Deploying NetScaler AppFirewall
|
|
|
- Edgar Roy Craig
- 9 years ago
- Views:
Transcription
1 Deploying NetScaler AppFirewall Deployment Guide This deployment guide provides general guidelines for deploying the NetScaler Application Firewall.
2 Table of Contents Introduction 3 AppFirewall Features 3 Rules and Signatures 7 Integrating with other NetScaler features 8 Packet Processing with NetScaler and AppFirewall 8 Standard Workflow for Deploying AppFirewall 9 Deploying the AppFirewall 11 Basic and Advanced Policies 12 Custom Policy Bindings 16 Conclusion 18 2
3 Citrix NetScaler AppFirewall is a comprehensive ICSA certified web application security solution that blocks known and unknown attacks against web and web services applications. NetScaler AppFirewall enforces a hybrid security model that permits only correct application behaviour and efficiently scans and protects against known application vulnerabilities. It analyzes all bidirectional traffic, including SSL-encrypted communication, to protect against a broad range of security threats without any modification to applications. Introduction NetScaler AppFirewall (also referred to as AppFirewall, Web Application Firewall or WAF) technology is included in and integrated with Citrix NetScaler MPX and NetScaler VPX, Platinum Edition, and is available as an optional module that can be added to NetScaler MPX appliances running NetScaler Enterprise Edition. NetScaler AppFirewall is also available as a stand-alone solution on some NetScaler MPX appliances. The stand-alone NetScaler AppFirewall models can be upgraded through software licensing to full NetScaler Application Delivery Controllers (ADCs). This guide focuses on defining the general deployment guidelines for Citrix NetScaler AppFirewall. The product versions described here are - Product NetScaler (AppFirewall Integrated Module) Version 10.5 (Enterprise/Platinum License) AppFirewall Features Hybrid security model The NetScaler hybrid security model allows you to take advantage of both a positive security model and a negative security model to come up with a configuration ideally suited for your applications. The positive security model protects against Buffer Overflow, CGI-BIN Parameter Manipulation, Form/Hidden Field Manipulation, Forceful Browsing, Cookie or Session Poisoning, Broken ACLs, Cross-Site Scripting (XSS), Command Injection, SQL Injection, Error Triggering Sensitive Information Leak, Insecure Use of Cryptography, Server Misconfiguration, Back Doors and Debug Options, Rate-Based Policy Enforcement, Well Known Platform Vulnerabilities, Zero-Day Exploits, Cross Site Request Forgery (CSRF), and leakage of Credit Card and other sensitive data. The negative security model uses a rich set signatures to protect against L7 and HTTP application vulnerabilities. The application firewall is integrated with several third party scanning tools, such as those offered by Cenzic, Qualys, Whitehat, and IBM. The built-in XSLT files allow easy importation 3
4 of rules, which can be used in conjunction with the native-format Snort based rules. An autoupdate feature gets the latest updates for new vulnerabilities. The positive security model might be the preferred choice for protecting applications that have a high need for security, because it gives you the option to fully control who can access what data. You allow only what you want and block the rest. This model includes a built-in security check configuration, which is deployable with a few clicks. However, keep in mind that the tighter the security, the greater the processing overhead. The negative security model might be preferable for customized applications. The signatures allow you to combine multiple conditions, and a match and the corresponding action are triggered only when all the conditions are satisfied. You block only what you don t want and allow the rest. A specific fast-match pattern in a specified location can significantly reduce processing overhead to optimize performance. The option to add your own signature rules, based on the specific security needs of your applications, gives you the flexibility to design your own customized security solutions. Request as well as response side detection and protection You can inspect the incoming requests to detect any suspicious behavior and take appropriate actions, and you can check the responses to detect and protect against leakage of sensitive data. Rich set of built-in protections for HTML, XML and JSON payloads The application firewall offers 19 different security checks. Six of them (such as Start URL and Deny URL) apply to both HTML and XML data. Five checks (such as Field Consistency and Field Format) are specific to HTML, and eight (such as XML Format and Web Service Interoperability) are specific to XML payloads. This feature includes a rich set of actions and options. For example, URL Closure enables you to control and optimize the navigation through your website, to safeguard against forceful browsing without having to configure relaxation rules to allow each and every legitimate URL. You have the option to remove or x-out the sensitive data, such as credit-card numbers, in the response. Be it SOAP array attack protection, XML denial of service (XDoS), WSDL scan prevention, attachment check, or any number of other XML attacks, you have the comfort of knowing that you have an ironclad shield protecting your data when your applications are protected by the application firewall. The signatures allow you to configure rules using XPATH-Expressions to detect violations in the body as well as the header of a JSON payload. GWT Support for protecting Google Web Toolkit applications to safeguard against SQL, XSS and Form Field Consistency check violations. Java-free, user friendly graphical user interface (GUI) An intuitive GUI and preconfigured security checks make it easy to deploy security by clicking a few buttons. A wizard prompts and guides you to create the required elements, such as profiles, policies, signatures, and bindings. The HTML5 based GUI is free of any Java dependency. It s performance is significantly better than that of the older, Java based versions. 4
