Jump to content
  • NetScaler Cyber Threat Intelligence
    (UPDATE) CVE-2023-40044 : Progress Software - Critical Pre-Auth Flaws in WS_FTP Server Product Published in v114  
     NetScaler CTRI Team
    Last Updated: 10/03/2023
     
    /applications/core/interface/js/spacer.png" data-src="/monthly_2023_10/image.jpg.7a14f0d755e478fe77f32fe76ad1ce8d.jpg" data-ratio="24.48" width="1348" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">
    Description:
    CVE-2023-40044 is a critical vulnerability in WS_FTP Server versions before 8.7.4 and 8.8.2. The vulnerability is caused by a .NET deserialisation flaw in the Ad Hoc Transfer module, which a pre-authenticated attacker can exploit to execute remote commands on the underlying WS_FTP Server operating system. The vulnerability has a CVSS score of 10, indicating its severity. The WS_FTP team discovered the vulnerability, and all versions of the WS_FTP Server are affected by it. The vendor has patched the vulnerability, and version-specific hotfixes have been made available for customers to remediate the issue. It is highly recommended that users of WS_FTP Server update their software to the latest version to avoid exploitation of this vulnerability.
     Please follow the guidelines as recommended by the vendor in their Security Article
     NetScaler CTRI :
    NetScaler CTRI team is actively investigating this issue and will provide an update on the mitigation steps, WAF Signature soon. 
     References: 
    https://nvd.nist.gov/vuln/detail/CVE-2023-40044  
     
     

    NetScaler Cyber Threat Intelligence
    NetScaler WAF Signatures Update v114
     
    NetScaler has new signatures available for its integrated Web App Firewall to help customers mitigate several CVEs, including CVE-2023-40044 Progress Software Patches Multiple Vulnerabilities in WS_FTP Server and CVE-2023-42793: Critical RCE Vulnerability in TeamCity On-Premises.
    CVE-2023-40044 is a critical vulnerability in Progress WS_FTP Server, a popular file transfer software. It is a .NET deserialization vulnerability that could allow an unauthenticated attacker to execute remote commands on the underlying WS_FTP Server operating system. In the case of CVE-2023-40044, the vulnerability is in the Ad Hoc Transfer module of WS_FTP Server. An attacker could exploit this vulnerability by sending a specially crafted POST request to a vulnerable WS_FTP Server. Successful exploitation would grant the attacker the ability to achieve remote command execution on the underlying operating system of the WS_FTP Server. This vulnerability is particularly dangerous because it can be exploited without any authentication. This means that an attacker does not need to have any existing credentials on the WS_FTP Server to exploit it.
    CVE-2023-42793 is a critical remote code execution (RCE) vulnerability in JetBrains TeamCity On-Premises. It allows an unauthenticated attacker with HTTP(S) access to a TeamCity server to execute arbitrary code on the server. The vulnerability is caused by a flaw in the way TeamCity authenticates users. An attacker can exploit this flaw by sending a specially crafted HTTP(S) request to the TeamCity server. If the request is successful, the attacker will be able to execute arbitrary code on the server.
    This vulnerability is very dangerous because it can be exploited without any authentication. This means that an attacker does not need to have any existing credentials on the TeamCity server in order to exploit it. JetBrains has released a patch for CVE-2023-42793 for all affected versions of TeamCity On-Premises. 
     Signatures included in v114:
    Signature rule
    CVE ID
    Description
    998601
    CVE-2023-42793
    WEB-MISC JetBrains TeamCity Prior to 2023.05.4 - Authentication Bypass Vulnerability (CVE-2023-42793)
    998602
    CVE-2023-40931
    WEB-MISC NagiosXI Prior to 5.11.2 - SQL Injection Vulnerability (CVE-2023-40931)
    998603
    CVE-2023-40044
    WEB-MISC Progress WS_FTP Server - Deserialization of Untrusted Data Vulnerability (CVE-2023-40044)
    998604
    CVE-2023-39362
    WEB-MISC Cacti Prior To 1.2.25 - OS Command Injection Vulnerability (CVE-2023-39362)
    998605
    CVE-2023-39361
    WEB-MISC Cacti Prior to 1.2.25 - SQL Injection Vulnerability (CVE-2023-39361)
    998606
    CVE-2023-39359
    WEB-MISC Cacti Prior to 1.2.25 - SQL Injection Vulnerability (CVE-2023-39359)
    998607
    CVE-2023-39358
    WEB-MISC Cacti Prior to 1.2.25 - SQL Injection Vulnerability via reports_admin (CVE-2023-39358)
    998608
    CVE-2023-39358
    WEB-MISC Cacti Prior to 1.2.25 - SQL Injection Vulnerability via reports_user (CVE-2023-39358)
    998609
    CVE-2023-35813
    WEB-MISC Sitecore Through 10.3 - Remote Code Execution Vulnerability (CVE-2023-35813)
    998610
    CVE-2023-20890
    WEB-MISC VMware Aria Operations for Networks - Path Traversal Vulnerability Via infra API (CVE-2023-20890)
    998611
    CVE-2023-20890
    WEB-MISC VMware Aria Operations for Networks - Path Traversal Vulnerability Via data-sources API (CVE-2023-20890)
    998612
    CVE-2022-43719
    WEB-MISC Apache Superset Multiple Versions - CSRF Vulnerability (CVE-2022-43719)
    998613
    CVE-2022-40881
    WEB-MISC Contec SolarView Compact Prior to 7.21 - OS Command Injection Vulnerability (CVE-2022-40881)
     
