter
 
IBM Informix - What's new in 12.10.xc7
IBM Informix - What's new in 12.10.xc7IBM Informix - What's new in 12.10.xc7
IBM Informix - What's new in 12.10.xc7Pradeep Natarajan
 
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Richard Rabins
 
IRJET- College Infrastructure Management System
IRJET- College Infrastructure Management SystemIRJET- College Infrastructure Management System
IRJET- College Infrastructure Management SystemIRJET Journal
 
Improve your Tech Quotient
Improve your Tech QuotientImprove your Tech Quotient
Improve your Tech QuotientTarence DSouza
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance NETSCOUT
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptHannaAnvar1
 
Top local databases for react native app development
Top local databases for react native app developmentTop local databases for react native app development
Top local databases for react native app developmentSameerShaik43
 
"Going Offline", one of the hottest mobile app trends
"Going Offline", one of the hottest mobile app trends"Going Offline", one of the hottest mobile app trends
"Going Offline", one of the hottest mobile app trendsDerek Baron
 

Similaire à Troubleshooting and debugging Citrix Receiver for iOS and Android (20)

As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
As Cloud Trends Drive User Expectations Higher, Networks Must Now Deliver App...
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...
Fairfield, California Has Used Virtualization to Efficiently Deliver Crucial ...
 
React Native Local Database For Super Smart Applications.pdf
React Native Local Database For Super Smart Applications.pdfReact Native Local Database For Super Smart Applications.pdf
React Native Local Database For Super Smart Applications.pdf
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
 
Goutham_DevOps
Goutham_DevOpsGoutham_DevOps
Goutham_DevOps
 
Goutham_DevOps
Goutham_DevOpsGoutham_DevOps
Goutham_DevOps
 
Selje_Fox on the Run.pdf
Selje_Fox on the Run.pdfSelje_Fox on the Run.pdf
Selje_Fox on the Run.pdf
 
Top-10-Java-Performance-Problems.pdf
Top-10-Java-Performance-Problems.pdfTop-10-Java-Performance-Problems.pdf
Top-10-Java-Performance-Problems.pdf
 
Prototyping with the Internet of Things
Prototyping with the Internet of ThingsPrototyping with the Internet of Things
Prototyping with the Internet of Things
 
Moving To SaaS
Moving To SaaSMoving To SaaS
Moving To SaaS
 
IBM Informix - What's new in 12.10.xc7
IBM Informix - What's new in 12.10.xc7IBM Informix - What's new in 12.10.xc7
IBM Informix - What's new in 12.10.xc7
 
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
Alpha Anywhere presentation at the the Always on Summit -- Building Offline M...
 
IRJET- College Infrastructure Management System
IRJET- College Infrastructure Management SystemIRJET- College Infrastructure Management System
IRJET- College Infrastructure Management System
 
Improve your Tech Quotient
Improve your Tech QuotientImprove your Tech Quotient
Improve your Tech Quotient
 
Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance Clues for Solving Cloud-Based App Performance
Clues for Solving Cloud-Based App Performance
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.ppt
 
Top local databases for react native app development
Top local databases for react native app developmentTop local databases for react native app development
Top local databases for react native app development
 
"Going Offline", one of the hottest mobile app trends
"Going Offline", one of the hottest mobile app trends"Going Offline", one of the hottest mobile app trends
"Going Offline", one of the hottest mobile app trends
 

Plus de Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

Plus de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Troubleshooting and debugging Citrix Receiver for iOS and Android

