White paper. Load balancing basics. Updated 12-07
|
|
- Patricia Walton
- 8 years ago
- Views:
Transcription
1 White paper Load balancing basics Updated 12-07
2 Table of Contents Overview Traditional load balancing... 3 Improving network traffic management... 4 Accelerating application performance... 4 Application-aware delivery... 6 Conclusion...7 About Citrix NetScaler...7 Glossary of terms Appendix A...8
3 Overview As the global business environment has evolved, companies have significantly expanded their reliance on remote and mobile access to business applications over the Internet. Applications that must be available to employees in the field, in branch offices and in home offices are increasingly delivered via a corporate intranet or portal. Further, for many organizations, externally facing websites are an integral component of day-in/day-out business interactions with customers, suppliers and partners. In addition, due to the incorporation of Web 2.0 functionality, applications have become far more dynamic and interactive compared to their predecessors. For all these reasons, businesses recognize they cannot function effectively without a robust solution to ensure uninterrupted, secure and high-performance access to network-based business applications and corporate websites. This reliance upon Internet-delivered applications has also changed how businesses look at their underlying network infrastructure. On one hand, organizations understanding of how critical network infrastructure works has never been higher. On the other, companies want to know explicitly how the network is enhancing their ability to deliver new application services. To a business, the network s value is not its own availability, performance and security, but rather its ability to improve the availability, performance and security of the businesses applications it serves. As such, networks must evolve from highways designed to push packets into more-active participants in the end-to-end delivery of application services. For this to occur, many components of the network will need to evolve at a fundamental level. Traditional load balancing What has traditionally been known as load balancing is one such component. Load balancers sit at a critical junction between users and the applications they access, which are typically hosted on servers. They are designed to evenly distribute among available servers the user requests that come in over the network so an individual server does not become overwhelmed with traffic. Basic load balancers direct traffic based on Layer 4 the connection layer of the Open System Interconnection (OSI) model. Layer 4 load balancers look at the packet s addressing information IP address and port number and must support: Server health checks that determine whether individual servers are up or down Load balancing algorithms that determine which of the up application servers will receive the request The most common algorithm is a round-robin that prompts the load balancer to go down the list of servers from top to bottom and then begin again. However, this assumes all requests will have a similar load and duration, and that all servers are available. More-advanced algorithms use factors such as server utilization level and current-connection counts to select the most appropriate server. Initially, load-balancing capabilities were built directly into the application software or the operating system of the underlying application server. These approaches transitioned into using application-neutral, purpose-built, network-based appliances. Network-based appliances enable load-balancing of all applications, not just those with built-in functionality. In addition to these advancements, the load balancing process itself needs to evolve from simple packet delivery to application delivery. The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide not only traditional networking traffic management functions, but also a comprehensive set of networklevel and application-level services. To ensure the business is getting the investment protection to meet both near and longer-term requirements, today s loadbalancing solutions should provide the following functionality as part of either the base offering, or as post-deployment software upgrades: Network traffic management functionality to ensure application availability and even distribution of load across a server farm or multiple farms Application acceleration functionality to accelerate application performance by 5X or more Application-aware delivery functionality to protect applications and their data, control access and monitor end-user performance 3
4 Improving network traffic management Layer 4 load balancing Directing traffic based upon IP address and port number has become standard functionality, but that doesn t diminish its importance. Solutions must support a wide variety of loadbalancing algorithms that direct traffic based upon network, server and application loads. Session persistence: In some cases it is important to have a single server handle all of a user s transactions for the length of that session. The obvious one is online shopping. Regardless of how the user jumps around looking at brochure content, their shopping cart entries have to go to the same place all the time. Session persistence ties the requests from one client to the same server node. Common functionality used to maintain session persistence includes cookies and header IDs. However, maintaining persistence for the latest generation of applications can require basing persistence on applicationspecific content (e.g., a transaction ID in an XML document) carried in the payload body. Server health monitoring: Health checks to ensure a