Jump to content
Updated Privacy Statement

Chris Chau

Internal Members
  • Posts

    73
  • Joined

  • Last visited

Everything posted by Chris Chau

  1. Learn how to leverage NetScaler to secure your APIs from OWASP API Top 10 risks, safeguard against common attacks such as SQL Injection and cross-site scripting, authenticate endpoints, and monitor API traffic. In this live demo, NetScaler experts will cover: Mitigating OWASP API Top 10 risks Securing API Endpoints via WAF Detailed information can be found in the following eDoc link: API authentication with the NetScaler appliance- https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/authentication-methods/oauth-authentication/api-authentication-with-adc.html For more latest NetScaler technical information, please feel free to visit and register our NetScaler Community: https://community.netscaler.com
  2. When NetScaler is deployed as a proxy for application deployments, NetScaler inspects each user request or response for global routing and local data center routing. With the thousands of logs and counters provided by NetScaler you can have granular information about HTTP, TCP, SSL, and DNS packets. You can leverage such rich data and insights from NetScaler to troubleshoot and pinpoint issues. You can export the data from NetScaler to your preferred observability endpoints to create visualizations and get real-time, granular application insights. NetScaler Intelligent Traffic Management (ITM) provides a revolutionary approach to Global Traffic Management/Global Server Load Balancing (GTM/GSLB). The mission of NetScaler ITM is to enable next-generation cloud strategies based on real-time Internet data feeds. The platform provides a highly robust means to ingest real-time data from various Internet sources and provides a DNS-based approach to Load-balancing. ITM uses DNS CNAME or records where its DNS responses can be altered in real-time based on the required business logic. In this demo, we will cover: Internet health monitoring: Internet visibility using NetScaler ITM Infrastructure health monitoring: exporting NetScaler logs and events to Splunk Details information can be found in the following eDoc link: NetScaler Intelligent Traffic Management (ITM): https://docs.netscaler.com/en-us/citrix-intelligent-traffic-management/openmix NetScaler Observability: https://docs.netscaler.com/en-us/citrix-adc/current-release/observability.html For more latest NetScaler technical information, please feel free to visit and NetScaler Community: https://community.netscaler.com
  3. Join our upcoming webinar to explore the intricate landscape of cloud deployments, encompassing dependencies like security groups, IAM roles, and much more at the cloud environment level. For customers transitioning from on-premises to the cloud, replicating the NetScaler deployments could be daunting. However, our NetScaler Cloud Sanity Checker tool guarantees deployment accuracy in every aspect and provides actionable insights for error scenarios. In this live demo, NetScaler experts will cover: Overview of NetScaler Public Cloud Common challenges with cloud deployments How NetScaler Cloud Sanity Checker Tool works Details information can be found in the following eDoc link: NetScaler Hybrid Multicloud Deployment: https://docs.netscaler.com/en-us/netscaler-console-service/hybrid-multi-cloud-deployments For more latest NetScaler technical information, please feel free to visit and register our NetScaler Community: https://community.netscaler.com
  4. Join us for a live demonstration session where we will dive into the art of tuning the NetScaler VPX running on ESX for the best performance. Get ready to explore the keys to achieve top-tier efficiency in this interactive, hands-on session. In this live demo, we will: Uncover the techniques and best practices to supercharge your application delivery and network performance Details information can be found in the following eDoc link: Optimize the NetScaler VPX Performance: https://docs.netscaler.com/en-us/citrix-adc/current-release/deploying-vpx/vpx-performance-on-esx-kvm-xen.html For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  5. When NetScaler is deployed as a proxy for application deployments, NetScaler inspects each user request or response for global routing and local data center routing. With the thousands of logs and counters provided by NetScaler you can have granular information about HTTP, TCP, SSL, and DNS packets. You can leverage such rich data and insights from NetScaler to troubleshoot and pinpoint issues. You can export the data from NetScaler to your preferred