Citrix Blogs

Lessons from the Field: Citrix on Azure network design

Citrix Virtual Apps and Desktops deployments typically focus on Citrix technologies and the underlying feature sets. However, when completing a public cloud design or deployment, network architecture plays a significant role in your success. This post is the second in a series on Citrix Consulting lessons learned from the field and outlines a handful of Azure network design considerations. Make sure you check out our first post on scaling Citrix Gateway for business continuity from my colleague Nicholas Czabaranek.

Traffic Security Options

One key item to consider when designing the traffic flow is securing and inspecting the traffic from the client network(s) to the cloud provider and within the cloud deployment. A few key options are available for securing traffic within an Azure subscription, including leveraging the built-in Azure Network Security Groups (NSGs) and deploying an Azure/third-party firewall solution.

Please note, these options are not mutually exclusive and complement each other.

Firewall Design

Our field experience has shown that pushing large quantities of traffic through a firewall appliance, especially virtual appliances (think ADC VPXs), can cause performance degradation. An example case involves a customer who deployed a hub-and-spoke model, with the firewall serving as a hub and all other components (including Active Directory) segmented into different spokes. The firewall appliances experienced a performance bottleneck, which was resolved by moving components that frequently communicated into the same VNets, and then leveraging NSGs to secure communication between these components. VNet-to-VNet traffic still passed through firewall appliances to align with security standards. However the overhead was drastically reduced.

VNet peering is another key tool that may be used to bridge networks that must communicate regularly without having to traverse a network appliance (e.g. VDAs and backend applications). Here are some tips to help you avoid design flaws that may affect environment performance.

NSG Design

If you are unsure about the port requirements to or from a certain virtual machine or subnet, first configure an “Allow All” rule as the highest priority rule to avoid an impact on functionality. From here, configure flow logging to capture the inbound and outbound traffic during normal operations, and use this data to lock down the NSG. Unless a specific VM needs to be restricted, applying NSGs to subnets instead of individual NICs typically makes sense to limit work effort and the potential for misconfiguration.

Additional Performance Considerations

Some additional network design aspects include:

Key Takeaways

To sum up the recommendations and considerations covered here:

Citrix deployments on public cloud have become commonplace in recent years and are only going to continue growing. If you need assistance with the implementation of your cloud-hosted platform, contact our Professional Services team to take advantage of many more leading practices and a plethora of field experience.

Exit mobile version