SlideShare une entreprise Scribd logo
1  sur  83
Télécharger pour lire hors ligne
1 © 2016 Citrix | Confidential
2 © 2016 Citrix | Confidential
3 © 2016 Citrix | Confidential
4 © 2016 Citrix | Confidential
5 © 2016 Citrix | Confidential
6 © 2016 Citrix | Confidential
7 © 2016 Citrix | Confidential
8 © 2016 Citrix | Confidential
9 © 2016 Citrix | Confidential
10 © 2016 Citrix | Confidential
11 © 2016 Citrix | Confidential
12 © 2016 Citrix | Confidential
13 © 2016 Citrix | Confidential
14 © 2016 Citrix | Confidential
15 © 2016 Citrix | Confidential
16 © 2016 Citrix | Confidential
17 © 2016 Citrix | Confidential
18 © 2016 Citrix | Confidential
19 © 2016 Citrix | Confidential
20 © 2016 Citrix | Confidential
21 © 2016 Citrix | Confidential
22 © 2016 Citrix | Confidential
23 © 2016 Citrix | Confidential
24 © 2016 Citrix | Confidential
25 © 2016 Citrix | Confidential
26 © 2016 Citrix | Confidential
27 © 2016 Citrix | Confidential
28 © 2016 Citrix | Confidential
29 © 2016 Citrix | Confidential
30 © 2016 Citrix | Confidential
31 © 2016 Citrix | Confidential
32 © 2016 Citrix | Confidential
• nFactor was released in version 11.062x
• http://docs.citrix.com/en-us/netscaler/11/security/aaa-tm/multi-factor-nfactor-authentication.html
33 © 2016 Citrix | Confidential
Framehawk improves traffic delivery in low or challenging bandwidth situations
With NetScaler Gateway, Framehawk is available off the corporate network too, for remote access
scenarios such as working from home or the coffee shop or a hotel room. These are places where
Wi-Fi is often subject to electromagnetic inference that degrades the quality of the connection.
Support for remote access also opens the door to using Framehawk over 3G/4G/LTE connections.
This helps ensure the best mobile user experience by providing the best ICA transport grooming
possible over less than desirable network paths
<next slide>
Ensure UDP port 443 is open on the NetScaler Gateway virtual server. Framehawk will use UDP
over port 443 when accessing XenApp/XenDestop remotely through NetScaler Gateway.
34 © 2016 Citrix | Confidential
35 © 2016 Citrix | Confidential
36 © 2016 Citrix | Confidential
37 © 2016 Citrix | Confidential
38 © 2016 Citrix | Confidential
39 © 2016 Citrix | Confidential
40 © 2016 Citrix | Confidential
41 © 2016 Citrix | Confidential
42 © 2016 Citrix | Confidential
43 © 2016 Citrix | Confidential
44 © 2016 Citrix | Confidential
The threat index is based on attack information. The attack-related information, such as violation
type, attack category, location, and client details, gives you insight into the attacks on the
application. Violation information is sent to NetScaler Insight Center only when a violation or
attack occurs. A large number of breaches and vulnerabilities lead to a high threat index value.
45 © 2016 Citrix | Confidential
46 © 2016 Citrix | Confidential
ETA – Q1’2016
47 © 2016 Citrix | Confidential
http://docs.citrix.com/en-us/netscaler/11/security/reputation/ip-reputation.html
48 © 2016 Citrix | Confidential
49 © 2016 Citrix | Confidential
50 © 2016 Citrix | Confidential
51 © 2016 Citrix | Confidential
52 © 2016 Citrix | Confidential
53 © 2016 Citrix | Confidential
54 © 2016 Citrix | Confidential
55 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
56 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
57 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
58 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
59 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
60 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
61 © 2016 Citrix | Confidential
GSLB selects a Gateway using proximity logic
Gateway invokes LB (w/ staticProximity LB method)
• Rewrite policy is used for invocation
• Actual client IP used for “staticProximity” service selection
LB return “preferred services list”
• Services indicate delivery controllers
Gateway inserts the preferred service list in the header for Storefront
Storefront selects the delivery controller based on most preferred service
Receiver uses the “Optimal Gateway” configured for this delivery controller (site)
• Optimal gateway configuration is performed on Storefront
62 © 2016 Citrix | Confidential
http://docs.citrix.com/en-us/storefront/2-6/dws-manage/dws-configure-ha/dws-configure-ha-
optimal.html?_ga=1.141282164.756373124.1454298992
63 © 2016 Citrix | Confidential
64 © 2016 Citrix | Confidential
65 © 2016 Citrix | Confidential
66 © 2016 Citrix | Confidential
67 © 2016 Citrix | Confidential
68 © 2016 Citrix | Confidential
69 © 2016 Citrix | Confidential
70 © 2016 Citrix | Confidential
71 © 2016 Citrix | Confidential
72 © 2016 Citrix | Confidential
73 © 2016 Citrix | Confidential
74 © 2016 Citrix | Confidential
Benefits:
Online community with shared expertise
Online content
Local meetings in technology community
Local content
Training and certification discounts
Discounts on Synergy in 2016
Led by users, for users, C-U-G-C is an online and in-person hub for technology professionals.
Its goal is to connect users across industries, globally and locally. It‘s about knowledge-sharing,
high-quality content and independent insights.
We encourage you get involved by starting or joining a local group, sharing content and
networking.
Membership is free and open to anyone who works with Citrix products or is interested in Citrix
products.
Join now at www.mycugc.org!
75 © 2016 Citrix | Confidential
76 © 2016 Citrix | Confidential
77 © 2016 Citrix | Confidential
78 © 2016 Citrix | Confidential
79 © 2016 Citrix | Confidential
80 © 2016 Citrix | Confidential
81 © 2016 Citrix | Confidential
82 © 2016 Citrix | Confidential
83 © 2016 Citrix | Confidential