observability endpoints to create visualizations and get real-time, granular application insights. NetScaler Intelligent Traffic Management (ITM) provides a revolutionary approach to Global Traffic Management/Global Server Load Balancing (GTM/GSLB). The mission of NetScaler ITM is to enable next-generation cloud strategies based on real-time Internet data feeds. The platform provides a highly robust means to ingest real-time data from various Internet sources and provides a DNS-based approach to Load-balancing. ITM uses DNS CNAME or records where its DNS responses can be altered in real-time based on the required business logic. In this demo, we will cover: Internet health monitoring: Internet visibility using NetScaler ITM Infrastructure health monitoring: exporting NetScaler logs and events to Splunk Details information can be found in the following eDoc link: NetScaler Intelligent Traffic Management (ITM): https://docs.netscaler.com/en-us/citrix-intelligent-traffic-management/openmix NetScaler Observability: https://docs.netscaler.com/en-us/citrix-adc/current-release/observability.html For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  6. NetScaler BLX appliance is a software form-factor of NetScaler and provides the same functionality as of a traditional NetScaler appliance. It is designed to run natively on bare-metal-Linux on commercial off-the-shelf servers (COTS), hence, provides day-zero support for running on cloud. Open source tools (for example, monitoring, debugging, and logging) supported for Linux environment can be seamlessly integrated with NetScaler BLX. Since NetScaler BLX appliances run as a software application, other Linux applications can also run on the same host. In this live demo, you will: Experience a live seamless migration demo showcasing the effortless transition of NetScaler workloads to a Bare Metal Linux hardware using NetScaler BLX.Witness a swift and frictionless process that maintains configurations and ensures optimal performance, all within a few simple steps, demonstrating a quick and hassle-free migration.Details information can be found in the following eDoc link: NetScaler BLX 14.1: https://docs.netscaler.com/en-us/blx/...For more latest NetScaler technical information, please feel free to visit and register for our NetScaler Community: https://community.netscaler.com
  7. For the Operations team, automating workflows is one of the key goals to successfully applying DevOps. Automating infrastructure deployments and configurations helps streamlining the process of building, testing, and deploying infrastructure leading to a secure, scalable and reliable infrastructure. There are various ways to design Automation pipelines; Terraform Cloud is a remote, cloud-based service offered by HashiCorp for managing and collaborating on infrastructure as code (IaC). It offers several benefits for organizations and makes it easier for teams to collaborate especially in complex, multi-cloud, and multi-team environments. In this live session we will demonstrate: How you can leverage Terraform Cloud to Automate NetScaler operationsHow setup a NetScaler Automation pipeline on Terraform CloudHow to store and retrieve credentialsHow to manage your certificatesHow to safely store your Terraform state fileHow to segregate the duties of committing and approving Infrastructure as Code changesDetails information can be found in the following eDoc link: Automate deployment and configurations of NetScaler: https://docs.netscaler.com/en-us/citrix-adc/current-release/deploying-vpx/citrix-adc-automation.htmlAutomation in NetScaler Community: https://community.netscaler.com/s/topic/0TO8b000000QnUHGA0/automationGithub link for Terraform-NetScaler provider: https://github.com/citrix/terraform-provider-citrixadcFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com.
  8. A NetScaler cluster is formed by grouping NetScaler appliances together. NetScaler clustering can provide active-active traffic processing on 2 or up to 32 NetScaler appliances either physical or virtual. Each appliance must be of the same license type, software build, hardware build (MPX/SDX) or virtual build (VPX/SDX). In this live demo, we will showcase: How to perform a cluster upgrade: Procedure and Best practicesHandling of spotted entities in Cluster during node removal and joinRetain connection feature: Bird eye view and best practicesDetails information can be found in the following eDoc link: Clustering Overview: https://docs.netscaler.com/en-us/citrix-adc/current-release/clustering/cluster-overview.htmlFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com.
