Microsoft Exchange 2013 with NetScaler: Authentication and Optimization
|
|
|
- Amberly Holt
- 9 years ago
- Views:
Transcription
1 Microsoft Exchange 2013 with NetScaler: Authentication and Optimization Deployment Guide This deployment guide focuses on enabling authentication and optimization with NetScaler for Exchange 2013 deployments.
2 Table of Contents Introduction 3 Configuration Details 4 NetScaler features to be enabled 4 Steps for authentication and optimization configuration 5 Enabling authentication to Exchange 2013 with NetScaler 6 Creating the AAA vserver 6 RADIUS authentication 8 LDAP authentication 9 Client certificate authentication 10 Session policy configuration 11 Traffic policies and form-based SSO profiles (for Exchange OWA logins) 12 Two-factor authentication with NetScaler and Exchange Setting up front-end authentication 16 Optimizing Exchange 2013 with NetScaler 19 HTTP compression 19 Integrated caching 22 Front-end optimization 27 Content filtering on NetScaler with Responder and Rewrite 29 Conclusion 33 2
3 NetScaler is a world-class application delivery controller (ADC) with the proven ability to load balance, accelerate, optimize and secure enterprise applications. Microsoft Exchange 2013 is an industry-leading enterprise and personal information management solution developed by Microsoft. Out of the box, the product provides enterprises with an easily deployed enterprise , calender, task and other enterprise information management solution with a massive and ever-evolving set of features. Introduction Enterprises today use various authentication schemas to give internal and external users reliable and secure access to their corporate Microsoft Exchange servers. With NetScaler application delivery controllers (ADCs) serving as the preferred platform for enhancing enterprise application performance at many organizations worldwide, it is important to understand how the security requirements of these enterprises can also be served by NetScaler. This guide focuses on using the authentication and optimization capabilities of NetScaler with Microsoft Exchange 2013 to enable enterprises to use more secure authentication systems while reducing the network load experienced due to Exchange traffic. 3
4 Configuration Details Product Microsoft Exchange Server NetScaler VPX Version 2013 SP (Enterprise License) NetScaler features to be enabled The following NetScaler features are necessary for authentication with Exchange Please ensure they are enabled. Content switching Load balancing Rewrite Responder SSL offload AAA (authentication, authorization and auditing) Other considerations Make sure you have installed, at a minimum, one license for NetScaler Enterprise Edition. Set the time zone and a NTP (Network Time Protocol) server, and check the date and time on the NetScaler virtual appliance, as Exchange server connections can be very sensitive to time differences. 4
5 Configure your DNS settings properly: Note that for the purposes of certificate-based authentication, all addressable hosts that are part of the network setup should have resolvable domain names, not just IP addresses. Steps for authentication and optimization configuration Broadly, the steps to configure an Exchange server with authentication are as follows: Set up load balancing virtual servers i) Complete initial setup for the Exchange server; create a server object for each Exchange server and a custom monitor for each individual Exchange service, listed here: (1) /owa (Outlook Web Access) (2) /ecp (Exchange Control Panel) (3) /ews (Exchange Web Service) (4) /Microsoft-Server-ActiveSync (ActiveSync Service for mobile mail clients) (5) /oab (Offline Address Book) (6) /rpc (Outlook Anywhere or RPC over HTTPS) (7) /Autodiscover (Autodiscover Service) ii) Create a service group object for each Exchange service and bind the server objects and appropriate monitors to it. iii) Now, create a load balancing virtual server (load balancing vserver) for each Exchange service and bind the appropriate service group and certificate to it. For this deployment, we have used a self-signed certificate; however you may use any valid server certificate. (1) When defining the load balancing vservers, select Not Directly Addressable, as these vservers will later be bound to a content switching virtual server. (content switching vserver) (2) Set an appropriate load balancing method (such as LEASTCONNECTION) and a persistence method such as SSLSESSION. iv) Now, configure the content switching vserver and relevant policies for switching to the appropriate backend load balancing vserver based on user request. Set up authentication and AAA-TM policies i) Create an AAA vserver with an externally accessible IP address (over HTTPS) and bind the required certificate to it. This vserver is the authentication server that will handle the two-factor authentication requirement. ii) Define and bind relevant authentication policies. iii) Define the session policy for configuring login to Exchange, and bind it to the AAA vserver. iv) Define traffic policies and a form-based SSO policy, then bind the traffic policies to the OWA (Outlook Web Access) load balancing vserver v) Bind the authentication policy to the content switching vserver. Multiple configurations, defined later in the guide, can be made here. Set up optimization policies i) Create the FEO, compression and caching policies and attach them to the content switching vserver. This guide covers sections (b) and (c) above. Detailed guidelines for section (a) can be found in the basic deployment guide for Exchange 2013 with NetScaler at dam/citrix/en_us/documents/products-solutions/microsoft-exchange-2013-citrix-netscalerdeployment-guide.pdf 5
