Basic & Advanced Administration for Citrix NetScaler 9.2



Similar documents
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Citrix NetScaler 10 Essentials and Networking

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

How To Manage A Netscaler On A Pc Or Mac Or Mac With A Net Scaler On An Ipad Or Ipad With A Goslade On A Ggoslode On A Laptop Or Ipa On A Network With

Basic Administration for Citrix NetScaler 9.0

CNS-200-1I Basic Administration for Citrix NetScaler 9.0

Citrix NetScaler 10 Essentials and Networking

CNS-205 Citrix NetScaler 10 Essentials and Networking

CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration

Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led

CNS-208 Citrix NetScaler 10 Essentials for ACE Migration

CNS-205-1: Citrix NetScaler 10 Essentials and Networking

CNS-208 CITRIX NETSCALER 10.5 ESSENTIALS FOR ACE MIGRATION

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Features of a comprehensive application security solution

Configuring Citrix NetScaler for IBM WebSphere Application Services

FortiWeb 5.0, Web Application Firewall Course #251

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

Barracuda Load Balancer Online Demo Guide

F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description

Information Technology Policy

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

ExamPDF. Higher Quality,Better service!

Understanding Slow Start

What is Web Security? Motivation

How To Protect A Web Application From Attack From A Trusted Environment

Barracuda Web Application Firewall

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

What's New in Cisco ACE Application Control Engine Module for the Cisco Catalyst 6500 and Cisco 7600 Series Software Release 2.1.0

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Durée 4 jours. Pré-requis

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

McAfee Next Generation Firewall (NGFW) Administration Course

Configuring Auto Policy-Based Routing

Deployment Guide for Microsoft Lync 2010

NMS300 Network Management System

Web Application Vulnerability Testing with Nessus

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DottsConnected SHAREPOINT 2010 ADMIN TRAINING. Exercise 1: Create Dedicated Service Accounts in Active Directory

304 - APM TECHNOLOGY SPECIALIST

10972-Administering the Web Server (IIS) Role of Windows Server

Apigee Gateway Specifications

Cisco Application Networking Manager Version 2.0

Load Balancing for Microsoft Office Communication Server 2007 Release 2

IBM. Vulnerability scanning and best practices

White paper. Keys to SAP application acceleration: advances in delivery systems.

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Formación en Tecnologías Avanzadas

IJMIE Volume 2, Issue 9 ISSN:

Proxies. Chapter 4. Network & Security Gildas Avoine

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

White Paper. Citrix NetScaler Deployment Guide

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Firewalls P+S Linux Router & Firewall 2013

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Networking for Caribbean Development

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server

Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router

1. Barracuda Load Balancer - Overview What's New in the Barracuda Load Balancer Barracuda Load Balancer Release Notes

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Communication ports used by Citrix Technologies. July 2011 Version 1.5

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Configuration Guide BES12. Version 12.3

App Orchestration 2.0

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Configuration Guide BES12. Version 12.2

Brocade Virtual Traffic Manager and Microsoft Skype for Business 2015 Deployment Guide

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Avaya TM G700 Media Gateway Security. White Paper

MS 10972A Administering the Web Server (IIS) Role of Windows Server

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES

Avaya G700 Media Gateway Security - Issue 1.0

Cisco ACE Application Control Engine: ACEBC Catalyst 6500 and 4710 Applicance Boot Camp

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Locking down a Hitachi ID Suite server

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

McAfee Web Gateway 7.4.1

Implementing the Application Control Engine Service Module

Command Center :29:23 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Deployment Topologies

APV9650. Application Delivery Controller

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Citrix Desktop Virtualization Fast Track

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

CVE-401/CVA-500 FastTrack

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

McAfee Network Security Platform Administration Course

Citrix NetScaler Make web applications run five times better

Transcription:

Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios NetScaler platform and product editions Product features Hardware platforms and components NetScaler architecture overview Initial NetScaler access Networking Key - INTRO NetScaler-owned IP addresses NetScaler modes Network address translation Virtual local area networks Link Aggregation Internet Control Message Protocol Path MTU discovery Dynamic routing support and route health injection Configuring high availability Key - INTRO Introduction to high availability High availability node configuration Propagation and synchronization High availability management Securing the NetScaler system MID NetScaler system communication Access control lists

Configuring load balancing Key - INTRO Load-balancing process Entity management Load-balancing traffic types Service monitoring Load-balancing topology, methods, and additional options Advanced load balancing methods Link load balancing Custom load Load monitor process Service and virtual server management Load Balancing Visualizer

Day Two Configuring SSL offload Key - INTRO SSL and digital certificates SSL concepts SSL offload overview Offload performance SSL administration and deployment decisions Deployment scenarios Configuring SSL offload Creating an SSL virtual server Advanced SSL settings Configuring Global Server Load Balancing Key - INTRO GSLB concepts Metric exchange protocol GSLB DNS methods GSLB persistence Configuring DNS virtual servers GSLB configuration Implementing traditional GSLB, proximity-based GSLB, and GSLB failover for disaster recovery GSLB entity relationship GSLB site communication example Using AppExpert Classic to optimize traffic MID - INTRO Policy overview and basics Hypertext Transfer Protocol Expression structures Content filtering Introduction to compression Using AppExpert for responder, rewrite, and URL transform MID going to use info on email. Understanding the packet processing flow Actions Understanding bind points Using pattern sets

Typecasting Rewrite, responder, and URL transformation overview Identifying packet processing flow Basic configurations: policies and actions Configuring rewrite actions Rewrite policies Responder actions and policies Configuring URL transformation Using AppExpert for content switching MID email for discussion. Introduction to content switching Configuring content-switching virtual servers Rule-based policy example

Day Three Using AppExpert Advanced to optimize traffic OPT Compression with advanced policy expressions Integrated caching Cache policies and cache expressions Graceful cache configuration changes Cache content groups and aging Content group settings FlashCache Global cache attributes Caching management AppExpert templates Policy-based routing Management Key - BRIEF Simple Network Management Protocol SNMPv3 Dashboard Reporting and monitoring tools Auditing and logging Configuring an auditing server Global auditing parameters Configuring auditing policies NetScaler log management Replacing a high availability node Upgrading as a standalone NetScaler Password recovery Network traffic capture using NSTCPDUMP TCPDUMP options and filter expressions Network traffic capture using NSTRACE.SH NSTRACE options and filter expressions The CNS-203-2W course has an additional NetScaler 9.3 Features module with the following topics: Citrix NetScaler 9.3 Features New NetScaler 9.3 Features AppFlow MID ADV.

Branch Repeater load balancing OPT Remote Desktop Protocol load balancing MID ADV. Database load balancing OPT OpenCloud Bridge MID ADV Citrix Application Firewall enhancements MID ADV DNS Security Extensions OPT Advanced Troubleshooting MID - ADV Troubleshooting Resources Citrix Knowledge Center Citrix Product Documentation Citrix Technical Support Collected NetScaler Data Troubleshooting Log NetScaler System Overview NetScaler Processes ncore Configuration Architecture Built-In Tools Nsconmsg Network Traffic Capture show and stat Commands Reporting Tool Shell Tools Command-Line Interface Tools Configuration Utility Tools Third-Party Tools Network Protocol Analyzers Web Browser Plug-ins SNMP Browsers FTP Clients

Introducing Application Firewall MID - ADV Application Attacks Application Attack Description Goals of Application Attacks Most Common Types of Web Application Attacks The Application Firewall Solution Business Problems The Benefits of Application Firewall Application Layer Protection Positive Security Model Negative Security Model Deep Stream Inspection Adaptive Learning Engine Web Application Vulnerabilities Security Audits and Application Firewalls Payment Card Industry Data Security Standard Importance of PCI Common Coding Vulnerabilities PCI-DSS Report Packet Processing and Inspection Request Process Response Process Deployment Considerations Profiles and Policies Profiles Policies Profiles and Policies MID - ADV Profiles Profile Types Default Profiles Creating a Profile in the Configuration Utility Creating a Profile in the Command-Line Interface Action Settings Sessionization and Security Checks Profile Settings Error Page HTML Comment Stripping XML Error Object Other Profile Settings Policies