5 Easy to Use and automatable CLI Most of the configuration options that are available in GUI are also available in the command line interface (CLI). The CLI commands can be executed by a batch file and are easy to automate. Support for REST API The NetScaler NITRO protocol supports a rich set of REST API s to automate application firewall configuration and collect pertinent statistics for ongoing monitoring of security violations. Learning The application firewall s ability to learn by monitoring traffic to fine tune security is very user friendly. The learning engine recommends rules, which makes it easy to deploy relaxations without proficiency in regular expressions. RegEx editor support Regular expression offer an elegant solution to the dilemma of wanting to consolidate rules and yet optimize search. You can capitalize on the power of regular expressions to configure URLs, field names, signature patterns, and so on. The rich built-in GUI RegEx editor offers you a quick reference for the expressions and provides a convenient way to validate and test your RegEx for accuracy. Customized error page Blocked requests can be redirected to an error URL. You also have the option to display a customized error object that uses supported variables and Citrix default syntax (advanced PI expressions) to embed troubleshooting information for the client. PCI-DSS, stats, and other violation reports The rich set of reports makes it easy to meet the PCI-DSS compliance requirement, gather stats about traffic counters, and view violation reports for all profiles or just one profile. Logging and click-to-rule from log Detailed logging is supported for native as well as CEF format. The application firewall offers you the ability to filter targeted log messages in the syslog viewer. You can select a log message and deploy a corresponding relaxation rule by a simple click of a button. You have the flexibility to customize log messages and also have support for generating web logs. For additional details, see Include violation logs in trace records The ability to include log messages in the trace records makes it very easy to debug unexpected behavior such as reset and block. Cloning The useful Import/Export profile option allows you to clone the security configuration from one NetScaler appliance to others. Export learned data options make it easy to export the learned rules to an Excel file. You can then get them reviewed and approved by the application owner before applying them. 5
6 AppExpert Templates An AppExpert template (a set of configuration settings) can be designed to provide appropriate protection for your websites. You can simplify and expedite the process of deploying similar protection on other appliances by exporting these cookie-cutter templates to a template file. For additional details, see Sessionless security checks Deploying sessionless security checks can help you reduce the memory footprint and expedite the processing. Interoperability with other NetScaler features The application firewall works seamlessly with other NetScaler features, such as rewrite, URL transformation, integrated caching, CVPN, and rate limiting. Support of PI expressions in policies You can leverage the power of advanced PI expressions to design policies to implement different levels of security for different parts of your application. Support for IPv6 The application firewall supports both IPv4 and IPv6 protocols. Geolocation based security protection: You have the flexibility of using Citrix default syntax (PI Expressions) for configuring location based policies, which can be used in conjunction with a built-in location database to customize firewall protection. You can identify the locations from which malicious requests originate, and enforce the desired level of security-check inspections for requests that originate from a specific geographical location. Performance Request-side streaming significantly improves performance. As soon as a field is processed, the resulting data is forwarded to the back end while evaluation continues for the remaining fields. The improvement in processing time is especially significant when handling large posts. Other security features The application firewall has several other security knobs that can help ensure the security of your data. For example, the Confidential Field lets you block leakage of sensitive information in the log messages, and Strip HTML Comment allows you to remove the HTML comments from the response before forwarding it to the client. Field Types can be used to specify what inputs are allowed in the forms submitted to your application. 6