    NetScaler customers can quickly import the above signatures to help reduce risk and lower exposure associated with these vulnerabilities. Signatures are compatible with NetScaler (formerly Citrix ADC) software version 11.1, 12.0, 12.1, 13.0 and 13.1. NOTE: Software versions 11.1 and 12.0 are end of life, and you should consider upgrading for continued support. Learn more about the NetScaler software release lifecycle.
     
    If you are already using NetScaler Web App Firewall with the signature auto-update feature enabled, verify that your signature file version is 114 or later and then follow these steps.
    Search your signatures for <number> Select the results with ID  Choose “Enable Rules” and click OK  
    NetScaler WAF Best Practices
    NetScaler recommends that WAF users always download the latest signature version, enable signature auto-update, and subscribe to receive signature alert notifications. NetScaler will continue to monitor this dynamic situation and provide updates as new mitigations become available.
    Handling false positives
    If app availability is affected by false positives that result from the above mitigation policies, relaxations can be applied. NetScaler recommends the following modifications to the policy.
     
    Modifications to NetScaler Web App Firewall Policy:
    add policy patset exception_list
    # (Example: bind policy patset exception_list “/exception_url”) 
    Prepend the existing WAF policy with:
    HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT
    # (Example :  set appfw policy my_WAF_policy q^HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT && <existing rule>^
    NOTE: Any endpoint covered by the exception_list may expose those assets to risks 
    Additional Information
    NetScaler Web App Firewall benefits from a single code base across all its form-factors (physical, virtual, bare-metal, and containers). This signature update applies to all form factors and deployment models of NetScaler Web App Firewall.
    Learn more about NetScaler Web app Firewall, read our alert articles and bot signature articles to learn more about NetScaler WAF signatures, and find out how you can receive signature alert notifications.
    Please join the NetScaler Community today and engage with your peers to learn more about how they are protecting their businesses with NetScaler WAF. 
     
     
     
     
     

