+ All Categories
Home > Documents > MasterClass August - FInal

MasterClass August - FInal

Date post: 27-Oct-2014
Category:
Upload: mathieu-hamel
View: 223 times
Download: 4 times
Share this document with a friend
105
Remember. You can contact the NetScaler Master Class Team by email [email protected] NetScaler Master Class August 2012 This PDF slide deck contains slides with animation. It is recommended that the deck is viewed alongside the accompanying webinar recording located here: https://www1.gotomeeting.com/register/325602920
Transcript
Page 1: MasterClass August - FInal

Remember. You can contact the NetScaler Master Class Team by email [email protected]

NetScaler Master Class August 2012

This PDF slide deck contains slides with animation. It is recommended that the deck is viewed alongside the accompanying webinar recording located here: https://www1.gotomeeting.com/register/325602920

Page 2: MasterClass August - FInal

© 2012 Citrix

Who’s online today?

Page 3: MasterClass August - FInal

© 2012 Citrix

Top 10 Countries represented

USA

Russia

Turkey

Denmark

Page 4: MasterClass August - FInal

© 2012 Citrix

Top 10 Countries represented

The Netherlands Ireland Italy

Page 5: MasterClass August - FInal

© 2012 Citrix

Top 10 Countries represented

Germany France

Page 6: MasterClass August - FInal

© 2012 Citrix

Top 10 Countries represented

United Kingdom

Page 7: MasterClass August - FInal

© 2012 Citrix

• NetScaler 101 – NetScaler and Security: An introduction and reminder • Ronan O’Brien

• In the Spotlight – NetScaler Application Firewall • Lena Yaravaya

• What’s new – NetScaler Security eco-System • Prakash Sinha

• News and Views

Today’s running order

Page 8: MasterClass August - FInal

August, 2012

Security on NetScaler

NetScaler MasterClass

Page 9: MasterClass August - FInal

© 2012 Citrix

Core Security Features

•  Layer 2 – Cloak your downed VServers - Respond to ARP based on VServer Health.

•  Per Virtual IP Configuration. •  Same logic and functionality

for ICMP.

ARP Response Layer 2

Page 10: MasterClass August - FInal

© 2012 Citrix

Core Security Features

•  Layer 3 – non TCP •  Limits for ICMP and UDP

packets per 10ms (NetscaleràSystemà SettingsàGlobal Sys Settings

ARP Response Layer 2

ICMP\UDP Limit Layer 3

Page 11: MasterClass August - FInal

© 2012 Citrix

Core Security Features

•  Layer 3 – TCP

•  Syn Flood Protection

•  ACL

•  Surge Protection

•  DNS Security ARP Response

Layer 2

ICMP\UDP Limit

Layer 3

Syn Flood Attack Extended ACL

Surge Protection

DNS Security

Page 12: MasterClass August - FInal

© 2012 Citrix

•  ACL's are oldest security and firewalling mechanism •  Used to match each inbound packet and trigger action

• Source IP/Port • Destination IP/Port •  TTL • SourceMAC • Protocol • VLAN •  ICMP Type/Code

•  ACL Logging can be configured for further Audit trails

Access Control List

Page 13: MasterClass August - FInal

© 2012 Citrix

ACLs

Page 14: MasterClass August - FInal

© 2012 Citrix

Core Security Features

•  Upper Layers •  Rewrite and URL Transform

can be used to mask internal URLs

•  TLS Man in the Middle attack. •  HTTP Cookie Encryption /

proxying & XML Encryption •  SlowPost & Slowloris Attack

ARP Response Layer 2

ICMP\UDP Limit

Layer 3 Syn Flood Attack Extended ACL

Surge Protection

Upper Layers

SSL HTTP Rate Limit

Action Analytics SQL Responder

Authentication SSL FIPS

HTTP Responder HTTP Callout

App Firewall HTTP DOS

Page 15: MasterClass August - FInal

© 2012 Citrix

SYN Attack Protection

Client Server

SYN

SYN+ACK

ACK

GET

SYN Cookie

Resource Allocated

Protects against over 20 M SYN / Sec

Page 16: MasterClass August - FInal

© 2012 Citrix

HTTP DDoS Protection

Client Server

GET/POST

JS: Refresh

Refresh Request

DDoS Policy

DOSQ SQ

Page 17: MasterClass August - FInal

© 2012 Citrix

SSL Security SSL HTTP

SSL SSL

SSL_BRIDGE SSL_BRIDGE

SSL Offloading

SSL Backend Encryption

SSL Bridge

Page 18: MasterClass August - FInal

© 2012 Citrix

NetScaler - Optimized for 2048-bit RSA Keys

2048-bit RSA Key

http://www.verisign.com/ssl/ssl-information-center/express-renew-ssl-certificate/index.html

“You must submit a minimum 2048-bit CSR to qualify for Express Renewal.”