Policy Creation Policy Binding Policy State Policy Priorities Creating a Policy in the Configuration Utility Creating Policies in the Command-Line Interface Binding and Prioritizing a Policy in the Configuration Utility Binding Policies in the Command-Line Interface Engine Settings

Day Four Regular Expressions MID - ADV Regular Expressions Forms of Regular Expressions Using Regular Expressions Metacharacters and Literal Characters Metacharacters Escapes Quantifiers Backreferencing Lookaheads Regular Expression Scope Attacks and Protections MID - Brief Security Checks Profile Types Common Security Checks HTML Security Checks XML Security Checks Request-Side and Response-Side Checks HTTPS Web Applications Buffer Overflow Exploits Goals of a Buffer Overflow Attack Consequences of a Buffer Overflow Attack Buffer Overflow Protection Default Maximum Values Modifying Buffer Overflow Settings Parameter Manipulation Parameter Manipulation Example Server Misconfiguration Deny URL Protection The Deny URL List Adding a Deny URL in the Command-Line Interface Deleting a Deny URL in the Command-Line Interface SQL Injection How SQL Injection Works HTML SQL Injection Protection SQL Keywords and Special Characters Modifying SQL Injection Action Settings XML SQL Injection Security Check Cross-Site Scripting

Attacking the Trust Relationship How Cross-Site Scripting Attacks Work Results of a Cross-Site Scripting Attack Preventing Cross-Site Scripting Attacks HTML Cross-Site Scripting Protection Cross-Site Scripting Action Settings Transform Cross-Site Scripts Check Complete URLs for Cross-Site Scripting Additional Action Settings Relaxations Modifying Cross-Site Scripting Action Settings Adding a Cross-Site Scripting Relaxation Using the Command-Line Interface Deleting a Cross-Site Scripting Relaxation Using the Command-Line Interface XML Cross-Site Scripting Security Check Command Injection Command Injection Examples Field Format Protection Field Types and Field Formats Predefined Field Types Custom Field Types Field Format Configuration Default Field Format Confidential Fields Adding a Custom Field Type Setting a Default Field Type Modifying Field Format Settings Adding a Confidential Field Modifying a Confidential Field Cookie Tampering and Poisoning Types of Cookies How Cookies Are Added Web Server Sessions Cookie Consistency Protection Sessionization and Cookies Relaxations Adding a Cookie Consistency Relaxation in the Command-Line Interface Deleting a Cookie Relaxation in the Command-Line Interface Form/Hidden Field Manipulation Example of Hidden Field Manipulation Form Field Consistency Protection Field Consistencies User Sessions Adding a Form Field Consistency Relaxation Using the Command-Line Interface Deleting a Form Field Consistency Relaxation Using the Command-Line Interface

Forceful Browsing Forceful Browsing Protection Start URLs The Start URL List Sessionization and Start URLs Modify Start URL Check Adding a Start URL in the Command-Line Interface Deleting a Start URL in the Command-Line Interface Backdoors and Misconfigurations URL Closure Enforcing URL Closure in the Configuration Utility Enforcing URL Closure in the Command-Line Interface Identity Theft Attacks Types of Identity Theft Attacks Application Firewall Protection Against Identity Theft Credit Card Protection Predefined Credit Cards Credit Card Settings Protecting Credit Cards Protecting Credit Cards in the Configuration Utility Protecting Credit Cards in the Command-Line Interface Errors Triggering Sensitive Information Leaks Safe Object Protection Defining a Safe Object Adding a Safe Object Adaptive Learning for Security Learning Over Time Learning Thresholds Generalized and Simple Rules Learned Rules Enabling Learning Setting Learning Thresholds Managing Learned Rules Application Firewall Troubleshooting MID - ADV Application Firewall and Applications HTTP Headers HTML Comment Stripping Configuration Issues Policy Issues Profile Issues Suggested Actions

