Jump to content
Welcome to our new Citrix community!

Nagaraj Harikar

Internal Members
  • Posts

    20
  • Joined

  • Last visited

Nagaraj Harikar's Achievements

  1. It is hosted on ITM servers
  2. Authors: Nagaraj Harikar, Dinesh Bansal In the realm of the internet infrastructure, DNSSEC (Domain Name System Security Extensions) plays a crucial role in safeguarding domain names and the associated data they point to. It employs cryptographic signatures to verify the authenticity and integrity of DNS records, preventing unauthorized modifications and protecting against DNS spoofing attacks. However, maintaining the effectiveness of DNSSEC requires regular key rollovers to ensure the continued validity of these signatures. Traditional key rollovers, often performed manually, can be a time-consuming and error-prone process. Automated DNSSEC signature rollover has emerged as a powerful and efficient solution to streamline this essential task. Understanding DNSSEC Key RolloverDNSSEC keys are employed to generate digital signatures that authenticate DNS records. These keys have a defined lifespan, and their timely renewal is essential for maintaining the integrity of DNSSEC protection. Key rollovers involve replacing the existing keys with new ones, ensuring that the cryptographic signatures remain valid and effective. Manual vs. Automated Key RolloverManual key rollovers, while effective, can be cumbersome and prone to human error. As shown in the steps below, the process involves generating new keys, updating the DNS zone, and propagating the changes across the DNS hierarchy. This manual intervention can be time-consuming and increases the risk of errors, potentially leading to disruptions in DNS resolution. Figure 1: DNSSEC Key rollover steps Steps involved in creating a new key: The first step involves creating a new cryptographic key on NetScaler. This key can be either a Zone Signing Key (ZSK) or a Key Signing Key (KSK) (create DNS key). In the second step, the newly created key is published. However, it cannot be used to sign any records (add DNS key).The published key is now active for use and is added to the zone to sign the zone (sign DNS zone).In the final step, the old key is deactivated and no longer used to sign any records (unsign DNS zone). Once the new signatures have been propagated and the old signatures are no longer needed, the old key is removed (remove DNS key). The entire process from step A to step D needs to be repeated in order to create a new ZSK or KSK. In the automated key rollover process, the steps from A to D are automated using the DNSSEC key rollover feature on NetScaler, which simplifies the key management and rollover tasks. For more information, refer to the Zone Maintenance documentation. Automatic Distribution of DNSSEC Keys in GSLB DeploymentsEarlier, if a global server load balancing (GSLB) domain was signed by a DNSSEC key that required a rollover, you had to create the keys on one of the GSLB site nodes and manually transfer these to other GSLB sites using scp or some other tool before they could be used. Now, this entire process can be automated by enabling the DNS zone transfer parameter and ensuring the AutomaticConfigSync option is enabled. For more information, refer to the Zone Maintenance for GSLB deployments. Benefits of Automated DNSSEC Signature RolloverAutomated DNSSEC signature rollover offers several compelling advantages: Reduced Operational Overhead: Automation eliminates the need for manual intervention, freeing up IT staff to focus on other critical tasks.Enhanced Security: NetScaler can perform rollovers more consistently and accurately, minimizing the risk of human error and any potential security vulnerabilities.Improved Efficiency: Automation streamlines the rollover process, reducing the time and resources required to maintain DNSSEC protection.Reduced Disruptions: NetScaler can perform rollovers without disrupting DNS resolution, ensuring consistent service availability.Implementing Automated DNSSEC Signature Rollover As mentioned above, there are two types of keys used by DNSSEC: Zone Signing Key (ZSK) and Key Signing Key (KSK). ZSK-type key is used to sign DNS resource records of various types such as A, AAAA, NS, SOA, etc. KSK-type key is used to sign DNSKEY records. Usually, the KSK-type key is created with a stronger algorithm and a bigger key size. Figure 2: Automatic DNSSEC key rollover with NetScaler In the following example, we use the ‘create DNS key’ command to generate a DNSSEC key (example.ksk) of type KSK in zone example.com with key size 1024 using algorithm RSASHA256. Then we publish this key in the zone ‘add DNS key’ command with auto-rollover enabled.The key has an expiry period of ten days and needs to roll over five days before the expiry determined by the notification period. Then use the ‘sign DNS zone’ command to use this key to sign the records under DNS Zone ‘example.com.’ All these steps will be performed automatically at the time of rollover of the successor key since auto-rollover is enabled on the key. This process with a rollover period R is shown in Figure 2 above. Figure 3: Example of configuring auto-rollover of DNSSEC key ConclusionThe Automated DNSSEC Signature Rollover feature will be critical for maintaining the effectiveness of DNSSEC protection. Streamlining the key rollover process, it reduces administrative burden, enhances security, and ensures the integrity of DNS records. As the demand for secure and reliable DNS services grows, automated DNSSEC signature rollover will play an increasingly important role in safeguarding the internet infrastructure. NetScaler also supports DNS over TLS, which encrypts DNS queries, enhancing privacy and security by safeguarding against potential eavesdropping and manipulation of domain name resolution, ensuring a safer online experience.
  3. This has been identified and fixed. Latest firmware with the fix will be released soon.
  4. Hi @jordi salinas​ Can you share additional details ConfigurationRequest / Response snippet https://docs.netscaler.com/en-us/citrix-adc/current-release/global-server-load-balancing/configure/configuring-a-gslb-service-group.html
  5. The limitations of static load balancing Traditional GSLB solutions rely on DNS-based load balancing to direct users to the closest available server. However, these solutions have a number of limitations. First, they lack the ability to accurately measure geolocation and network latency, which can result in suboptimal routing decisions. Second, they do not provide visibility into network congestion, micro outages or other factors that can impact performance. Third, they require manual configuration and maintenance, which can be time-consuming and error-prone. Need for real-time data and insights: In today's fast-paced and rapidly changing internet condition, there is a growing need for real-time data and insights that can help organizations to make better decisions. Internet state data from real users can help to provide this type of information, by enabling the collection and analysis of data in real-time. The benefits of modern GSLB Modern GSLB solutions, such as the one offered by NetScaler, leverage advanced technologies to overcome these limitations. For example, Intelligent Traffic Management (ITM) uses real-time network analytics to optimize traffic routing decisions (Figure1) based on actual network performance, rather than just geographical location. This ensures that users are always directed to the best-performing server, regardless of their location. Figure1: ITM optimized algorithm to improve your application performance In addition, ITM provides real-time visibility into network performance and congestion, allowing businesses to proactively address performance issues before they impact end-users. They also automate configuration and maintenance, reducing the risk of errors and freeing up IT resources for more strategic initiatives. Multi-CDN use-caseMulti-CDN global server load balancing (GSLB) with ITM (Citrix Intelligent Traffic Management) is a solution that enables organizations to provide a high-performance, highly available, and scalable user experience for their global customers. This solution leverages multiple content delivery networks (CDNs) to distribute user traffic across the best-performing CDN based on real-time data and performance metrics. With ITM, organizations can define GSLB policies that automatically route user traffic to the optimal CDN or the origin server based on factors such as user location, network conditions, and CDN availability. This approach helps to ensure that users are always directed to the optimal data source, reducing latency, improving the user experience and save cost. Here's how multi-CDN GSLB works: A user requests content from a website or application that is delivered by a CDN. The DNS query for the website or application is directed to the NetScaler ITM. The NetScaler ITM uses its geographic and network-aware load balancing algorithms to determine the most optimal CDN or Origin Datacenter for the user based on their location, network conditions, and other factors. The NetScaler ITM returns the IP address of the optimal CDN to the user's device. The user's device sends the request for the content to the CDN with the returned IP address. The content is delivered to the user's device from the CDN. As shown in Figure2, If CDN2's E2a edge becomes unavailable, the NetScaler ITM automatically redirects the user to the next optimal CDN1 E1b edge to ensure continuous delivery of the content. Figure2: ITM optimized multi-cdn high availability Figure3: ITM ensuring business continuity for its users during Azure global outage (Jan 25th 2023). Conclusion Traditional algorithms in GSLB solutions have been a mainstay of web traffic management for many years, but they are increasingly being supplanted by more modern and advanced solutions like NetScaler ITM. By leveraging real-time network analytics, providing visibility into network performance, and automating configuration and maintenance, modern GSLB solutions offer a more effective and efficient way to manage web traffic in today's complex digital environment. If you're application is deployed across multiple datacenters, it's time to consider upgrading to this modern solution. Contact NetScaler netscaler-itm@cloud.com today to learn more about how our Intelligent Traffic Management solution can help you optimize your web traffic and deliver a superior user experience.