server s availability can prevent directing of a request to a failed server. At a basic level, the load balancer can keep checking the server port to determine its status. However, just because the network and server are responding doesn t mean the application itself is available. Solutions should be able to check the health of the applications themselves when marking servers or services up or down. Layer 7 request switching To advance to the next generation of traffic management, load balancers began to use Layer 7 of the OSI model the application layer to read the packet payload instead of just the addressing information to determine the best place to send the traffic. Content switching at Layer 7 provides intelligent traffic management, enabling application-layer information such as client type, requested URL, cookie information and application software usage to be used to optimize delivery, without requiring changes to Layer 4 network addressing. Switching at Layer 7 instead of at the connection level (Layer 4) enables better utilization of server resources. For example, because different types of content have different requirements for CPU usage, I/O throughput, etc., it is possible to increase efficiency by using some servers to handle transactions, and others to provide storage or other functions. Also, with Layer 7 request switching, certain users can be directed to higher-power servers to provide the highest service level. Global server load balancing In addition to enhancing load balancing with Layer 7 request switching, organizations can benefit from global server load balancing (GSLB) across the entire enterprise. GSLB balances requests from users across a geographically distributed set of server farms based on health, load or proximity. Effective solutions support several load-balancing algorithms (e.g., least response time, least packets), as well as geographic proximity and network proximity, to intelligently distribute the load across multiple datacenters. GSLB gives network administrators the ability to provide high availability and optimal application performance for remote users worldwide. Other benefits include reducing bandwidth costs and latency. As part of a comprehensive business continuity solution, global server load balancing transparently ensures that requests are routed only to datacenters or failover sites that are operating normally. GSLB technology gives IT administrators the ability to create policies defining site health based upon site status, connection load and packet rate. By continuously monitoring the health of each datacenter and associated network links, GSLB solutions maintain a global view of the entire hosting infrastructure s status. In the event that a hosting site cannot meet the criteria of the health policy, further incoming requests are automatically directed to sites still deemed healthy. When availability is restored, new requests are transparently directed back to the original site. High application availability with Global Server Load Balancing A U.S. beverage company needed a solution to loadbalance requests from global users to access a missioncritical application over the web. Through global server load balancing capability, the solution directs user requests to the optimal server, provides high availability, maximizes server resources, and provides traffic management for the company s multi-site enterprise. Accelerating application performance Initially, users were willing to accept slow application performance in exchange for the convenient, widely available access the Web provides. But not any more. Users now expect applications delivered via the Internet to offer performance similar to that of locally deployed applications. The flexibility to add functionality 4
5 that accelerates application performance has become critical in meeting the larger business goal of successfully delivering applications over the Internet. All too often, problems with application performance are deemed to be a function of server hardware after network infrastructure has been ruled out. Although the server has a direct impact on processing performance, it is not necessarily directly related to application performance. There needs to be a distinction between processing and application performance. Simply increasing processing power in a server may have little or no effect on application performance and scalability. The same may be said for adding load-balanced servers to cope with increased load. Offloading tedious or repetitive processes from application servers can free them to perform their main functions of serving content. Offloading also enables servers to scale up beyond their original capacity while accelerating application content delivery. Following are important technologies that can enhance basic load balancing by reducing server workload and accelerating application performance: Caching: Caching static content can help relieve the burden on servers. However, more and more applications rely upon content that is dynamically generated each time a request is made. In many cases, the same content (e.g., sales reports) is repetitively generated for every user. The load balancer can store content in a cache so that some requests can be handled without contacting the server. Caching dynamic content can accelerate application performance by up to 30X. Using caching to optimize server performance A government organization overseeing public transport was experiencing huge growth in traffic needed to ensure its public website could cope with more users, as well as unpredictable spikes in Web traffic. Because much of the information requested on the site is repetitive, the solution caches all commonly required content