  9. You can create jobs to make configuration changes across instances. You can replicate configurations on multiple instances on your network and record and play configuration tasks using the NetScaler ADM GUI and convert it into CLI commands. In this short video you can see steps on how to create templates to run config jobs on ADM, please find the edoc link below: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/networks/configuration-jobs/use-master-configuration-template For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  10. The NetScaler front end optimization (FEO) feature addresses such issues and reduces the load time and render time of webpages by: Reducing the number of requestsRequired for rendering each pageReducing the number of bytes in page responsesSimplifying and optimizing the content served to the client browserYou can customize your FEO configuration to provide the best results for your users. In this short video, you can follow how to configure front end optimization. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/optimization/front-end-optimization.html For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  11. The rate limiting feature enables you to define the maximum load for a given network entity or virtual entity on the NetScaler appliance. The feature enables you to configure the appliance to monitor the rate of traffic associated with the entity and take preventive action, in real time, based on the traffic rate. This feature is particularly useful when the network is under attack from a hostile client that is sending the appliance a flood of requests. You can mitigate the risks that affect the availability of resources to clients, and you can improve the reliability of the network and the resources that the appliance manages. In this short video, you can follow how to configure IP Rate limiting. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/appexpert/rate-limiting For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  12. While user is accessing enterprise or internal network using NetScaler Gateway, there can be two possibilities/cases for device originating traffic. Case 1: Send complete traffic originating from user device through the VPN tunnel to the NetScaler Gateway, so that organization can provide high security to their internal network.Case 2: Send only the Intranet application traffic through the VPN tunnel to NetScaler Gateway, so that it is segregated from personal Internet traffic.The split tunneling is used to prevent the NetScaler Gateway Plug-in from sending unnecessary network traffic to NetScaler Gateway. In this short video, you can follow how to configure split tunneling. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-gateway/current-release/vpn-user-config/configure-full-vpn-setup#configure-split-tunneling For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  13. You can use the Web server logging feature to send logs of HTTP and HTTPS requests to a client system for storage and retrieval.o configure Web server logging, you first enable the Web logging feature on the NetScaler and configure the size of the buffer for temporarily storing the log entries. Then, you install NSWL on the client system. You then add the NetScaler IP address (NSIP) to the NSWL configuration file. You are now ready to start the NSWL client to begin logging. You can customize Web server logging by making additional modifications to the NSWL configuration file (log.conf). In this short video, you can follow how to configure NS web logging. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/system/web-server-logging For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  14. NetScaler Connect is a monthly webinar, held by NetScaler Community, targeting to release any updates of NetScaler technologies to our valued partners and customers. In this Sept webinar we will cover: NetScaler for Openshift workloadsSupport Assist : Post NetScaler upgradeADM Update: Cloud connector support on-premYou can find more information related to these topics here: NetScaler for Openshift: https://docs.netscaler.com/en-us/citrix-k8s-ingress-controller/deploy/cic-openshift.htmlUpgrade and downgrade a NetScaler appliance: https://docs.netscaler.com/en-us/citrix-adc/current-release/upgrade-downgrade-citrix-adc-applianceADM On-Prem Cloud Connector: https://docs.netscaler.com/en-us/citrix-application-delivery-management-software/current-release/cloud-connector
  15. Security as Code (SaC) is a concept that leverages code and automation to enforce security policies and practices across an organization's entire IT infrastructure. To successfully transition from DevOps to the security-integrated approach of DevSecOps means embracing SaC. In this live session we will discuss: Why SaC is important for Shifting Security left in the early stages of Software Development Life Cycle (SDLC)Demonstrate how Ansible can be used to configure NetScaler WAF for protecting your applications.Details information can be found in the following eDoc link: Get Started with NetScaler Automation using Ansible: https://community.netscaler.com/s/article/Get-Started-with-NetScaler-Automation-using-AnsibleADC Automation Use Cases: https://www.netscaler.com/solutions/adc-automationNetScaler Ansible Collections: https://github.com/netscaler/ansible-collection-netscaleradc/tree/v2.0.0-alpha/examples For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com ​​​​​​​
