Jump to content
Welcome to our new Citrix community!

Chris Chau

Internal Members
  • Posts

    70
  • Joined

  • Last visited

Chris Chau's Achievements

Enthusiast

Enthusiast (6/14)

  • Dedicated Rare
  • Conversation Starter Rare
  • Week One Done
  • One Month Later
  • First Post Rare

Recent Badges

0

Reputation

  1. Learn how to leverage NetScaler to secure your APIs from OWASP API Top 10 risks, safeguard against common attacks such as SQL Injection and cross-site scripting, authenticate endpoints, and monitor API traffic. In this live demo, NetScaler experts will cover: Mitigating OWASP API Top 10 risks Securing API Endpoints via WAF Detailed information can be found in the following eDoc link: API authentication with the NetScaler appliance- https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/authentication-methods/oauth-authentication/api-authentication-with-adc.html For more latest NetScaler technical information, please feel free to visit and register our NetScaler Community: https://community.netscaler.com
  2. When NetScaler is deployed as a proxy for application deployments, NetScaler inspects each user request or response for global routing and local data center routing. With the thousands of logs and counters provided by NetScaler you can have granular information about HTTP, TCP, SSL, and DNS packets. You can leverage such rich data and insights from NetScaler to troubleshoot and pinpoint issues. You can export the data from NetScaler to your preferred observability endpoints to create visualizations and get real-time, granular application insights. NetScaler Intelligent Traffic Management (ITM) provides a revolutionary approach to Global Traffic Management/Global Server Load Balancing (GTM/GSLB). The mission of NetScaler ITM is to enable next-generation cloud strategies based on real-time Internet data feeds. The platform provides a highly robust means to ingest real-time data from various Internet sources and provides a DNS-based approach to Load-balancing. ITM uses DNS CNAME or records where its DNS responses can be altered in real-time based on the required business logic. In this demo, we will cover: Internet health monitoring: Internet visibility using NetScaler ITM Infrastructure health monitoring: exporting NetScaler logs and events to Splunk Details information can be found in the following eDoc link: NetScaler Intelligent Traffic Management (ITM): https://docs.netscaler.com/en-us/citrix-intelligent-traffic-management/openmix NetScaler Observability: https://docs.netscaler.com/en-us/citrix-adc/current-release/observability.html For more latest NetScaler technical information, please feel free to visit and NetScaler Community: https://community.netscaler.com
  3. NetScaler BLX appliance is a software form-factor of NetScaler and provides the same functionality as of a traditional NetScaler appliance. It is designed to run natively on bare-metal-Linux on commercial off-the-shelf servers (COTS), hence, provides day-zero support for running on cloud. Open source tools (for example, monitoring, debugging, and logging) supported for Linux environment can be seamlessly integrated with NetScaler BLX. Since NetScaler BLX appliances run as a software application, other Linux applications can also run on the same host. In this live demo, you will: Experience a live seamless migration demo showcasing the effortless transition of NetScaler workloads to a Bare Metal Linux hardware using NetScaler BLX.Witness a swift and frictionless process that maintains configurations and ensures optimal performance, all within a few simple steps, demonstrating a quick and hassle-free migration.Details information can be found in the following eDoc link: NetScaler BLX 14.1: https://docs.netscaler.com/en-us/blx/...For more latest NetScaler technical information, please feel free to visit and register for our NetScaler Community: https://community.netscaler.com
  4. For the Operations team, automating workflows is one of the key goals to successfully applying DevOps. Automating infrastructure deployments and configurations helps streamlining the process of building, testing, and deploying infrastructure leading to a secure, scalable and reliable infrastructure. There are various ways to design Automation pipelines; Terraform Cloud is a remote, cloud-based service offered by HashiCorp for managing and collaborating on infrastructure as code (IaC). It offers several benefits for organizations and makes it easier for teams to collaborate especially in complex, multi-cloud, and multi-team environments. In this live session we will demonstrate: How you can leverage Terraform Cloud to Automate NetScaler operationsHow setup a NetScaler Automation pipeline on Terraform CloudHow to store and retrieve credentialsHow to manage your certificatesHow to safely store your Terraform state fileHow to segregate the duties of committing and approving Infrastructure as Code changesDetails information can be found in the following eDoc link: Automate deployment and configurations of NetScaler: https://docs.netscaler.com/en-us/citrix-adc/current-release/deploying-vpx/citrix-adc-automation.htmlAutomation in NetScaler Community: https://community.netscaler.com/s/topic/0TO8b000000QnUHGA0/automationGithub link for Terraform-NetScaler provider: https://github.com/citrix/terraform-provider-citrixadcFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com.
