Citrix SD-WAN WANOP 11.0

Total Page:16

File Type:pdf, Size:1020Kb

Citrix SD-WAN WANOP 11.0 Citrix SD‑WAN WANOP 11.0 Citrix Product Documentation | docs.citrix.com August 25, 2021 Citrix SD‑WAN WANOP 11.0 Contents About Citrix SD‑WAN WANOP 3 Get started with Citrix SD‑WAN WANOP 12 Select an appliance based on capacity 13 Select the deployment mode based on datacenter topology 16 Sites with one WAN router 17 Sites with multiple WAN routers 19 Appliance failure handled in various deployment modes 22 Supported mode and feature matrix 22 Configure Citrix SD‑WAN WANOP plug‑in with Access Gateway VPNs 24 Deploy SD‑WAN WANOP VPX on Microsoft Azure 26 SD‑WAN WANOP upgrading procedure 32 Initial Configuration 34 Prerequisites 35 Deployment Worksheet 36 Configuring the Appliance 39 Assigning a Management IP Address through the Ethernet Port 39 Assigning a Management IP Address through the Serial Port 41 Provisioning the Appliance 42 Deployment Modes 46 Customizing the Ethernet ports 48 Port Parameters 49 Accelerated Bridges (apA and apB) 50 Motherboard Ports 51 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix SD‑WAN WANOP 11.0 VLAN Support 52 Customizing the Ethernet ports 52 Ethernet Bypass and Link‑Down Propagation 53 Accelerating an Entire Site 54 Partial‑Site Acceleration 54 WCCP Mode 55 WCCP Mode (Non‑Clustered) 59 WCCP Clustering 65 Virtual Inline Mode 72 Configuring Packet Forwarding on the Appliance 73 Router Configuration 73 Virtual Inline for Multiple‑WAN Environments 77 Virtual Inline Mode and High‑Availability 78 Monitoring and Troubleshooting 78 Group Mode 78 When to Use Group Mode 79 How Group Mode Works 80 Enabling Group Mode 80 Forwarding Rules 82 Monitoring and Troubleshooting Group Mode 83 Customizing the Ethernet ports 84 How High‑Availability Mode Works 84 Cabling Requirements 86 Other Requirements 86 © 1999–2021 Citrix Systems, Inc. All rights reserved. 3 Citrix SD‑WAN WANOP 11.0 Management Access to the High‑Availability Pair 87 Configuring the High‑Availability Pair 87 Updating Software on a High‑Availability Pair 88 Saving/Restoring Parameters of an high availability Pair 88 Troubleshooting High Availability Pairs 89 Two box mode 90 FAQs 94 Acceleration 94 CIFS and MAPI 95 Compression 97 RPC over HTTPS 99 SCPS 100 Secure peering 101 SSL Acceleration 102 Citrix SD‑WAN WANOP plug‑in 103 Traffic shaping 108 Upgrade (OS) Process 109 Video caching 117 Office 365 Acceleration 122 Compression 124 HTTP acceleration 130 How HTML5 works 132 Internet Protocol version 6 (IPv6) acceleration 134 Link definitions 139 © 1999–2021 Citrix Systems, Inc. All rights reserved. 4 Citrix SD‑WAN WANOP 11.0 Manage link definitions in traffic shaping 141 Configure link definitions 142 Manage and monitor using Citrix Application Delivery Management 147 Citrix Cloud Connector 148 Configure cloud connector tunnel 152 Configure cloud connector tunnel between two datacenters 154 Configure cloud connector tunnel between a datacenter and AWS/Azure 159 Office 365 acceleration 165 SCPS support 177 Secure traffic acceleration 178 Secure peering 178 CIFS, SMB2, and MAPI 183 Configure Citrix SD‑WAN WANOP appliance to optimize secure Windows traffic 185 Configure CIFS and SMB2/SMB3 acceleration 201 Configure MAPI acceleration 208 SSL compression 210 How SSL compression works 211 Configure SSL compression 213 SSL Compression with Citrix SD‑WAN WANOP plug‑in 221 RPC over HTTP 222 TCP Flow‑Control acceleration 225 Lossless and transparent flow control 226 Speed optimization 227 Auto‑discovery and auto‑configuration 229 © 1999–2021 Citrix Systems, Inc. All rights reserved. 5 Citrix SD‑WAN WANOP 11.0 TCP flow control modes 230 Firewall considerations 232 Traffic classification 233 Application classifier 234 Service classes 236 Traffic shaping 241 Weighted fair queuing 242 Traffic shaping policies 244 Video caching 247 Video caching scenarios 249 Configure video caching 252 Video prepopulation 257 Verify video caching 264 Manage video caching sources 266 WAN insight 268 Asymmetric routing 272 Citrix SD‑WAN WANOP client plug‑in 274 Hardware and software requirements 275 How WANOP plug‑in works 276 Deploy appliances for use with plug‑ins 285 Customize plug‑in’s MSI file 288 Deploy plug‑ins on Windows 290 Citrix SD‑WAN WANOP plug‑in GUI 295 Update Citrix SD‑WAN WANOP plug‑in 299 © 1999–2021 Citrix Systems, Inc. All rights reserved. 6 Citrix SD‑WAN WANOP 11.0 Citrix Virtual Apps and Desktops acceleration 299 Configure Virtual Apps acceleration 300 Optimize Citrix Receiver for HTML5 302 Deployment modes 304 Adaptive transport interoperability 312 Citrix Hypervisor 6.5 upgrade 312 Maintenance 313 Diagnostics 316 Troubleshooting 323 CIFS and MAPI 323 Citrix SD‑WAN WANOP plug‑in 326 RPC over HTTPS 327 Video caching 328 Citrix Virtual Apps and Desktops acceleration 329 © 1999–2021 Citrix Systems, Inc. All rights reserved. 