    Karthick Srivatsan
    ADM Integration to 3rd Party tools -  Light up your Splunk/New Relic visibility with SSL Certificate or WAF/BOT Violation Insights
    NetScaler ADM (Application Delivery Management),  is a control plane available as both on-prem and as a Service that manages a fleet of NetScalers across monolith and modern microservices applications.  It offers Observability around, Infrastructure and Application availability, Performance, Usage including Security insights,  to enable you to act on application performance issues. It also provides HDX and Gateway insights to identify the gateway errors and the network or application latency issues impacting the ICA HDX proxy user experience.
    In this blog post, we'll explore how NetScaler ADM can integrate with 3rd party tools (such as Splunk, New Relic) to empower you to receive NetScaler’s aggregated/processed insights, directly from ADM.
    ADM is a great choice of platform for 2 reasons:
    In-Product ADM Observability - NetScaler admins who use ADM as a visualization and management platform for their fleet and use analytics with aggregated/processed insights for triaging and troubleshooting ADM’s Aggregated/Processed Insights export to 3rd party tools - Personas like Splunk or SIEM admins who manage their existing enterprise observability tools can receive rich NetScaler insights via ADM integration as well. Insights available in ADM that can be exported to Splunk:
    ADM Integration with Splunk is available in both ADM Service and on-prem. ADM on-prem has the observability integration available from 13.1-48.x onwards. These integrations include:
    WAF violation Security Insights (Realtime or Periodic) BOT violation Security Insights (Realtime or Periodic) SSL Certificate Insights (Periodic) ADM On-prem system health and events (Sent every minute from ADM on-prem release 14.1-8.x onwards)   Use Case
    Category
    Endpoints
    Release
    Export Type
    Available on
    WAF Violation Insights
    Security
    Splunk, New Relic, Any HTTPS Collector
    ADM on-prem (13.1-48.x) onwards
    JSON
    ADM Service & ADM on-prem
    BOT Violation Insights
    Security
    Splunk, New Relic, Any HTTPS Collector
    ADM on-prem (13.1-48.x) onwards
    JSON
    ADM Service & on-prem
    SSL Certificate Insights
    Security, Infrastructure
    Splunk, New Relic, Any HTTPS Collector
    ADM on-prem (13.1-48.x) onwards
    JSON
    ADM Service & ADM on-prem
    ADM On Prem specific system health and Events
    On Prem System
    Splunk, New Relic, Any HTTPS Collector
    ADM on-prem (14.1-8.x) onwards
    JSON
    ADM on-prem
     Live Demo of How to Configure ADM for Export to Splunk available below.
     

    How NetScaler Sample Dashboards help visualize at Splunk:
    SSL Certificate Insights :
    Let us look at some of the use cases you can visualize with the SSL certificate insights exported to Splunk from the ADM aggregated across your NetScalers.
    SSL Protocol Compliance - Quickly track if unsupported protocols are enabled in the SSL profile across a scale of Vservers of all your instances, which could be against your enterprise compliance.  Get notified before certificates expire to Proactive notification of expiring certs to avoid Application disruption - SSL certificate expiry information aggregated across NetScalers can be exported and you can get timely notifications about certificates expiring in next month or quarter so that you can renew those on time. You can now avoid unnecessary and embarrassing app downtimes
    Security Compliance - Easy way to assess and track which of the SSL certificates are unused (not bound to any VServer) or expired and act upon them.  Below is the dashboard of SSL Cert data exported from ADM aggregated across NetScalers.
    /applications/core/interface/js/spacer.png" data-src="/monthly_2023_10/image.jpg.fae8fa65c118bbcb7fd95275e393c940.jpg" data-ratio="93.66" width="678" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">
     WAF/BOT Insights :
     
    SecOps admins typically export and visualize security events in SIEM tools like Splunk. NetScaler WAF/BOT violation events can be exported from ADM in real-time and visualized at Splunk.
    Let us look at some of the use cases you can visualize with the WAF/Bot Violation events insights exported to Splunk from the ADM aggregated across your NetScalers.
    View  Violation trends - Quickly track WAF or Bot violation trends over a period of time to derive patterns or your application threat surface.  View Top applications with WAF/Bot Events View total applications impacted by WAF/Bot violations View today application attacks mitigated with the WAF rules configured in the NetScalers. View BOT traffic classification to identify good actors, bad actors classified as humans or bots  
     /applications/core/interface/js/spacer.png" data-src="/monthly_2023_10/image.jpg.25a972c1460512d35acad04182e0528c.jpg" data-ratio="105.96" width="654" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">
    Benefits of ADM Integration with  3rd party endpoints:
    Enterprises that have ADM managing their NetScaler fleet can leverage it as a centralized export platform that offers several advantages:
    Aggregated Data: Since ADM manages all NetScalers, it can aggregate the data across NetScalers to export to 3rd party tools of choice. For example, whether it is an application or certificates across 10’s or 100’s of ADCs, ADM’s aggregated data can collect the total traffic/errors/certificate and usage details that is available for immediate export, alleviating the need to code or perform the aggregation yourself.
    Processing Capabilities: ADM can preprocess and normalize the data before and produce more meaningful insights before exporting.  For example, Web Insights is a standout example where the Response time is broken down into Client Network Latency, Server Network Latency and Server Processing Time. This helps pinpoint the session slowness problem to the exact contributor by doing some processing at the ADM end.
    Centralized Control: ADM’s centralized data collection from managed NetScalers makes export easier to observability tools of choice. Typically integrations increase the ingestion at destination end (such as Splunk), but our integration helps you control and filter relevant data export at source itself (i.e the ADM itself). With this, you can control what data you want, how much you want and where you want it to be exported. Intent Centric User Interface for Data Export hosted in the ADM as a feature: Is going to simplify the experience of configuring the integrations in ADM, going forward. Setting Up NetScaler ADM Integration with Splunk:
    NetScaler ADM Integration with Splunk is easy with a 3-step process. Here's a high-level overview of the steps for streamlined data export and analysis:
     