  5. A NetScaler cluster is formed by grouping NetScaler appliances together. NetScaler clustering can provide active-active traffic processing on 2 or up to 32 NetScaler appliances either physical or virtual. Each appliance must be of the same license type, software build, hardware build (MPX/SDX) or virtual build (VPX/SDX). In this live demo, we will showcase: How to perform a cluster upgrade: Procedure and Best practicesHandling of spotted entities in Cluster during node removal and joinRetain connection feature: Bird eye view and best practicesDetails information can be found in the following eDoc link: Clustering Overview: https://docs.netscaler.com/en-us/citrix-adc/current-release/clustering/cluster-overview.htmlFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com.
  6. You can create jobs to make configuration changes across instances. You can replicate configurations on multiple instances on your network and record and play configuration tasks using the NetScaler ADM GUI and convert it into CLI commands. In this short video you can see steps on how to create templates to run config jobs on ADM, please find the edoc link below: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/networks/configuration-jobs/use-master-configuration-template For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  7. The NetScaler front end optimization (FEO) feature addresses such issues and reduces the load time and render time of webpages by: Reducing the number of requestsRequired for rendering each pageReducing the number of bytes in page responsesSimplifying and optimizing the content served to the client browserYou can customize your FEO configuration to provide the best results for your users. In this short video, you can follow how to configure front end optimization. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/optimization/front-end-optimization.html For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  8. The rate limiting feature enables you to define the maximum load for a given network entity or virtual entity on the NetScaler appliance. The feature enables you to configure the appliance to monitor the rate of traffic associated with the entity and take preventive action, in real time, based on the traffic rate. This feature is particularly useful when the network is under attack from a hostile client that is sending the appliance a flood of requests. You can mitigate the risks that affect the availability of resources to clients, and you can improve the reliability of the network and the resources that the appliance manages. In this short video, you can follow how to configure IP Rate limiting. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/appexpert/rate-limiting For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  9. While user is accessing enterprise or internal network using NetScaler Gateway, there can be two possibilities/cases for device originating traffic. Case 1: Send complete traffic originating from user device through the VPN tunnel to the NetScaler Gateway, so that organization can provide high security to their internal network.Case 2: Send only the Intranet application traffic through the VPN tunnel to NetScaler Gateway, so that it is segregated from personal Internet traffic.The split tunneling is used to prevent the NetScaler Gateway Plug-in from sending unnecessary network traffic to NetScaler Gateway. In this short video, you can follow how to configure split tunneling. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-gateway/current-release/vpn-user-config/configure-full-vpn-setup#configure-split-tunneling For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  10. You can use the Web server logging feature to send logs of HTTP and HTTPS requests to a client system for storage and retrieval.o configure Web server logging, you first enable the Web logging feature on the NetScaler and configure the size of the buffer for temporarily storing the log entries. Then, you install NSWL on the client system. You then add the NetScaler IP address (NSIP) to the NSWL configuration file. You are now ready to start the NSWL client to begin logging. You can customize Web server logging by making additional modifications to the NSWL configuration file (log.conf). In this short video, you can follow how to configure NS web logging. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/system/web-server-logging For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  11. NetScaler Connect is a monthly webinar, held by NetScaler Community, targeting to release any updates of NetScaler technologies to our valued partners and customers. In this Sept webinar we will cover: NetScaler for Openshift workloadsSupport Assist : Post NetScaler upgradeADM Update: Cloud connector support on-premYou can find more information related to these topics here: NetScaler for Openshift: https://docs.netscaler.com/en-us/citrix-k8s-ingress-controller/deploy/cic-openshift.htmlUpgrade and downgrade a NetScaler appliance: https://docs.netscaler.com/en-us/citrix-adc/current-release/upgrade-downgrade-citrix-adc-applianceADM On-Prem Cloud Connector: https://docs.netscaler.com/en-us/citrix-application-delivery-management-software/current-release/cloud-connector