such as HTML, images, PDFs, JavaScript and XML. Removing this burden from the Web server infrastructure optimized existing servers and considerably improved response times. Up to 40 percent of all server requests are delivered entirely from the cache. Compression: Compressing content minimizes the amount of data that must traverse the wire and also decreases the back and forth overhead of TCP that is so sensitive to latency. Network congestion is reduced, and applications can be accelerated by three to five times. SSL Offload: Offloading encryption/decryption onto a dedicated device to reduce datacenter costs removes the burden of SSL processing from the server. Offloading can significantly lower CPU utilization and even enable fewer servers to handle application loads. TCP Multiplexing: TCP overhead can slow any application s performance. TCP optimization reduces the number of client connections each application server has to deal with while optimizing server response. The result is a server that can support an increased number of users. This can extend the life of existing hardware while delivering application content with much better performance. Reducing server load with TCP multiplexing An online media provider sought a way to support dramatic increases in online traffic during major sports events without over-investing in servers. A TCP multiplexing solution that consolidated multiple user TCP sessions into fewer sessions on the Web servers allowed the servers to focus on processing user requests. As a result, the servers load dropped dramatically, while throughput experienced a strong increase all without the cost of adding more servers. The company was able to reduce the number of servers required to support its Web site by 66 percent. TCP optimization: Latency, network congestion and TCP overhead can slow any application s performance. In order to minimize the unnecessary TCP transmissions and round trips that increase network congestion, solutions should support network optimizations such as limited transmit and fast retransmit, windows scaling, selective acknowledgement and TCP buffering. 5
6 Application-aware delivery For networks to provide true business value, they must advance from merely transporting network packets from point A to point B to actively improving the applications themselves. To do this, solutions must be able to inspect all aspects of application traffic, take action based upon this inspection, and potentially change or act on behalf of the applications themselves. With these capabilities, the network becomes an enabler of overall business agility and flexibility. One of the most important capabilities is improved application security. Network firewalls and authentication solutions have largely secured the network itself. However, applications themselves remain surprisingly vulnerable to attack. Cross-site scripting, buffer overflows, SQL injection and other common hacking techniques are continually used to steal valuable customer and corporate data from applications. As application services are rolled out to employees, agents, customers and contractors on a global basis, the need to finely control which users have access to which functions in which applications has increased. SSL VPNs have emerged as the de facto method for providing trusted application access. Integrating SSL VPNs and application security with load balancing and traffic management strengthens end-to-end application security and simplifies the IT infrastructure. Another important functionality that improves application delivery is end-user performance monitoring solutions. SSL VPN with granular access control: With the prevalence of Internet threats, organizations need to control who is accessing corporate applications and what actions they are taking with each application. By integrating special SSL VPN technology with granular access control into a load-balancing solution, administrators can control both access and actions (such as downloading, printing or saving) of remote and mobile users who want to connect to applications over the Internet, mitigating the risk of opening the corporate network to threats. firewalls because they look at all content within every request and response. Some application firewalls look for certain attack signatures to try to identify a specific attack that an intruder may be sending, but this only protects against known attacks. True application-layer defense protects against known and unknown attacks. Improved security of access by home-based workers A newspaper publishing company wanted to enable employees to connect to network resources from home computers to meet tight deadlines without compromising security. An advanced SSL VPN solution allows IT administrators to define granular access policies for different users. End-point analysis allows them to thoroughly check each device that connects to the network and ensure it meets security requirements. With these security capabilities the company agreed to let workers monitor content and make changes necessitated by late-breaking news from home. Work is performed more quickly, deadlines are met and people do not have to drive into the office. In many respects, the final frontier of successful application delivery is obtaining direct feedback on how the applications themselves are performing. Ultimately, applications and networks are only as good as the perception of the people who use them. Directly monitoring end users actual experience with an application is critical to understanding how effectively users are served, and how well the network is working. The point in the network where load balancers are traditionally deployed is an ideal junction for performing this monitoring. As such, solutions should provide the ability to directly and transparently measure and track end-user performance. Application firewall: With over 70% of successful Internet attacks now exploiting application vulnerabilities, network firewalls are not enough. Standard firewalls are designed to restrict access to certain ports or services that an administrator doesn t want unauthorized people to access. In contrast, application firewalls are often called deep packet inspection 6