6 Enabling authentication to Exchange 2013 with NetScaler Creating the AAA vserver The AAA vserver on NetScaler handles authentication requirements. This versatile feature allows a combination of multiple authentication factors in a primary/secondary prioritized setup and policy-driven authentication mechanisms to be used from a single interface. For this deployment, the Exchange_2013_401_Auth_vserver AAA vserver was created. To create a new AAA vserver, navigate to Security>AAA Application Traffic>Virtual Servers and click the Add button. Upon clicking the Add button, the following screen is presented, where settings for the AAA vserver (IP address, authentication domain, etc.) can be entered. Context-sensitive help is provided (a small question mark shows up next to each text field) if you need assistance with providing details. Once created, the AAA vserver shows up on the Authentication Virtual Servers listing screen (where the Add button was clicked earlier) as shown below. As noted above, the AAA vserver we will be using is Exchange_2013_401_Auth_vserver. 6
7 Upon selecting the AAA vserver and clicking Edit, the the configuration screen for the virtual server is presented, as shown below. It allows exhaustive changes to the vserver configuration. This screen can be used for defining backend (NetScaler to Exchange servers) authentication settings, which is described later in this guide 7
8 RADIUS authentication To add a new RADIUS authentication policy, in the navigation menu on the left, click through to AAA Application Traffic>Policies>Authentication>Basic Policies>RADIUS. Click Add in the pane on the right to add a new policy. Before creating a policy, ensure you have defined the settings for your RADIUS server in the Servers tab. If you haven t, click on the Servers tab and then click Add to create a new RADIUS server definition. You will see the following window. Enter the appropriate settings for your RADIUS server. (The Details pane is minimized by default; you can expand it when needed, for example, to connect to RSA SecurID, as NetScaler connectivity to SecurID works over RADIUS.) 8
9 After creating a new server, you can add it to your RADIUS authentication policy; go back to the Policies tab and click Add. On the prompt that follows, add the necessary details with the name of the server you have just created. The Expression section shown below lets you add an expression that determines whether or not the user should be authenticated with the server, using parameters such as the certificate issuer or source IP address. LDAP authentication To add a new LDAP authentication policy, in the navigation menu on the left of the screen below, click through to AAA Application Traffic>Policies>Authentication>Basic Policies>LDAP. Here, click Add in the pane on the right to add a new policy. Again, make sure the server is defined first. To do so, go to the Servers tab as described earlier, then click Add. This screen will allow you to configure your LDAP server. It also provides other capabilities, such as extracting a field other than the user s SAN (for example, the UPN). These capabilitiescan be defined in the Other Settings section under Server Logon Name Attribute (for server login) and SSO Name Attribute (for an alternate username). After adding the server, you can go back to policies and add the LDAP policy, similar to the RADIUS policy. The Expression section also holds similar functionality. 9
10 The screen prompt for LDAP authentication servers (left and right halves of the screen) Client certificate authentication To enable client certificate authentication with Exchange on NetScaler, you may choose one of two options. If you would like to enable client certificate authentication without needing to set up an authentication (AAA) virtual server, you can enable Client Authentication in the SSL Parameters section of the Exchange CS vserver basic settings window. Here, you also have the option of setting client authentication as Optional or Mandatory; if you choose the latter, NetScaler will terminate the request if the user presents an invalid certificate or does not submit one. If you select Optional, the user will be allowed to proceed further without authentication. Therefore, for enabling certificate-based authentication, the recommended setting here is Mandatory. The validity of the certificate is verified by matching the root CA for the certificate with the one registered on the Exchange content switching vserver. Alternatively, you can configure a CERT policy and link it to an AAA vserver, then add it to your content switching vserver definitions (as with the LDAP and RADIUS policies). 10
11 Session Policy Configuration After completing configuration of the AAA vserver and relevant authentication policies, you should next create a session policy that allows NetScaler to initiate and maintain an authenticated session with the Exchange server. To begin creating the session policy, navigate to Security>AAA Application Traffic>Policies>Session. Alternatively, you can do the same by going to the basic settings screen for your AAA vserver and adding a policy. Here, after clicking on the Add button, you can configure a new session policy. Alternatively, you can use ns_true for the expression. To edit or create a new request profile, click on either the pencil icon (for editing an existing policy) or the plus icon (for creating a new one). This action launches the session profile definition screen, shown below. 11
12 Here, fill the text box titled Single Sign-on Domain with the SSO domain for your environment. In some instances, the HTTPOnly cookie setting may cause synchronization issues with some Android native clients. If this is an issue in your environment, change the setting (enable the check mark next to the setting to edit it; when unchecked, the setting is inherited from the global settings). Traffic policies and form-based SSO profiles (for Exchange OWA logins) Now, to enable OWA functionality, you should configure traffic policies and form-based SSO profiles. The Form SSO profile definition can be done at Security>AAA-Application Traffic>Policies>Traffic as shown below. The profile configuration required is shown below. 12