    /applications/core/interface/js/spacer.png" data-src="/monthly_2023_10/image.jpg.f03b5390c47addefec1c3b1e36f00e0a.jpg" data-ratio="27.02" width="940" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">
     Prepare Splunk Install the relevant app plugins of NetScaler at Splunk (See Doc Link) Configure HEC endpoint (HTTP Event Collector) in Splunk and generate the token. Prepare Data Export in the ADM In the ADM interface, configure the data export under Settings -> Ecosystem Integration Create a subscription specifying Splunk as the target destination with the HEC endpoint details and the token generated while preparing Splunk. HEC format - https://SPLUNK_PUBLIC_IP:SPLUNK_HEC_PORT/services/collector/event . Select the use-case to export data. Download Sample Dashboards and Visualize in Splunk: NetScaler offers sample dashboards off-the-shelf which can be easily imported into Splunk to visualize data as soon as ADM is prepared to send data. This alleviates the need to build complex logic of parsing and querying at Splunk, making visualization and customization easier for admins with a quick starting point in their journey.Download Splunk dashboards for ADM from https://www.citrix.com/downloads/citrix-adc/sample-dashboards/endpoints-and-dashboards.html Extract the tgz file and copy the contents of the dashboard you want to create (It will be in JSON format) Go to Splunk and create a Dashboard studio. Click on the source code icon and paste the JSON and save the dashboard. That’s it!!
    Conclusion:
    NetScaler ADM integration with Splunk provides organizations with a centralized point for data export that offers enhanced control, data processing capabilities, and aggregated insights.
    By seamlessly integrating these powerful tools, organizations can gain a comprehensive understanding of their network and application performance, enabling them to proactively address issues and enhance user experiences.
    You can DIY this right away. Here’s how.
    Download Splunk dashboards for ADM from https://www.citrix.com/downloads/citrix-adc/sample-dashboards/endpoints-and-dashboards.html Detailed documentation of preparation available at https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/analytics/security/splunk-integration.html  
     

    Brian Huhn 2
    In today’s world of increasing importance and complexity of app delivery, cloud transformation and cybersecurity, many companies feel they need to purchase a tool or service for all IT requirements. But, this “best of breed” approach comes with more complications than one may consider.
     
    In this episode, Brian Huhn and Jason Poole chat with guest Al Taylor to take a closer look at the pros and cons of consolidating app delivery and security tools.
     
    In particular, they will examine:
    - User experience and cost impact
    - Operational inconsistency and the effects management complexity
    - Risks of a fragmented security posture
    - Insights from the market