7 Conclusion Fundamental changes are affecting networks, particularly the sweeping transformations of Web 2.0. Because Web 2.0 is driving greater user participation, openness and network effects, tomorrow s networks will require infrastructure that is agile, flexible and dynamic. Is your organization prepared for these changes with a load-balancing solution that can optimize application performance, ensure high application availability and provide tools to safeguard data and improve the application experience? Citrix NetScaler offers a powerful and comprehensive solution to these challenges. About Citrix NetScaler Application-aware delivery: NetScaler protects applications from application-layer attacks, helping to prevent the theft and leakage of valuable corporate and customer data. The latest version, 8.0, includes application firewall technology that proactively protects against application-layer attacks and helps prevent theft and leakage of valuable corporate and customer data. It also includes real-time and historical page-level monitoring of the end-user experience with application performance. NetScaler 8.0 makes secure access to applications easier by tightly integrating SSL technology that automatically responds to each user scenario with the appropriate level of application access, including control of actions such as print, save and edit. Citrix NetScaler from Citrix Systems, Inc., is an ideal solution for any enterprise organization seeking basic and advanced load balancing capability combined with application performance enhancement, improved application security and increased application availability for users. Citrix NetScaler integrates all the critical functionality of Layer 4-7 network traffic management, application acceleration and application-aware delivery in a single appliance. Load balancing: NetScaler delivers fine-grained direction of client requests to ensure optimal distribution of traffic to servers. In addition to Layer 4 addressing information (protocol and port number), traffic management policies can be based on application content. For example, administrators can segment application traffic based upon information contained within an HTTP request body or TCP payload, as well as Layer 4-7 header information such as URL, application data type or cookie. Numerous load-balancing algorithms and extensive server health checks provide greater application availability by ensuring client requests are directed only to correctly behaving servers. Web application acceleration: Citrix NetScaler accelerates Web application performance by up to five times by leveraging multiple acceleration technologies including data compression and caching of static and dynamic content. NetScaler TCP optimizations overcome the issues caused by high latency and congested network links and are transparent to clients and servers, accelerating the delivery of any application while requiring little or no configuration. 7
8 Appendix A Glossary of terms Application firewall An enhanced firewall that limits access to the operating system (OS) of a computer. Conventional firewalls merely control the flow of data to and from the central processing unit (CPU), examining each packet and determining whether or not to forward it toward a particular destination. An application firewall offers additional protection by controlling the execution of files or the handling of data by specific applications. Application-layer attack Targets application servers by deliberately causing a fault in a server s operating system or applications, which results in the attacker gaining the ability to bypass normal access controls. Caching Local storage of remote data on a file server, which is designed to reduce network transfers and therefore increase speed of download. Compression Encoding data to take up less storage space and less bandwidth for transmission. Content switching Allows traffic management to be based on application-layer content such as the information contained in the body of a TCP or HTTP request. Global server load balancing, GSLB, (also known as global traffic management) The load balancer distributes load to a geographically distributed set of server farms based on health, server load or proximity. Layer 4 (Transport layer of the Open System Interconnection model) Provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. Layer 7 (Application layer of the Open System Interconnection model) Defines the services that directly support applications, such as software for network management, electronic mail or file transfers. It interfaces directly to and performs common application services for the application processes. Load balancing A technique performed by load balancers to spread work between many computers, processes, hard disks or other resources in order to get optimal resource utilization and decrease computing time. SSL offloading Relieves a Web server of the processing burden of encrypting and/or decrypting traffic sent via SSL, the security protocol that is implemented in every Web browser. The processing is offloaded to a separate device designed specifically to perform SSL acceleration. SSL VPN Provides a comprehensive, secure remote access technology for remote users without the use of additional remote client software, but instead uses common client technology and industry-standard Secure Sockets Layer technology for content privacy. TCP optimization Reduces the number of client connections each application server has to deal with while optimizing server responses. Web 2.0 applications Deliver software as a continually updated service that gets better the more that people use it, consuming and remixing data from multiple sources including individual users. Web server farm A redundant cluster of several Web servers serving a single IP address. 8
