SAML is a protocol that is taking off more and more allowing authentication of users without passwords over public Networks.
XenMobile has a secure web browser called WorxWeb that allows you to browse web pages on the internet and on your private intranet, but how to selectively redirect this web traffic to a proxy server?
NetScaler can process traffic in several ways, for example Layer 2 mode, Layer 3 mode and as a full (reverse) proxy, and before you go and implement there are several considerations you need to take on how you would like to get the traffic processed, some of them include: Does the NetScaler need to be transparent in my networks?
Citrix just released a security advisory article regarding the SSL “poodle” vulnerability and how we can disable SSL 3.0 protocol on the Netscaler -> http://support.citrix.com/article/ctx200238 The article shows how we can disable SSL on vServers and on NSIP, MIP and SNIPs.
Here is an idea on how to create a Content Switch, and hook up lots and lots (and lots) of VServers based on HTTP.REQ.HOSTNAME.
As a dedicated NetScaler fan and having some background in programming and scripting, I was looking for a way to start using the Nitro API, after attending a NetScaler MasterClass and reading some articles about it.
1-oct-2014 – Updated with new Responder Policy to block ShellShock based on traffic pattern 28-oct-2014 – Updated with new NetScaler version with Bash Fix This week it happened again, after HeartBleed a couple of months ago another major security hole popped-up; ShellShock or CVE-2014-6271.
With the introduction of NetScaler 10.5 most of the java is gone, But some bits and pieces remain Java for a bit longer, including the update window and this blog will show you how to update you NetScaler by only using Putty PSCP.
Recently I deployed a Netscaler Enterprise Edition HA pair in combination with an Exchange 2013 environment in coexistence with Exchange 2007.