This document provides a deployment guide for using Citrix NetScaler Access Gateway Enterprise Edition (NetScaler AGEE) as an ICA proxy for the Citrix XenApp web interface and plugin. It includes prerequisites, a network diagram, and configuration steps for XenApp, NetScaler AGEE, and testing the solutions. The goal is to securely deliver XenApp applications to remote users through NetScaler AGEE using a certificate chain of trust.
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX - Lessons Learned from real projectDavid Pasek
This document provides an overview and agenda for a presentation on implementing end-to-end quality of service (QoS) for VMware vSphere with NSX on Cisco UCS. It discusses the project requirements of guaranteeing network traffic for FCoE storage, vSphere management, vMotion and VM backups. It then presents three design options for implementing QoS by marking and prioritizing different classes of service on the virtual network interface cards, VMware distributed virtual switch port groups, Cisco UCS fabric interconnects and Nexus switches. The optimal solution must meet requirements within the constraints of the Cisco and VMware infrastructure components.
VMware NSX is a software-defined networking and security platform that delivers virtual network services like logical switches, routers, firewalls, and load balancers. It allows for the creation of isolated, software-based virtual networks independent of physical network hardware. NSX provides capabilities like network automation, security segmentation, and multi-tenancy that can be used for data center automation, rapid application deployment, and isolating development, test, and production environments.
The document discusses how NSX security services can automate security operations and policies across virtualized environments through features like distributed firewalling, guest introspection, security groups, and integration with third-party security services. It provides an overview of how NSX improves visibility, context, performance, and automation compared to traditional network and host-based security controls. Use cases demonstrated include optimized vulnerability management and context-based isolation in VDI environments.
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
VMworld 2013
Ben Basler, VMware
Roberto Mari, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMware NSX - Lessons Learned from real projectDavid Pasek
This document provides an overview and agenda for a presentation on implementing end-to-end quality of service (QoS) for VMware vSphere with NSX on Cisco UCS. It discusses the project requirements of guaranteeing network traffic for FCoE storage, vSphere management, vMotion and VM backups. It then presents three design options for implementing QoS by marking and prioritizing different classes of service on the virtual network interface cards, VMware distributed virtual switch port groups, Cisco UCS fabric interconnects and Nexus switches. The optimal solution must meet requirements within the constraints of the Cisco and VMware infrastructure components.
VMware NSX is a software-defined networking and security platform that delivers virtual network services like logical switches, routers, firewalls, and load balancers. It allows for the creation of isolated, software-based virtual networks independent of physical network hardware. NSX provides capabilities like network automation, security segmentation, and multi-tenancy that can be used for data center automation, rapid application deployment, and isolating development, test, and production environments.
The document discusses how NSX security services can automate security operations and policies across virtualized environments through features like distributed firewalling, guest introspection, security groups, and integration with third-party security services. It provides an overview of how NSX improves visibility, context, performance, and automation compared to traditional network and host-based security controls. Use cases demonstrated include optimized vulnerability management and context-based isolation in VDI environments.
Software Defined Networking (SDN) with VMware NSXZivaro Inc
Combining SDN with VMware’s NSX can accelerate application deployment and delivery in a secure and virtualized network. No longer will your network create a bottleneck when trying to administer new applications. Key topics include:
- How SDN allows for innovative ways to use a virtualized network
- Why SDN creates greater span of control, network analytics and response
- What intelligence can be gained from a global view of the network
- How SDN and NSX together allow IT to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand
From: "Software Defined Networking for NSX" webinar presented by Scott Hogg of GTRI and Hunter Hansen of VMware on February 3, 2016. Webinar recording: https://youtu.be/t_3DpN3nIXQ
Ng Tock Hiong discusses the zero trust security model and its implementation using VMware's NSX platform. A zero trust model prevents threats from moving laterally inside a network through strict micro-granular security policies tied to individual workloads. NSX enables this by providing distributed firewalling and security services at the hypervisor layer. This allows fine-grained micro-segmentation of workloads and simplifies network security management. NSX also provides visibility into the entire environment and automates security policy provisioning as workloads move or change.
