book
Article ID: CTX319649
calendar_today
Updated On:
Description
Getting any MCS Provisioning Exceptions, make sure to get the entire details of the Exceptions to help work the case\issue.
Environment
Citrix is not responsible for and does not endorse or accept any responsibility for the contents or your use of these third party Web sites. Citrix is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Citrix of the linked Web site. It is your responsibility to take precautions to ensure that whatever Web site you use is free of viruses or other harmful items.
Resolution
1. Items to check on the Cloud Connector placed in the AWS VPC
2. Creating the AWS Host Connection
3. Checking the Master AMI\VDA\VDI Image
- One of the most overlooked items is to have the Master AMI\VDA\VDI Image join a domain and then install the VDA Health Check Assistant and run this to ensure all the basics are passing.
- Note: It’s suggested to ensure that the latest 1912 LTSR Cumulative Update (CU) or the latest Current Release (at least 2012 VDA or later versions as well) is in use
- As an additional item it's also suggested to change the Nic IPv4 properties for the DNS settings
- Add your AD DNS Server IP as well as the DNS Name in the DNS Names list and move your specific DNS Name to the top of the list.
4. Check Default VPC and DHCP Options Sets
5. Use of AWS Nitro Instance types
- Unless you are in a region with ONLY Nitro-based instances and you create your own volume worker template, you should NOT USE Nitro instance types for the volume worker.
- Note: The XD template gets made once (even if the catalog fails) per image.
- AWS GOV Info and Nitro instances
- Nitro instances can be used for the VDAs, but is NOT RECOMMENDED for the Volume Workers
- Note: If a Nitro instance must be used for Volume Workers, the "Out of Box" Nitro Instance will need to be modified and reconfigured
- Nitro Examples include:
- C5, T3, M5, R5 and any of these types with an "a" at the end denotes AMD chipset
6. Changing or locking down TLS and Cipher suites on Cloud Connectors and getting MCS Provisioning Exceptions.
- It's been reported that attempts to lock down the Citrix Cloud Cipher Suites can yield MCS Provisioning Exception similar to the following:
- The following TLS and Cipher Suites have been verified to work with MCS Provisioning:
- Note: Utilize IIS Crypto to check settings
- It's suggested to use the button for preferred settings from IIS Crypto and then reboot Cloud Connectors
- Svr2019 CC system Minimum settings:
7. AWS Guardrails usage
- If still receiving MCS Provisioning Exceptions, please check the AWS Policy JSON settings and use only the preferred settings at the top of this page
- Note: Do not use/add AWS Guardrails in the Policy JSON, as this ends up breaking the Citrix MCS Provisioning processes
Problem Cause
Misconfiguration of the AWS Host for use with Citrix Cloud Virtual Apps and Virtual Desktops