9 Citrix Worldwide Worldwide headquarters Citrix Systems, Inc. 851 West Cypress Creek Road Fort Lauderdale, FL USA T T Regional headquarters Americas Citrix Silicon Valley 4988 Great America Parkway Santa Clara, CA USA T Europe Citrix Systems International GmbH Rheinweg Schaffhausen Switzerland T Asia Pacific Citrix Systems Hong Kong Ltd. Suite 3201, 32nd Floor One International Finance Centre 1 Harbour View Street Central Hong Kong T Citrix Online division 5385 Hollister Avenue Santa Barbara, CA USA T Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. CITRIX SYSTEMS, INC. ( CITRIX ), SHALL NOT BE LIABLE FOR TECHNICAL OR EDITORIAL ERRORS OR OMISSIONS CONTAINED HEREIN, NOR FOR DIRECT, INCIDENTAL, CONSEQUENTIAL OR ANY OTHER DAMAGES RESULTING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS PUBLICATION, EVEN IF CITRIX HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN ADVANCE. THE USE CASES IN THIS PAPER ARE PROVIDED ONLY AS POTENTIAL EXAMPLES AND YOUR ACTUAL COSTS AND RESULTS MAY VARY. About Citrix Citrix Systems, Inc. (Nasdaq:CTXS) is the global leader and the most trusted name in application delivery infrastructure. More than 200,000 organizations worldwide rely on Citrix to deliver any application to users anywhere with the best performance, highest security, and lowest cost. Citrix customers include 100% of the Fortune 100 companies and 98% of the Fortune Global 500, as well as hundreds of thousands of small businesses and prosumers. Citrix has approximately 6,200 channel and alliance partners in more than 100 countries. Annual revenue in 2006 was $1.1 billion Citrix Systems, Inc. All rights reserved. Citrix and NetScaler are trademarks or registered trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. PDF
Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH
W H I T E P A P E R Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH Table of Contents 2 Network Firewalls: Notable Facts Why that s good Why that s not good enough
More informationFeatures of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
More informationWhite paper. Keys to SAP application acceleration: advances in delivery systems.
White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional
More informationHow To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
More informationBenefits of Citrix NetScaler for Ajax Applications
Benefits of Citrix NetScaler for Ajax Applications W H I T E P A P E R Table of Contents 2 Ajax and Web Applications 2 What is Ajax? 3 Ajax and Citrix NetScaler 4 Improving Data Center Efficiency Request
More informationApplication Template Deployment Guide
DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Application Template Deployment Guide Oracle E-Business Suite 12.1 www.citrix.com DEPLOYMENT GUIDE NetScaler, Oracle EBS 12.1 Table of Contents Introduction...3
More informationExecutive summary. Introduction Trade off between user experience and TCO payoff
Virtual desktop White Paper How fast is my virtual desktop? Delivering a high definition desktop experience to branch office users with Citrix Branch Repeater DVI www.citrix.com Executive summary Emerging
More informationDEPLOYMENT GUIDE XenApp, Avaya 1X Agent. Deployment Guide. Avaya 1X Agent. XenApp. www.citrix.com
Deployment Guide Avaya 1X Agent XenApp www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Usage Modes...4 Network Diagram...5 Compatibility Matrix...6 XenApp
More informationCloud Networking Services
Cloud computing is a compelling way to deliver web-based and non-web-based applications that better utilize the physical infrastructure, while lowering costs by moving from silos of expensive customized
More informationThe Benefits of Virtualizing Citrix XenApp with Citrix XenServer
White Paper The Benefits of Virtualizing Citrix XenApp with Citrix XenServer This white paper will discuss how customers can achieve faster deployment, higher reliability, easier management, and reduced
More informationWhite paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
More informationKEYS TO ACCELERATING WEB APPLICATION DELIVERY
KEYS TO ACCELERATING WEB APPLICATION DELIVERY Citrix NetScaler TABLE OF CONTENTS Business Applications Are Essential Treat The Symptoms or Solve The Problem? Application Delivery as a Strategy Citrix NetScaler:
More informationCitrix Solutions for Complying with PCI-DSS ENSURING PROTECTION OF WEB APPLICATIONS AND PRIVACY OF CARDHOLDER INFORMATION
W H I T E P A P E R Citrix Solutions for Complying with PCI-DSS ENSURING PROTECTION OF WEB APPLICATIONS AND PRIVACY OF CARDHOLDER INFORMATION Table of Contents 2 Overview 2 A Tale of Abandonment, Missed
More informationDeployment Guide ICA Proxy for XenApp
Deployment Guide ICA Proxy for XenApp Access Gateway Enterprise Edition (NetScaler AGEE) www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Network Diagram...5
More informationConfiguring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
More informationBuilding a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
More informationDesktop virtualization and the branch office. Optimizing virtual desktops and applications to the branch office VDI. www.citrix.