Page 19: MasterClass August - FInal

© 2012 Citrix

SSL Cert Renewals

• NetScaler can notify you of invalid certificates

• Notice notification when a certificate nears expiry

• CSRs for submission to certificate authorities can be generated on-box using a wizard.

• Hooks into Command Center.

Page 20: MasterClass August - FInal

© 2012 Citrix

TLS-Reneg MITM Attack Protection

•  Man in the Middle Attack

•  Prevented by cryptographically binding renegotiation handshakes to the enclosing TLS cryptographic parameters

•  Transport Layer Security (TLS) Renegotiation Indication Extension 5746

Page 21: MasterClass August - FInal

© 2012 Citrix

Responder

GET /secure/index.asp

Respondwith: 200 OK

HTTP.REQ.URL.CONTAINS(“secure”)

Redirect: 302 Found

RESET DROP

• First module any incoming request hits on NetScaler

• Can internally invoke Rate Limiting and Callout objects

Page 22: MasterClass August - FInal

© 2012 Citrix #CitrixSummit

DataStream - Responder

22

•  Allows NetScaler to respond to a MySQL or MS-SQL Request without any

input from the back end servers.

drop database imdb;

select * from imdb.actors;

Drop Not Allowed through VServer!

Page 23: MasterClass August - FInal

© 2012 Citrix #CitrixSummit

Drop Invalid HTTP requests & Slow* Protections

23

•  Drop Invalid Requests

•  Custom

Actions

Page 24: MasterClass August - FInal

© 2012 Citrix

Slowloris Attack

Attack Client

Attack Client sends few bytes of Header before idle Client timeout keeping the connection always opened.

Idle timeout reached

Legitimate Client

Page 25: MasterClass August - FInal

© 2012 Citrix

SlowPost Attack

Attack Client

Attack Client sends Header completely but POST body in few bytes before idle Client timeout keeping the connection always opened

Idle timeout reached Legitimate Client

Header

POST Body

Page 26: MasterClass August - FInal

© 2012 Citrix

Authentication

?

Page 27: MasterClass August - FInal

© 2012 Citrix

Authentication types (Dual Auth Supported)

27

• (S)LDAP (includes Microsoft Active Directory, Novell NDS) • Radius • TACACS • Certificate • Kerberos • SAML (New in NetScaler 10!) • Local

Page 28: MasterClass August - FInal

© 2012 Citrix

Authorisation

28

• Two key elements – WHO has access to WHAT. • Two outcomes – Allow & Deny • Who = Authenticated User ᵒ Authorisation Policies MUST be bound to Users or Groups

• What = granular, easily defined object e.g. ᵒ  IP address ᵒ HTTP URL ᵒ Group etc..

Page 29: MasterClass August - FInal

© 2012 Citrix

10.90.41.25 [30/Apr/2012:13:07:15 +0200] "GET /config/aaauser?count=yes HTTP/1.1" 200 105 "http://10.90.196.150/menu/neo" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.162 Safari/535.19“ 10.90.41.25 [30/Apr/2012:13:07:16 +0200] "GET /views/applets/guiquickloader.jar HTTP/1.1" 304 - "-" "Mozilla/4.0 (Windows 7 6.1) Java/1.6.0_29“ 10.90.41.25 [30/Apr/2012:13:07:17 +0200] "GET /views/applets/gui_images.jar HTTP/1.1" 304 - "-" "Mozilla/4.0 (Windows7 6.1) Java/1.6.0_29“ 10.90.41.25 [30/Apr/2012:13:07:17 +0200] "GET /nsip?filter=type:SNIP&count=yes HTTP/1.1" 200 103 "http://10.90.196.150/menu/neo" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko)

Accounting

29

• Records who, when & from where • SYSLOG server (open standard format). ᵒ NetScaler’s own syslog server ᵒ Syslog server outside the appliance ᵒ Command Center

• There is also the NSLOG format which is NetScaler proprietary

Page 30: MasterClass August - FInal

Work better. Live better.