This document discusses the Cisco Nexus 1000V virtual switch, which provides virtual machine-level network visibility and policy enforcement within VMware vSphere environments. The Nexus 1000V replaces the hypervisor virtual switch with Cisco's modular software switch. It extends the network to each virtual machine and allows consistent network and security policies to follow VMs during live migration. The Nexus 1000V integrates tightly with VMware vCenter and leverages Cisco's NX-OS operating system, providing familiar CLI management of the virtual switch.
VMworld 2013: An Introduction to Network Virtualization VMworld
The document discusses network virtualization and VMware NSX. It begins with an agenda that covers objectives, network virtualization, NSX system architecture and use cases. It then discusses what network virtualization is, how it abstracts and automates the network. The NSX architecture uses Open vSwitch and tunnels traffic between virtual networks. Key use cases include automated provisioning and cross-datacenter connectivity. Physical and logical relationships are illustrated on a whiteboard. Takeaways focus on the benefits of network virtualization in building scalable software-defined datacenters.
VMworld Europe 2014: Advanced Network Services with NSXVMworld
This document provides an overview and agenda for a presentation on Network and Security services provided by VMware's NSX software-defined networking platform, including:
1. What network and security services are used by applications today.
2. Details on NSX firewalling, load balancing, and VPN services, including demos.
3. How NSX integrates with third-party security and load balancer vendors to enhance services.
VMworld 2013: Security Automation Workflows with NSX VMworld
VMworld 2013
Gargi Keeling, VMware
Don Wood, McKesson
Troy Casey, McKesson
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Vtguru v mware-v-sphere-administration-trainingfosilalive2
This document outlines the modules and content covered in the VTguru VMware vSphere-4.1 Administration Training course. The course teaches students to install, configure, and manage VMware vSphere-4.1 which includes ESX Server and vCenter Server. Students will learn how to install and configure ESX Server and vCenter Server, manage virtual networks and storage, deploy and manage virtual machines, ensure high availability, and more. The course contains over 15 modules and covers all aspects of virtual infrastructure administration using VMware vSphere 4.1.
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
VMworld 2013
Anirban Sengupta, VMware
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
The document discusses security and compliance requirements for cloud computing. It provides an overview of key compliance standards and regulations that affect customers. It then discusses some of the unique security challenges that virtualized and cloud environments can present compared to traditional IT environments. Specifically, it notes that system boundaries are less clear in virtual systems and that more components and complexity are involved. Finally, it outlines some of the foundations that VMware and its partners are providing to help address these challenges, such as security hardening guides, virtual trust zones, and network segmentation controls.
This document discusses network virtualization from an architectural and technological perspective. It covers the principles of network virtualization including coexistence, recursion, inheritance, and revisitation. It then discusses different types of network device virtualization including NIC, router, link, and data path virtualization. It also covers network virtualization technologies like overlay networks and virtual private networks. Finally, it discusses applications of network virtualization like provisioning independent networks, improving robustness and reducing hardware costs.
Guido Appenzeller
CEO
Big Switch Networks
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
The term Micro-segmentation has been used by all vendors to death. So what does it mean for you? This session walks through step by step building a security architecture from nothing. Where do you start? How do you learn how an application speaks? What approach can you take that is not disruptive? What objects should I use? Security Groups, IPsets, Clusters, VMs? After deciding what is best for the right situation come and see how to apply micro segmentation with VMware NSX to VMware Log Insight. Walk away with a repeatable approach breaking down, learning, and segmenting any application on your virtualised infrastructure. Designing an applications micro segmentation policy just got a whole lot easier.