13 The traffic policy definition can be done at Security>AAA-Application Traffic>Policies>Traffic as shown below. Here, we create two policies (Exchange_2013_owa_sso_policy and Exchange_2013_owa_logout_ policy), one to enable SSO and the other for clean logout. The configurations for the two policies are shown below. Exchange_2013_owa_sso_policy A. Configuring the traffic policy The expression added here is HTTP.REQ.URL.CONTAINS( /owa/auth/logon.asp ) B. Configuring the traffic profile Here, set AppTimeout to 1 minute, Single Sign-on to ON and for the Form SSO profile, use the profile created earlier. Leave the other settings as is. 13
14 Exchange_2013_owa_logout_policy A. Configuring the traffic policy The expression added here is HTTP.REQ.URL.CONTAINS( logoff.owa ) 14
15 B. Configuring the traffic profile Here, select the check mark next to Initiate Logout. These configured traffic policies should be bound to the OWA load balancing vserver v_cas_owa. Two-factor authentication with NetScaler and Exchange 2013 When two-factor authentication is required, you can add a second primary authentication policy to the content switching vserver. If the first factor configured is CERT authentication, the policy will then pass the credentials pulled from the certificate to the form. On the form, the username will be locked and a password for the username corresponding to the one present in the certificate provided will be requested. For the purposes of illustrating this capability and describing the solution, we will be using the following test configuration: Product Version Microsoft Exchange Server version 2013 NetScaler version 10.5 Primary authentication factor Secondary authentication factor LDAP/Active Directory RADIUS The reason for the selection of RADIUS as the secondary factor is that the RADIUS authentication system connects quite easily with popular enterprise second-factor authentication systems such as RSA SecurID, SafeWord and Gemalto Protiva. To enable two-factor authentication, complete configuration of the LDAP and RADIUS servers as described earlier in the guide. Then, navigate to the Basic Settings page for the AAA vserver configured earlier (Security>AAA Application Traffic>Virtual Servers) and then, click on the plus sign (+) next to Basic Authentication Policies. 15
16 Here, you will see the following screen: In the Choose Type dropdown, select Secondary. After clicking Continue, you are taken to the following screen where you can select or add a new authentication policy. After selecting/adding a new policy (the process for adding a new RADIUS policy is the same as described earlier), click on Bind. This completes the configuration for two-factor authentication. Setting up front-end authentication At the content switching vserver To enable authentication on NetScaler for the front end (client-to-netscaler authentication), click on the Authentication subsection on the cs_cas_443 content switching vserver Basic Settings page. Note that this action has to be performed on the settings screen for the content switching vserver, not the AAA vserver. 16
17 To get to the Authentication section, scroll down on the Basic Settings page or, if you don t see the section, look on the right-hand side of the page for the Authentication link and click it. In this section, you have two options: enable 401-based authentication, in which case users will be presented with a standard authentication popup prompt; or enable Form-based authentication, in which case NetScaler will present an authentication form to the user. In the second case, you will also have to provide the authentication FQDN (Fully Qualified Domain Name), which is the domain name for the AAA vserver. This is the host domain for the form that will be presented to the user. Note that if form-based authentication is enabled at the content switching vserver, only OWA and ECP (Exchange Control Panel) will be accessible. The other services cannot work with form-based authentication. If all services are required to be functional with this setup, use 401-based basic authentication as the setup option. At the individual load balancing vservers In a similar fashion, the authentication can be enabled at the load balancing vserver level as well. In this case, the OWA and ECP load balancing vservers should be configured with form-based authentication, while all other load balancing vservers are configured with 401-based authentication, all linked to the same AAA vserver (Exchange_2013_401_Auth_vserver). 17
18 To have this profile functioning with Outlook clients, you should enable Outlook Anywhere. (located in File>Account Settings>More Settings>Connection>Connect to Microsoft Exchange using HTTP). Here, to use the settings above (LDAP server), you must configure the mail server address as the FQDN for the CS vserver, and the authentication type as Basic. This should be configured at the Exchange server as well. To be able to use NTLM authentication, use a Negotiate Action policy with the AAA vserver instead of the LDAP policy bound currently. Note: Please ensure that Edgesight Monitoring/HTML Injection is disabled in the feature list (Located at System>Advanced Settings) on the NetScaler device for Exchange connectivity to function properly with NetScaler. 18