  • 1. Hello  and  Welcome  to  Troubleshoo*ng  and  Debugging  Receiver  for  iOS  and  Android.   This  presenta4on  will  show  you  the  tools  and  data  that  can  be  used  to  help  resolve   problems  in  the  Receivers  for  iOS  and  Android.     1  
  • 2. Why  Mobility?  Mobility  can  make  employees  more  produc4ve  and  reac4ve  by  allowing   them  to  access  any  resource,  anywhere  with  any  device.   2  
  • 3. Why  Now?  There  is  an  increasing  demand  for  employees  to  securely  access  these   resources  on  the  device  of  their  choice  and  the  pressure  is  on  for  IT  to  adapt!     3  
  • 4. Here  is  a  look  at  this  fast  growing  and  rapidly  changing  mobile  market.    From  these   forecasts  from  Gartner,  we’ll  see  twice  as  many  smartphones  and  tablets  by  2015  as   we  did  in  2012.     4  
  • 5. Here  is  a  look  at  this  fast  growing  and  rapidly  changing  mobile  market.    From  these   forecasts  from  Gartner,  we’ll  see  twice  as  many  smartphones  and  tablets  by  2015  as   we  did  in  2012.     5  
  • 6. Mobility  is  a  top  priority  for  organiza4ons  AND  the  employees.  And  it  is  a  BIG  challenge   for  IT.       6  
  • 7. How  do  you  find  the  problem  when  dealing  with  the  Mobile  Receivers?  There  are  lots   of  ones  and  zeroes  flowing,  how  do  we  know  which  ones  to  look  at?  There  has  not   been  much  logging  in  the  Citrix  Mobile  Receivers  in  the  past  and  it  was  quite  difficult  to   get  to.  Many  have  been  frustrated  looking  for  logging  within  the  Mobile  Receivers.  We   have  added  some  exci4ng  new  and  convenient  tracing  methods  to  both  the  iOS  and   Android  Receivers.   7  
  • 8. With  all  the  combina4ons  of  products  or  network  devices  between  your  Mobile   Receivers  and  your  cri4cal  business  applica4ons  and  desktops,  First,  understand  the   infrastructure  design  to  help  narrow  down  the  problem.  These  are  the  major   components  considered  in  this  presenta4on.  The  Mobile  Receivers:  iOS  and  Android,   the  Network  and  Web  components:  Netscaler,  Storefront  and  Web  Interface,  and  your   business  resources  like  XenApp  published  applica4ons  and  XenDesktop  machines.     See  the  big  picture  and  ISOLATE  the  issue  by  determining  which  connec4on  scenarios   the  problem  does  and  does  not  occur.  Next,  SEPARATE  the  network  layers  from  the   applica4ons  layer  by  checking  out  the  network  traffic.  Then,  GATHER  and  INVESTIGATE   the  key  diagnos4c  data  from  the  applica4ons  layers.    Here  is  how  to  get  the  most  useful   data  from  the  XenDesktops  and  XenApp  Servers  and  the  Mobile  Receivers.           8  
  • 9. With  all  the  combina4ons  of  products  or  network  devices  between  your  Mobile   Receivers  and  your  cri4cal  business  applica4ons  and  desktops,  First,  understand  the   infrastructure  design  to  help  narrow  down  the  problem.  These  are  the  major   components  considered  in  this  presenta4on.  The  Mobile  Receivers:  iOS  and  Android,   the  Network  and  Web  components:  Netscaler,  Storefront  and  Web  Interface,  and  your   business  resources  like  XenApp  published  applica4ons  and  XenDesktop  machines.     See  the  big  picture  and  ISOLATE  the  issue  by  determining  which  connec4on  scenarios   the  problem  does  and  does  not  occur.  Next,  SEPARATE  the  network  layers  from  the   applica4ons  layer  by  checking  out  the  network  traffic.  Then,  GATHER  and  INVESTIGATE   the  key  diagnos4c  data  from  the  applica4ons  layers.    Here  is  how  to  get  the  most  useful   data  from  the  XenDesktops  and  XenApp  Servers  and  the  Mobile  Receivers.           9  
  • 10. With  all  the  combina4ons  of  products  or  network  devices  between  your  Mobile   Receivers  and  your  cri4cal  business  applica4ons  and  desktops,  First,  understand  the   infrastructure  design  to  help  narrow  down  the  problem.  These  are  the  major   components  considered  in  this  presenta4on.  The  Mobile  Receivers:  iOS  and  Android,   the  Network  and  Web  components:  Netscaler,  Storefront  and  Web  Interface,  and  your   business  resources  like  XenApp  published  applica4ons  and  XenDesktop  machines.     See  the  big  picture  and  ISOLATE  the  issue  by  determining  which  connec4on  scenarios   the  problem  does  and  does  not  occur.  Next,  SEPARATE  the  network  layers  from  the   applica4ons  layer  by  checking  out  the  network  traffic.  Then,  GATHER  and  INVESTIGATE   the  key  diagnos4c  data  from  the  applica4ons  layers.    Here  is  how  to  get  the  most  useful   data  from  the  XenDesktops  and  XenApp  Servers  and  the  Mobile  Receivers.           10  
  • 11. The  Agenda:  Start  with  common  Network  and  ICA  Connec4on  troubleshoo4ng  steps.   This  sec4on  can  be  applied  to  connec4on  issues  from  any  Citrix  Receiver.  Look  at   Network  Traces,  useful  Event  Logs  and  CDF  Tracing.  In  the  next  sec4on,  gert  into  all   new  Advanced  Logs  in  the  Receiver  for  iOS.  Show  how  to  enable,  collect  and  debug   these  logs.    Then  the  same  for  LogCat  logging  in  the  Receiver  for  Android.  Cover  some   supportability  concerns  for  these  Receivers.  Within  each  of  these  three  sec4ons,  cover   some  Case  Studies.    Wrap  it  up  and  provide  some  references.   11  
  • 12. 12 Get  started  with  Network  and  ICA  Connec4on  Troubleshoo4ng    
  • 13. 13 It  is  a  common  prac4ce  in  iden4fying  an  issue  is  to  ISOLATE  the  problem  to  a  specific   scenario.    Does  the  issue  occur  for  XenApp  and  XenDesktop  connec4ons?      
  • 14. 14 Is  there  a  difference  if  the  user  connects  from  StoreFront,  Web  Interface,  or  a  Services   Site?    
  • 15. 15 Is  the  issue  occurring  for  a  specific  user  base?  Or  certain  devices  only?  How  oeen  does   the  issue  occur?  Every  4me?  1  out  of  10  4mes?  Or  the  second  4me  only?    
  • 16. 16 It  is  very  important  to  get  clear,  sequen4al  steps  that  a  user  takes  to  reproduce  the   problem  and  include  approximate  4mes  while  collec4ng  data.  For  example,  here  we   started  the  tracing  about  6:09  on  April  2nd,  the  user  logged  on  to  Web  Interface  from   the  Browser  at  about  6:10  and  launched  a  XenApp  Desktop  at  6:11.  Include  the   Expected  Behavior  as  well  as  the  Unexpected  Behavior  which  is  the  problem  you  are   experiencing.        
  • 17. 17 If  the  infrastructure  is  too  complex  or  requires  a  proprietary  soeware  backend,  may   rely  on  an  External  Reproduc4on,  we  may  ask  for  need  test  user  access  to  your   environment.    This  would  give  our  engineers  an  opportunity  to  test,  create  and   recreate  private  Receiver  builds  on  the  spot  to  find  the  solu4on  the  fastest.  We  would   ask  for  the  StoreFront  or  Account  configura4on,  usually  a  URL  and  a  Test  user  account.     Of  course,  one  without  a  Security  Token  would  be  ideal  but  if  it  is  required,  we  will  s4ll   work  with  you.      