Desktop virtualization and the branch office White Paper Optimizing virtual desktops and applications to the branch office VDI www.citrix.com Introduction The challenge of managing applications and desktop
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationAccelerated application performance. Comprehensive application security
Citrix NetScaler Product Overview Application Delivery System integrating comprehesive application acceleration, traffi c management, security and performance and visibility Citrix NetScaler web application
More informationExtending Microsoft Hyper-V with Advanced Automation and Management from Citrix
Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix August 2009 Table of Contents Introducing Citrix Essentials for Hyper-V 3 Challenges of Server Virtualization 3 Components
More informationNetScaler SQL Intelligent Load Balancing. Scaling the Data Tier with. www.citrix.com
Scaling the Data Tier with Citrix NetScaler SQL Intelligent Load Balancing www.citrix.com Executive summary The growth of social networks, video, mobile and the Web in general has resulted in an explosion
More informationAdvanced virtualization management for Hyper-V and System Center environments. www.citrix.com
Advanced virtualization management for Hyper-V and System Center environments www.citrix.com Introduction Microsoft Hyper-V provides a dynamic, reliable and scalable virtualization platform enabling cost
More informationFive reasons why you need Citrix Essentials for Hyper-V now
Five reasons why you need Citrix Essentials for Hyper-V now This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with
More informationWhite paper. Improving visibility to user login experience with Citrix EdgeSight
White paper Improving visibility to user login experience with Citrix EdgeSight Table of contents Introduction...1 Citrix end-user experience monitoring service overview...2 The Presentation Server login
More informationMicrosoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
More informationIs your load balancer cloud ready? How NetScaler helps enterprises achieve cloud computing benefits. www.citrix.com
Is your load balancer cloud ready? How NetScaler helps enterprises achieve cloud computing benefits www.citrix.com Executive summary Cloud computing is one of the emerging developments in IT service delivery.
More informationSecure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
More informationWhat is an application delivery controller?
What is an application delivery controller? ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery
More informationAppFlow: next-generation application performance monitoring. www.citrix.com
AppFlow White Paper AppFlow: next-generation application performance monitoring www.citrix.com Introduction: monitoring application performance has become more complex In today s always-on and connected
More informationStaying Ahead of the Hacker Curve Turn-key Web Application Security Solution
White Paper and Cenzic Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution Website Testing / Vulnerability Scanning (Cenzic) & Web Application Firewall (Citrix) www.citrix.com
More informationCitrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
More informationNetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway
NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise
More informationThe Application Delivery Controller Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking
More informationBrocade Virtual Traffic Manager and Microsoft IIS Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,
More informationCisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility
White Paper Cisco ACI and Citrix NetScaler: Opening the Way to Data Center Agility Business Agility Requires Data Center Agility Today s successful enterprises innovate and respond to change faster than
More informationAdvanced virtualization management for Hyper-V and System Center environments
Advanced virtualization management for and System Center environments Microsoft extends the management capabilities of and System Center Virtual Machine Manager giving Microsoft customers a scalable, advanced
More informationOptimizing with Citrix NetScaler. Three keys to building the best front-end network for virtual desktop delivery. www.citrix.com
Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual
More informationThe Application Front End Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.
