An SSL bridge configured on the NetScaler appliance enables the appliance to bridge all secure traffic between the SSL client and the SSL server. The appliance does not offload or accelerate the bridged traffic, nor does it perform encryption or decryption. Only load balancing is done by the appliance. The SSL server must handle all SSL-related processing. Features such as content switching, SureConnect, and cache redirection do not work, because the traffic passing through the appliance is encrypted.
In a typical deployment, different clients ask web servers for the same content repeatedly. To relieve the origin web server of processing each request, a NetScaler® appliance with cache redirection enabled can serve this content from a cache server instead of from the origin server.
The NetScaler analyzes incoming requests, sends requests for cacheable data to cache servers, and sends non-cacheable requests and dynamic HTTP requests to origin servers.
Cache redirection is a policy-based feature.
List of commands used in Netscaler(not full list):
show ns ip - Shows configured Netscaler IP address (SNIP, VIP, MIP) show version - Shows the current Netscaler firmware version show hardware - Lists hardware details of appliance (including serial number) sh license Displays licensed feature on appliance sh running | more Shows the current running configuration (page per time) sh ns fea Displays list of Netscaler features en ns fea Enables a Netscaler feature (Dependant on license) dis ns fea Disables Netscaler feature sh ns mode Displays list of configured Netscaler modes en ns mode Enables Netscaler Mode dis ns mode Disables Netscaler mode sh lb vserver | more Displays list of configured Load Balanced vServers sh lb vserver Displays information relating to specified vserver en lb vserver Enable LB vserver dis lb vserver Disable LB vserver sh service | more Displays list of configured Services (not service groups) sh service <service name> Displays information relation to specified service en service Enable Service dis service Disable Service with a delay (in seconds) sh servicegroup | more Displays list of configured Service Groups sh servicegroup Displays information relating to specified servicegroup en servicegroup Enable servicegroup dis servicegroup –delay <#> Disables servicegroup with delay (in seconds) sh server Displays a list of servers en server Enables specified server dis server Disables specified server with a delay (in seconds) sh monitor Shows the list of configured Netscaler monitors sh monitor Displays information relating to the specificed monitor sh route Prints a list of defined routes add route Adds a static route on the appliance rm route Removes a static route on the appliance sh int Displays information on all network interfaces sh int Displays information relating to specified network interface en int Enable Netscaler NIC dis int Disable Netscaler NIC sh arp Displays information from ARP table (including iface used) sh vlan Displays VLAN ID’s and assigned NIC’s sh ha node Displays HA node status force ha fail Forces HA Failover between nodes nstrace –tcpdump enable Performs a packet capture (all NICs) with tcpdump enabled shell Exits to shell command prompt (FreeBSD) dmesg Displays system message log from shell (since reboot) save c Saves current running config to fileFor these 3 below commands use name also, to get the desired output.
A host bus adapter (HBA) is a circuit board and/or integrated circuit adapter that provides input/output (I/O) processing and physical connectivity between a server and a storage device. Because the HBA relieves the host microprocessor of both data storage and retrieval tasks, it can improve the server’s performance time. An HBA and its associated disk subsystems are sometimes referred to as a disk channel.
It looks something like this:
In one of the used cases, it looks like,
Netscaler has the ability to use something called TCP profiles, which allows “non-TCP” experts to customize the Netscaler based upon what application is being used or what kind of network is be used or devices that are accessing the service.
TCP configurations for a NetScaler appliance can be specified in an entity called a TCP profile, which is a collection of TCP settings. The TCP profile can then be associated with services or virtual servers that want to use these TCP configurations.
Implementing Citrix Provisioning Services (PVS) is very common nowaday when it’s about deploying Shared Desktops (XenApp) or Pooled, Private or Personal Desktops (XenDesktop). If there are still some debate around about using TFTP+PXE vs using BDM (Boot Device Manager) I still observe a large number of deployment made using TFTP+PXE rather than BDM. Both of these two solution have Pro and Cons (Check Wilco’s website here) and this is an architectural choice you need to plan ahead the project.
Protocols and Ports used for Configuring the High Availability Setup
The following ports are used to exchange high availability related information between the NetScaler appliances in the high availability setup:
The UDP port 3003 is used to exchange the heartbeat packets for communicating the UP or DOWN status of the appliance. The TCP port 3008 is used for secure high availability configuration synchronization. The TCP port 3009 is used for secure command propagation and Metric Exchange Protocol (MEP).
In today’s complex Web sites, you may want to present different content to different users. For example, you may want to allow users from the IP range of a customer or partner to have access to a special Web portal. You may want to present content relevant to a specific geographical area to users from that area. You may want to present content in different languages to the speakers of those languages.
Citrix Microsoft Management Console (MMC) based administrative consoles (Access Management Console, Delivery Services Console) take an extended time to launch. Once running, the consoles operate normally.
If you face the following issue at the time of opening XenApp 5 or XenApp 6 Citrix Delivery Services Console/Access Management Console, go through the following steps to resolve this.
.net authentiode signature check Cause Citrix MMC based administrative consoles feature components that are written using the Microsoft .
Citrix released the first part of the Project Avalon with the codename Excalibur at Citrix Synergy 2013 in [Los Angeles](http://maps.google.com/maps?ll=34.05,-118.25&spn=0.1,0.1&q=34.05,-118.25 (Los%20Angeles)&t=h “Los Angeles”). Project Avalon was announced as the Giant step into Cloud Transformation, so what is it really? Citrix invested heavily in their existing product infrastructure with the question: “What could XenDesktop & XenApp look like if we re-imagined them for the cloud era?”. If Citrix started over, how would they design virtual apps & desktops for the mobile cloud era?