  16. NetScaler Connect is a monthly webinar, held by NetScaler Community, targeting to release any updates of NetScaler technologies to our valued partners and customers. In this Aug webinar we will cover: NetScaler ADM Security Advisory - File Integrity MonitoringLDAP configuration: what you should and shouldn’t do?Ensure seamless conversion of NetScaler policy using NSPEPI Tool: Classic to Advanced policies using NSPEPIImproving TCP's robustness to blind in window attacksYou can find more information related to our topics here: NetScaler Community Article - File Integrity Monitoring: https://community.netscaler.com/s/article/NetScaler-File-Integrity-MonitoringLDAP Configuration on NetScaler: https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/authentication-methods/citrix-adc-aaa-ldap-authentication-policiesConverting policy expressions using the NSPEPI tool: https://docs.netscaler.com/en-us/citrix-adc/current-release/appexpert/policies-and-expressions/introduction-to-policies-and-exp/converting-policy-expressions-nspepi-tool.htmlTCP Configurations for RFC 5961: https://docs.netscaler.com/en-us/citrix-adc/current-release/system/tcp-configurations.html#defending-tcp-against-spoofing-attacks-as-per-rfc-5961For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  17. NetScaler has introduced a new feature in the Application Delivery Management (ADM) Service called File Integrity Monitoring, which helps you determine if any unapproved changes have been made to your NetScaler build files. Unapproved changes may happen if your NetScaler has been compromised (or accessed by unapproved persons) and manipulation of those files has gone unnoticed. Moreover, there is a huge volume of files within NetScaler. Monitoring each of these files for changes manually is an enormous task, prone to error, and often insufficient for detecting subtle or rapid alterations. Even with existing security measures in place, the dynamic nature of cyber threats demands a more proactive approach to identifying unauthorized modifications to your NetScaler build files. NetScaler File Integrity Monitoring provides you with valuable insights that help you manage this risk. In this video, you can see how NetScaler ADM makes a comparison of the hash values by running a script in NetScaler and collecting the current binary hash values for the NetScaler build files. After the comparison, NetScaler ADM provides the result with total number of existing files modified and total number of newly added files. As an administrator, you can contact your organization digital forensics for further investigations on the scan results. More information can be found in the following links: NetScaler Community Article: NetScaler File Integrity Monitoring: https://community.netscaler.com/s/article/NetScaler-File-Integrity-MonitoringNetScaler ADM Security Advisory: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/instance-advisory/security-advisory.htmlFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  18. NetScaler Web App Firewall (WAF) Profile and WAF Signatures protect your web applications from malicious attacks. WAF signatures provide specific, configurable rules to simplify the task of protecting your websites against known attacks. To protect your application using signatures, you must review the rules, enable, and configure the ones that you want to apply. Similarly, to prevent data breaches and provide the right security protection in the application for other known or unknown attacks, you must create a WAF profile with security checks. When you create a WAF profile with certain security checks, you may result in blocking legitimate traffic (as the security checks are too strict) or allowing malicious traffic passing through (as the security checks are not strict enough). As an administrator, you must understand to enable the right signatures and create the right WAF profiles to protect the web application. Identifying the right signatures and the WAF profiles might be a difficult task at some scenarios. NetScaler ADM WAF recommendation scans the application for vulnerabilities and generates recommendations on WAF Profile and WAF Signature. WAF recommendation database is updated on a frequent duration to include any new vulnerabilities. You can scan and then select to enable the required recommendations. In this video, a brief demo on how to use the WAF Recommendation Scanner, in ADM, to scan the web apps for any vulnerabilities and provide the correspoding reccommendations in WAF Signature and Security Checks. For more detailed information, please go to the following eDoc link: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/analytics/security/waf-recommendation.html. For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  19. To enhance resiliency, operators distribute multiple instances of the same application across various Kubernetes clusters situated in different data centers and cloud platforms. Managing and accurately directing traffic to applications within these Kubernetes clusters can be cumbersome and prone to errors. In our live demonstration, we will highlight how the challenges can be addressed using the Multi-cluster Kubernetes ingress and load balancing solution that: Monitors applications on a global scale. Gathers and disseminates metrics across numerous clusters. Offers intelligent load balancing decisions. For a