7 Rules and Signatures The application firewall makes it very easy to design the right level of security for your applications. You can have multiple application firewall policies, bound to different application firewall profiles, to implement different levels of security-check inspections for your applications. You can initially monitor the logs to observe what security threats are being detected and which violations are being triggered. Rule creation is made straightforward with the application firewall s rule engine, which supports two types of rules learned rules and relaxation rules. You can either manually add relaxation rules or take advantage of the application firewall s recommended learned rules to deploy the required relaxations to avoid false positives. The Citrix application firewall offers visualizer support in the GUI, which makes rule management very easy. You can easily view all the data on one screen, and take action on several rules with one click. The biggest advantage of the visualizer is that it recommends regular expressions to consolidate several rules. You can select a subset of the rules, basing your selection on the delimiter and Action URL. Visualizer support is available for viewing 1) learned rules and 2) relaxation rules. 1) The visualizer for learned rules offers the option to edit the rules and deploy them as relaxations. You can also skip (ignore) rules. 2) The visualizer for deployed relaxations offers you the option to add a new rule or edit an existing one. You can also enable or disable a group of rules by selecting a node and clicking the Enable or Disable button in the relaxation visualizer. A signature is an object that can have multiple rules. Each rule consists of one or more patterns that can be associated with a specified set of actions. The application firewall has a built-in default signature object consisting of more than 1,300 signature rules, with an option to get the latest rules by using the auto-update feature to get protection against new vulnerabilities. Rules created by other scan tools can also be imported. Signatures are very powerful because they use pattern matching to detect malicious attacks and can be configured to check both the request and the response of a transaction. They are a preferred option when a customizable security solution is needed. Multiple action choices (for example, block, log, learn, and transform) are available for when a signature match is detected. The default signatures, such as web-cgi, web-coldfusion, web-frontpage, web-iis, web-php, webclient, web-activex, web-shell-shock, and web-struts, cover rules to protect different types of applications. To match the needs of your application, you can select and deploy the rules belonging to a specific category. 7
8 Signature usage tips: You can just make a copy of the default signature object and modify it to enable the rules you need and configure the actions you want. The signature object can be customized by adding new rules, which can work in conjunction with other signature rules. The signature rules can also be configured to work in conjunction with the security checks specified in the application firewall profile. If a match indicating a violation is detected by a signature as well as a security check, the more restrictive action is the one that gets enforced. A signature rule can have multiple patterns and be configured to flag a violation only when all the patterns are matched, thereby avoiding false positives. Careful selection of a literal fast-match pattern for a rule can significantly optimize processing time. Integrating with other NetScaler features The application firewall is fully integrated into the NetScaler appliance and works seamlessly with other features. You can configure maximum security for your application by using other NetScaler security features in conjunction with the application firewall. For example, AAA-TM can be used to authenticate the user, check the user s authorization to access the content, and log the accesses, including invalid login attempts. Rewrite can be used to modify the URL or to add, modify or delete headers, and responder can be used to deliver customized content to different users. You can define the maximum load for your website by using rate limiting to monitor the traffic and throttle the rate if it is too high. HTTP Denial-of-Service (DoS) protection can help distinguish between real HTTP clients and malicious DoS clients. You can narrow the scope of security-check inspection by binding the application firewall policies to virtual servers, while still optimizing the user experience by using the load balancing feature to manage heavily used applications. Requests for static objects such as images or text can bypass security check inspection, taking advantage of integrated caching or compression to optimize the bandwidth usage for such content. Packet Processing with NetScaler and AppFirewall The flow of a packet in the NetScaler appliance is shown in the diagram below. This diagram is also available in the Processing Order of Features section at getting-started-with-netscaler.html. 8