Page 31: MasterClass August - FInal

Citrix NetScaler Web Application Firewall NS WAF Overview and Update

Page 32: MasterClass August - FInal

© 2012 Citrix

Problem

Session Layer Transport Layer

: :

Network AppFW

Solution

No Apps protection WAF Protection 86% of the attacks are attacks to the applications

Page 33: MasterClass August - FInal

© 2012 Citrix

DDos SSL/VPN SSL WAF XML FW AAA SSO Reporting

•  4th Gen Web App Firewall

•  Fastest App Firewall (12 Gbps)

•  Best Price-Performance

NetScaler MPX and VPX

•  First to implement learning (Teros)

•  First to implement positive security

•  Fine-grained policy driven

Convergence of Application Security Functions

Page 34: MasterClass August - FInal

© 2012 Citrix

Logical Deployment

Citrix Application Firewall (in the DMZ)

Application Infrastructure

Network Firewall

Internet Network Firewall

Logical Deployment

Trusted Network

Interfaces connected to different networks

Untrusted Network

Page 35: MasterClass August - FInal

© 2012 Citrix

Hybrid Security Model

•  Signatures for known attacks ᵒ  Easy deployment, Quick PoC ᵒ  Checks request headers (URL, cookies, etc) and body (form fields) ᵒ  Integrates with scanning tools ᵒ  Wizard to ease configuration

•  Mix-and-match with positive security ᵒ  Defense against zero-day attacks ᵒ  Defense against custom attacks ᵒ  Strongest security posture

Page 36: MasterClass August - FInal

© 2012 Citrix

Signatures

Page 37: MasterClass August - FInal

© 2012 Citrix

Signature Maintenance/Updates

•  Based on SNORT •  Partnership with SourceFire to

provide signatures •  Can be updated without changing

build •  Open format for signature files •  Signature versioning •  Automatic identification of “new”

signatures

Page 38: MasterClass August - FInal

© 2012 Citrix

•  NetScaler provides SNORT signatures converted into NetScaler native format

•  Import into NetScaler

•  Click and choose which application rules apply and whether to block or log

•  Deploy

How Does It Work – SNORT® signatures?

Page 39: MasterClass August - FInal

© 2012 Citrix

Integrates with Scanner tools –> NetScaler and Cenzic integration

Protected website

Run periodic scans

Import Vulnerability file into NetScaler

Page 40: MasterClass August - FInal

© 2012 Citrix

Positive Security Model

Page 41: MasterClass August - FInal

© 2012 Citrix

Vulnerable Websites

Copyright WASC, White Hat Security

Page 42: MasterClass August - FInal

© 2012 Citrix

Cross-site Scripting (XSS) Attacks Attacking trust relationships

Cross-Site Scripting: Inserting a malicious script that compromises the trust relationship between a user and a Web application, resulting in sending an attacker confidential information that can be used to steal that user’s identity.

Innocent user downloads script and executes 2

Hacker posts <malicious script> to vulnerable Web application

1

3

Script captures credential info and sends to hacker

Page 43: MasterClass August - FInal

© 2012 Citrix

SQL Injection Attacks

SQL Injection Attacks: Sending SQL commands to a Web application that when passed to databases execute and allow hacker to gain access or change customer and sensitive information.

SQL Injection Attack

http://shop/index.asp?category=books' or ‘1=1

Accessing databases via Web applications

Page 44: MasterClass August - FInal

© 2012 Citrix

Cookie Poisoning defense prevents identity theft and session hijacking

Client returns cookie to server

Web server sends client cookie

Application Firewall verifies that cookies have not been modified by client

Page 45: MasterClass August - FInal

© 2012 Citrix

HTML Form Field Protection

Client completes and returns form

Application sends form to client

Protect applications by blocking malicious and illegal input parameters

For each user session AppFw ensures that: 1.  Each field is returned 2.  No fields were added by client 3.  Read-only and hidden fields are unaltered 4.  Data in drop-down list or radio button field conforms 5.  Max length of form fields is adhered to