Day Five Queuing and Connection Tuning OPT - ADV HTTP Connections Keep-alive HTTP Connections HTTP 1.0 and 1.1 Behavior <<< MID - ADV Pipelined Requests HTTP Connection Management and NetScaler HTTP Behavior Client Keep-Alive Connection IP Address Control Maximum Requests and Maximum Connections Connection Idle Settings Trackable Connections TCP Buffering Down-State Flush and Access Down Connection Settings TCP Optimization Advertised Window Size Window Scaling Selective Acknowledgement Surge Queue Surge Protection Request and Response Rates Throttle Rate Disabling Surge Protection in the Configuration Utility Disabling Surge Protection for a Service in the Configuration Utility Setting Thresholds in the Configuration Utility Priority Queuing Enabling Priority Queuing in the Configuration Utility Creating a Priority Queuing Policy in the Configuration Utility Binding Priority Queuing Policies in the Configuration Utility Weighted Queuing HTTP Denial-of-Service Protection Enabling HTTP DoS Protection in the Configuration Utility Adding a HTTP DoS Policy in the Configuration Utility Challenged JavaScript Responses Client Detection Tuning and JavaScript Challenge Response Rate HTTP DoS Protection Deployment Guidelines Attack Characteristics IP Rate Limiting Rate Control by Subnet Example IP Rate Limiting Best Practices

Authentication, Authorization, and Auditing OPT - ADV Users, Groups and Command Policies Authentication, Authorization, and Auditing Systems and AAA Users Groups Local Accounts External Authentication External Authentication for System Users Authentication Actions and Policies Configuring Local Authentication Configuring External Authentication with Explicit Accounts Configuring External Authentication with Group Extraction Creating an External Authentication Policy Creating local groups in the Command-Line Interface Binding Groups in the Command-Line Interface Creating an LDAP Authentication Action in the Command-Line Interface Creating an Authentication Policy in the Command-Line Interface Binding the Policy in the Command Line Interface Authentication Troubleshooting External Authentication Common Issues AAA for Traffic Management Enabling AAA for Traffic Management AAA for Application Traffic Basic AAA Setup for Application Traffic Workflow for AAA Traffic Management Configuration Creating an Authentication Virtual Server Creating an Authentication Virtual Server in the Command-Line Interface Binding an SSL Certificate in the Command-Line Interface Binding a Virtual Server to an Authentication Policy in the Command-Line Interface Configuring a Virtual Server to use an Authentication Virtual Server in the Command-Line Interface Configuring Authorization Policies for Traffic Management Setting the Default Traffic Management Authentication Action to Deny in the Command-Line Interface Creating an Authorization Policy to Allow Access Audit Logging Audit Logging Troubleshooting HTTP Service Callouts OPT - ADV HTTP Callouts

Configuring HTTP Callouts Configuring HTTP Callouts in the Configuration Utility Configuring HTTP Callouts in the Command-Line Interface Callout Examples HTTP Callout Response Parsing HTTP Callout Use Cases Scenario 1: Filter Clients Based on an IP Address Blacklist Scenario 2: Fetch and Update Content HTTP Callout Auditing Command Center MID - ADV Command Center Introduction Command Center NetScaler Features NetScaler and WANScaler Support Command Center Clients Connecting to Command Center Server Requirements Disk Space Requirements MySQL Considerations Microsoft SQL Server 2005 Considerations Port Setting Requirements Command Center Installation Linux Considerations Installation Capacity Planning Backup Installation Modes Installation Considerations Command Center Functionality Command Center Home Page Discovery Fault Management Configuration Management Change Management Centralized Certificate Management Performance Monitoring Command Center Administration Security Administration Administration Operations Administration Configuration

Server Details Command Center Troubleshooting Microsoft SQL Database Issues Discovery Issues Performance Data Issues Linux Command-Line Interface Access Issues Reporting Issues