    NetScaler Cyber Threat Intelligence
    NetScaler WAF Signatures Update v113
     NetScaler has new signatures available for its integrated Web App Firewall to help customers mitigate several CVEs, including three CISA published vulnerabilities, namely Ignite Realtime Openfire Path Traversal Vulnerability, Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability and Ivanti Sentry Authentication Bypass Vulnerability.
     CVE-2023-32315 is a vulnerability found in the Openfire administrative console, a web-based application used for managing an XMPP server. This vulnerability allows an unauthenticated user to exploit the Openfire Setup Environment within an established Openfire configuration, accessing restricted pages reserved for administrative users. The vulnerability affects all versions of Openfire released since April 2015, starting with version 3.10.0. The Openfire community has patched this vulnerability in release 4.7.5 and 4.6.8, with further improvements planned for the upcoming 4.8.0 release. Users are advised to upgrade their Openfire installations to the latest patched versions.
    CVE-2022-24086 is a vulnerability that affects Adobe Commerce versions 2.4.3-p1 and earlier, as well as 2.3.7-p2 and earlier. It is an improper input validation vulnerability that can be exploited during the checkout process. This vulnerability allows arbitrary code execution without requiring user interaction. The severity of this vulnerability is rated as CRITICAL with a CVSS score of 9.8. Adobe has released a security bulletin with more information and instructions on how to apply updates.
    CVE-2023-38035 is an API authentication bypass vulnerability that affects Ivanti MobileIron Sentry versions 9.18.0 and below. This vulnerability allows unauthenticated attackers to access APIs configuring the Ivanti Sentry on the administrator portal/interface. The administrative interface is also known as the MobileIron Configuration Service (MICS) Admin Portal. By default, the MICS Admin Portal runs on port 84432. The severity of this vulnerability is rated as CRITICAL with a CVSS score of 9.8.
     Signatures included in v113:
      Signature rule
    CVE ID
    Description
    998614
    CVE-2023-38035
    WEB-MISC Ivanti Sentry Up To 9.18.0 - Incorrect Authorization Vulnerability via /asproxy/services/ (CVE-2023-38035)
    998615
    CVE-2023-38035
    WEB-MISC Ivanti Sentry Up To 9.18.0 - Incorrect Authorization Vulnerability via /mics/services/ (CVE-2023-38035)
    998616
    CVE-2023-36846
    WEB-MISC Juniper JunOS SRX - Missing Authentication for Critical Function Vulnerability Via webauth_operation (CVE-2023-36846)
    998617
    CVE-2023-3486
    WEB-MISC PaperCut NG Prior to 22.1.3 - Unrestricted File Upload Vulnerability (CVE-2023-3486)
    998618
    CVE-2023-34468, CVE-2023-40037
    WEB-MISC Apache NiFi Multiple Versions - Command Injection Vulnerability (CVE-2023-34468, CVE-2023-40037)
    998619
    CVE-2023-33653
    WEB-MISC Sitecore - Remote Code Execution Vulnerability (CVE-2023-33653)
    998620
    CVE-2023-33224, CVE-2023-23843
    WEB-MISC SolarWinds Orion Platform Prior to 2023.3 - Remote Code Execution Vulnerability (CVE-2023-33224, CVE-2023-23843)
    998621
    CVE-2023-32566
    WEB-MISC Ivanti Avalanche - SecureFilter Authentication Bypass Vulnerability (CVE-2023-32566)
    998622
    CVE-2023-32562
    WEB-MISC Ivanti Avalanche Prior to 6.4.1 - Unrestricted File Upload Vulnerability (CVE-2023-32562)
    998623
    CVE-2023-32315
    WEB-MISC Ignite Realtime Openfire - Path Traversal Vulnerability (CVE-2023-32315)
    998624
    CVE-2023-28128
    WEB-MISC Ivanti Avalanche Prior to 6.4.0 - Unrestricted Upload Vulnerability (CVE-2023-28128)
    998625
    CVE-2023-27066
    WEB-MISC Sitecore Up To 10.2 - Path Traversal Vulnerability (CVE-2023-27066)
    998626
    CVE-2022-23333
    WEB-MISC Contec SolarView Compact Prior to 7.21 - OS Command Injection Vulnerability (CVE-2022-23333)
    998627
    CVE-2022-37044
    WEB-MISC Zimbra Collaboration Suite Prior to 8.8.15 P33 - XSS Vulnerability via onload (CVE-2022-37044)
    998628
    CVE-2022-37044
    WEB-MISC Zimbra Collaboration Suite Prior to 8.8.15 P33 - XSS Vulnerability via extra (CVE-2022-37044)
    998629
    CVE-2022-37044
    WEB-MISC Zimbra Collaboration Suite Prior to 8.8.15 P33 - XSS Vulnerability via title (CVE-2022-37044)
    998630
    CVE-2022-24086
    WEB-MISC Adobe Magento - Arbitrary Code Execution Vulnerability Via wishlist (CVE-2022-24086)
    998631
    CVE-2022-24086
    WEB-MISC Adobe Magento - Arbitrary Code Execution Vulnerability via checkout (CVE-2022-24086)
    17279
    CVE-2005-1939
    WEB-MISC Ipswitch WhatsUp Small Business directory traversal attempt
     NetScaler customers can quickly import the above signatures to help reduce risk and lower exposure associated with these vulnerabilities. Signatures are compatible with NetScaler (formerly Citrix ADC) software version 11.1, 12.0, 12.1, 13.0 and 13.1. NOTE: Software versions 11.1 and 12.0 are end of life, and you should consider upgrading for continued support. Learn more about the NetScaler software release lifecycle.
     If you are already using NetScaler Web App Firewall with the signature auto-update feature enabled, verify that your signature file version is 113 or later and then follow these steps.
    Search your signatures for <number> Select the results with ID  Choose “Enable Rules” and click OK  
    NetScaler WAF Best Practices
    NetScaler recommends that WAF users always download the latest signature version, enable signature auto-update, and subscribe to receive signature alert notifications. NetScaler will continue to monitor this dynamic situation and provide updates as new mitigations become available.
    Handling false positives
    If app availability is affected by false positives that result from the above mitigation policies, relaxations can be applied. NetScaler recommends the following modifications to the policy.
     