Page 46: MasterClass August - FInal

© 2012 Citrix

2 User visits blog.net in

another browser window

Blog.net

User logs in and creates session with web application

1

Cross Site Request Forgery Attacks

Blog.net makes request to application using user’s

session credentials 3

CSRF Denial of Service Scan Tool Integration

Page 47: MasterClass August - FInal

© 2012 Citrix

Business Object Protection Modules

Financial Theft Prevention

Prevent the inadvertent disclosure of customer or corporate data

Configurable Protections

Credit Card Numbers

Customer-defined Data Objects

Mastercard 5168701720999598 5487106695039822 5374247346295037 5229226821960783 5120772245608565 5418244166026814 5214846392378060 5593219822414122 5302495774841718 5141463445796112 VISA 4532804852500010 4328380488186126 4532740912246923 4716318594729561 4916022347049263 4929693453925879 4916392627322353 4485495924283904 4532203936162055 4916164014266109

Mastercard XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX VISA XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX

Server: Msg 547, Level 16, State 1, Procedure error_demo_sp, Line 2 UPDATE statement conflicted with COLUMN FOREIGN KEY constraint 'fk7_acc_cur'. The conflict occurred in database 'bos_sommar', table 'currencies', column 'curcode'. The statement has been terminated.

Page 48: MasterClass August - FInal

© 2012 Citrix

•  XML Security •  Threat Protection •  Content Validation •  Data Leak Prevention •  Reporting and Monitoring

•  Secures all flavors of XML Applications (not just SOAP)

•  Single devices for XML, HTML and Web 2.0 applications security

•  Check types are categories as HTML, XML or Common

•  Block, Log and Statistics can be enable for all checks.

Integrated HTML and XML Security

Page 49: MasterClass August - FInal

© 2012 Citrix

Auditing

•  Full administrative audit trail ᵒ  All management operations logged

•  Full user activity audit trail ᵒ  All session activity ᵒ  All network flows

•  All system events logged •  Support for external logging servers

Page 50: MasterClass August - FInal

© 2012 Citrix

•  Rule Recommendation Engine in learning mode

Manageability and Ease of Use - Learning

Page 51: MasterClass August - FInal

© 2012 Citrix

Manageability/Ease of Use – Rule Visualizer

Page 52: MasterClass August - FInal

© 2012 Citrix

Reporting Dashboard of top AppFirewall information – for quick security summary Ability to create custom reports for specific violations, client IPs, profiles etc.

Page 53: MasterClass August - FInal

© 2012 Citrix

Visibility and Reporting with Splunk for NetScaler

• Splunk App for NetScaler

• Available at SplunkBase •  http://www.splunkbase.com/apps/All/4.x/

Add-On/app:Splunk+for+Citrix+NetScaler

• Case Study: FreshDirect •  http://www.splunk.com/view/case-study-

fresh-direct/SP-CAAACDB

Page 54: MasterClass August - FInal

© 2012 Citrix

Full PCI v1.2 compliance report

•  Analyze App Firewall configuration against PCI-DSS requirements •  Executive summary of Application Firewall configuration

Page 55: MasterClass August - FInal

© 2012 Citrix

Demo - Prevent Web Application Attacks with Citrix NetScaler Application Firewall

AppFw and Cenzic Integration - http://support.citrix.com/article/CTX133285 AppFw and Qualys Integration - http://support.citrix.com/article/CTX133269

Page 56: MasterClass August - FInal

© 2012 Citrix

Application Attack Demonstration

•  Against any web site without written permission by a corporate officer

•  Across a corporate network •  Across a public network

These Attacks Are Illegal

To avoid going to jail never run these attacks:

Page 57: MasterClass August - FInal

© 2012 Citrix

Page 58: MasterClass August - FInal

NetScaler Technology Partnership Update Prakash Sinha July 2012

Page 59: MasterClass August - FInal

© 2012 Citrix

VA / Scanning

SIEM

Network Infrastructure

Identity Management

Log Management

Network Monitoring

•  Improves security of Citrix NetScaler

•  Integration with leading technology vendors improves security time to protect •  Reduces Web App Firewall Proof of

Concept (PoC) and time-to-deployment •  SIEM integration improves compliance,

reporting, and monitoring in the Enterprise

•  Provides enhanced security through technology partners

Expanding Mindshare with Ecosystem Partners

a  access  

 

t  threat    

Anti Virus

URL Filtering

Certificate Mgmt

Secure Browsing

Page 60: MasterClass August - FInal

© 2012 Citrix

• Provides “net new” security through tech partners

•  Integration with leading vendors reduces insecure time •  App Scan integration reduces Proof

of Concept (PoC) and time-to-deployment

•  SIEM integration improves compliance, reporting, and monitoring in the enterprise