  6. Hi Sunil, Following document covers NetScaler Global Server Load Balancing DNS Request Flow Differences Between ADNS and DNS Proxy Solutions: https://support.citrix.com/article/CTX123792/netscaler-global-server-load-balancing-dns-request-flow-differences-between-adns-and-dns-proxy-solutions
  7. Here is a simple example of how to configure NetScaler GSLB for an active-active data center topology: Let's assume you have two data centers, DC1 and DC2, each hosting the same web application.On DC1, create a NetScaler VIP address with IP address 10.0.0.1 and configure a GSLB site with name "DC1".On DC2, create a NetScaler VIP address with IP address 10.0.0.2 and configure a GSLB site with name "DC2".Create a GSLB service with name "web-app" and associate the VIP addresses from DC1 and DC2 to the service.Configure a health monitor to monitor the health of the backend servers hosting the web application.Configure a load balancing method, such as round robin, to distribute traffic between the backend servers.Create a DNS zone for the web application and delegate the zone to the NetScaler GSLB.Publish the web application using a fully qualified domain name (FQDN) such as "www.my-app.com" and configure clients to use the FQDN to access the application.NetScaler provides a wizard to help you configure GSLB in a graphical user interface. The wizard guides you through the steps to create a GSLB deployment and provides options to customize the deployment to meet your specific needs. The wizard makes it easier to configure a GSLB deployment, especially for those who are new to NetScaler or who are not familiar with the command line interface. To access the wizard, log into the NetScaler web-based management interface and navigate to the GSLB section. From there, you can launch the wizard and follow the steps to create a new GSLB deployment. More Details here: https://support.citrix.com/article/CTX223376/how-to-configure-gslb-activeactive-topology-on-netscaler-using-the-new-gslb-wizard
  8. @Barry Whitehouse​ : Can you share more details about your environment. Reference architecture diagram of the deployment will help understand the requirement. How many data centers do you have your WEM brokers / NetScalers deployed in? GSLB setup / configuration steps available here.
  9. For more information : https://docs.citrix.com/en-us/citrix-adc/current-release/global-server-load-balancing/configuring-static-proximity/add-a-location-file-create-static-proximity-db.html#script-to-convert-maxmind-geolite2-database-format-to-citrix-adc-database-format
  10. Download the GeoLite2 City or GeoLite2 Country database in .csv format from https://dev.maxmind.com/geoip/geoip2/geolite2/.Copy the file in a Citrix ADC directory (say /var). Unzip the file using the following shell command, which would create a directory with the same name.tar -xf <filename>Download the script Convert_GeoIPDB_To_Netscaler_Format.pl from https://github.com/citrix/MaxMind-GeoIP-Database-Conversion-Citrix-ADC-Format and copy it to the directory created in step #2.To check the acceptable options for the script execution, run the following command:perl Convert_GeoIPDB_To_Netscaler_Format.pl –helpVarious options available are:<filename> IPv4 output file. Default output file name: Netscaler_Maxmind_GeoIP_DB_IPv4.csv-p <filename> IPv6 output file. Default output file name: Netscaler_Maxmind_GeoIP_DB_IPv6.csv-logfile <filename> File containing list of events/messages-debug Prints all the messages to STDOUTRun the following command to convert the GeoLite2 database format to Citrix ADC database format.perl Convert_GeoIPDB_To_Netscaler_Format.plExample: perl Convert_GeoIPDB_To_Netscaler_Format.pl -b GeoLite2-Country-Blocks-IPv4.csv -i GeoLite2-Country-Blocks-IPv6.csv -l GeoLite2-Country-Locations-en.csv
  11. Yes. From Citrix ADC release 13.1 build 21.x onwards, you have the option to increase disk space on the Citrix ADC VPX instance by adding a second disk. This feature is supported on all VPX form factors. You must add the second disk during the first boot of the Citrix ADC appliance or next when the appliance is shut down. The second disk is used for storing core files and logging. Existing directories that are used to store core files and log files continue to work as earlier.
  12. How to configure a service group to scale automatically, is there a way to gracefully transition server out of service?
×
×
  • Create New...