  • 18. 18 For  client  side  issues,  compare  with  other  Receivers.    Did  the  issue  occur  with  a   previous  Receiver  version?  This  tells  us  that  is  may  be  a  Regression.    Or  if  available,   does  the  issue  occur  in  the  Beta  Version  of  the  Receiver?  Here  is  the  Beta  for  Android   and  iOS  has  an  Early  Adopter  Program  that  you  subscribe  to  by  contac4ng  Citrix.    A   Beta  version  will  help  determine  if  we  have  already  resolved  the  issue.  Determine  if  the   issue  occurs  when  launching  the  connec4on  from  the  Device’s  Browser  or  within  the   configured  Receiver.    Also  the  iOS  and  Android  Receivers  have  a  rela4vely  common   feature  set,  so  it  is  good  to  know  if  it  happens  with  both  of  these  plagorms.    Finally,  the   real  litmus  test  for  Receiver  issues  is  does  it  occur  with  the  latest  Receiver  for  Window?   This  could  indicate  the  problem  is  on  the  server.      
  • 19. 19 For  client  side  issues,  compare  with  other  Receivers.    Did  the  issue  occur  with  a   previous  Receiver  version?  This  tells  us  that  is  may  be  a  Regression.    Or  if  available,   does  the  issue  occur  in  the  Beta  Version  of  the  Receiver?  Here  is  the  Beta  for  Android   and  iOS  has  an  Early  Adopter  Program  that  you  subscribe  to  by  contac4ng  Citrix.    A   Beta  version  will  help  determine  if  we  have  already  resolved  the  issue.  Determine  if  the   issue  occurs  when  launching  the  connec4on  from  the  Device’s  Browser  or  within  the   configured  Receiver.    Also  the  iOS  and  Android  Receivers  have  a  rela4vely  common   feature  set,  so  it  is  good  to  know  if  it  happens  with  both  of  these  plagorms.    Finally,  the   real  litmus  test  for  Receiver  issues  is  does  it  occur  with  the  latest  Receiver  for  Window?   This  could  indicate  the  problem  is  on  the  server.      
  • 20. 20 For  client  side  issues,  compare  with  other  Receivers.    Did  the  issue  occur  with  a   previous  Receiver  version?  This  tells  us  that  is  may  be  a  Regression.    Or  if  available,   does  the  issue  occur  in  the  Beta  Version  of  the  Receiver?  Here  is  the  Beta  for  Android   and  iOS  has  an  Early  Adopter  Program  that  you  subscribe  to  by  contac4ng  Citrix.    A   Beta  version  will  help  determine  if  we  have  already  resolved  the  issue.  Determine  if  the   issue  occurs  when  launching  the  connec4on  from  the  Device’s  Browser  or  within  the   configured  Receiver.    Also  the  iOS  and  Android  Receivers  have  a  rela4vely  common   feature  set,  so  it  is  good  to  know  if  it  happens  with  both  of  these  plagorms.    Finally,  the   real  litmus  test  for  Receiver  issues  is  does  it  occur  with  the  latest  Receiver  for  Window?   This  could  indicate  the  problem  is  on  the  server.      
  • 21. 21 Next,  check  out  the  Network  connec4on,  is  there  an  Access  Gateway  in  the  mix  and  is  it   in  ICA  Proxy  mode  or  Full  VPN  mode?    Or  using  a  third  party  VPN?    Does  the  issue  occur   for  Internal  users  or  External  users  or  both?    For  the  Mobile  plagorms  does  the  issue   occurs  from  both  the  4G  network  and  from  a  Wi-­‐fi  connec4on?    Since  Authen4ca4on  is   oeen  done  on  the  network  devices,  is  single  or  dual  authen4ca4on?    Cer4ficates  tends   to  be  a  common  set  back  with  the  Receivers.  Have  a  public  or  private  cer4ficate?  Is  the   private  cer4ficate  on  the  end  device?    Is  the  intermediate  cer4ficate  on  the  Gateway   device?  Also,  ensure  using  a  supported  cer4ficate  or  authen4ca4on  method.        
  • 22. 22 Preparing  for  Network  traces,  note  the  IP  Addresses  of  all  the  network  devices  used  for   the  connec4on.    Look  for  any  unique  or  custom  configura4ons.    Check  for  logging  in   any  Third  Party  products  used  for  the  connec4on.    And  iden4fy  the  closest  working   scenario.  Then,  if  suspect  that  there  may  be  something  wrong  at  the  Network  level,     Collect  working  and  non-­‐working  Network  Traces.        
  • 23. 23 Specific  to  the  Citrix  ICA  Connec4on,  ICA  is  Citrix’s  primary  TCP  Protocol  and  it  uses  port   1494.  Session  Reliability  uses  CGP  over  2598,  which  is  basically  a  reliability  buffer   around  ICA.  It  is  good  to  determine  if  your  issue  occurs  during  enumera4on  or  the   connec4on  aiempt.  Authen4ca4on  issues  may  occur  during  Enumera4on    The   connec4on  issues  occur  during  the  Session  launch.  With  the  Mobile  Receivers,  the   enumera4on  occurs  during  the  ini4al  authen4ca4on.    With  Web  Interface  enumera4on   occurs  each  4me.    and  the  App  can  be  launch  from  the  Desktop  browser  or  from  the   Receiver.      
  • 24. Network  Traces  Analysis-­‐  Here  are  some  quick  analysis  4ps  to  find  the  ICA  traffic  in  a   Network  Trace.  Wireshark  and  several  other  network  tools  have  the  same  type  of   features.    First,  filter  the  trace  to  the  most  useful  data.    Iden4fy  the  Citrix  connec4ons   by  filtering  on  ports  1494  and  2598.    If  you  have  the  IP  informa4on  of  the  client  and   server,  filter  on  the  IP  addresses  to  view  the  en4re  conversa4on.         24  
  • 25. Network  Traces  Analysis-­‐  Here  are  some  quick  analysis  4ps  to  find  the  ICA  traffic  in  a   Network  Trace.  Wireshark  and  several  other  network  tools  have  the  same  type  of   features.    First,  filter  the  trace  to  the  most  useful  data.    Iden4fy  the  Citrix  connec4ons   by  filtering  on  ports  1494  and  2598.    If  you  have  the  IP  informa4on  of  the  client  and   server,  filter  on  the  IP  addresses  to  view  the  en4re  conversa4on.         25  
  • 26. A  nice  feature  in  Wireshark  from  readability  is  to  add  a  common  name  to  the  IP   Addresses  or    allow  the  automa4c  Name  Resolu4on  if  on  the  internal  network.    For   4ming  or  performance  issues,  it  helps  to  set  the  Time  Format    to  something  more   readable.       26  
  • 27. Once  formaied  and  filtered  the  output,  find  the  beginning  of  the  ICA  conversa4on.   This  can  be  done  by  looking  for  the  TCP  Handshake  –  SYN,  SYN/ACK,  and  ACK.  These   three  messages  start  every  TCP/IP  network  connec4on.  Once  the  ICA  conversa4on  is   found,  use  Follow  the  TCP  Stream  and  then  iden4fy  the  ICA  Sounder,  which  shows  up   as  7F  7F  in  the  data.       27  