7 Citrix SD‑WAN WANOP 11.0 About Citrix SD‑WAN WANOP March 12, 2021 Citrix SD‑WAN WANOP appliances optimize your WAN links, giving your users maximum responsive‑ ness and throughput at any distance. A Citrix SD‑WAN WANOP appliance is easy to deploy, because it works transparently. A twenty minute installation accelerates your WAN traffic with no other con‑ figuration required. You do not have to change your applications, servers, clients, or network infras‑ tructure. You can, however change them after Citrix SD‑WAN WANOP installation without affecting traffic acceleration. A Citrix SD‑WAN WANOP appliance needs reconfiguration only when yourWAN links change. Citrix SD‑WAN WANOP appliances support a full range of optimizations, including: • Multi‑session compression with compression ratios of up to 10,000:1. • Protocol acceleration for Windows network file systems (CIFS), Virtual Apps (ICA and CGP, in‑ cluding the new multi‑session ICA standard), Microsoft Outlook (MAPI), and SSL. • Traffic shaping to ensure that high‑priority and interactive traffic takes precedence overlow‑ priority or bulk traffic. • Advanced TCP protocol acceleration, which reduces delays on congested or high‑latency links. • Video caching. How Citrix SD‑WAN WANOP works? Citrix SD‑WAN WANOP products work in pairs, one at each end of a link, to accelerate traffic over the link. The transformations done by the sender are reversed by the receiver. However, one appliance (or virtual appliance) can handle many links, so you do not have to dedicate a pair to each connection. An enterprise typically has one Citrix SD‑WAN WANOP appliance per site (larger appliances at larger sites, smaller ones at smaller sites), though a company with numerous branch offices might have mul‑ tiple appliances at its central data center. A link from a site with a Citrix SD‑WAN WANOP appliance to a site that does not have a Citrix SD‑WAN WANOP appliance functions normally, but its traffic is not accelerated. Citrix SD‑WAN WANOP features include robust compression for brisk performance over relatively slow links, and lossless flow control to deal with congestion. TCP optimizations overcome the main limi‑ tations of problematic links, and application optimization does away with the limitations of applica‑ tions designed for high‑speed, local networks. An autodetection feature makes deployment quick and easy. © 1999–2021 Citrix Systems, Inc. All rights reserved. 8 Citrix SD‑WAN WANOP 11.0 Citrix SD‑WAN WANOP features and benefits Any time workers spend waiting for their computers to respond is lost time, resulting in lost produc‑ tivity. When users work remotely or use off‑site resources, their productivity depends on the respon‑ siveness of their network connections. Safeguarding the responsiveness of their connections requires advanced network acceleration. The Citrix SD‑WAN WANOP product line protects your productivity by providing reliable WAN and In‑ ternet link performance through a set of multiple, interlocking optimizations, each reinforcing the oth‑ ers. To provide maximum productivity across your entire enterprise, there are Citrix SD‑WAN WANOP products for every need, from the largest data center though the smallest branch office and even the individual laptop. Citrix SD‑WAN WANOP provides robust usability even with undersized or degraded links. Features at a glance: For more information, see the table Features and benefits: The following are some of the key benefits of our Citrix SD‑WAN WANOP product line. Compression overcomes low link speeds. The most obvious problem with wide‑area network (WAN) links and Internet links is their low bandwidth compared to local‑area networks (LANs). A 1 Mbps WAN has only 1% of the throughput of a 100 Mbps LAN. How do you overcome low link bandwidth? With compression. A compression ratio of 100:1 enables a 1 Mbps link to transfer data as quickly as a 100 Mbps. This speedup factor is achieved whenever the following criteria are met: • The compression algorithm must be able to deliver high compression ratios. • The compression algorithm must be very fast (much faster than the link bandwidth, and ideally as fast as the LAN). • The LAN segments of the link must have flow control that is independent of the WAN segment, because the different segments handle data at different rates. • Multiple compression engines must be used to handle the different needs of different kinds of traffic. Interactive traffic requires relatively little bandwidth but is very sensitive to delay, while bulk‑transfers are very sensitive to bandwidth but are insensitive to delay. TCP protocol acceleration overcomes congestion. Any attempt to send traffic faster than the link speed results in congestion, which results in many problems caused by high packet losses and high queuing latency. Lossless flow control. The TCP/IP protocol has no flow control to slow senders down directly, and the absence of this necessary control mechanism makes packet losses and excessive queuing delays normal, even on mission‑critical links. (If anything, this problem is getting worse over time, as papers on the phenomenon of bufferbloat attest.) © 1999–2021 Citrix Systems, Inc. All rights reserved. 9 Citrix SD‑WAN WANOP 11.0 A Citrix SD‑WAN WANOP appliance solves this problem by providing the flow control that was omitted from the TCP/IP protocol.
Recommended publications
  • Citrix ADC SDX 12.1