19 Other settings The authentication profile defines settings such as the authentication domain and level. The authentication level is important, as it defines the vserver levels that authentication with this profile will allow the user to access. A user authenticated with an authentication vserver at a certain level cannot access a vserver running at a higher level. The level setting for load balancing or content switching vservers is an optional parameter when access restriction is required. If dual-factor authentication is set up as described earlier, when the AAA vserver is bound to the Exchange vserver(s), the login screen shown will ask for two passwords one each for LDAP (first authentication factor) and RADIUS (second authentication factor). Note that the username for both factors should be the same. The screen above shows the login prompt users will see if dual factor authentication is enabled. Optimizing Exchange 2013 with NetScaler NetScaler offers a suite of optimization features in these categories: - HTTP compression - Integrated caching - Front-end optimization (FEO) - Responder and Rewrite To configure HTTP compression, integrated caching and FEO, expand the Optimization tab in the NetScaler GUI s left-hand navigation panel. HTTP compression The NetScaler optimization suite is, like other NetScaler features, driven by a policy-action architecture. 19
20 To enable HTTP compression for the Exchange 2013 content switching vserver, you should - Define the HTTP Compression Policies and Actions relevant to the service - Bind the service to the Exchange 2013 CS vserver. To define the Compression Policy and Action, click on the Policies option under HTTP Compression, shown above. This gives you the following screen - To add a new compression policy, click the Add button. This will give you the following screen. Here, you can define a name for the policy and an expression that defines when this policy is triggered (for example, when a particular URL is encountered.) To make the policy apply to all content, use true in the Expression window. For assistance here, click on the Frequently Used Expressions dropdown and the Response Action that should be taken. Here, the actions available are COMPRESS (GZIP or DEFLATE compression, with GZIP given priority), GZIP (GZIP standard compression), DEFLATE (DEFLATE compression) and NOCOMPRESS. Note that you should use true and not ns_true for the expression, as ns_true will make the compression policy a classic policy, which will not allow proper binding to the content switching vserver. If you have difficulties with binding the policy,please verify this setting. You can either add a new action or reconfigure the existing ones. You can add using the plus button, or edit/configure using the pencil-shaped button. Either option gives you a screen similar to the one shown below. 20
21 To offload all compression to NetScaler (and thus save CPU cycles on the server) you can disable server-side compression. By default, NetScaler will disable server-side compression, but in case it is enabled you can disable it by navigating to Optimization>HTTP Compression and clicking Change compression settings. Here, clear the check box for Allow Server-side compression if it is enabled. 21
22 Compression should be enabled on the service groups as well. To do this using the GUI, navigate to Traffic Management>Load Balancing>Service Groups. Here, you will see the individual service groups listed for each Exchange service (created using the base deployment guide listed earlier). Here, select each service group and click the edit button. This takes you to the Basic Settings screen for the service group, shown below. Here, click on the edit (pencil icon) next to the Settings section and then enable HTTP compression (already enabled in the screenshot above) Vary Header Insertion is an option that is relevant for caching; the value of the vary header allows different cache results to be returned for similar requests. For now, we are not changing the options presented here. You can add a new action that uses a compression type of your choice. Integrated caching After you enable the integrated cache feature and perform basic setup (for example, determining the amount of NetScaler appliance memory the cache is permitted to use), the integrated cache 22
23 uses built-in policies to store and serve specific types of static content, including simple web pages and image files. You can also configure the integrated cache to store and serve dynamic content that is usually marked as non-cacheable by web and application servers (for example, database records and stock quotes). To configure caching, you can use the integrated wizard that makes configuration very straightforward. To initiate the wizard, navigate to Optimization>Integrated Caching as shown below. You can initiate the Caching Wizard under Getting Started. The first step requires you to specify the content type. This can be either static (examples given) or dynamic. Helpful hints are provided as shown above to help determine which type of content is relevant for you. 23
24 The next step involves defining which content should be cached. The Frequently Used Expressions dropdown helps you define the correct expression; however, if you want the caching policy to run for all content, you can use ns_true as the expression, as shown below. The next screen allows you to define when content expires. This can be custom (a defined interval) or heuristic (NetScaler makes the determination based on a guideline percentage of the time since the object was last modified, with a pre-set deadline that is used in case the heuristic measurement cannot be made). 24
25 The next step involves definition of the caching space to be used on NetScaler and the minimum size of objects to be cached. Here, you should increase the setting for Do not cache if size exceeds (default set to 80KB) as relevant to your environment. If your deployment uses a large number of image/audio/video files or large documents, this size should be increased to a higher number so that caching performance is improved. Note, however, that the cache has a limit, and caching large objects will result in reaching this limit much faster. Finally, the cache policy should be bound to the Exchange content switching vserver cs_cas_443. These definitions can be made under Cache Policies as shown in the next screenshot.. 25
