Book Image

Mastering NetScaler VPX

By : Marius Sandbu, Andy Paul
Book Image

Mastering NetScaler VPX

By: Marius Sandbu, Andy Paul

Overview of this book

Citrix NetScaler is one of the best Application Delivery Controller products in the world. The Application Delivery Controllers are commonly used for load balancing purposes, to optimize traffic, and to perform extra security settings. This book will give you an insight into all the available features that the Citrix NetScaler appliance has to offer. The book will start with the commonly used NetScaler VPX features, such as load balancing and NetScaler Gateway functionality. Next, we cover features such as Responder, Rewrite, and the AppExpert templates, and how to configure these features. After that, you will learn more about the other available Citrix technologies that can interact with Citrix NetScaler. We also cover troubleshooting, optimizing traffic, caching, performing protection using Application Firewall, and denying HTTP DDoS attacks for web services. Finally, we will demonstrate the different configuration principles real-world Citrix NetScaler deployment scenarios.
Table of Contents (15 chapters)
Mastering NetScaler VPX™
Notice
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Citrix Receiver™ authentication


If you want to use the Citrix Receiver functionality and Receiver for Web with the NetScaler Gateway environment as well, some changes should be made to the LDAP and RADIUS policies. You should make some adjustments to the expressions.

When a user contacts the NetScaler Gateway through the web browser, they will see three fields that need to be filled in.

The first box requires the username, the second requires the password, and the third requires the RADIUS code. This means that the LDAP authentication is primary and RADIUS is the secondary authentication. You can see this in the following screenshot:

When the user connects with Citrix Receiver, the authentication is different because Citrix Receiver verifies the RADIUS authentication as primary and the LDAP authentication as secondary.

In order to arrange this, we should create two different LDAP and RADIUS policies. The LDAP policies could bind to the same LDAP server. The RADIUS policies could be bind to the same RADIUS server as well.

Follow these steps to arrange authentication through Citrix Receiver when using two-factor authentication:

  1. Create two LDAP policies:

    • Policy 1:

      Name: CitrixReceiver-DC1 (where DC1 is the domain controller name)

      Expression: REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver

      Server: DC1

    • Policy 2:

      Name: NonCitrixReceiver-DC1 (where DC1 is the domain controller name)

      Expression: REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver

      Server: DC1

  2. Create two RADIUS policies:

    • Policy 1:

      Name: CitrixReceiver-RADIUS1 (where RADIUS1 is the RADIUS server)

      Expression: REQ.HTTP.HEADER User-Agent CONTAINS CitrixReceiver

      Server: RADIUS1

      Policy 2:

      Name: NonCitrixReceiver-RADIUS1 (where RADIUS1 is the RADIUS server)

      Expression: REQ.HTTP.HEADER User-Agent NOTCONTAINS CitrixReceiver

      Server: RADIUS1

  3. Bind the NonCitrixReceiver-DC1 LDAP policy and the CitrixReceiver-RADIUS1 RADIUS policy as the primary authentication.

  4. Bind the CitrixReceiver-DC1 LDAP policy and the NonCitrixReceiver-RADIUS1 RADIUS policy as the secondary authentication.

When the user connects through Citrix Receiver, the authentication flow would first be CitrixReceiver-RADIUS1 as primary and CitrixReceiver-DC1 as secondary, because Citrix Receiver contains the User-Agent header with the CitrixReceiver value. All other non-Citrix Receiver users will authenticate with NonCitrixReceiver-DC1 as primary authentication and NonCitrixReceiver-RADIUS1 as secondary authentication.

Troubleshooting

For troubleshooting authentication, Citrix NetScaler provides a built-in tool that can be run from the CLI. Connect to the CLI with an SSH tool (PuTTY, for example). After logging in, type shell and then jump to the tmp location using cd /tmp. Run the following command after switching to the tmp location:

cat aaaa.debug

This built-in tool will give us information about what's going wrong during authentication.

Besides the built-in tool, Citrix also provides troubleshoot logging according to authentication in the GUI since NetScaler firmware release 11. So, if you are using Citrix NetScaler 11, troubleshooting through CLI isn't necessary.