Contenu connexe

En vedette

En vedette (15)

SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
 
SYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobileSYN111: What's New and Exciting with XenMobile
SYN111: What's New and Exciting with XenMobile
 
SYN 321: Securing the Published Browser
SYN 321: Securing the Published BrowserSYN 321: Securing the Published Browser
SYN 321: Securing the Published Browser
 
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
Citrix Mobile Analytics Report September 2014: Mobile subscriber data usage t...
 
SYN002: General Session
SYN002: General SessionSYN002: General Session
SYN002: General Session
 
SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices SYN 220: XenApp and XenDesktop Security Best Practices
SYN 220: XenApp and XenDesktop Security Best Practices
 
SYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft AzureSYN 305: Architecting Citrix on Microsoft Azure
SYN 305: Architecting Citrix on Microsoft Azure
 
SYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServerSYN 103: Learn What’s New with XenServer
SYN 103: Learn What’s New with XenServer
 
12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning12 Game Changing Ways to Mobilize Teaching and Learning
12 Game Changing Ways to Mobilize Teaching and Learning
 
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitalePerché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
Perché la DISTRIBUZIONE DELLE APPLICAZIONI conta nell'economia digitale
 
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
Почему ДОСТАВКА ПРИЛОЖЕНИЙ так важна в цифровой экономике?
 
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
Pourquoi la MISE A DISPOSITION D’APPLICATIONS joue un rôle important dans l’é...
 
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economieWaarom APPLICATION DELIVERY belangrijk is in de digitale economie
Waarom APPLICATION DELIVERY belangrijk is in de digitale economie
 
How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization Team
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers
 

