20,39 €
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be the difference between secure data and stolen data.Starting with how to deploy a Citrix Netscaler on DMZ this book presents you with options, their uses, and features that can be enabled. In order to ensure each recipe gives you the most benefit, case studies are included to show you real life implications of your decisions.
This book will guide you through the world of load balancing using both content switching and redirection. We will also discuss load balancing based on geographical location and disaster recovery methods.
The number of features within each module to reduce server load and CPU is astounding and will make your life, the end user, a walk in the park.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 77
Veröffentlichungsjahr: 2013
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: February 2013
Production Reference: 1120213
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-84968-672-3
www.packtpub.com
Author
Carmel Jacob
Reviewer
Andrew Mallett
Acquisition Editor
Martin Bell
Commissioning Editor
Meeta Rajani
Technical Editors
Prasad Dalvi
Lubna Shaikh
Project Coordinator
Esha Thakker
Proofreader
Lawrence A. Herman
Graphics
Valentina D'silva
Production Coordinator
Melwyn D'sa
Cover Work
Melwyn D'sa
Cover Image
Sheetal Aute
Carmel Jacob is a networking professional with five and a half years of experience and counting. She has worked on a wide range of products at different layers of networking starting with firewall, load balancers, routers, and switches. She is now into network testing and loves what she does. She has a keen interest in reading books, writing, and debugging issues at work!
I would like to express my gratitude towards my family and friends, who have been supportive and encouraging during the preparation of this book and will always be!
Andrew Mallett has worked in IT for more years than he cares to mention, well, since 1986, and is working with Citrix technologies since Metaframe 1.8 in 1999. He not only has Citrix skills and certification, but also teaches Linux, Citrix, Novell, and Microsoft official courses and supports many of these products. He is well versed and certified in Linux. His interest and skills in security and remote access made this book an ideal book for him to review. He has also authored the book Citrix Access Gateway VPX 5.04 Essentials, Packt Publishing, which you may want to look at yourself.
Andrew currently works for QA Ltd. (http://www.qa.com), the largest Citrix authorized learning center in the U.K., as a Certified Citrix Instructor and Principal Technologist. You may well find Andrew teaching across the U.K. at one of their many training centers.
You might want to visit www.PacktPub.com for support files and downloads related to your book.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at <[email protected]> for more details.
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
http://PacktLib.PacktPub.com
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
Get notified! Find out when new books are published by following @PacktEnterprise on Twitter, or the Packt Enterprise Facebook page.
"My books are like water; those of the great geniuses are wine. (Fortunately) everybody drinks water."
—Mark Twain
The aim of this book is to comb through the many features of Citrix Application Delivery Controller, which is NetScaler, and give you insight into how to handle and tune them according to your requirements.
I have tried to whip up as many recipes as possible so that they would be easier for readers to choose from. In addition, there are certain important terms explained, which we usually come across while deploying Citrix NetScalers and Access Gateways, but don't think much about. By the end of this book, we hope to give readers a good practical knowledge of the working of an end-to-end Citrix solution. Though it is recommended you read it from start to finish, it is made flexible so that you can move between recipes and skip to recipes that intrigue you.
This book will also try to simplify any complexities involved and make the read an interesting one.
I would like to sign off with a quote from Bruce Lee (I'm a big fan!).
"Use only that which works, and take it from any place you can find it."
—Bruce Lee
Day one – deployment in a DMZ network (Must know) discusses the basic set up of NetScaler in DMZ and the server farm in internal zone, while keeping in mind what changes should be done to ensure connectivity between NetScaler and the backend servers.
Triple A (Must know) shows how to configure the AAA vserver and use it with CS/LB vserver. This recipe also shows the readers how to configure SSO functionality and gives the readers a detailed packet flow as well as a capture that shows a successful authentication using LDAP, which can be used to troubleshoot in readers' environments.
Controlling surge/burst (Must know) shows how to enable settings that turn on surge protection, along with the base threshold and throttling options. This recipe also explains how the protection works along with NetScaler's inherent connection multiplexing.
Content switching (Must know) discusses a simple but most commonly used procedure to redirect the HTTP traffic to secure HTTPS by using the responder policy bound to the CS level along with the configuration commands.
Zombie cleanup (Must know) discusses how to clean up idle connections that would take up space and memory at intervals that can be customized. This recipe also shows the levels at which the timeout can be set.
Disaster recovery (Should know) introduces a series of steps for setting up disaster recovery and later shows the ways to troubleshoot it as well. This recipe includes a discussion of dynamic proximity, which shows how the RTT calculation is done. This recipe also discusses the steps that are used to calculate as well as configure dynamic proximity.
DOS and attack prevention (Should know) covers default settings that provide protection along with the options that can be turned on to provide extra security. This recipe throws light on how to set up priority queuing for different types of traffic among other things. Rate limiting configuration is also included in the recipe.
Learning Application Firewall (Must know) guides the readers through the steps and shows snapshots of the defense mechanism with the help of logs and packet captures. It also speaks about role-based access control where you can restrict the management access of a user to the desired level. This recipe also includes tips to troubleshoot the App Firewall issue.
The Access Gateway integration for Citrix XenApp and XenDesktop (Become an expert)