26 With respect to dynamic caching, NetScaler allows configuration of selectors and content groups. Selectors and content groups A content group is a container for cached objects that can be served in a response. When you first enable the integrated cache, cacheable objects are stored in a content group named Default. You can create new content groups that have unique properties. For example, you can define separate content groups for image data, bug reports and stock quotes, and you can configure the stock quote content group to be refreshed more often than the other groups. You can configure expiration of an entire content group or selected entries in a content group. The data in a content group can be static or dynamic: Static content groups. Find an exact match between the URL stem and host name on the request and the URL stem and host name of the response. Dynamic content groups. Look for objects that contain particular parameter-value pairs, arbitrary strings or string patterns. Dynamic content groups are useful when caching data that is updated frequently (for example, a bug report or a stock quote). When you add a selector to one or more content groups, you specify whether the selector is to be used for identifying cache hits or identifying cached objects to be invalidated (expired). Selectors are optional. Alternatively, you can configure content groups to use hit parameters and invalidation parameters. However, Citrix recommends that you configure selectors. Both of these features can be accessed using the navigation menu in the NetScaler GUI. 26
27 For more detailed information on integrated caching and the features described above, please refer to 10-con.html Front-end optimization The FEO feature set makes NetScaler an extremely capable optimization device by implementing enhanced optimization routines for specific front-end entities such as images, JavaScript, etc. These improve optimization performance by enabling compression and caching. FEO capabilities can be activated by navigating to Optimization>Front End Optimization. As with all NetScaler features, FEO capabilities are implemented using a policy-action mechanism. To add a new policy, click on Policies, then click Add in the section displayed to the right of the navigation menu. This will give you the following screen for definition of a new FEO policy. 27
28 The expression here works much on the same lines as expressed for the earlier features; the Frequently Used Expressions dropdown can be used for assistance. Certain predefined actions can be assigned here, all of which have different configurations for the same settings; you can also either edit or create a custom action using the plus or pencil buttons next to the Action name. Upon clicking either of these buttons, the following screen (or a similar one) is shown. This screen presents all the various FEO options available; NetScaler can help to optimize web traffic with JavaScript, image, cascading style sheets (CSS), HTML and miscellaneous optimization. This last section also allows for domain sharding, which splits resources across subdomains to improve optimization and page load times. (The profile shown above is for the Basic default setting, however the recommended setting here is Moderate.) 28
29 For FEO implementation, the profile to be used will vary significantly for each individual deployment, depending upon the mix of data that is being sent over in your organization. Therefore, it is recommended that you try out different built-in profiles/create custom profiles to see which of the available optimization options provides the best performance. Begin with the BASIC profile, evaluate performance and then move on to MODERATE/AGGRESSIVE to find the profile that gives you best performance improvements. Alternatively, you may configure your own custom FEO action. In our test deployment, primarily running text and basic HTML , we have used the following settings. Optimization Policy Name: Exchange_Optimization_Test Default Optimization Action: MODERATE (Preconfigured) Expression: HTTP.REQ.HEADER( Accept ).CONTAINS( html ) Alternate Configuration (Custom Policy) Optimization Policy Name: Exchange_Optimization_TestCustom Optimization Action: Exchange_Optimization_custom Expression: HTTP.REQ.HEADER( Accept ).CONTAINS( html ) Exchange_Optimization_TestCustom Configuration: Enabled Settings: JavaScript/Make Inline, JavaScript/Minify, Image/Optimize, Image/Convert GIF to PNG, Image/Make Inline, Image/Optimize, Image/Convert to WEBP, Image/Convert to JXR format, CSS/Make Inline, CSS/Move to Head Tag, CSS/Minify, CSS/Combine, CSS/Convert Imports to Links, HTML/Remove Comments from HTML You may use the default optimization action (Moderate) if you do not want to configure your own custom optimization action. The alternate configuration provides the recommended settings in case you do choose to create it. In the lab environment, these settings provide up to a 60 percent reduction in page load times and up to a 36 percent reduction in the amount of data transferred. This may vary significantly for your deployment based on the profile of data being transferred; therefore, it is recommended that you test multiple settings. Content filtering on NetScaler with Responder and Rewrite Note: the use of Responder and Rewrite is optional and allows administrators to configure several usage improvements for the deployment, such as making it easier to access URLs. The URL filtering capability with NetScaler can be found under AppExpert>Responder on the lefthand navigation menu in the NetScaler GUI. With the Responder feature, responses can be based on who sends the request, where it is sent from and other criteria with security and system management implications. The feature is simple and quick to use. By avoiding the invocation of more-complex features, it reduces CPU cycles and time spent in handling requests that do not require complex processing. 29