  • 28. Once  formaied  and  filtered  the  output,  find  the  beginning  of  the  ICA  conversa4on.   This  can  be  done  by  looking  for  the  TCP  Handshake  –  SYN,  SYN/ACK,  and  ACK.  These   three  messages  start  every  TCP/IP  network  connec4on.  Once  the  ICA  conversa4on  is   found,  use  Follow  the  TCP  Stream  and  then  iden4fy  the  ICA  Sounder,  which  shows  up   as  7F  7F  in  the  data.       28  
  • 29. Once  formaied  and  filtered  the  output,  find  the  beginning  of  the  ICA  conversa4on.   This  can  be  done  by  looking  for  the  TCP  Handshake  –  SYN,  SYN/ACK,  and  ACK.  These   three  messages  start  every  TCP/IP  network  connec4on.  Once  the  ICA  conversa4on  is   found,  use  Follow  the  TCP  Stream  and  then  iden4fy  the  ICA  Sounder,  which  shows  up   as  7F  7F  in  the  data.       29  
  • 30. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       30  
  • 31. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       31  
  • 32. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       32  
  • 33. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       33  
  • 34. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       34  
  • 35. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       35  
  • 36. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       36  
  • 37. Aeer  finding  the  ICA  network  traffic,  look  for  the  most  common  problems.  One  method   of  finding  the  problem  is  to  simply  use  the  4ming  of  the  failed  behavior.  Perhaps  the   issue  occurs  5-­‐10  seconds  aeer  the  beginning  of  the  connec4on  aiempt  so  focus  on   that  area  of  the  trace.    Wireshark  has  an  excellent  Expert  Info  feature,  located  in  the   Analyze  Menu,  you  can  get  some  useful  data  from  the  Details  tab.    Here  you  can   iden4fy  Network  Satura4on,  see  these  TCP  Dup  ACK  messages  and  Retransmission  or   Resets.  If  one  of  these  issues,  look  at  the  traffic  and  determine  which  side  of  the   conversa4on  ini4ated  the  drops.  Look  at  the  trace  of  a  working  scenario  to  iden4fy   differences.  Use  at  these  clues  from  the  trace  analysis  to  determine  if  any  par4cular   node  within  the  network  connec4on  is  causing  a  problem  and  then  try  to  confirm  by   elimina4ng  or  avoiding  that  component.       37  
  • 38. There  are  a  couple  of  ways  to  get  a  Network  trace  from  a  Netscaler  device.  The   command  line  way  with  secure  shell  tools  like  PuTTY  and  secure  copy  tools  u4lizing  the   nstrace  command.    Or  a  trace  can  be  gathered  from  the  Netscaler  web  console  under   System  Diagnos4cs,  select  Start  new  trace.  Dealing  with  Secure  traffic,  to  decrypt  an   SSL  Trace  obtain  the  Private  Key.    See  CTX116557  for  further  details.     38  
  • 39. There  are  a  couple  of  ways  to  get  a  Network  trace  from  a  Netscaler  device.  The   command  line  way  with  secure  shell  tools  like  PuTTY  and  secure  copy  tools  u4lizing  the   nstrace  command.    Or  a  trace  can  be  gathered  from  the  Netscaler  web  console  under   System  Diagnos4cs,  select  Start  new  trace.  Dealing  with  Secure  traffic,  to  decrypt  an   SSL  Trace  obtain  the  Private  Key.    See  CTX116557  for  further  details.     39  
  • 40. There  are  a  couple  of  ways  to  get  a  Network  trace  from  a  Netscaler  device.  The   command  line  way  with  secure  shell  tools  like  PuTTY  and  secure  copy  tools  u4lizing  the   nstrace  command.    Or  a  trace  can  be  gathered  from  the  Netscaler  web  console  under   System  Diagnos4cs,  select  Start  new  trace.  Dealing  with  Secure  traffic,  to  decrypt  an   SSL  Trace  obtain  the  Private  Key.    See  CTX116557  for  further  details.     40  
  • 41. There  are  a  couple  of  ways  to  get  a  Network  trace  from  a  Netscaler  device.  The   command  line  way  with  secure  shell  tools  like  PuTTY  and  secure  copy  tools  u4lizing  the   nstrace  command.    Or  a  trace  can  be  gathered  from  the  Netscaler  web  console  under   System  Diagnos4cs,  select  Start  new  trace.  Dealing  with  Secure  traffic,  to  decrypt  an   SSL  Trace  obtain  the  Private  Key.    See  CTX116557  for  further  details.     41  
  • 42. 42 Some  other  data  to  collect  for  ICA  Connec4on  Issues.  First  check  the  System  and   Applica4on  Event  Logs  for  your  XenApp  Server  or  XenDesktop  host.  Could  discover   Licensing  issues  or  Authen4ca4on  issues  indicated  there.    Check  the  Event  Logs  of  the   Authen4ca4ng  Server,  whether  it  is  the  Web  Interface  Server  or  the  XML  Broker.    For   4cke4ng  issues,  there  are  STA  Logs  that  can  be  enabled.    Enable  Web  Interface  tracing   in  the  web.config  file    There  are  several  tracing  categories  that  you  can  enable  for  Web   Interface  Issues.    And  for  Web  Site  issues  examine  the  IIS  Logs.  I  have  referenced  all  the   Citrix  KB  Ar4cles  that  you  need  for  these  steps  in  this  slide  deck.       Receiver  for  iOS  Troubleshoo4ng   hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐ troubleshoo4ng.html   Enable  STA  Logging   hip://support.citrix.com/ar4cle/CTX120589   Web  Interface  tracing     hip://support.citrix.com/ar4cle/CTX122427    
  • 43. 43 Some  other  data  to  collect  for  ICA  Connec4on  Issues.  First  check  the  System  and   Applica4on  Event  Logs  for  your  XenApp  Server  or  XenDesktop  host.  Could  discover   Licensing  issues  or  Authen4ca4on  issues  indicated  there.    Check  the  Event  Logs  of  the   Authen4ca4ng  Server,  whether  it  is  the  Web  Interface  Server  or  the  XML  Broker.    For   4cke4ng  issues,  there  are  STA  Logs  that  can  be  enabled.    Enable  Web  Interface  tracing   in  the  web.config  file    There  are  several  tracing  categories  that  you  can  enable  for  Web   Interface  Issues.    And  for  Web  Site  issues  examine  the  IIS  Logs.  I  have  referenced  all  the   Citrix  KB  Ar4cles  that  you  need  for  these  steps  in  this  slide  deck.       Receiver  for  iOS  Troubleshoo4ng   hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐ troubleshoo4ng.html   Enable  STA  Logging   hip://support.citrix.com/ar4cle/CTX120589   Web  Interface  tracing     hip://support.citrix.com/ar4cle/CTX122427    