    Citrix ADC SDX 12.1 Citrix Product Documentation | docs.citrix.com September 21, 2021 Citrix ADC SDX 12.1 Contents Introduction 3 Release Notes 3 Getting Started with the Management Service User Interface 3 Data governance 9 Introduction to Citrix ADM service connect for Citrix ADC SDX appliances 11 Single bundle upgrade 14 Upgrading a Citrix ADC instance 17 Manage and Monitor the SDX appliance 19 Creating SDX Administrative Domains 25 Managing RAID Disk Allocation on 22XXX Series SDX Appliances 27 SDX Licensing Overview 31 SDX Resource Visualizer 34 Manage interfaces 35 Jumbo Frames on SDX Appliances 38 Configuring SNMP on SDX Appliances 52 Configuring Syslog Notifications 58 Configuring Mail Notifications 59 Configuring SMS Notifications 59 Monitoring and Managing the Real‑Time Status of Entities Configured on an SDX Appliance 60 Monitoring and Managing Events Generated on Citrix ADC instances 65 Call Home Support for Citrix ADC instances on an SDX Appliance 73 System Health Monitoring 75 Configuring System Notification Settings 79 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix ADC SDX 12.1 Configuring the Management Service 80 Configuring Authentication and Authorization Settings 84 Configuring the External Authentication Server 89 Configuring Link Aggregation from the Management Service 94 Configuring a Channel from the Management Service 95 Access Control Lists 96 Set up a cluster of Citrix ADC instances 102 Configuring Cluster Link Aggregation 104 Configuring SSL Ciphers to Securely Access the Management Service
    [Show full text]
  • Ensure the Secure, Reliable, Delivery of Citrix Workspace to Any User
    White Paper Ensure the Secure, Reliable, Delivery of Citrix Workspace to Any User, Over Any Network Citrix ADC improves the Citrix Virtual Apps and Desktops experience for both end users and IT administrators Citrix | Ensure the Secure, Reliable Delivery of Citrix Workspace 2 Application and desktop application traffic. Without end-to-end visibility, it is extremely difficult to troubleshoot performance virtualization have dramatically problems. Proponents of application and desktop improved end-user productivity virtualization need to overcome these challenges in order to protect and extend the gains they have and data security. They have made in simplifying the end-user experience, also simplified the work of IT increasing the reliability of application performance, strengthening security, and improving management administrators and decreased of IT resources. overall computing costs. Yet the Citrix ADC specifically addresses these challenges. flexibility businesses need to Citrix ADC brings together the capabilities of application ensure they are competitive means delivery controllers (ADCs) and secure remote access (in the case of this white paper, for access IT must now consider: to Citrix Workspace powered by Citrix Virtual Apps and Desktops). The goal of Citrix ADC is to ensure • How to ensure the security posture is extended to compliance to the endpoint by enabling the secure, the endpoint in order to maintain compliance. IT reliable delivery of applications and virtual desktops to must manage secure access across all the different any user, anywhere. This white paper provides a brief use cases while deploying applications securely to overview of Citrix ADC and how it addresses these users on any device, over any network.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy
    Citrix Systems, Inc. Citrix ADC VPX Software Version: 12.1.51.152 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.12 Prepared for: Prepared by: Citrix Systems, Inc. Corsec Security, Inc. 851 Cypress Creek Road 13921 Park Center Road, Suite 460 Fort Lauderdale, FL 33309 Herndon, VA 20171 United States of America United States of America Phone: +1 954 267 3000 Phone: +1 703 267 6050 www.citrix.com www.corsec.com FIPS 140-2 Non-Proprietary Security Policy, Version 0.12 September 30, 2020 Table of Contents 1. Introduction ..........................................................................................................................................4 1.1 Purpose .....................................................................................................................................................4 1.2 References ................................................................................................................................................4 1.3 Document Organization ...........................................................................................................................4 2. Citrix ADC VPX .......................................................................................................................................5 2.1 Overview ...................................................................................................................................................5 2.2 Module Specification ................................................................................................................................6
    [Show full text]
  • The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