30 For example, for handling sensitive data such as financial information, if you want to ensure that the client uses a secure connection to browse a site, you can redirect the request to a secure connection by using instead of To use the Responder feature, first enable it on NetScaler from System>Settings>Configure Advanced Features. Then, navigate to AppExpert>Responder and click Policies to add a new policy. After clicking Add, the next screen allows you to configure the policy as well as the action bound to it. The policy determines the requests (traffic) for which an action has to be taken. This determination is made using the expression provided by the administrator. Multiple Frequently Used Expressions are available for use, as shown below. 30
31 To configure the action bound to this policy, click the pencil icon next to the action name indicated. Note that you will not be able to edit the default policies, only custom ones that you have created. To add a new policy, click the plus icon. The action can be to generate a custom response or redirect a request to a different, custom web page. The policy must be bound to a bind point put it into effect. A bind point refers to an entity where NetScaler examines the traffic to see if it matches a policy. For example, a bind point can be a load balancing vserver. You can specify a default action for requests that do not match any policy, and you can bypass the safety check for actions that would otherwise generate error messages. The Rewrite feature helps in rewriting some information in the requests or responses handled by NetScaler. For example, the following Rewrite action adds the /owa string to any user URL when it contains the organization s domain. 31
32 The policy that enables this action to be performed when the URL contains the organization s mail domain is defined as follows (again, these are configurable in the AppExpert>Rewrite section under Policies and Actions). Here, replace_host_name is the policy name, and replace_host_name is the action we defined earlier. There are differences between the Rewrite and Responder features. Responder cannot be used for response- or server-based expressions. Responder can be used only for the following scenarios, depending upon client parameters: Redirecting an HTTP request to new websites or web pages Responding with a custom response Dropping or resetting a connection at the request level 32
33 For a Rewrite policy, the NetScaler device examines the request from the client or response from the server, takes action according to the applicable policies and forwards the traffic to the client or the server. In general, it is recommended to use Responder if you want NetScaler to reset or drop a connection based on a client- or request-based parameter. Use Responder to redirect traffic or respond with custom messages. Use Rewrite for manipulating data on HTTP requests and responses. Conclusion NetScaler enables a secure and optimized experience with Microsoft Exchange 2013 through a superior set of optimization and authentication capabilities. NetScaler not only helps deliver a load balanced and responsive Exchange system, but also provides several additional capabilities such as two-factor authentication and front-end optimization. Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2014 of $3.14 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at Copyright 2015 Citrix Systems, Inc. All rights reserved. Citrix and NetScaler are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies /PDF 33
Microsoft TMG Replacement with NetScaler
Microsoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for Optimization This deployment guide focuses on replacing Microsoft Forefront Threat Management Gateway (TMG)
Deploying Microsoft Dynamics CRM 2015 with NetScaler
Deploying Microsoft Dynamics CRM 2015 with NetScaler Deployment Guide This deployment guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler. It includes information
Deploying NetScaler with Microsoft Exchange 2016
Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features
Using Vasco IDENTIKEY Server with NetScaler
Using Vasco IDENTIKEY Server with NetScaler Deployment Guide This deployment guide describes the process for deploying Vasco IDENTIKEY server with NetScaler to enable secure authentication for application
Single Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
icrosoft TMG Replacement with NetScaler
icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled
How To Use Netscaler As An Afs Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
Deploying NetScaler Gateway in ICA Proxy Mode
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
Replacing Microsoft Forefront TMG with Citrix NetScaler for enterprise authentication
NetScaler deployment guide Replacing Microsoft Forefront TMG with Citrix NetScaler for enterprise authentication Prepared by: Abhishek RVRK Sharma, Networking and Cloud Authors The following authors contributed
Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com
Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace
Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
Solution Guide. Optimizing Microsoft SharePoint 2013 with Citrix NetScaler. citrix.com
Solution Guide Optimizing Microsoft SharePoint 2013 with Citrix NetScaler Table of Contents Overview of SharePoint 2013 3 Why NetScaler Optimization Solution for SharePoint 2013? 3 Product Versions and
Microsoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall
Solution Guide Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall Solution Guide This solution guide provides guidelines for securing Exchange 2013 Outlook Web Access (OWA) with NetScaler
Single Sign On for GoToMeeting with NetScaler
Deployment Guide Single Sign On for GoToMeeting with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into GoToMeeting with Citrix NetScaler.