•  Network Monitoring, Scalability and Virtualization creates differentiation

NetScaler Technology Ecosystem Partners

Security Events

Network Infra

Antivirus/URL Filter

App Visibility

Intrusion Detection

Identity Mgmt

Penetration Testing

Browser Security

Certificate Mgmt

a  access  

 

t  threat    

Page 61: MasterClass August - FInal

Integration with Application Scanning & Penetration Testing Tools

Page 62: MasterClass August - FInal

© 2012 Citrix

Website is now protected

Web App Security with Cenzic and NetScaler Run periodic scans to keep website secure

Import into NetScaler Application Firewall

Web vulnerability scan results from Cenzic

Page 63: MasterClass August - FInal

© 2012 Citrix

How Does It Work?

•  Vulnerabilities are found during a Cenzic Hailstorm software or SaaS security scans

•  Development team logs into Cenzic Hailstorm and/or receives vulnerability report with details

•  Remediation process begins •  Export Cenzic Hailstorm vulnerability report to a

NetScaler Application Firewall •  The XML file of scan results is imported into NetScaler

Application Firewall •  The imported, Cenzic-generated rules are then bound

to the NetScaler Application Firewall profile

•  Quick protection against Cenzic Hailstorm identified application vulnerabilities. No additional configuration and learning is required

Page 64: MasterClass August - FInal

Certificate Lifecycle Management

Page 65: MasterClass August - FInal

© 2012 Citrix

•  Enable rapid migration from 1024 bit keys to 2048 across the IT infrastructure • Venafi has the certificate inventory • Venafi provide automated replacement of

keys • Venafi can enforce 2048 policies / compliance

•  Improve performance by offloading SSL certificates to NetScaler devices • Expand NetScaler platforms to enable 2048

compliance without degrading performance • Venafi integration with NetScaler enables

automated deployment of certs to NetScaler from other systems

Certificate Management on NetScaler with Venafi

Reporting, Analysis, &

Mgmt

6 Automated Provisionin

g

Network Discovery 1

Validation

2

Monitoring &

Alerting

3

4

5 Enrollment (to CAs)

Page 66: MasterClass August - FInal

© 2012 Citrix

•  Venafi discovers certificates in your network

•  Venafi validates inventory daily

•  Venafi monitors for & reports on inventory expirations, policy violations

•  Venafi acts as the intermediary to manage the enrollments, approvals and issuances of certificates

•  Venafi automatically issues, uploads and binds new certificates in the Citrix NetScaler

•  Venafi regularly rotates certificates, providing increased security agility

How Does it Work?

9. Transfer certificate and private key

10. Associate certificate with virtual server

6. Submit CSR 7. Retrieve Cert

3. Approve Key Gen

1. Configure Netscaler in Director

2. Configure Cert 8. Approve

Installation (for each Netscaler)

4. Generate Key Pair/CSR 5. Store encrypted in DB

Page 67: MasterClass August - FInal

Token-less and Risk-based One-Time Password (OTP)

Page 68: MasterClass August - FInal

© 2012 Citrix

•  Solution Components •  Citrix NetScaler - Version 9.2 or later •  Identity Provider such as Active Directory or equivalent

LDAP based system •  RSA Adaptive Authentication Server for secondary

authentication of users based on behavioral and other inputs

•  How does the integration work? •  User attempts to access a system protected by Adaptive

Authentication •  User's activity is analyzed by the RSA Risk Engine and is

assigned a Risk Score •  RSA Policy Manager determines Risk using behavioral

analysis

•  User is directed to "Step-Up Authentication"

RSA Adaptive Authentication with Citrix NetScaler

Page 69: MasterClass August - FInal

© 2012 Citrix

SecureMatrix GSB Integration with NetScaler

Page 70: MasterClass August - FInal

Single Sign On

Page 71: MasterClass August - FInal

© 2012 Citrix 71

SAML Consumer with SecureAuth •  Reference win at Carolinas Healthcare

System (CHS) against Juniper SSL/VPN

•  CHS chose SecureAuth for SSO/SAML Provider use case

•  Requested support for “SAML Consumer” in NetScaler/AGEE

•  Delivered by Citrix Consulting

•  Product support in NetScaler 10

Page 72: MasterClass August - FInal

Intrusion Detection and Intrusion Protection (IDS/IPS)