  • 44. 44 Some  other  data  to  collect  for  ICA  Connec4on  Issues.  First  check  the  System  and   Applica4on  Event  Logs  for  your  XenApp  Server  or  XenDesktop  host.  Could  discover   Licensing  issues  or  Authen4ca4on  issues  indicated  there.    Check  the  Event  Logs  of  the   Authen4ca4ng  Server,  whether  it  is  the  Web  Interface  Server  or  the  XML  Broker.    For   4cke4ng  issues,  there  are  STA  Logs  that  can  be  enabled.    Enable  Web  Interface  tracing   in  the  web.config  file    There  are  several  tracing  categories  that  you  can  enable  for  Web   Interface  Issues.    And  for  Web  Site  issues  examine  the  IIS  Logs.  I  have  referenced  all  the   Citrix  KB  Ar4cles  that  you  need  for  these  steps  in  this  slide  deck.       Receiver  for  iOS  Troubleshoo4ng   hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐ troubleshoo4ng.html   Enable  STA  Logging   hip://support.citrix.com/ar4cle/CTX120589   Web  Interface  tracing     hip://support.citrix.com/ar4cle/CTX122427    
  • 45. 45 Citrix  Diagnos4c  Facility  (CDF)  is  Citrix’s  primary  data  capturing  method.  It  is  the  best   way  to  trace  most  of  our  server  products.  It  does  require  parsing  with  symbols  and  we   have  a  public  Citrix  Symbol  server  if  you  want  to  analyzing  a  CDF  Trace.  CDF  is  based  off   Event  Tracing  for  Windows  with  Providers,  Controllers  and  Consumers.  This  just  means   that  you  must  enable  the  Citrix  modules  to  trace  (providers)  and  then  collect  them  with   a  u4lity  (controller  and  consumer).    But  first,  we  must  determine  where  to  collect  the   CDF  Trace.    For  session  launching  issues,  collect  the  CDF  trace  from  the  server  hos4ng   the  applica4on  or  the  XenDesktop  VDA.    If  you  are  dealing  with  Applica4on   enumera4on  or  Load-­‐balancing  issues,  trace  all  IMA/XML  modules  on  the  Zone  Data   Collector  and  XML  Brokers.      
  • 46. 46 There  are  a  couple  of  Citrix  u4li4es  that  can  be  used  to  gather  a  CDF  Trace  file  while  the   issue  occurs,    Scout  and  CDF  Control.  Both  of  these  u4li4es  will  provide  Tracing   Categories  of  Citrix  modules  to  enable  specific  to  the  issue.    For  issues  that  are   intermiient  or  hard  to  reproduce,  leave  a  circular  CDF  trace  running,  un4l  the  issue   occurs  and  then  collect  the  etl  file.  While  we  do  not  recommend  leaving  CDF  Traces   running  under  normal  opera4ng  circumstances,  CDF  Traces  can  be  taken  with  a   minimal  performance  impact  on  the  host.    Submit  the  .etl  file  to  Citrix  Technical   Support  for  a  detailed  analysis.      
  • 47. A  Demo  of  the  CDF  Control  u4lity  at  work  on  a  Citrix  XenDesktop  VDA  and  on  a  Citrix   XenApp  Server.     <PLAY>  To  use  CDF  Control  for  gathering  a  CDF  Trace,  download  the  u4lity  on  the  VDA   from  our  KB  at  CTX111961.  This  will  download  a  compressed  zip  file  of  the  execu4bles   for  32-­‐bit  and  64-­‐bit.  Next  simply  drill  down  and  run  the  executable.  There  is  no  install   process,  which  makes  it  easy  to  move  this  u4lity  around.  Here  are  the  Op4ons  for  the   ways  to  gather  the  trace  file,  like  that  circular  log  I  men4oned  earlier.  Here  are  the   Trace  Categories,  which  allows  us  to  only  trace  the  Citrix  modules  (providers)  specific  to   the  issue.    If  your  issue  clearly  falls  into  one  of  these  categories  it  could  save  4me  but  if   you  are  in  doubt  select  All  Modules.  You  can  also  Clear  All  Selected.  And  you  can  select   mul4ple  categories  and  it  will  choose  both  sets  of  modules.  When  you  are  ready  to   reproduce  the  issue,  select  Start  Tracing.  If  you  are  tracing  an  event  that  occurs  during   the  logon  of  a  disconnected  session,  simply  leave  this  trace  running,  disconnect  the   session  and  reconnect  to  the  session.  Stop  the  trace  once  the  logon  process  is   completed.  By  default,  the  etl  file  will  be  located  in  the  same  folder  as  the  CDF  Control   executable.  Send  this  etl  file  into  Citrix  Technical  Support  for  analysis.  This  works  the   same  from  the  XenApp  Server.  You  can  run  a  CDF  Trace  from  an  Administrators  session   and  it  collect  all  the  session’s  data  and  it  will  grow  very  fast.       47  
  • 48. To  Summarize  some  of  the  Data  Collected  in  this  sec4on,  For  Network  problems,  get   the  Network  Traces  in  pcap  or  cap  file  and  the  Network  IP  informa4on    Make  sure  to   note  the  IP  Addresses  of  all  the  important  devices,  like  the  XenApp  Server  and  Citrix   Receiver.       48  
  • 49. To  Summarize  some  of  the  Data  Collected  in  this  sec4on,  For  Network  problems,  get   the  Network  Traces  in  pcap  or  cap  file  and  the  Network  IP  informa4on    Make  sure  to   note  the  IP  Addresses  of  all  the  important  devices,  like  the  XenApp  Server  and  Citrix   Receiver.       49  
  • 50. To  Summarize  some  of  the  Data  Collected  in  this  sec4on,  For  Network  problems,  get   the  Network  Traces  in  pcap  or  cap  file  and  the  Network  IP  informa4on    Make  sure  to   note  the  IP  Addresses  of  all  the  important  devices,  like  the  XenApp  Server  and  Citrix   Receiver.       50  
  • 51. The  CDF  Trace  come  in  a  etl  file  along  with  the  repro  steps  during  that  collec4on.    Here   is  the  files  and  Good  reproduc4on  steps  with  4mes  added.   51  
  • 52. The  CDF  Trace  come  in  a  etl  file  along  with  the  repro  steps  during  that  collec4on.    Here   is  the  files  and  Good  reproduc4on  steps  with  4mes  added.   52  
  • 53. The  CDF  Trace  come  in  a  etl  file  along  with  the  repro  steps  during  that  collec4on.    Here   is  the  files  and  Good  reproduc4on  steps  with  4mes  added.   53  
  • 54. And  finally  include  the  other  important  logs  like  Applica4on  and  System  Event  Logs  of   the  appropriate  servers.     54  
  • 55. And  finally  include  the  other  important  logs  like  Applica4on  and  System  Event  Logs  of   the  appropriate  servers.     55  
  • 56. This  is  some  of  the  key  Diagnos4c  Data  from  the  Network  and  Server-­‐side  for  any  ICA   Connec4on  issues       56  
  • 57. First  Case  Study!         57  
  • 58. 58 In  this  Case,  the  Long  Commmand  Line  Parameter    which  allows  you  to  send  an   argument,  like  an  hip  page  or  file  to  the  published  applica4on  was  failing   intermiiently  from  the  iOS  Receiver.    So  we  started  Troubleshoo4ng  by  isola4ng  the   issue.    It  turns  out  that  the  issue  occurred  for  all  non-­‐windows  Receivers  that  they   tested  like  Android  and  Mac.    Also  we  no4ced  that  it  worked  on  the  first  launch  but   when  launching  addi4onal  sessions  which  we  determines  the  issue  only  occurs  when   session  sharing.    Also  we  determined  that  it  occurs  from  any  method  of  launching  the   session,  Internal,  External,  Web  Interface  or  StoreFront.    