    The definitive guide to selecting the right ADC for the digital transformation era ↑ ← Pg. 2 | Pg. 4 → Back to contents Citrix.com | eBook | App attack 1 Content Introduction .........................................................................................................3 Digital transformation’s impact .....................................................................4 Harness the power of the Cloud ...................................................................5 Application architectures ................................................................................7 Provide protection .............................................................................................8 Provide flexibility ................................................................................................9 Choosing an ADC ............................................................................................. 10 Meet Citrix ADC ................................................................................................ 11 ↑ Back← Pg. to 2 contents | Pg. 4 → 2 Introduction It used to be that you would build out your datacenter with all the right considerations in place, purchasing equipment that was sized to meet the needs of your organization for today and the near term future. Change used to be merely planning for capacity upgrades or network expansion, or migrating to the latest application version—or more simply put: things we could measure, control and manage. With the advent of the cloud, the rise in cyber-based threats,
    [Show full text]
  • Safeguard Application Uptime and Ensure Consistent Performance
    Safeguard application uptime and ensure consistent performance How a software-first approach can streamline app delivery across your hybrid, multi, and AWS clouds. Contents Introduction 3 Delivery, performance, and availability 6 ADC in AWS Marketplace 8 Cloud adopters 10 Key benefits and features 12 Marketplace advantage 14 Conclusion 16 Citrix | Safeguard application uptime and ensure consistent performance 2 Expectations for application delivery are on the rise. In today’s highly complex, distributed, • Imbalanced distribution of workloads hybrid-multi-cloud and multi-device world, across workers/partners/contractors organizations are feeling the impacts to the scattered around the globe user experience, and potential risks and loss • Cloud sprawl brought on by of control for IT. Users expect the applications and content moving applications they rely on every day to between on-premises and the cloud function without error, and deliver the and between clouds information they need on demand, around the clock wherever they are. • Employees accessing applications from multiple endpoints Scaling your workloads to the cloud helps your organization remain agile and • Lack of centralized visibility, data-driven. But even as you gain management, and control of infrastructure on demand, cloud adoption dispersed applications and the changing hybrid and multi-cloud landscapes bring business challenges, • Inability to effectively troubleshoot including: application performance and security issues that come up, as well as enforce • The need to rapidly
    [Show full text]
  • Citrix Application Delivery Management
    White Paper Citrix Application Delivery Management Simplify operations, gain insight and improve troubleshooting of application delivery infrastructure Citrix | Citrix Application Delivery Management 2 New applications come quickly and application Citrix Application delivery infrastructure is constantly changing. Delivery Management For all the potential benefits that cloud provides, including agility, scalability, security, and cost savings, Simplify operations, gain insight and the truth remains that it can be difficult or impossible to get visibility into your workloads—let alone effectively improve troubleshooting of application manage them—when you are running applications delivery infrastructure across cloud and on-premises. There is a desperate need to unify application delivery consistently across all environments. This is the only Cloud is transforming way to achieve the desired outcome of “define once and application delivery deploy everywhere” that will help business reach the speed and agility it needs to transform. Applications are at the heart of the modern business. They control everything that happens in the business. We effectively live in an application economy and the Citrix Application Delivery application is synonymous with productivity, growth strategy and user experience. Management (ADM): A single pane Users are changing the way that applications are of glass for end-to-end Application consumed. Customers want the application and data Delivery Management across hybrid delivered to them when it is convenient. They want it on the device they choose and they want it fast. This multi-cloud environments is driving the importance of customer experience and An effective Application Delivery Management system hence the importance of application delivery. must do more than provide monitoring of application delivery controllers (ADCs).