This document discusses best practices for deploying VMware Infrastructure 3.x and VMware ESX Server 3.x in a Cisco network environment. It provides details on the internal constructs of the ESX Server and how they relate to external Cisco network devices. The document is intended for network architects, engineers, and server administrators interested in virtualization deployments within Cisco data centers. It covers ESX Server networking components, virtual switching, LAN and storage connectivity, design considerations, and VMotion.
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks
Use this VNS3 set up guide to get started in CenturyLink Cloud environments.
About VNS3:
VNS3 delivers cloud networking and NFV functionality for virtual and cloud environments. The VNS3 virtual network security appliance includes a router, switch, stateful firewall, VPN support (IPsec and SSL), and protocol redistributor, and extensible NFV optimized for all major cloud providers. VNS3 cloud networks are configured and managed through the VNS3 Manager web-based UI or resetful API.
VNS3 is available in: Amazon Web Services EC2, Amazon Web Services VPC, Microsoft Azure, CenturyLink Cloud, Google Compute Engine (GCE), Rackspace, IBM SoftLayer, ElasticHosts, Verizon Terremark vCloud Express, InterRoute, Abiquo, Openstack, Flexiant, Eucalyptus, Abiquo, HPE Helion, VMware (all formats), Citrix, Xen, KVM, and more.
VNS3 supports most IPsec data center solutions, including: Preferred Most models from Cisco Systems*, Juniper, Watchguard, Dell SONICWALL, Netgear, Fortinet, Barracuda Networks, Check Point*, Zyxel USA, McAfee Retail, Citrix Systems, Hewlett Packard, D-Link, WatchGuard, Palo Alto Networks, OpenSwan, pfSense, Vyatta, and any IPsec device that supports IKE1 or IKE2, AES256 or AES128 or 3DES, SHA1 or MD5, and most importantly NAT-Traversal standards.
The document discusses Cisco Nexus 1000V and the Nexus 1010 appliance. It provides an overview of the Nexus 1000V architecture, comparing it to a physical modular switch. It describes how the Nexus 1000V uses Virtual Supervisor Modules (VSMs) and Virtual Ethernet Modules (VEMs) to replace the functionality of physical linecards and supervisors. It also discusses how the Nexus 1010 appliance allows hosting of VSMs on a physical device for improved performance and redundancy.
The document provides an overview of network virtualization and Quantum, an OpenStack module that provides network as a service. It discusses how Quantum uses plug-ins and extensions to provide layer 2 isolation using mechanisms like VLANs and tunnels. It also describes Quantum's layer 3 networking extension which allows creation of routers to connect different networks, and how security groups can specify ingress/egress traffic rules for ports.
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
Cisco Virtual Security Gateway (VSG) provides security policies and controls for virtual machine to virtual machine traffic. It analyzes VM attributes and context to dynamically apply access controls. VSG inserts transparently without relying on VLANs to protect intra-segment communication. It also supports multi-tenant environments through security domain separation and granular policy assignment.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
Bridges and Tunnels a Drive Through OpenStack Networkingmarkmcclain
This document summarizes OpenStack networking and some of its key components and capabilities. It discusses the motivation for creating Neutron as a networking service, challenges in cloud networking like multi-tenancy and on-demand provisioning, and how Neutron tackles these challenges through network virtualization and SDN. It provides an overview of Neutron's architecture, including its plugin-based model, agents, and common features like security groups. It also describes new capabilities in OpenStack Juno like IPv6 support and distributed virtual routing.
Quantum provides an API for managing virtual networks in OpenStack. It allows tenants to create multiple private networks with their own IP addressing, and attach virtual machines to these networks. Quantum uses a plugin architecture that supports various networking technologies by exposing a generic API and allowing operators to choose different backend implementations, such as VLANs, VXLAN, or SDN controllers. This provides tenants with advanced network automation capabilities and operators with network technology choices.
Quantum - Virtual networks for Openstacksalv_orlando
An overview of Quantum, the soon-to-be default Openstack network service.