Configuring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
This guide identifies two possible enterprise integration scenarios for NetScaler and Azure AD.
Solution Guide Integrating NetScaler with Microsoft Azure Active Directory Enterprise Use Case Guidelines Enable NetScaler integration with Azure AD for XenApp and XenDesktop delivery as well as enterprise
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
Single Sign On for ZenDesk with NetScaler. Deployment Guide
Deployment Guide Single Sign On for ZenDesk with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into ZenDesk with Citrix NetScaler. Table of
Citrix Lifecycle Management
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
Provisioning ShareFile on Microsoft Azure Storage
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
Replacing Microsoft Forefront TMG with Citrix NetScaler for Website Publishing
NetScaler Deployment Guide Replacing Microsoft Forefront TMG with Citrix NetScaler for Website Publishing Prepared by: Abhishek RVRK Sharma, Networking and Cloud Authors The following authors contributed
Single Sign On for Google Apps with NetScaler. Deployment Guide
Deployment Guide Single Sign On for Google Apps with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Google Apps for Work with Citrix NetScaler.
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Single Sign On for Office 365 with NetScaler. Deployment Guide
Deployment Guide Single Sign On for Office 365 with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Microsoft Office 365 with Citrix NetScaler.
Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013. citrix.com
Solutions Guide Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync 2013 Table of Contents Introduction 3 Overview of Microsoft Lync 2013 3 Why NetScaler GSLB Solution for Lync
Taking Windows Mobile on Any Device
Taking Windows Mobile on Any Device As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today s fast-paced workforce and at the
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
603: Enhancing mobile device experience with NetScaler MobileStream Hands-on Lab Exercise Guide
603: Enhancing mobile device experience with NetScaler MobileStream Hands-on Lab Exercise Guide Christopher Rudolph January 2015 1 Table of Contents Contents... 2 Overview... 3 Scenario... 6 Lab Preparation...
Solution Guide for Citrix NetScaler and Cisco APIC EM
Solution Guide for Citrix NetScaler and Cisco APIC EM Orchestrating Network QoS policy for delivering enhanced video experience to XenDesktop users Table of contents Solution Overview 3 Executive Summary
Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide. Johnathan Campos
Improving Microsoft Exchange 2013 performance with NetScaler Hands-on Lab Exercise Guide Johnathan Campos Contents Contents... 1 Overview... 2 Scenario... 6 Exercise 1 - Initial Configuration... 7 Exercise
How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
Deployment Guide ICA Proxy for XenApp
Deployment Guide ICA Proxy for XenApp Access Gateway Enterprise Edition (NetScaler AGEE) www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Network Diagram...5
NetScaler carriergrade network
White Paper NetScaler carriergrade network address translation Preserve IPv4 network investments, consolidate application delivery control in one platform and lower capex and opex Protect your investment
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Deployment Guide. Microsoft SharePoint Deployment Guide. Utilizing the Acceleration and Optimization Features of Citrix NetScaler A Technical Guide
Deployment Guide Microsoft SharePoint Deployment Guide Utilizing the Acceleration and Optimization Features of Citrix NetScaler A Technical Guide Deployment Guide Introduction Microsoft SharePoint is becoming
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
Mobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
NetScaler for the best XenApp/XenDesktop access and mobile experience
NetScaler for the best XenApp/XenDesktop access and mobile experience Discover 10 reasons NetScaler is the best way to futureproof your infrastructure As you refresh your network, it s important to understand
XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology
Citrix Frequently Asked Questions White Paper XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology Frequently Asked Questions February 2016 Prepared by: Citrix Windows App Delivery Product
Citrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
Application Template Deployment Guide
DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Application Template Deployment Guide Oracle E-Business Suite 12.1 www.citrix.com DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Table of Contents Introduction...3
Microsoft Exchange Client Access Servers
F5 Deployment Guide Microsoft Exchange Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide. Use this document for guidance on configuring
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Top Three Reasons to Deliver Web Apps with App Virtualization
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
Windows XP Application Migration Checklist
Windows XP Application Migration Checklist Accelerate XP migration planning 2 Whether just beginning a Microsoft Windows XP application migration project or moving forward on an existing project, it s
Run Skype for Business as a Secure Virtual App with a Great User Experience
Run Skype for Business as a Secure Virtual App with a Great User Experience Improve security and manageability while avoiding the performance problems of traditional virtual installations. Deliver secure,