    [Show full text]
  • Hybrid Multi-Cloud Networking That Delivers a Better Application Experience 2
    Hybrid multi-cloud networking that delivers a better • application experience • Hybrid multi-cloud networking solutions from Citrix deliver connectivity, performance, security, and management for all applications,• on-premises and on Google Cloud Platform. • • Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ● Extend on-premises networks, apps, and infrastructure resources to the cloud. ● Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ● Sustain operational consistency across on-premises and cloud environments. ● Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the alliance of Citrix and Google Cloud. ● 90 percent of business innovation will depend on public cloud services by 20221 “We can help customers with their ● 124 SaaS applications cloud transformations by enabling on average are in use in 1 them to access and run the apps their an enterprise businesses depend on
    [Show full text]
  • Citrix Application Delivery Management Service Data Governance Document
    CITRIX SYSTEMS, INC. Citrix Application Delivery Management Service Data Governance Document Sep 7, 2020 Page 0 Contents Abstract ........................................................................................................................................................... 2 ADM Service Overview .................................................................................................................................... 2 Customer Content ........................................................................................................................................... 2 Methods for data collection, storage, and transmission ................................................................................. 3 Logs ................................................................................................................................................................. 4 Secure access to Customer Content and Logs ................................................................................................. 4 Data retention policy for ADM Service ............................................................................................................ 4 Third-party services used in ADM Service ........................................................................................................ 5 References ....................................................................................................................................................... 5 Citrix Cloud Technical Security Overview ....................................................................................................
    [Show full text]
  • Delivering an Optimal Application Experience Across Hybrid and Multi-Cloud Infrastructures
    Solution Brief Delivering an optimal application experience across hybrid and multi-cloud infrastructures Work and grow the way you want to, with application delivery and security from Citrix and Google Cloud that’s simple, flexible, and secure Citrix App Delivery and Security with Google Cloud Platform 2 Application performance and • Reduce risk by securing applications, APIs, delivery have changed users, and networks to drive consistency and resiliency across an expanding Here’s how your network can keep pace attack service. Cloud changed the fundamentals of how your IT • Use packet-based path selection to steer team delivers applications and manages their traffic based on application requirements and performance. Rather than hosting applications real-time network conditions for branch and solely on-premises, many enterprises now remote sites. choose a hybrid cloud strategy where applications reside both on-premises and in Gain all of these advantages and more when you public cloud. By leveraging public cloud, run your apps on Google Cloud Platform (GCP) enterprises can take full advantage of modern with Citrix. application architectures that use microservices and containers to rapidly deploy and scale their applications. With this increased agility comes 90 percent of business innovation faster innovation and time to market. will depend on public cloud services by 2022.¹ Today, IT needs modern application delivery and security solutions that: • Deliver an unmatched application experience 124 SaaS applications are in use for your users with the best performance and in an enterprise, on average.¹ flexibility for SaaS, cloud, and virtual apps. • Provide enhanced visibility and control for IT, while simplifying observability 92 percent of reported and troubleshooting.