  • 59. 59 It  was  preiy  clear  that  this  was  not  a  Network  issue,  so  we  went  right  to  the  CDF   Traces.    We  also  collected  client  side  logs  which  I  will  show  you  how  to  do  in  the  next   sec4ons,  but  they  were  not  useful  in  this  case.    We  gathered  a  CDF  Trace  with  both  a   Successful  and  Failed  launch  and  found  the  Host  Launch  Request  marking  the  launching   of  the  session.    A  few  messages  later  in  the  successful  trace,  we  could  see  the  long   command  parameter  being  sent,  which  was  a  URL  for  Internet  Explorer.      
  • 60. 60 In  the  bad  launch  of  the  trace,  we  were  able  to  locate  the  Host  Launch  Request  and   then  no4ced  that  the  Long  Command  Parameters  was  NULL  therefore  not  gesng  sent   into  the  session.    
  • 61. 61  With  this  data,  the  developer  found  a  defect  in  all  non-­‐windows  Receivers.    We  fixed   the  problem  in  each  of  these  plagorms  and  the  Long  Command  Line  parameter  now   gets  properly  sent  into  the  session  during  every  launch.    
  • 62. Advanced  Logging  for  the  Citrix  Receiver  for  iOS       62  
  • 63. Citrix  introduced  Advanced  Logs  to  the  Receiver  for  iOS  in  version  5.7.  This  is  a  first   edi4on  of  this  tracing  so  there  are  improvements  to  come.    Advanced  Logs  are  based  of   AeTracing  or  Advanced  Extensible  Tracing.    It  produces  an  interpreted  plain  text  log  file   that  you  can  look  at  with  any  text  editor.    Each  log  entry  includes  a  Time  and  Date   stamp  and    each  message  will  also  be  one  of  the  following  Types  –  INFO,  WARN,   VERBOSE,  or  ERROR.  ERROR  messages  are  clearly  something  to  pay  aien4on  to.  You   may  see  this  par4cular  applica4on  Significant  Time  Change  warning  whenever  there  is   new  ac4vity  in  the  Receiver  aeer  some  4me.  So  this  message  appears  at  the  beginning   of  any  logging  ac4vity.       63  
  • 64.  Enabling  the  Advanced  Logs  is  done  from  the  Sesngs  of  the  Receiver.     64  
  • 65.  To  access  the  Receiver  Sesngs,  click  on  the  gear  icon  in  the  top  right  corner.    Next   Click  on  the  Advanced  op4on  and    enable  or  disable  the  Advanced  Logs  by  toggling  the   ON/OFF  switch.    Simply  as  that.     65  
  • 66.  To  access  the  Receiver  Sesngs,  click  on  the  gear  icon  in  the  top  right  corner.    Next   Click  on  the  Advanced  op4on  and    enable  or  disable  the  Advanced  Logs  by  toggling  the   ON/OFF  switch.    Simply  as  that.     66  
  • 67.  To  access  the  Receiver  Sesngs,  click  on  the  gear  icon  in  the  top  right  corner.    Next   Click  on  the  Advanced  op4on  and    enable  or  disable  the  Advanced  Logs  by  toggling  the   ON/OFF  switch.    Simply  as  that.     67  
  • 68. Run  the  failing  condi4on  on  the  Receiver  for  iOS  while  the  Log  is  enabled,  and  then   collect  the  logs.  The  Advanced  Logs  are  stored  in  the  Shared  Documents  sec4ons  of  the   Citrix  Receiver  on  the  iOS  device.  There  are  two  ways  to  get  those  logs  from  the   Receiver.    From  the  Receiver  Sesngs,  you  can  send  an  email  that  includes  a   compressed  archive  of  all  the  Advanced  Logs  on  the  device  as  well  as  some  version   informa4on  about  your  device.     68  
  • 69. From  the  Sesngs  icon  on  the  Receiver,  click  on  Send  Feedback  at  the  boiom  and    then   Request  Help  from  Support.     69  
  • 70. Here  you  can  see  the  email  that  pops  up  with  your  device  informa4on  and  the  logs   aiached  in  a  zip.     70  
  • 71. Or  you  can  get  the  Advanced  Logs  from  the  Shared  Documents  sec4on  of  a  synced   iTunes.  Here  is  a  very  brief  video  on  what  that  looks  like.       <PLAY>  Once  the  device  is  synced  to  the  PC  or  Mac,  you  will  see  the  Receiver  in  the  File   Sharing  sec4on  of  the  Apps  tab.  Highlight  the  Log  folder  and  Save  As.  Then  pull  up  a   Finder  window  and  open  the  Logs  directory  and  there  you  will  see  a  series  of  Advanced   Logs  files.     71  
  • 72. Or  you  can  get  the  Advanced  Logs  from  the  Shared  Documents  sec4on  of  a  synced   iTunes.  Here  is  a  very  brief  video  on  what  that  looks  like.       <PLAY>  Once  the  device  is  synced  to  the  PC  or  Mac,  you  will  see  the  Receiver  in  the  File   Sharing  sec4on  of  the  Apps  tab.  Highlight  the  Log  folder  and  Save  As.  Then  pull  up  a   Finder  window  and  open  the  Logs  directory  and  there  you  will  see  a  series  of  Advanced   Logs  files.     72  
  • 73. Couple  of  items  to  note  regarding  Advanced  Logs.  The  Advanced  Logs  will  get  disabled   aeer  you  use  the  Send  Feedback  feature.  So  you  must  re-­‐enable  them  to  collect  more.   This  feature  will  send  all  the  logs  on  the  device  in  a  compressed  archive    So  it  is   important  to  know  approximately  when  the  issue  has  occurred  to  help  find  the  right  log   file.    There  are  a  couple  of  common  keywords  that  you  can  look  for  that  may  indicate  a   problem.  ERROR  is  a  popular  one,  you  will  see  NOT  oeen  in  errors  and  FAIL   occasionally.       73  
  • 74. Make  sure  that  you  are  not  trying  to  use  an  unsupported  feature.  You  can  ALWAYS  look   at  the  Citrix  Client  Feature  Matrix  located  here.  This  document  is  frequently  updated   and  it  the  final  word  on  supportability.     74  
  • 75. 75  
  • 76. 76  
  • 78. The  user  in  this  case  discovered  the  Store  configura4on  by  entering  an  email  address.     This  prompted  a  ChangeStore  message  that  indicates  the  Store  configura4on  has  been   saved  on  the  Receiver.     78  
  • 79. Here  we  have  a  user  enumera4ng  applica4on  from  Web  Interface.  you  may  see  this   Get  Mobile  App  Enum  for  Store  messages  duplicated  and  that  is  normal,    Here  you  can   see  some  of  the  metadata  contained  in  that  message     79  
  • 80. Next  we  have  a  user  that  has  selected  a  Published  Desktop  icon  that  was  already   enumerated  from  the  XenApp  Farm.  You  will  see  the  App  Clicked  message.     80  
  • 81. This  is  how  the  ICA  File  appears  in  the  Advanced  Logs.    You  will  see  a  “The  ICA”   message  for  that.     81  
  • 82. These  are  the  messages  that  you  may  see  when  the  Session  starts  to  launch,  the  Set   Session  View  messages.     82  
  • 83. You  can  find  the  Session  Width  in  the  Advanced  Logs  if  you  are  dealing  with  a  Display   issue.       83  
  • 84. This  can  be  very  useful  because  oeen  connec4on  issues  occur  while  the  No4fica4ons   are  running  by  and  the  user  can  tell  where  it  has  failed.    You  will  see  the  series  of   Launch  Status  Messages.     84  
  • 85. Here  is  a  message  that  you  hope  to  see,  it  is  a  successful  session  loaded  message    and   yes  that  successful  typo  does  appear  in  the  message.     85  