Page 73: MasterClass August - FInal

© 2012 Citrix

•  Two modes of deployment •  Off of span port •  Inline mode

•  Solution Components •  Citrix NetScaler front-ending web applications & sites •  Sourcefire 3D Sensor •  Sourcefire Defense Center

•  How does it work? •  Sourcefire 3D Sensor detects an attack •  Sourcefire Defense Center creates an ACL policy and

sends it to Citrix NetScaler through the NetScaler API •  Citrix NetScaler applies the policy and blocks the attack

How Does IDS/IPS Integration Work?

Page 74: MasterClass August - FInal

© 2012 Citrix

•  Import signatures into NetScaler •  Signatures updates available from Citrix

NetScaler product update site approximately every 6 weeks

•  Click and choose which application rules to apply

•  Choose whether to block or log

•  Deploy

How Does SNORT Signature Integration Work?

Page 75: MasterClass August - FInal

Anti Virus and URL Filtering

Page 76: MasterClass August - FInal

© 2012 Citrix

•  Integrated with Trend Micro IWS Virtual Appliance (IWSVA)

•  Customer win at Government of Alberta, Canada

•  Whitepaper written by Trend Micro

Integration with Anti-Virus, URL Filtering

NetScaler VPX deployment as forward proxy load balancing outbound user traffic across multiple InterScan Web Security appliances.

NetScaler deployed as reverse proxy switching inbound file uploads across multiple Trend Micro Inter Scan Web appliances

Page 77: MasterClass August - FInal

© 2012 Citrix

How Does It Work?

NetScaler deployed as reverse proxy switching inbound file uploads across multiple Trend Micro Inter Scan Web appliances

Page 78: MasterClass August - FInal

Security Information & Event Management (SIEM)

Page 79: MasterClass August - FInal

© 2012 Citrix

•  Correlate NetScaler events with SIM/SEM Tools – address Compliance and Visibility requirements for NERC, FISMA, PCI, HIPAA, IT Governance etc

•  NetScaler now a supported data source with RSA enVision •  RSA enVision Event Sources

•  ArcSight ESM integration available

•  ArcSight and RSA in Citrix Ready program •  Collateral at Citrix Cloud Solution Compliance Partners

•  NitroSecurity (McAfee) integration is now available

Security Event Management with ArcSight and RSA

Page 80: MasterClass August - FInal

Visibility & Reporting

Page 81: MasterClass August - FInal

© 2012 Citrix

Visibility and Reporting with Splunk for NetScaler

• Splunk App for NetScaler available as of Aug 2010

• Available at SplunkBase •  Splunk App for NetScaler

• Case Study: FreshDirect •  Fresh Direct Case Study

Page 82: MasterClass August - FInal

© 2012 Citrix

• Who’s accessing my application resources?

• Are my apps aligned with my users?

• How can I get clear operational visibility?

• How do I monitor and ensure SLAs are met?

Application Visibility - AppFlow on NetScaler

Page 83: MasterClass August - FInal

© 2012 Citrix

Application Visibility and Log Mgmt Partners

Page 84: MasterClass August - FInal

© 2012 Citrix

• Cenzic scans supported by NetScaler

• Three products bundled and packaged together by SoftChoice

• Sold by SoftChoice along with consulting as a “Web Security Solution”

Channel Solution Example: SoftChoice

Page 85: MasterClass August - FInal

© 2012 Citrix

Page 86: MasterClass August - FInal

News and Views

86

Page 87: MasterClass August - FInal

© 2012 Citrix

NetScaler Repeater Scalability…

•  http://blogs.citrix.com/2012/07/13/branch-repeater-on-hyper-v/

Page 88: MasterClass August - FInal

© 2012 Citrix

NetScaler command Center MPX

•  http://blogs.citrix.com/2012/07/13/netscaler-command-center-mpx-%E2%80%93-a-complete-solution-in-a-box/

88

Page 89: MasterClass August - FInal

© 2012 Citrix

AAA revisited

•  http://blogs.citrix.com/2012/07/30/aaa-what-it-means-to-you/

89

Page 90: MasterClass August - FInal

© 2012 Citrix

GSLB – hierarchical approach

•  http://blogs.citrix.com/2012/07/27/netscaler-gslb-parent-child-sites/

90

Page 91: MasterClass August - FInal

© 2012 Citrix

NetScaler 10 and keep-alives

•  http://blogs.citrix.com/2012/07/26/netscaler-10-keep-alive-value-add-to-the-tcp-stack-with-profiles/