detailed understanding, refer to the following links: Multi-cluster ingress and load balancing solution using the NetScaler Ingress Controller: https://docs.netscaler.com/en-us/citrix-k8s-ingress-controller/multicluster/multi-cluster.html Configuring Multi-cluster Kubernetes Ingress with GSLB: https://community.netscaler.com/s/article/Configuring-Multi-cluster-Kubernetes-Ingress-with-GSLB For more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  20. In the recent years, nearly ALL of the apps configured in NetScaler are SSL/TLS encrypted HTTPS Apps. Hence, it is a very common task for installing the existing server certificate into the NetScaler or creating a new certificate request and installing the new certificate in the NetScaler. In this short video, you can follow how to create a new RSA key / certificate request, install the new server certificate and bind the new certificate-key pair. Details information can be found in the following eDoc link: https://docs.netscaler.com/en-us/citrix-adc/current-release/ssl/ssl-certificates/create-a-certificate.html
  21. In this live demo, we will cover: A Brief Introduction on AnsibleA Demonstration of how to automate NetScaler Configurations using AnsibleDetails information can be found in the following eDoc link:NetScaler Automation Toolkit: https://github.com/netscaler/automation-toolkitAutomate deployment and configuration of NetScaler: https://docs.netscaler.com/en-us/citrix-adc/current-release/deploying-vpx/citrix-adc-automation.htmlFor more latest NetScaler technical information, please feel free to register and visit our NetScaler Community: https://community.netscaler.com
  22. NetScaler ADM seamlessly integrates with the observability tool Splunk. It gathers Bot, WAF, and SSL events, sending them to Splunk at regular intervals, and Splunk's Common Information Model (CIM) add-on then automatically transforms these events into CIM-compatible data. This enables administrators to access and analyze the events through the Splunk dashboard, providing valuable insights into certificate health, application performance, and more. In this demo, we will showcase NetScaler ADMs observability integration with Splunk: SSL Certificate Insights: SSL Certificate management data from ADM across ADCs to Splunk every one hour (customizable from ADM)Security Insights: WAF/BOT Violations sent realtime or in periodic intervalsDetailed information can be found in the following eDoc link: Integration with Splunk : https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/analytics/security/splunk-integration.htmlFor any queries, please post it on the NetScaler Community Discussion Forum, and we will get it addressed for you. https://community.netscaler.com/s/webinar/a078b000010ripqAAA/security-analytics-ssl-analytics-with-splunk-netscaler-adm-integration
  23. NetScaler Connect is a monthly webinar, held by NetScaler Community, targeting to release any updates of NetScaler technologies to our valued partners and customers. In this July webinar we will cover: NetScaler Automation Toolkit - UpdatesAdvanced storefront monitor with actionable insightsBot Management - Mitigating automated browser attacks via Device FingerprintingAutomated identification and remediation of NetScaler vulnerabilities through ADM Security AdvisoryHere, you may find more information related to our topics:NetScaler Automation Toolkit GitHub: https://github.com/netscaler/automation-toolkitNetScaler ADM Analytics: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/analytics.htmlNetScaler BOT Detection: https://docs.netscaler.com/en-us/citrix-adc/current-release/bot-management/bot-detection.htmlNetScalerADM Security Advisory: https://docs.netscaler.com/en-us/citrix-application-delivery-management-service/instance-advisory/security-advisory.htmlLabs on the NetScaler Community: https://community.netscaler.com/s/netscaler-labs
  24. Self-service password reset (SSPR) is a web-based password management solution. It is available in both the authentication, authorization, and auditing features of the NetScaler appliance and NetScaler Gateway. It eliminates the user’s dependency on the administrator’s assistance for changing the password. In this demo, NetScaler experts will demonstrate: How SSPR (self-service password reset) provides the end user with the ability to securely create or reset a password. Detailed information can be found in the following eDoc link: Self-service password reset: https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/sspr-support.html For more NetScaler technical information, please feel free to visit and register for our NetScaler Community on https://community.netscaler.com
  25. Modern software applications comprise code from many sources, including proprietary code and open source libraries. So taking shortcuts with security - whether failing to implement user authorization at the beginning or failing to scan for vulnerabilities later - exposes your applications and APIs to attacks. When it comes to cybersecurity, we hear lots of myths and buzzwords, e.g. firewall, WAF, BOT, DDoS, etc... In this whiteboard series, our NetScaler Security Expert, Pons, will guide you through a security journey, from basic to advanced, to help you secure your application delivery with the right strategies and right tools. This is the first one and let's start with what is WAF and what are the common web attacks.
×
×
  • Create New...