Citrix Workspace 1911

Posted on  by admin
downloadWhy can't I download this file?Citrix Workspace 1911 DownloadDifferent types of networks may have different MTU/MSS requirements, which may result on packets being fragmented when transmitted on those networks. This can cause issues with applications that use UDP as transport protocol due to improper handling of UDP packet fragmentation. In the case of Citrix XenApp and XenDesktop / Virtual Apps and Desktops, this affects EDT since it is a UDP-based protocol. These issues can result on performance issues in ICA sessions, on EDT connections failing and falling back to TCP, or even not being able to establish a session altogether.
This is common when using VPN solutions like Cisco AnyConnect, when using Citrix Gateway hosted on Azure, when connected to certain Wi-Fi networks or mobile networks (3G, 4G, etc).Citrix Workspace 1911

Citrix Workspace 1911 Mac

XenApp and XenDesktop 7.15 or Citrix Virtual Apps and Desktops 1808+
EDT-capable Citrix Receiver / Workspace app:
  • Receiver for Windows 4.9, Workspace app for Windows 1808+
  • Workspace app for Mac 1808+
  • Workspace app for Linux 1808+
  • Workspace app for iOS 1808+
  • Workspace app for Android 1909+


Citrix Virtual Apps and Desktops 7 1912 LTSR and Workspace app for Windows 1911 introduced support for EDT MTU Discovery. If using these versions (or newer) of the VDA and Workspace app for Windows, this workaround is not required. Please review the documentation for more details.
This workaround is needed if using VDA 1909 (or older), Workspace app for Windows 1910 (or older), or Workspace app for Mac, Linux, or iOS.
The workaround involves lowering the EDT MTU to a value that will not cause fragmentation.
This MTU value needs to be determined for each network. A tool like mturoute.exe can help determine the appropriate MTU for a network.
When using Azure:
  • If ICA traffic has to traverse an Azure Gateway, the EDT MTU must be set to 1350 since Azure limits the MTU on the Azure Gateway to 1400.
  • If using an Azure-hosted Citrix Gateway, the EDT MTU must be set to a value lower than 1500 (e.g. 1480).

1. Define the EDT MTU and Output Buffers Length in the ICA file template in the Storefront server:
Open the default.ica file for editing (by default it is located in C:inetpubwwwrootCitrix<StoreName>App_Datadefault.ica)
Add the following options under the [Application] section:
udtMSS=1480 (add this line if using Receiver for Windows 4.9 - 4.9 CU3, Workspace app for Linux 1808 - 1903, Workspace app 1808+ for Mac or iOS)
edtMSS=1480 (add this line if using Receiver for Windows 4.9 CU4+, Workspace app for Windows 1808+, Workspace app for Linux 1906+)
CitrixCitrix workspace 1911 windows
If unsure whether to use 'udtMSS' or 'edtMSS', add both. The client will use the appropriate setting and ignore the one that does not apply.
edtMSS and OutBufLength should be set to the same value.
1480 was used as an example. Replace 1480 with the value that's appropriate for your network.
The client and server will agree on sizes during the connection negotiation.

2. Citrix Workspace 1911Enable Receiver/Workspace app to read the custom EDT MTU and Output Buffers Length values.
NOTE: If using Receiver for Windows 4.9 CU4+, Workspace app for Windows 1808+, or Workspace app for Mac 1809+, the configuration described below is NOT required, so step 2 can be omitted.
Create UDPStackParameters registry key, which is missing by default:
HKCUSOFTWARECitrixICA ClientEngineConfigurationAdvancedModulesUDPUDPStackParameters
There is a legacy issue in these Receivers for Windows where OutbufLength, when passed in an ICA file, is ignored.
Even if the registry value is modified to '*', meaning accept everything from the ICA file, the ICA file setting is still ignored.
For this to work, in addition to creating the 'UDPStackParameters' key as mentioned above, it is also necessary to modify the OutbufLength value in the registry and set it to the desired value determined above (1480 in the example):
  • 64-bit Windows
HKLMSOFTWAREWow6432NodeCitrixICA ClientEngineConfigurationAdvancedModulesTCP/IPOutbufLength
  • 32-bit Windows
HKLMSOFTWARE CitrixICA ClientEngineConfigurationAdvancedModulesTCP/IPOutbufLength
Modify the appropriate App Property to allow Receiver to read the customer parameters in the ICA file. This property is set to NO by default.
To do this, open Terminal and run:
defaults write com.citrix.receiver.nomas UDPStackParameters -bool YES
Toggle the the 'Read EDT stack parameter' option, which is disabled by default:
Settings > Advanced > Adaptive Transport Settings > Read EDT stack parameter
Enable the 'EDT Stack Parameters' option, which is disabled by default:
Settings > Advanced > EDT Stack Parameters

Problem Cause

MTU alteration not accounted dynamically by EDT, and IP Fragmentation not handled properly by network appliances.

Additional Resources

Today, I am going to show you how to install Citrix Workspace App at Microsoft Windows 10.

  1. Login to Windows 10.
  2. Login and download Citrix Workspace app 1911 from website.
  3. Click Yes at User Account Control.
  4. At License Agreement page, select I accept the license agreement, click Next.
  5. Make sure Installation successful, click Add Account.
  6. On the add account page, enter the url of Virtual App server, click Add.
  7. On the Workspace page, click Add your favorite apps.
  8. Click the application which you would like to add it as favorite app. In my case, I add Microsoft Outlook.
  9. Double click Microsoft Outlook and it will pop up app Starting….
  10. You may see the warning issues at the bottom of outlook, it’s showing Windows Desktop Search is not available. This is not Citrix issues, and it’s easy to fix it.
  11. Login to Citrix Virtual App VDA server, in my case, it’s CGY-XEN02.
  12. Check the Services, the windows Search startup type is Disabled.
  13. Change it Startup Type from Disabled to Automatic, click Start.
  14. Close Microsoft Outlook and reopen it again and you will see the warning message gone.

Hope you enjoy this post.

Cary Sun

Twitter: @SifuSun

Author: Cary Sun

Cary Sun is an Principal Consultant, He has a strong background specializing in datacenter and deployment solutions, and has spent over 20 years in the planning, design, and implementation of network technologies and Management and system integration.He hold CISCO CERTIFIED INTERNETWORK EXPERT (CCIE No.4531) from 1997.Cary is also a Microsoft Most Valuable Professional (MVP) and Cisco Champion, He is a published author with serveral titles, include blogs on, author for many books. Specialties: CCIE /CCNA / MCSE / MCITP / MCTS / MCSA / Solution Expert / CCA