    Modifications to NetScaler Web App Firewall Policy:
    add policy patset exception_list
    # (Example: bind policy patset exception_list “/exception_url”) 
    Prepend the existing WAF policy with:
    HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT
    # (Example :  set appfw policy my_WAF_policy q^HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT && <existing rule>^
    NOTE: Any endpoint covered by the exception_list may expose those assets to risks 
    Additional Information
    NetScaler Web App Firewall benefits from a single code base across all its form-factors (physical, virtual, bare-metal, and containers). This signature update applies to all form factors and deployment models of NetScaler Web App Firewall.
    Learn more about NetScaler Web app Firewall, read our alert articles and bot signature articles to learn more about NetScaler WAF signatures, and find out how you can receive signature alert notifications.
    Please join the NetScaler Community today and engage with your peers to learn more about how they are protecting their businesses with NetScaler WAF. 
     
     

    Arvind Kandula
    Below is a small snippet of the items that were released as part of NetScaler 14.1.
     
    1. TLS Enhancements :
    TLS Handshakes are computationally expensive. TLS Handshake Renegotiation occurs when  A session has expired Long life session key is renewed Client certificate mutual authentication  
    Bad actors can overwhelm the infrastructure by sending a high volume of renegotiations requests. Prior to the 14.1 version,  option exists to only turn renegotiation on and off, but with the enhancement, renegotiations can be ratelimited, without limiting any other part of the TLS transaction.  
    2. TLS 1.3 Backend Support Across All Platforms:
     
    TLS is a cryptographic protocol that provides end-to-end security of data, sent between applications over the internet. It is used for secure web browsing, email, file transfers, video/audio conferencing, instant messaging, DNS, etc. Before the 14.1 release, NetScaler supported TLS1.3 only on the frontend, but with 14.1 release, there will be backend support as well. Thus, making it end to end.  
    3. Improved TCP’s Robustness to Blind In-Window Attacks
    In addition to TCP spoofing attacks such as TCP Reset Attack, TCP SYN Flood Attack, 14.1 is RFC 5961 compliant, which gives NetScaler the following capabilities: Reduces the probability of false data injection attacks Allows imposing a limit on the number of challenge ACK responses sent per second (/s) by the NetScaler  
    4. One-touch SSL A+ rating workflow in ADM On-Prem:
    With this, customers can upgrade non A+ rated apps to A+ with a single touch and Meet organizational compliance Reduce time and operational overhead to fix SSL Profile deviations Excel at Scale - Upgrade A+ profiles of apps at scale in minutes and not hours  
    5.  Single Pane Overview Dashboard for ADM On Prem:
    This Dashboard hosts all key metrics and golden signals across Applications Infrastructure Security Gateway  
    Segue into drill down dashboards is available. Filters can be applied by admins to narrow the scope to entities or apps of criticality. This dashboard is very popular in ADM Service and now available in ADM on Prem 6. Export ADM On Prem events and system metrics to Splunk with Dashboard
     
    NetScaler admins can take the advantage of this feature and view: Trend of System performance over time History of events with severity like Critical, Major, Warning Critical and Major events that are currently active  
     For more information please refer to the 14.1 release notes and latest 13.1 release notes
     