  • 86. This  update  video  out  message  appears  whenever  the  user  changes  the  view  away   from  the  ICA  Session  into  the  Receiver  main  area  or  some  other  applica4on.     86  
  • 87. And  finally,  this  a  the  session  close  down  messages  when  a  user  Disconnects  the   session.     87  
  • 88. Another  important  thing  to  know  is  how  to  get  an  Applica4on  dump  if  the  Receiver   crashes.  iOS  uses  CrashReporter  to  collect  crash  dumps.  The  Crash  report  includes  the   Stack  Trace  which  is  one  of  the  more  cri4cal  parts  of  the  dump.  The  crash  report  is   located  in  the  following  loca4ons  from  an  iTunes  synced  PC,  Mac  or  Windows.     88  
  • 89. To  Summarize  the  data  Collected  from  Receiver  for  iOS,  the  Advanced  Logs  come  in  a   zip  of  text  files.    Since  this  zip  includes  all  the  logs  files  on  the  device  ,  it  is  important  to   get  the  4me  and  date  that  the  issue  occurred  in  thorough  Repro  Steps     89  
  • 90. To  Summarize  the  data  Collected  from  Receiver  for  iOS,  the  Advanced  Logs  come  in  a   zip  of  text  files.    Since  this  zip  includes  all  the  logs  files  on  the  device  ,  it  is  important  to   get  the  4me  and  date  that  the  issue  occurred  in  thorough  Repro  Steps     90  
  • 91. To  Summarize  the  data  Collected  from  Receiver  for  iOS,  the  Advanced  Logs  come  in  a   zip  of  text  files.    Since  this  zip  includes  all  the  logs  files  on  the  device  ,  it  is  important  to   get  the  4me  and  date  that  the  issue  occurred  in  thorough  Repro  Steps     91  
  • 92. To  Summarize  the  data  Collected  from  Receiver  for  iOS,  the  Advanced  Logs  come  in  a   zip  of  text  files.    Since  this  zip  includes  all  the  logs  files  on  the  device  ,  it  is  important  to   get  the  4me  and  date  that  the  issue  occurred  in  thorough  Repro  Steps     92  
  • 93. If  a  crash  occurred  provide  the  .crash  and  .log  file.     93  
  • 94. If  a  crash  occurred  provide  the  .crash  and  .log  file.     94  
  • 95. This  is  the  key  Diagnos4c  Data  from  the  Receiver  for  iOS.     95  
  • 96. Case  study  2,Problems  connec4ng  through  Citrix  Access  Gateway         96  
  • 97. 97 In  this  Case,  iPad  users  were  able  to  enumerate  their  XenDesktops  but  unable  to   connect  to  them  through  Access  Gateway    Users  from  Receiver  for  Windows  were  able   to  access  their  Desktops  through  AG    The  issue  only  occurred  for  Access  Gateway   connec4ons,  Internal  iPad  users  were  able  to  connect.    On  the  Netscaler  they  were   using  FIPS  and  the  SHA2  cer4ficate  was  on  the  iPad.    
  • 98. 98 What  debug  data  can  we  collect  in  this  case?    Looking  at  the  State  of  the  VDA  from  the   Console,  there  was  no  indica4on  of  the  connec4on  aiempt  on  the  VDA.  Therefore  a   CDF  Trace  from  the  VDA  would  not  be  useful.    So  we  gathered  Advanced  Logs  from  the   iPad  device.    
  • 99. 99 In  the  Advanced  Logs  we  could  see  this  host  error  183  –  You  have  not  chosen  to  trust   “Entrust  Cer4fica4on  Authority”  the  issuer  of  the  server’s  security  cer4ficate.  So  this   tells  me  that  it  appears  that  the  cer4ficate  is  not  trusted  on  the  device.  We  checked  the   device  and  no4ced  that  the  cer4ficate  was  trusted  on  the  device    
  • 100. 100 So  next  we  checked  the  Citrix  Client  Feature  Matrix    and  no4ced  that  FIPS  140/SHA2    is   not  supported  with  iOS.  FIPS/SHA2  was  recently  added  to  the  Windows  and  Mac   Receivers  and  it  is  on  the  roadmap  for  support  in  the  Receiver  for  iOS  later  this  year.    
  • 101. Case  Study  3  Receiver  for  iOS  disconnect  issues       101  
  • 102. 102 In  this  case  the  iOS  Receiver  has  causing  problems  reconnec4ng  to  a  disconnected   session  that  4med  out.  What  we  had  observed  was  if  you  let  the  session  4me  out  on  an   iPad  and  then  aiempt  to  click  on  the  applica4ons  that  appears  successfully   enumerated,  we  would  see  the  following  session  expired  message.    the  problem  only   occurred  on  iOS,  really  Android  was  the  only  comparable  scenario  in  this  case.    And  it   only  happened  with  Access  Gateway  Connec4ons.      
  • 103. 103 For  this  issue,  we  obtained  an  Advanced  Log  from  the  iPad  Receiver  and    it  show  the   App  no  longer  available  message.    
  • 104. 104 We  discovered  a  problem  in  the  way  we  were  caching  the  users  creden4als  on  the   Receiver.    We  fixed  this  issue  in  version  5.7  of  the  iOS  Receiver  and  aeer  authen4ca4on   4mes  out  the  user  returns  to  the  logon  screen  instead  of  gesng  an  error.    
  • 105. Receiver  for  Android  Logging.       105  
  • 106. LogCat  is  Android’s  inherent  logging  system,  which  allows  for  collec4ng  and  viewing  of   system  debug  output.    LogCat  uses  the  Log  class.    The  Receiver  for  Android  always   outputs  debug  messages  to  LogCat  by  default.  The  output  is  a  plain  text  file  readable   file.  and  it  does  contain  a  4me  stamp,  although  with  some  logging  u4li4es  you  must   enable  4me  stamps.    Some  problema4c  keywords  that  you  may  find  in  a  Logcat  log  are   ERROR,  FAIL  and  FATAL  EXCEPTION  for  crashes,  which  we  will  talk  about  more  shortly.     106  
  • 107. There  are  several  priority  tags  that  are  used  to  indicate  the  kind  of  message.  These  are   the  tags  in  priority  order.     107  
  • 108. There  are  two  ways  of  gathering  Logcat  logs  from  an  Android  device.  we  have  made  it   very  simply  to  collect  and  send  just  the  Logcat  regarding  Citrix  by  Clicking  on  the   Sesngs  dots  in  the  top  right  corner.    The  second  way  is  a  bit  more  cumbersome  and   will  also  include  Logcat  messages  for  all  products  running  on  the  Android  device  and   that  is  with  a  third  party  u4lity.     108  
  • 109. There  are  two  ways  of  gathering  Logcat  logs  from  an  Android  device.  we  have  made  it   very  simply  to  collect  and  send  just  the  Logcat  regarding  Citrix  by  Clicking  on  the   Sesngs  dots  in  the  top  right  corner.    The  second  way  is  a  bit  more  cumbersome  and   will  also  include  Logcat  messages  for  all  products  running  on  the  Android  device  and   that  is  with  a  third  party  u4lity.     109  
  • 110. Sending  LogCat  logs  from  the  Receiver  is  from  the  Sesngs  -­‐>  Send  Feedback  buion.     Click  on  Request  help  from  Support.     110  
  • 111. Sending  LogCat  logs  from  the  Receiver  is  from  the  Sesngs  -­‐>  Send  Feedback  buion.     Click  on  Request  help  from  Support.     111  
  • 112. That  will  popup  an  email  with  the  single  Logfile  included  as  an  aiachment     112  