Plus de Citrix

Plus de Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

SYN 227 - Product Update: What’s New with NetScaler

  • 1. 1 © 2016 Citrix | Confidential
  • 2. 2 © 2016 Citrix | Confidential
  • 3. 3 © 2016 Citrix | Confidential
  • 4. 4 © 2016 Citrix | Confidential
  • 5. 5 © 2016 Citrix | Confidential
  • 6. 6 © 2016 Citrix | Confidential
  • 7. 7 © 2016 Citrix | Confidential
  • 8. 8 © 2016 Citrix | Confidential
  • 9. 9 © 2016 Citrix | Confidential
  • 10. 10 © 2016 Citrix | Confidential
  • 11. 11 © 2016 Citrix | Confidential
  • 12. 12 © 2016 Citrix | Confidential
  • 13. 13 © 2016 Citrix | Confidential
  • 14. 14 © 2016 Citrix | Confidential
  • 15. 15 © 2016 Citrix | Confidential
  • 16. 16 © 2016 Citrix | Confidential
  • 17. 17 © 2016 Citrix | Confidential
  • 18. 18 © 2016 Citrix | Confidential
  • 19. 19 © 2016 Citrix | Confidential
  • 20. 20 © 2016 Citrix | Confidential
  • 21. 21 © 2016 Citrix | Confidential
  • 22. 22 © 2016 Citrix | Confidential
  • 23. 23 © 2016 Citrix | Confidential
  • 24. 24 © 2016 Citrix | Confidential
  • 25. 25 © 2016 Citrix | Confidential
  • 26. 26 © 2016 Citrix | Confidential
  • 27. 27 © 2016 Citrix | Confidential
  • 28. 28 © 2016 Citrix | Confidential
  • 29. 29 © 2016 Citrix | Confidential
  • 30. 30 © 2016 Citrix | Confidential
  • 31. 31 © 2016 Citrix | Confidential
  • 32. 32 © 2016 Citrix | Confidential • nFactor was released in version 11.062x • http://docs.citrix.com/en-us/netscaler/11/security/aaa-tm/multi-factor-nfactor-authentication.html
  • 33. 33 © 2016 Citrix | Confidential Framehawk improves traffic delivery in low or challenging bandwidth situations With NetScaler Gateway, Framehawk is available off the corporate network too, for remote access scenarios such as working from home or the coffee shop or a hotel room. These are places where Wi-Fi is often subject to electromagnetic inference that degrades the quality of the connection. Support for remote access also opens the door to using Framehawk over 3G/4G/LTE connections. This helps ensure the best mobile user experience by providing the best ICA transport grooming possible over less than desirable network paths <next slide> Ensure UDP port 443 is open on the NetScaler Gateway virtual server. Framehawk will use UDP over port 443 when accessing XenApp/XenDestop remotely through NetScaler Gateway.
  • 34. 34 © 2016 Citrix | Confidential
  • 35. 35 © 2016 Citrix | Confidential
  • 36. 36 © 2016 Citrix | Confidential
  • 37. 37 © 2016 Citrix | Confidential
  • 38. 38 © 2016 Citrix | Confidential
  • 39. 39 © 2016 Citrix | Confidential
  • 40. 40 © 2016 Citrix | Confidential
  • 41. 41 © 2016 Citrix | Confidential
  • 42. 42 © 2016 Citrix | Confidential
  • 43. 43 © 2016 Citrix | Confidential
  • 44. 44 © 2016 Citrix | Confidential The threat index is based on attack information. The attack-related information, such as violation type, attack category, location, and client details, gives you insight into the attacks on the application. Violation information is sent to NetScaler Insight Center only when a violation or attack occurs. A large number of breaches and vulnerabilities lead to a high threat index value.
  • 45. 45 © 2016 Citrix | Confidential
  • 46. 46 © 2016 Citrix | Confidential ETA – Q1’2016
  • 47. 47 © 2016 Citrix | Confidential http://docs.citrix.com/en-us/netscaler/11/security/reputation/ip-reputation.html
  • 48. 48 © 2016 Citrix | Confidential
  • 49. 49 © 2016 Citrix | Confidential
  • 50. 50 © 2016 Citrix | Confidential
  • 51. 51 © 2016 Citrix | Confidential
  • 52. 52 © 2016 Citrix | Confidential
  • 53. 53 © 2016 Citrix | Confidential
  • 54. 54 © 2016 Citrix | Confidential
  • 55. 55 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 56. 56 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 57. 57 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 58. 58 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 59. 59 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 60. 60 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 61. 61 © 2016 Citrix | Confidential GSLB selects a Gateway using proximity logic Gateway invokes LB (w/ staticProximity LB method) • Rewrite policy is used for invocation • Actual client IP used for “staticProximity” service selection LB return “preferred services list” • Services indicate delivery controllers Gateway inserts the preferred service list in the header for Storefront Storefront selects the delivery controller based on most preferred service Receiver uses the “Optimal Gateway” configured for this delivery controller (site) • Optimal gateway configuration is performed on Storefront
  • 62. 62 © 2016 Citrix | Confidential http://docs.citrix.com/en-us/storefront/2-6/dws-manage/dws-configure-ha/dws-configure-ha- optimal.html?_ga=1.141282164.756373124.1454298992
  • 63. 63 © 2016 Citrix | Confidential
  • 64. 64 © 2016 Citrix | Confidential
  • 65. 65 © 2016 Citrix | Confidential
  • 66. 66 © 2016 Citrix | Confidential
  • 67. 67 © 2016 Citrix | Confidential
  • 68. 68 © 2016 Citrix | Confidential
  • 69. 69 © 2016 Citrix | Confidential
  • 70. 70 © 2016 Citrix | Confidential
  • 71. 71 © 2016 Citrix | Confidential
  • 72. 72 © 2016 Citrix | Confidential
  • 73. 73 © 2016 Citrix | Confidential
  • 74. 74 © 2016 Citrix | Confidential Benefits: Online community with shared expertise Online content Local meetings in technology community Local content Training and certification discounts Discounts on Synergy in 2016 Led by users, for users, C-U-G-C is an online and in-person hub for technology professionals. Its goal is to connect users across industries, globally and locally. It‘s about knowledge-sharing, high-quality content and independent insights. We encourage you get involved by starting or joining a local group, sharing content and networking. Membership is free and open to anyone who works with Citrix products or is interested in Citrix products. Join now at www.mycugc.org!
  • 75. 75 © 2016 Citrix | Confidential
  • 76. 76 © 2016 Citrix | Confidential
  • 77. 77 © 2016 Citrix | Confidential
  • 78. 78 © 2016 Citrix | Confidential
  • 79. 79 © 2016 Citrix | Confidential
  • 80. 80 © 2016 Citrix | Confidential
  • 81. 81 © 2016 Citrix | Confidential
  • 82. 82 © 2016 Citrix | Confidential
  • 83. 83 © 2016 Citrix | Confidential