More informationHealthcare Security and HIPAA Compliance with A10
WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308
More informationWhite paper. Cutting datacenter costs with server and infrastructure offload A technical guide
White paper Cutting datacenter costs with server and infrastructure offload A technical guide Table of contents Overview Primary mechanisms for server offload... 4 Secondary mechanisms for reducing and
More informationWHITE PAPER. Pay-as-You-Grow Licensing. Pay-as-You-Grow: Flexible Capacity in the Datacenter with On-Demand Licensing. www.citrix.
WHITE PAPER Pay-as-You-Grow Licensing Pay-as-You-Grow: Flexible Capacity in the Datacenter with On-Demand Licensing www.citrix.com Executive Summary Today s organizations routinely experience both temporary
More informationMicrosoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
More informationWhite Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com
Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge Video content usage within the enterprise is growing significantly. In fact, Gartner forecasted that by 2016, large
More informationDeployment Guide. Microsoft SharePoint Deployment Guide. Utilizing the Acceleration and Optimization Features of Citrix NetScaler A Technical Guide
Deployment Guide Microsoft SharePoint Deployment Guide Utilizing the Acceleration and Optimization Features of Citrix NetScaler A Technical Guide Deployment Guide Introduction Microsoft SharePoint is becoming
More information2048-bit SSL. Best practices for implementing. www.citrix.com
Best practices for implementing 2048-bit SSL www.citrix.com Executive summary Secure sockets layer (SSL) technology continues to be essential to the growth of the web. With unabated increases in ecommerce
More informationSimplicity is power.
IT, Simplified. Simplicity is power. Corporate vision A world where anyone can work and play from anywhere. NASDAQ CTXS Member of the NASDAQ 100 and S&P 500 Index. Revenue FY08 $1.6 billion Employees 4,000
More informationCitrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com
Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using
More informationBest practices for implementing
Best practices for implementing 2048-bit SSL www.citrix.com Executive summary Secure sockets layer (SSL) technology continues to be essential to the growth of the web. With unabated increases in ecommerce
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationHigh availability and disaster recovery with Microsoft, Citrix and HP
High availability and disaster recovery White Paper High availability and disaster recovery with Microsoft, Citrix and HP Using virtualization, automation and next-generation storage to improve business
More informationLoad Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
More informationCisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationFortiBalancer: Global Server Load Balancing WHITE PAPER
FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success
More information7 Key Requirements for Secure Remote Access
W H I T E P A P E R 7 Key Requirements for Secure Remote Access The world is more dynamic and unpredictable than ever before and market forces are driving change at an unprecedented rate across both business
More informationAccelerating Microsoft Windows 7 migrations with Citrix XenApp
Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption
More informationSecuring virtual desktop infrastructure with Citrix NetScaler
Securing virtual desktop infrastructure with Citrix NetScaler 2 Today s enterprises are rapidly adopting desktop virtualization as a means to reduce operating costs, enable workplace flexibility, increase
More informationSolutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com
Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB Table of Contents Introduction 3 Overview of Microsoft Exchange 2013 3 Why NetScaler GSLB for Exchange 2013? 3 Topology 3 Single Namespace
More informationCitrix Access Gateway
F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome
More informationWhite paper. Getting started with EdgeSight for Load Testing
White paper Getting started with EdgeSight for Load Testing Table of contents Introduction... 1 Overview... 2 Defining Load... 3 Connections... 4 Define Users... 5 Instructions... 5 Performing a Load Test...
More informationThe Citrix guide to desktop virtualisation
The Citrix guide to desktop virtualisation Market overview Desktop virtualisation is a relatively new technology that has been receiving a lot of press attention. Confusingly for those less familiar with
More informationCitrix NetScaler and e-gaming data centres
and data centres www.citrix.com Introduction There is currently a boom in across most of Europe. Research has shown that the rise in internet sites for placing bets and the popularisation of playing games
More informationCisco and Citrix: Building Application Centric, ADC-enabled Data Centers
Solutions Brief : Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce
More informationAdvanced load balancing: 8 must-have features for today s network demands
Advanced load balancing: 8 must-have features for today s network demands Application availability and scalability are no longer enough. Today s enterprises require an integrated solution that also delivers
More informationAchieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
More informationCitrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com
Citrix XenClient White Paper Citrix XenClient Extending the benefits of desktop virtualization to mobile laptop users www.citrix.com Executive summary Desktop virtualization is attractive to organizations
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationArray Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010 Array Networks Enables Highly Optimized Microsoft Exchange Server 2010 Services Microsoft Exchange Server is the industry leading messaging platform for
More informationGuide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
More informationCisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
More informationWHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com
WHITE PAPER Citrix XenDesktop Cost savings with centralized virtual desktops www.citrix.com Introduction Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment.