     

    Mayur Patil
    NetScaler GSLB for your multi-Kubernetes microservice deployments

    NetScaler Application Delivery Controller (ADC) Global Server Load Balancing (GSLB) is a DNS-based solution which describes a range of technologies to distribute resources around multi-site data center locations. Customers are migrating application workloads from monoliths to microservices where applications are deployed across multiple Kubernetes clusters for high availability. NetScaler can distribute traffic across multiple K8s clusters providing resiliency to microservice applications. NetScaler GSLB controller deployed inside Kubernetes cluster will automate NetScaler GSLB appliance will be demonstrated in this lab.
    The lab will demonstrate how to:
    Deploy an application in Kubernetes cluster across two data centers/sites Deploy GSLB controller in the Kubernetes cluster Configure NetScaler GSLB using GSLB controller Distribute the ingress traffic to applications deployed across the site using NetScaler. Click the Start hands-on Lab at the top of the post to try out !
    Let us know your feedback or any issues in the comments section.

    Rahul Bhatia
    NetScaler is an advanced application delivery, load balancing and security solution for your web apps. Prometheus is an open-source monitoring tool that collects metrics data and stores that data with a timestamp at which the data was recorded.
    NetScaler supports directly exporting metrics to Prometheus. You can use the rich set of metrics provided by NetScaler ADC to monitor and analyze metrics, track the health of your applications, detect anomalies, create alerts, and take necessary corrective actions to ensure robust software delivery. To visualize the metrics we can use Grafana dashboards and use Prometheus as a data source.
    This lab will provision a NetScaler ADC and then guide you on configuring Prometheus and Grafana.

    Click the Start hands-on Lab at the top of the post to try out !
    Let us know your feedback or any issues in the comments section.

    Suman Rajaraman 2
    NetScaler 12.1 (formerly Citrix ADC) has been certified for use on the Department of Defense Information Network
    Author: Pooja Bagga, Suman Rajaraman
    NetScaler (Formerly Citrix ADC) is proud to announce that its product MPX 8900-FIPS 12.1 Platinum Edition, has achieved the DoDIN’s stringent APL certification ( Department of Defense Information Network Approved Products List (DoDIN APL) ) and is available in DoD approved list of products. 
    The DoDIN APL helps to ensure that Department of Defense organizations and their agencies are using secure products that are tested and certified for deployment in DoD’s technology infrastructure and helps in protecting their information system by providing increased cyber security. NetScaler helps in protecting unauthorized access of data, reduces data breaches, and ensures products are able to communicate within the DoD infrastructure with improved interoperability.
    NetScaler MPX 8900-FIPS 12.1 Platinum Edition has been successfully tested and certified to meet all the above criteria including Multi Factor authentication with Radius and LDAP for DoD.
    This certification serves as a major milestone for NetScaler (a Business unit of Cloud Software Group). The certification demonstrates NetScaler’s commitment to providing secure and interoperable products to DoDIN organizations. 
    Cybersecurity is a complex and ever evolving issue, and therefore a  critical imperative for DoDIN approved products. US government agencies continue to take steps to improve their cybersecurity.
    NetScaler helps to protect cybersecurity and interoperability in a number of ways, few features to name:
    Web application firewall, API security, bot management, surge protection, SSL offloading, DDoS protection, and content filtering. 
    By using these features, DoDIN organizations can further protect their mission critical applications from attacks and improve the performance and availability of their applications.
     
    Learn more about the DOD Information Network Approved Product List and find the NetScaler (formerly Citrix ADC) certified listing on the DoDIN Website and use the Keyword Search as “netscaler”

    /applications/core/interface/js/spacer.png" data-src="/monthly_2023_09/image.jpg.df4918471a5671ca74cd80674c4ef378.jpg" data-ratio="42.71" width="1194" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">

    /applications/core/interface/js/spacer.png" data-src="/monthly_2023_09/image.jpg.e9bca7c9227d51aa5109554039739fa4.jpg" data-ratio="20.1" width="2388" class="ipsImage ipsImage_thumbnailed" alt="image.jpg">
    Learn more about NetScaler MPX 8900-FIPS
     
    If you've any feedback please drop a note in the comments section below.
     
     
     
     
     

×
×
  • Create New...