Authentication methods

AAA Authentication methods: Netscaler supports 7 methods of authentication. Local: user account should be created locally on the netscaler. Authentication takes place without contacting external authentication server. LDAP: LDAP often uses Microsoft AD to validate users. It has 3 authentication types: Plaintext, SSL and TLS. Plaintext uses 389 for communication. Sends credentials in plain text. […]

Continue Reading

Configure LDAP authentication on netscaler

some or all steps are required to add external authentication on netscaler 12 and above: Create LDAP Server (authentication server). Create LDAP policy. Bind the LDAP policy globally. Add AD groups to netscaler to restrict access to management access. Optional Restrict normal users to netscaler gateway. Optional Create LDAP Server (authentication server):  To create LDAP […]

Continue Reading

what is netscaler

Netscaler is an Application delivery controller which is used for Load balancing, Http compression, SSL Offloading(which is useful for web servers),content switching, application acceleration, application firewall and more. A NetScaler appliance is usually deployed in front of a server farm and functions as a transparent TCP proxy between clients and servers, without requiring any client-side […]

Continue Reading

NetScaler Platforms and editions

Netscaler is available in either a hardware or software based appliance. Hardware options, MPX and SDX include single and multi-tenant devices, in addition to FIPS compliant and high SSL throughput appliances. Software-based options, VPX and CPX include virtual hypervisor-based and containerized microservice offerings. MPX: Available in burst packs and pay-as-you go grow options. Supports more […]

Continue Reading

Netscaler Deployment Topology

A NetScaler appliance resides between the clients and the servers, so that client requests and server responses pass through it. In a typical installation, virtual servers configured on the appliance provide connection points that clients use to access the applications behind the appliance. In this case, the appliance owns public IP addresses that are associated […]

Continue Reading