  • 113. This  Send  Feedback  feature  will  also  collect  informa4on  about  the  Android  device  that   it  was  sent  from     113  
  • 114. You  can  see  it  will  provide  versioning  informa4on  including  that  of  the  Citrix  Receiver     114  
  • 115. The  second  way  to  gather  LogCat  logs  from  Android  is  with  a  third  party  u4lity  like   aLogcat.     115  
  • 116. You  can  use  aLogcat  for  collec4ng  LogCat  logs  from  an  Android  device.    It  uses  Regular   Expression  filtering  with  ANDs  and  ORs.    A  filter  for  Citrix  Receiver  issues  is  simply   com.citrix.    and  you  can  also  send  the  logs  directly  from  aLogcat  via  email  or  ShareFile   or  more.     116  
  • 117. 117  
  • 118. Citrix  Receiver  in  an  LogCat  log.         118  
  • 119. Here  a  user  discovers  a  StoreFront  configua4on  via  email  so  you  see  the  Discovery   document  URL.     119  
  • 120. Next  a  user  successfully  logging  on  to  a  Services  Site.  You  will  see  a  Authen4ca4on   successful  message.     120  
  • 121. Next  these  onLoadResource  messages  is  what  you  will  see  in  the  LogCat  when  a  Web   Interface  Site  is  loading  on  a  Receiver  for  Android     121  
  • 122. Next  you  will  see  the  Download  ICA  File  and  Launch  Engine  Task  message  at  the   beginning  of  the  ICA  session  launching  from  StoreFront     122  
  • 123. Here  is  the  ICA  session  launch  from  a  Service  Site  and  you  will  see  the  common   Download  ICA  File  and  Launch  Engine  Task  message  followed  by  the  URL  and  in  this   case  you  can  see  it  is  a  PNAgent  or  Services  Site  URL       123  
  • 124. This  message  can  me  a  liile  misleading  but  this  Process  Citrix  Receiver  wfica  has  died   message  does  appear  on  a  graceful  user  disconnect.       124  
  • 125. Finally,    unlike  iOS  the  Stack  Trace  is  included  in  the  LogCat  if  the  Receiver  does  crash.   We  are  also  working  on  improving  the  log  messaging  from  the  Android  Receiver  so  we   will  see  more  relevant  messages  in  the  future.       125  
  • 126. Data  Collected  from  Receiver  for  Android,  the  LogCat  log.    And  again  Repro  Steps  with   the  4me  and  date  that  the  issue  occurred.  The  stack  trace  of  any  crashes  will  be   included  in  that  log.     126  
  • 127. Data  Collected  from  Receiver  for  Android,  the  LogCat  log.    And  again  Repro  Steps  with   the  4me  and  date  that  the  issue  occurred.  The  stack  trace  of  any  crashes  will  be   included  in  that  log.     127  
  • 128. The  last  Case  Study  –  Unknown  error  connec4ng  from  Android  through  an  Access   Gateway  site.       128  
  • 129. 129 The  user  is  able  to  launch  a  session  successfully  the  first  4me,  but  the  second  aiempt   failed  with  the  following  Access  Gateway  error  message.    The  problem  only  occurred   on  Android  Receiver  and    only  aeer  the  first  successful  connec4on.    
  • 130. 130 First    we  verified  with  network  with  a  network  trace  and  nothing  out  of  the  ordinary   appeared.    Then  we  gathered  aLogcat  log  while  this  issue  occurred.    and  no4ced  the  is   Receiver  403  response  from  gateway  authen4ca4on  error    
  • 131. 131 We  had  discovered  a  defect  in  the  handling  of  the  authen4ca4on  in  the  Receiver  for   Android.    This  issue  was  fixed  in  the  3.1.2  version  of  the  Receiver  and  the  user  no   longer  experienced  the  issue      
  • 132. Wrap  it  up!     132  
  • 133. 133 For  common  Citrix  Connec4on  issues,  Isolate  the  reproduc4on,  Separate  the  failing   components  and  gather  the  appropriate  data.  Don’t  forget  to  note  the  important   metadata,  like  IP  Addresses  for  Network  traces.  Focus  on  diagnos4c  data  from  a   working  and  non-­‐working  scenario.    
  • 134. 134 Great  new  Logging  feature  have  been  added  to  the  Citrix  Mobile  Receivers  that  have   made  it  quick  and  easy.  They  output  readable  messages.  Find  for  the  start  of  the  ICA   Session  by  looking  for  these  messages    
  • 135. 135 Search  for  some  of  the  more  problema4c  keywords.  And  then  search  the  same   ques4onable  messages  in  working  logs  to  determine  if  they  are  normal  messages.  Take   note  of  the  concise  and  thorough  steps  taken  to  reproduce  the  issue  and  include  4ming   markers  when  collec4ng  data.  And  Finally  if  you  need  more  help,  zip  up  the  network   traces,  CDF  Traces,  Receiver  Logs  and  Repro  info  and  send  it  into  Citrix  Technical   Support.  We  this  data  in  hand,  we  will  certainly  have  a  huge  head  start  in  gesng  to  the   boiom  of  your  issue.    
  • 136. All  Resources:     Troubleshoo4ng  Citrix  Receiver  for  Mobile  Devices   hip://support.citrix.com/ar4cle/CTX125533   How  to  Record  a  Network  Packet  Trace  on  a  NetScaler  Appliance   hip://support.citrix.com/ar4cle/CTX128655     Case  Study:  Troubleshoo4ng  ICA  Session  Disconnec4on  with  CDF  and  Network  Traces   hip://support.citrix.com/ar4cle/CTX113251     How  to  Enable  and  Collect  Advanced  Logs  for  Receiver  for  iOS   hip://support.citrix.com/ar4cle/CTX136380     Case  Study:  Unable  to  Launch  Applica4ons  from  Android  Device   hip://support.citrix.com/ar4cle/CTX131827   Receiver  for  Android  Troubleshoo4ng   hip://support.citrix.com/proddocs/topic/receiver-­‐android-­‐33/android-­‐receiver-­‐admin-­‐ troubleshoo4ng.html   Receiver  for  iOS  Troubleshoo4ng   hip://support.citrix.com/proddocs/topic/receiver-­‐ios-­‐57/ios-­‐receiver-­‐admin-­‐ troubleshoo4ng.html   Enable  STA  Logging   hip://support.citrix.com/ar4cle/CTX120589     136  
  • 137. Web  Interface  tracing     hip://support.citrix.com/ar4cle/CTX122427   How  to  Decrypt  SSL  and  TLS  Traffic  using  Wireshark   hip://support.citrix.com/ar4cle/CTX116557   How  to  Take  a  Network  Trace  on  a  Netscaler  or  Citrix  Access  Gateway  Enterprise  Edi4on   Appliance   hip://support.citrix.com/ar4cle/CTX114018   How  to  Capture  a  Nstrace  from  the  Command  Line  Interface  in  Release  9.2  and  9.3   hip://support.citrix.com/ar4cle/CTX120941     How  to  Record  a  Network  Packet  Trace  on  a  Netscaler  Appliance  (GUI  driven)   hip://support.citrix.com/ar4cle/CTX128655   How  to  Decrypt  Traces  Recorded  on  a  Netscaler  Appliance   hip://support.citrix.com/ar4cle/CTX118266   How  to  Export  and  use  SSL  Session  Keys  to  Decrypt  SSL  Trace  Without  Sharing  the  SSL   Private  Key   hip://support.citrix.com/ar4cle/CTX135889   CDFControl   hip://support.citrix.com/ar4cle/CTX111961   Citrix  Scout     hip://support.citrix.com/ar4cle/CTX130147   hip://support.apple.com/kb/ht4094   hip://www.raywenderlich.com/1948/how-­‐integrate-­‐itunes-­‐file-­‐sharing-­‐with-­‐your-­‐ios-­‐app     137  
  • 138. 138