More informationCOORDINATED THREAT CONTROL
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
More informationCitrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
More informationEasy and secure application access from anywhere
Easy and secure application access from anywhere Citrix is the leading secure access solution for applications and desktops HDX SmartAccess Delivers simple and seamless secure access anywhere Data security
More informationAdvanced load balancing: 8 must-have features for today s network demands
White paper Advanced load balancing: 8 must-have features for today s network demands Application availability and scalability are no longer enough. Today s enterprises require an integrated solution that
More informationGlobal Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
More informationThe complete solution for enabling BYO. www.citrix.com
The complete solution for enabling BYO Solution Brief The complete solution for enabling BYO www.citrix.com Companies of all sizes are witnessing a transformation in the types of devices entering the workplace,
More informationBrocade Virtual Traffic Manager and Microsoft Outlook Web Access Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft Outlook Web Access Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing
More informationDeployment Guide ICA Proxy for XenApp
Deployment Guide ICA Proxy for XenApp Access Gateway Standard Edition (CAG) www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Caveats...4 Network Diagram...5
More informationBasic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
More informationWHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager
WHITE PAPER Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager ALREADY USING AMAZON ELASTIC LOAD BALANCER? As an abstracted service, Amazon ELB
More informationBrocade Virtual Traffic Manager and Magento Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Magento Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric
More informationBetter virtualization of. XenApp and XenDesktop with XenServer
XenApp and XenDesktop with XenServer White Paper Better virtualization of XenApp and XenDesktop with XenServer XenApp and XenDesktop customers can achieve increased consolidation, easier management, improved
More informationBrocade Virtual Traffic Manager and Oracle Application Server 10G Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Oracle Application Server 10G Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing
More informationThe Critical Role of an Application Delivery Controller
The Critical Role of an Application Delivery Controller Friday, October 30, 2009 Introduction In any economic environment a company s senior management expects that their IT organization will continually
More informationGet Control of Your Data Center. Application Delivery Controllers
White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have
More informationBrocade Virtual Traffic Manager and Oracle EBS 12.1 Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Oracle EBS 12.1 Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,
More informationAPPLICATION DELIVERY
RIVERBED DELIVERY THE FIRST DELIVERY CONTROLLER (ADC) DESIGNED FOR ANY CLOUD OR Greater flexibility VIRTUALIZED ENVIRONMENT GARTNER MAGIC QUADRANT RECOGNITION We re a Visionary in the 2012 Magic Quadrant
More informationRSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
More informationTrend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview 2 Trend Micro and Citrix have a long history of partnership based upon integration between InterScan Web Security and Citrix
More informationThe Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
More informationSolutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
More informationAchieve mobile delivery with Citrix NetScaler
Achieve mobile delivery with Citrix NetScaler 2 The rise of mobility has placed unprecedented strain on the datacenter network, including one of its fundamental building blocks, TCP (Transmission Control
More informationSmart Network. Smart Business. Application Delivery Solution Brochure
Smart Network. Smart Business. Application Delivery Solution Brochure Radware Application Delivery Solution The Best Future-Proof ADC Solution Radware ADC is designed to last. It delivers industry-unique
More informationCitrix MetaFrame Password Manager 2.5
F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information
More informationA10 ADC Return On Investment
WHITE PAPER A10 ADC Return On Investment Table of Contents Introduction...3 Streamline Operations to Maximize Efficiencies...3 Server Offload Is the Key...3 SSL Acceleration...4 TCP Optimization...5 RAM
More informationBrocade Virtual Traffic Manager and Microsoft SharePoint 2010 Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft SharePoint 2010 Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing
More informationGoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
More information