App Orchestration 2.5
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Comprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
Optimizing service assurance for XenServer virtual infrastructures with Xangati
Solutions Brief Optimizing service assurance for XenServer virtual infrastructures with Xangati As IT organizations adopt application, desktop and server virtualization solutions as the primary method
Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
The Office Reinvented: Mobile Workspaces are the Future of Work
The Office Reinvented: Mobile Workspaces are the Future of Work How Citrix, Google and Samsung enable secure business mobility. Business mobility empowers people with a convenient and complete work experience
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile
Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Citrix ShareFile Enterprise: a technical overview citrix.com
Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose
Citrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
Modernize your business with Citrix XenApp 7.6
Modernize your business with Citrix XenApp 7.6 Avoid non-compliance issues and keep your business running smoothly by upgrading your SAP environment to run on top of the latest Citrix and Microsoft technologies
Powering real-time mobile access to critical information with ShareFile
Powering real-time mobile access to critical information with ShareFile An enterprise file sync and sharing solution built for the needs of the energy, oil and gas industry to provide employee and third-party
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers
Deployment Guide Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide.
Citrix TriScale clustering tech note
Citrix TriScale Clustering Citrix TriScale clustering tech note 2 Expanding capacity with TriScale clustering Citrix TriScale clustering provides the ability to scale out Citrix NetScaler capacity to massive
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
Use FortiWeb to Publish Applications
Tech Brief Use FortiWeb to Publish Applications Replacing Microsoft TMG with a FortiWeb Web Application Firewall Version 0.2, 27 June 2014 FortiWeb Release 5.2.0 Introduction This document is intended
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
Secure remote access
Simple, secure access to apps and desktops from anywhere Today s fast-paced business world requires IT organizations to supply tools that allow employees to quickly react to the demands of a competitive
Citrix StoreFront 2.0
White Paper Citrix StoreFront 2.0 Citrix StoreFront 2.0 Proof of Concept Implementation Guide www.citrix.com Contents Contents... 2 Introduction... 3 Architecture... 4 Installation and Configuration...
Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com
Solution Brief Deliver Production Grade OpenStack LBaaS with Citrix NetScaler Enterprises are increasingly turning to private cloud architectures for increased agility and greater operational efficiency
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide
Deployment Guide May-2015 rev. a APV Oracle PeopleSoft Enterprise 9 Deployment Guide 1 Introduction... 3 2 Prerequisites and Assumptions... 4 2.1 Oracle PeopleSoft Enterprise... 4 2.2 Array Networks APV
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
Enterprise- Grade MDM
Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has
Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility
White Paper Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility Business Agility Requires Data Center Agility Today s successful enterprises innovate and respond to change faster than
Virtual desktops in hospitals: streamlining clinical workflows
Virtual desktops in hospitals: streamlining clinical workflows How providers leverage Citrix and Imprivata solutions to optimize clinical workflows improving quality of care, while complying with industry
Microsoft Exchange Server
Deployment Guide Document Version: 4.9.2 Deploying the BIG-IP System v10 with Microsoft Welcome to the F5 and Microsoft Exchange 2010 deployment guide. This document contains guidance on configuring the
Resonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led
Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led Course Description The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6. Introduction The purpose of this document is to record the steps required to configure a NetScaler Gateway for use
The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video
The Trainer s Guide to Using Video Streaming, Video Conferencing and On-Demand Video How to effectively add video into elearning Integrating video into online learning is an undeniably hot topic, but determining
CNS-208 Citrix NetScaler 10 Essentials for ACE Migration
KURSBESCHREIBUNG CNS-208 Citrix NetScaler 10 Essentials for ACE Migration The objective of the Citrix NetScaler 10 Essentials for ACE Migration course is to provide the foundational concepts and advanced
Design and deliver cloudbased apps and data for flexible, on-demand IT
Design and deliver cloudbased apps and data for flexible, on-demand IT Discover the fastest and easiest way for IT to enable business productivity using cloud-based management and delivery of complete
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Microsoft Exchange 2016 DEPLOYMENT GUIDE
Microsoft Exchange 2016 DEPLOYMENT GUIDE Table of Contents Introduction...3 Deployment Prerequisites...3 Accessing the Thunder ADC Device...3 Architecture Overview...3 Validating Exchange 2016 Configuration...4
Secure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