9 Standard Workflow for Deploying AppFirewall Know your environment: Knowing your environment will help you to identify the best security protection solution (signatures, security checks, or both) for your needs. Before you begin configuration, you should gather the following information. OS: What kind of OS (MS Windows, Linux, BSD, Unix, others) do you have? Web Server: What web server (IIS, Apache or NetScaler Enterprise Server) are you running? Application: What type of applications are running on your application server (for example, ASP. NET, PHP, Cold Fusion, ActiveX, FrontPage, Struts, CGI, Apache Tomcat, Domino, and WebLogic)? Do you have customized applications or off-the-shelf (for example, Oracle, SAP) applications? What version you are using? SSL: Do you require SSL? If so, what key size (512, 1024, 2048, 4096) is used for signing certificates? Traffic Volume: What is the average traffic rate through your applications? Do you have seasonal or time-specific spikes in the traffic? Server Farm: How many servers do you have? Do you need to use load balancing? Database: What type of database (MS-SQL, MySQL, Oracle, Postgres, SQLite, nosql, Sybase, 9
10 DB Connectivity: What kind of data base connectivity do you have (DSN, per-file connection string, single file connection string) and what drivers are used? Identify your security needs: You might want to evaluate which applications or specific data need maximum security protection, which ones are less vulnerable, and the ones for which security inspection can safely be bypassed. This will help you in coming up with an optimal configuration, and in designing appropriate policies and bind points to segregate the traffic. For example, you might want to configure a policy to bypass security inspection of requests for static web content, such as images, MP3 files, and movies, and configure another policy to apply advanced security checks to requests for dynamic content. You can use multiple policies and profiles to protect different contents of the same application. License requirement: Citrix offers a unified solution to optimize the performance of your application by taking advantage of a rich set of features such as load balancing, content switching, caching, compression, responder, rewrite, and content filtering, to name a few. Identifying the features that you want can help you decide which license you need. Install and baseline a NetScaler appliance: Create a virtual server and run test traffic through it to get an idea of the rate and amount of traffic flowing through your system. This information will help you to identify your capacity requirement and select the right appliance (VPX, MPX, or SDX). For a detailed description of various available platforms and their throughput capabilities, see the following data sheet: Deploy the application firewall: Use the application firewall wizard to proceed with a simple security configuration. The wizard walks you through several screens and prompts you to add a profile, policy, signature, and security checks. Profile: Select a meaningful name and the appropriate type (HTML, XML or WEB 2.0) for your profile. The default policy and signatures will be auto-generated using the same name. Policy: The auto-generated policy has the default expression (true), which selects all traffic and is bound globally. This is a good starting point unless you have in mind a specific policy that you want to use. Protections: The wizard helps you take advantage of the hybrid security model, in which you can use the default signatures offering a rich set of rules to protect different types of applications. Simple edit mode allows you to view the various categories (CGI, Cold Fusion, PHP, etc.). You can select one or more categories to identify a specific set of rules applicable to your application. Use the Action option to enable all the signature rules in the selected categories. Make sure that blocking is disabled, so that you can monitor the traffic before tightening the security. Click Continue. In the Specify Deep protections pane, you can make changes as needed to deploy the security check protections. In most cases, basic protections are sufficient for initial security configuration. Run the traffic for a while to collect a representative sample of the security-inspection data. 10
11 Tightening the security: After deploying the application firewall and observing the traffic for a while, you can start tightening the security of your applications by deploying relaxations and then enabling blocking. Learning, visualizer, and click-to-deploy rules are useful features that make it very easy to tweak your configuration to come up with just the right level of relaxation. At this point, you can also change the policy expression and/or configure additional policies and profiles to implement desired levels of security for different types of content. Debugging: If you see unexpected behaviour of your application, the application firewall offers various options for easy debugging: Log: If legitimate requests are getting blocked, your first step is to check the ns.log file to see if any unexpected security-check violation is being triggered. Disable feature: If you do not see any violations but are still seeing unexpected behaviour, such as an application resetting or sending partial responses, you can temporarily disable the application firewall feature. If the issue persists, it rules out the application firewall as a suspect. Trace records with log messages: If the issue appears to be application firewall related and needs closer inspection, you have the option to include security violation messages in an nstrace. You can use Follow TCP stream in the trace to view the details of the individual transaction, including