91

Page 92: MasterClass August - FInal

© 2012 Citrix

CAC/SIPR tokens and NetScaler

•  http://blogs.citrix.com/2012/07/20/cac-or-sipr-token-on-netscaleragee/

92

Page 93: MasterClass August - FInal

© 2012 Citrix

NetScaler SAML and CG

•  http://blogs.citrix.com/2012/07/19/workin-it-with-netscaler-saml-and-cloud-gateway/

93

Page 94: MasterClass August - FInal

© 2012 Citrix

NetScaler and TFTP

•  http://blogs.citrix.com/2012/07/19/load-balancing-tftp-with-netscaler/

94

Page 95: MasterClass August - FInal

© 2012 Citrix

Tagged and Untagged traffic and NetScaler HA

•  http://blogs.citrix.com/2012/07/19/netscaler-ha-managing-tagged-versus-untagged-traffic/

95

Page 96: MasterClass August - FInal

© 2012 Citrix

• “Impressive and relevant book on Application Security”

• “If you haven't thought about security yet - this is the book for you”

• “A great book for those new to web security”

Competition

Page 97: MasterClass August - FInal

© 2012 Citrix

• Wednesday September 5

• 2pm UK time

• Agenda • NetScaler "101" – NetScaler projects: Beginning to end • "In the Spotlight" – NetScaler Implementation: A case study from Citrix Consulting Services

• What’s new – NetScaler product hardware update • Register today – https://www1.gotomeeting.com/register/521747929

Master Class: September

Page 98: MasterClass August - FInal

Work better. Live better.

98

Page 99: MasterClass August - FInal

© 2012 Citrix

• September 2011 Master Class recording here: • https://www1.gotomeeting.com/register/124944433

• October 2011 Master Class recording here: • https://www1.gotomeeting.com/register/907493912

• November 2011 Master Class recording here: • https://www1.gotomeeting.com/register/294761545

• December 2011 Master Class recording here: • https://www1.gotomeeting.com/register/586128016

Back issues of Master Class (recordings)

Page 100: MasterClass August - FInal

© 2012 Citrix

• February 2012 Master Class recording here: • https://www1.gotomeeting.com/register/811363848

• March 2012 Master Class recording here: • https://www1.gotomeeting.com/register/939423792

• April 2012 Master Class recording here: • https://www1.gotomeeting.com/register/276970321

• May 2012 Master Class recording here: • https://www1.gotomeeting.com/register/125653712

Back issues of Master Class (recordings)

Page 101: MasterClass August - FInal

© 2012 Citrix

• June 2012 Master Class recording here: • https://www1.gotomeeting.com/register/665543696

• July 2012 Master Class recording here: • https://www1.gotomee0ng.com/register/625884512

• August 2012 Master Class recording here: • https://www1.gotomeeting.com/register/325602920

Back issues of Master Class (recordings)

Page 102: MasterClass August - FInal

© 2012 Citrix

• September slides here: • https://citrix.sharefile.com/d-s5fdba69fbf44df49

• October slides here: • https://citrix.sharefile.com/d-s489bf4162504deb8

• November slides here: • https://citrix.sharefile.com/d-s20dc77787bd46a68

• December slides here: • https://citrix.sharefile.com/d-s8ad080afc1f49d99

Back issues of Master Class (slides)

Page 103: MasterClass August - FInal

© 2012 Citrix

• February slides here: • https://citrix.sharefile.com/d-s39b8bc07da7493d9

• March slides here: • https://citrix.sharefile.com/d-s7d8999b053d404d9

• April slides here: • https://citrix.sharefile.com/d-s6210f76d272418d8

• May slides here: • https://citrix.sharefile.com/d-s3b6fca7101e4bda8

Back issues of Master Class (slides)

Page 104: MasterClass August - FInal

© 2012 Citrix

• June slides here: • https://citrix.sharefile.com/d-s5bed85db98f40238

• July slides here: • https://citrix.sharefile.com/d-sa17f2229f9b40ae9

Back issues of Master Class (slides)

Page 105: MasterClass August - FInal

Work better. Live better.

105


Recommended