    [Show full text]
  • Secure Remote Access to Any Application from Anywhere, on Any Device
    Solution Brief Secure remote access to any application from anywhere, on any device At Citrix, we empower our customers to provide In addition to allowing access to corporate data contextual and secure access to applications deployed from managed devices, Citrix Secure Workspace on-premises, in the cloud, or delivered as SaaS. In Access provides security controls to protect user and addition, we also provide security controls like web corporate information even when accessed from filtering and web isolation for customers who want to BYO and unmanaged devices. With browser isolation control what users access on the Internet. Currently, technology, it helps users access applications in an we offer three choices to customers looking to isolated environment to protect applications from any implement secure access and single sign-on solutions malicious content on user devices. In addition, app for their applications, network and data. protection policies in Citrix Secure Workspace Access protect user and corporate information from being stolen by key logger and screen capturing malware. Citrix Secure Workspace Access This allows IT to let their users access corporate data from BYO and unmanaged devices; thus making life Citrix Secure Workspace Access offers a easier for both IT and end-users. comprehensive, zero trust approach that delivers secure and contextual access to all applications you need and provides an enhanced user experience while Citrix Workspace Essentials maintaining security control. It allows for consolidation of traditional security products like VPN, single sign-on Citrix Workspace Essentialsis a component of Citrix and browser isolation technologies with one solution. Secure Workspace Access that can be purchased This allows for a holistic security approach based on separately as well.
    [Show full text]
  • Citrix Application Delivery Management (Citrix ADM )Data Sheet
    Data Sheet Citrix Application Delivery Management Citrix Application Delivery Management (ADM) is an intuitive, comprehensive platform that enables automation, orchestration, management, and analytics for application delivery across hybrid multi-cloud environments. To help you deliver the best application experience and availability for both monolithic and microservices-based applications, Citrix ADM provides one holistic view with the ability to drill down on specific details for easier troubleshooting, faster resolution, and actionable insights. Applications Drive Business We effectively live in an application economy where applications are synonymous with business productivity, growth, and customer experience. To stay competitive, organizations must be able to innovate rapidly and scale to meet customer demand while also minimizing downtime to prevent productivity and revenue loss. Doing this effectively and efficiently requires a transformation in application design, application delivery, and the type of network services employed by applications. Application Delivery Needs to Adapt As hybrid multi-cloud becomes the standard for application deployment, application components become distributed across disparate environments, which leads to fragmentation. This fragmentation introduces a number of challenges for delivering applications and network services: • Inconsistent configuration resulting from time-consuming and error-prone processes • Lack of clear visibility and insight across all environments • Fragmented troubleshooting With
    [Show full text]
  • Netscaler White Paper: a Foundation for Next-Generation Datacenter
    White Paper Citrix ADC (formerly NetScaler ADC) – A Foundation for Next- Generation Datacenter and Cloud-Based Security citrix.com White Paper Citrix NetScaler The need for robust datacenter security has never been greater. Traditional challenges and concerns—including extensive regulatory requirements, the rise of targeted attacks, and the continuing erosion of perimeter-centric security models—are now being joined by the need to account for highly dynamic enterprise cloud architectures and flat networks with fewer, natural ‘choke points.’ Add the ever-present budgetary pressures to do more with less, and it becomes clear that the foundation for stronger security must be built using existing datacenter infrastructure. Citrix® NetScaler®, the best application delivery controller (ADC) for building enterprise cloud networks, is precisely such a solution. Already a strategic component in thousands of enterprise datacenters, NetScaler delivers an extensive portfolio of essential datacenter security capabilities. Moreover, it minimizes the need for enterprises to invest in a large number of expensive, standalone security solutions. NetScaler not only provides critically important application security, network/ infrastructure security, and identity and access management, but also supports a rich ecosystem of partner products to cover adjacent security domains. NetScaler Datacenter Security Capabilities Application Security • NetScaler Application Firewall • Data Loss Protection • Layer 7 Attack Protection Network/Infrastructure Security • No Compromise SSL • DNS Security • Layer 4 Attack Protection Identity and Access Management Security Fabric / Partner Ecosystem The net result is a strong foundation for next-generation datacenter and cloud-based security that is also cost effective. citrix.com 2 White Paper Citrix NetScaler NetScaler for application security Security practitioners are justifiably investing substantial time, effort, and money on application- layer security.
    [Show full text]