headers, payload, and the corresponding log message, together on the same screen. Details of how to use this functionality are available at nstrace-with-violation-logs.html. Deploying the AppFirewall Initiate the WAF wizard by navigating to Security > Application Firewall and clicking the Application Firewall Wizard link in the Getting Started section. This will give you the screen shown below - Add an application firewall profile and select the appropriate type (htmlhtml, xmlxml, wweb2.0) for the security requirements of the application. Choosing the right profile - The application firewall profile offers protection for both HTML and XML payloads. Depending on the need of your application, you can choose either a an HTML profile or an XML profile. If your application supports both HTML and XML data, you can choose a Web 2.0 profile. Select an appropriate profile at the next screen (screenshot on the next page) 11
12 Basic and Advanced Profiles When you choose to add a new profile by navigating to Security > Application Firewall > Profiles through the NetScaler GUI, you will get a screen similar to the one above, but with the additional option of choosing between a basic and an advanced profile, as shown below. The decision to use a basic or an advanced profile depends on the security need of your application. A basic profile includes a preconfigured set of Start URL and Deny URL relaxation rules. These relaxation rules determine which requests are allowed and which are denied. Incoming requests are matched with the preconfigured rules, and the configured actions are applied. The user can secure applications with minimal configuration of relaxation rules. The Start URL rules protect against forceful browsing. Known web server vulnerabilities that are exploited by hackers can be detected and blocked by enabling a set of default Deny URL rules. Commonly launched attacks, such as Buffer Overflow, SQL, or Cross-Site Scripting can also be easily detected. 12
13 As the name indicates, advanced protections are for applications that have higher security requirements. Relaxation rules are configured to allow access to only specific data and block the rest. This positive security model mitigates unknown attacks, which might not be detected by basic security checks. In addition to all the basic protections, an advanced profile keeps track of a user session by controlling the browsing, checking for cookies, specifying input requirements for various form fields, and protecting against tampering of forms or Cross-Site Request Forgery attacks. Learning, which observes the traffic and recommends the appropriate relaxations, is enabled by default for many security checks. Although easy to use, advanced protections require due consideration, because they offer tighter security but also require more processing. Some advance security checks do not allow use of caching, which can affect performance. Keep the following points in mind when deciding whether to use basic or advanced profiles: Basic and advanced profiles are just starting templates. You can always modify the basic profile to deploy advanced security features, or change an advanced profile to use basic features. Advanced security checks require more processing and can affect performance. Unless your application needs advanced security, you might want to start with a basic profile and tighten the security as required for your application. You do not want to enable all security checks unless your application needs them. Next, a rule must be specified that defines what type of traffic is evaluated by the current configuration. The rule is defined by an expression as shown below. To have this policy evaluate all traffic, set the expression to true. To specify the type of traffic to evaluate, use the Frequently Used Expressions drop-down list and the expression editor to create a custom expression. To have this policy evaluate all traffic, set the expression to true. To specify the type of traffic to evaluate, use the Frequently Used Expressions drop-down list and the expression editor to create a custom expression. Click Continue, and then add or select an existing signature on the screen shown in the next screenshot Note: AppFirewall also supports WSDL, which is applicable for XML or Web 2.0 profiles but is not part of the standard wizard workflow. WSDL files have to be imported separately at Security > Application Firewall > Imports > WSDL in the NetScaler GUI. 13
14 In the screen above, you can either create a new signature or select a pre-existing signature. After selection, to edit the signature you can use the simple or the advanced edit mode. The simple mode allows for easy configuration of the signature, with a preset list of protection definitions for common applications such as IIS (Internet Information Server), PHP and ActiveX. The advanced mode allows for more granular control over the signature definitions and provides significantly more information.use the advanced mode if you want complete control over signature definition. The screen for simple configuration is as shown below - Advanced mode presents a lot more options, as shown in the screenshot on the next page - 14
15 Next, after selecting the appropriate signatures and clicking continue, you will be shown the screen below. Here, you can configure the deep protections that this profile should support, as determined by the specific attack types that the protected application might be vulnerable to. Each application will have an appropriate profile that will allow it to function optimally. 15