  12. Security as Code (SaC) is a concept that leverages code and automation to enforce security policies and practices across an organization's entire IT infrastructure. To successfully transition from DevOps to the security-integrated approach of DevSecOps means embracing SaC. In this live session we will discuss: Why SaC is important for Shifting Security left in the early stages of Software Development Life Cycle (SDLC)Demonstrate how Ansible can be used to configure NetScaler WAF for protecting your applications.Details information can be found in the following eDoc link: Get Started with NetScaler Automation using Ansible: https://community.netscaler.com/s/article/Get-Started-with-NetScaler-Automation-using-AnsibleADC Automation Use Cases: https://www.netscaler.com/solutions/adc-automationNetScaler Ansible Collections: https://github.com/netscaler/ansible-collection-netscaleradc/tree/v2.0.0-alpha/examples For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com ​​​​​​​
  13. NetScaler Connect is a monthly webinar, held by NetScaler Community, targeting to release any updates of NetScaler technologies to our valued partners and customers. In this Aug webinar we will cover: NetScaler ADM Security Advisory - File Integrity MonitoringLDAP configuration: what you should and shouldn’t do?Ensure seamless conversion of NetScaler policy using NSPEPI Tool: Classic to Advanced policies using NSPEPIImproving TCP's robustness to blind in window attacksYou can find more information related to our topics here: NetScaler Community Article - File Integrity Monitoring: https://community.netscaler.com/s/article/NetScaler-File-Integrity-MonitoringLDAP Configuration on NetScaler: https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/authentication-methods/citrix-adc-aaa-ldap-authentication-policiesConverting policy expressions using the NSPEPI tool: https://docs.netscaler.com/en-us/citrix-adc/current-release/appexpert/policies-and-expressions/introduction-to-policies-and-exp/converting-policy-expressions-nspepi-tool.htmlTCP Configurations for RFC 5961: https://docs.netscaler.com/en-us/citrix-adc/current-release/system/tcp-configurations.html#defending-tcp-against-spoofing-attacks-as-per-rfc-5961For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  14. NetScaler has introduced a new feature in the Application Delivery Management (ADM) Service called File Integrity Monitoring, which helps you determine if any unapproved changes have been made to your NetScaler build files. Unapproved changes may happen if your NetScaler has been compromised (or accessed by unapproved persons) and manipulation of those files has gone unnoticed. Moreover, there is a huge volume of files within NetScaler. Monitoring each of these files for changes manually is an enormous task, prone to error, and often insufficient for detecting subtle or rapid alterations. Even with existing security measures in place, the dynamic nature of cyber threats demands a more proactive approach to identifying unauthorized modifications to your NetScaler build files. NetScaler File Integrity Monitoring provides you with valuable insights that help you manage this risk. In this video, you can see how NetScaler ADM makes a comparison of the hash values by running a script in NetScaler and collecting the current binary hash values for the NetScaler build files. After the comparison, NetScaler ADM provides the result with total number of existing files modified and total number of newly added files. As an administrator, you can contact your organization digital forensics for further investigations on the scan results. More information can be found in the following links: NetScaler Community Article: NetScaler File Integrity Monitoring: https://community.netscaler.com/s/article/NetScaler-File-Integrity-MonitoringNetScaler ADM Security Advisory: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/instance-advisory/security-advisory.htmlFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  15. NetScaler Web App Firewall (WAF) Profile and WAF Signatures protect your web applications from malicious attacks. WAF signatures provide specific, configurable rules to simplify the task of protecting your websites against known attacks. To protect your application using signatures, you must review the rules, enable, and configure the ones that you want to apply. Similarly, to prevent data breaches and provide the right security protection in the application for other known or unknown attacks, you must create a WAF profile with security checks. When you create a WAF profile with certain security checks, you may result in blocking legitimate traffic (as the security checks are too strict) or allowing malicious traffic passing through (as the security checks are not strict enough). As an administrator, you must understand to enable the right signatures and create the right WAF profiles to protect the web application. Identifying the right signatures and the WAF profiles might be a difficult task at some scenarios. NetScaler ADM WAF recommendation scans the application for vulnerabilities and generates recommendations on WAF Profile and WAF Signature. WAF recommendation database is updated on a frequent duration to include any new vulnerabilities. You can scan and then select to enable the required recommendations. In this video, a brief demo on how to use the WAF Recommendation Scanner, in ADM, to scan the web apps for any vulnerabilities and provide the correspoding reccommendations in WAF Signature and Security Checks. For more detailed information, please go to the following eDoc link: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/analytics/security/waf-recommendation.html. For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
×
×
  • Create New...