16 When you click Continue, the wizard ends and completes creation of the configuration profile. The the default policy created by the wizard is bound globally. Custom Policy Bindings To bind a policy to a particular target bind point (for example, bind globally or to a specific LB vserver. Other ptions are available as well) and specify the priority, go to Security > Application Firewall and click on the link for Application Firewall Policy Manager under Policy Manager. On the screen that appears, select the bind point, which can be global (Override Global) or a specific load balancing virtual server. The following example shows the selection of a load balancing virtual server as the bind point. After selecting the bind point, choose the policy that you would like to bind on the next screen, shown below - 16
17 Choosing a policy and bind point Application firewall policies can help sort your traffic into logical groups for configuring different levels of security implementation. Carefully select the bind points for the policies to determine which traffic is matched against which policy. For example, if you want every incoming request to be checked for SQL/XSS attacks, you can create a generic policy and bind it globally. Or, if you want to apply more stringent security checks to the traffic of a virtual server hosting applications that contain sensitive data, you can bind a policy to that virtual server. Careful assignment of priorities can enhance the traffic processing. You want to assign higher priorities to more specific policies and lower priorities to generic policies. Note that the higher the number, the lower the priority. A policy with a priority of 10 is evaluated before a policy that has a priority of 15. You can apply different levels of security for different kinds of contents, e.g. requests for static objects like images and text can be by-passed by using one policy and requests for other sensitive contents can be subjected to a much stringent check by using a second policy. After you bind the policy to the correct bind point, the application firewall begins applying the policy to filter traffic arriving at the bind point. Conclusion Citrix NetScaler AppFirewall enables a completely secured application delivery experience for enterprises. A winner in the Best of Application Firewalls category in TechTarget s Reader s Choice awards, recommended by NSS Labs and ICSA certified after stringent testing, NetScaler AppFirewall ticks all the boxes for enterprise application security requirements and is ideal for deployments in enterprise environments of all sizes. By utilizing the right mix of licensing and policy/rule/signature definition, AppFirewall can secure any enterprise environment. Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at Copyright 2015 Citrix Systems, Inc. All rights reserved. Citrix, other trademarks are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and com-pany names mentioned herein may be trademarks of their respective companies. 1115/PDF 17
Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall
Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
Microsoft TMG Replacement with NetScaler
Microsoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for Optimization This deployment guide focuses on replacing Microsoft Forefront Threat Management Gateway (TMG)
Microsoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
Configuring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
Using Vasco IDENTIKEY Server with NetScaler
Using Vasco IDENTIKEY Server with NetScaler Deployment Guide This deployment guide describes the process for deploying Vasco IDENTIKEY server with NetScaler to enable secure authentication for application
Deploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
How To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com
Solution Guide Optimizing Microsoft SharePoint 2013 with Citrix NetScaler Table of Contents Overview of SharePoint 2013 3 Why NetScaler Optimization Solution for SharePoint 2013? 3 Product Versions and
Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com
Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync
Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com
Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency
Deploying NetScaler with Microsoft Exchange 2016
Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com
Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace
Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
Citrix Lifecycle Management
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
Solution Guide for Citrix NetScaler and Cisco APIC EM
Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
NetScaler carriergrade network
White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment
Features of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
Deploying Microsoft Dynamics CRM 2015 with NetScaler
Deploying Microsoft Dynamics CRM 2015 with NetScaler Deployment Guide This deployment guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler. It includes information
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
Single Sign On for GoToMeeting with NetScaler
Deployment Guide Single Sign On for GoToMeeting with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into GoToMeeting with Citrix NetScaler.
Trend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution
White Paper and Cenzic Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution Website Testing / Vulnerability Scanning (Cenzic) & Web Application Firewall (Citrix) www.citrix.com
Taking Windows Mobile on Any Device
Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the
Modernize your business with Citrix XenApp 7.6
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
Secure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
Mobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
The Office Reinvented: Mobile Workspaces are the Future of Work
The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience
Citrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility
White Paper Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility Business Agility Requires Data Center Agility Today s successful enterprises innovate and respond to change faster than
Deploying XenApp on a Microsoft Azure cloud
Deploying XenApp on a Microsoft Azure cloud The scalability and economics of XenApp services on-demand citrix.com Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
Single Sign On for ZenDesk with NetScaler. Deployment Guide
Deployment Guide Single Sign On for ZenDesk with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into ZenDesk with Citrix NetScaler. Table of
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture
SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform 3.0.5 Reference Architecture 2 This reference architecture is a guideline for deploying Citrix CloudPlatform, powered by Apache CloudStack,
How To Get Cloud Services To Work For You
Product Overview Citrix CloudPortal Business Manager Unified cloud services delivery and business management platform Enterprises and cloud providers have focused most of their initial cloud strategies
Provisioning ShareFile on Microsoft Azure Storage
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler 2 Introduction Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility.
Optimizing service assurance for XenServer virtual infrastructures with Xangati
Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method
Securing virtual desktop infrastructure with Citrix NetScaler
Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Application Template Deployment Guide
DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Application Template Deployment Guide Oracle E-Business Suite 12.1 www.citrix.com DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Table of Contents Introduction...3
Securing virtual desktop infrastructure with Citrix NetScaler
Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Top Three Reasons to Deliver Web Apps with App Virtualization
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
FortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and
Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Solve the application visibility challenge with NetScaler Insight Center
Citrix NetScaler Solve the application visibility challenge with NetScaler Insight Center 2 Executive Summary The ability to observe, diagnose, and subsequently improve the performance of business-critical
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation
CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation11 vanced Implementation Overview Designed for students with previous NetScaler experience, this course is best suited for individuals who will be
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology
Citrix Frequently Asked Questions White Paper XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology Frequently Asked Questions February 2016 Prepared by: Citrix Windows App Delivery Product
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Comprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
Design and deliver cloudbased apps and data for flexible, on-demand IT
Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Safeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.
CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands citrix.com/ready CA Technologies and Citrix have partnered to integrate their complementary, industry-leading
Powering real-time mobile access to critical information with ShareFile
Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party
Deploying XenApp 7.5 on Microsoft Azure cloud
Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview
BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview 2 The BlueCat Networks and Citrix partnership is based upon integration between BlueCat Networks DNS, DHCP and IP Address Management
Single Sign On for Google Apps with NetScaler. Deployment Guide
Deployment Guide Single Sign On for Google Apps with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Google Apps for Work with Citrix NetScaler.
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Windows XP Application Migration Checklist
Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s
NetScaler SQL Intelligent Load Balancing. Scaling the Data Tier with. www.citrix.com
Scaling the Data Tier with Citrix NetScaler SQL Intelligent Load Balancing www.citrix.com Executive summary The growth of social networks, video, mobile and the Web in general has resulted in an explosion
NSFOCUS Web Application Firewall
NSFOCUS Web Application Firewall 1 / 9 Overview Customer Benefits Mitigate Data Leakage Risk Ensure Availability and QoS of Websites Close the Gap for PCI DSS Compliance Collaborative Security The NSFOCUS
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
NetScaler. Web Service Availability and Security
NetScaler Web Service Availability and Security NetScaler Application Delivery Controller What is NetScaler? NetScaler is an enterprise grade application delivery controller, or ADC. So, what does that
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
White Paper. The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise. citrix.com
White Paper The Value Add of Citrix Enterprise Mobility Management over App Configuration for the Enterprise citrix.com App Configuration for Enterprise (ACE) was introduced by AirWatch. AirWatch describes
Desktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Desktop virtualization for all
Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working
McAfee Security. Management Client
Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation
Deployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