These slides introduce Quantum, its design goals, and discusses the API. It also tries to address how quantum relates to Software Defined Networking (SDN)
Ng Tock Hiong discusses the zero trust security model and its implementation using VMware's NSX platform. A zero trust model prevents threats from moving laterally inside a network through strict micro-granular security policies tied to individual workloads. NSX enables this by providing distributed firewalling and security services at the hypervisor layer. This allows fine-grained micro-segmentation of workloads and simplifies network security management. NSX also provides visibility into the entire environment and automates security policy provisioning as workloads move or change.
This document discusses the Cisco Nexus 1000V virtual switch, which provides virtual machine-level network visibility and policy enforcement within VMware vSphere environments. The Nexus 1000V replaces the hypervisor virtual switch with Cisco's modular software switch. It extends the network to each virtual machine and allows consistent network and security policies to follow VMs during live migration. The Nexus 1000V integrates tightly with VMware vCenter and leverages Cisco's NX-OS operating system, providing familiar CLI management of the virtual switch.
VMworld 2013: An Introduction to Network Virtualization VMworld
The document discusses network virtualization and VMware NSX. It begins with an agenda that covers objectives, network virtualization, NSX system architecture and use cases. It then discusses what network virtualization is, how it abstracts and automates the network. The NSX architecture uses Open vSwitch and tunnels traffic between virtual networks. Key use cases include automated provisioning and cross-datacenter connectivity. Physical and logical relationships are illustrated on a whiteboard. Takeaways focus on the benefits of network virtualization in building scalable software-defined datacenters.
VMworld Europe 2014: Advanced Network Services with NSXVMworld
This document provides an overview and agenda for a presentation on Network and Security services provided by VMware's NSX software-defined networking platform, including:
1. What network and security services are used by applications today.
2. Details on NSX firewalling, load balancing, and VPN services, including demos.
3. How NSX integrates with third-party security and load balancer vendors to enhance services.
VMworld 2013: Security Automation Workflows with NSX VMworld
VMworld 2013
Gargi Keeling, VMware
Don Wood, McKesson
Troy Casey, McKesson
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Vtguru v mware-v-sphere-administration-trainingfosilalive2
This document outlines the modules and content covered in the VTguru VMware vSphere-4.1 Administration Training course. The course teaches students to install, configure, and manage VMware vSphere-4.1 which includes ESX Server and vCenter Server. Students will learn how to install and configure ESX Server and vCenter Server, manage virtual networks and storage, deploy and manage virtual machines, ensure high availability, and more. The course contains over 15 modules and covers all aspects of virtual infrastructure administration using VMware vSphere 4.1.
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
VMworld 2013
Anirban Sengupta, VMware
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
The document discusses security and compliance requirements for cloud computing. It provides an overview of key compliance standards and regulations that affect customers. It then discusses some of the unique security challenges that virtualized and cloud environments can present compared to traditional IT environments. Specifically, it notes that system boundaries are less clear in virtual systems and that more components and complexity are involved. Finally, it outlines some of the foundations that VMware and its partners are providing to help address these challenges, such as security hardening guides, virtual trust zones, and network segmentation controls.
This document discusses network virtualization from an architectural and technological perspective. It covers the principles of network virtualization including coexistence, recursion, inheritance, and revisitation. It then discusses different types of network device virtualization including NIC, router, link, and data path virtualization. It also covers network virtualization technologies like overlay networks and virtual private networks. Finally, it discusses applications of network virtualization like provisioning independent networks, improving robustness and reducing hardware costs.
Guido Appenzeller
CEO
Big Switch Networks
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
The term Micro-segmentation has been used by all vendors to death. So what does it mean for you? This session walks through step by step building a security architecture from nothing. Where do you start? How do you learn how an application speaks? What approach can you take that is not disruptive? What objects should I use? Security Groups, IPsets, Clusters, VMs? After deciding what is best for the right situation come and see how to apply micro segmentation with VMware NSX to VMware Log Insight. Walk away with a repeatable approach breaking down, learning, and segmenting any application on your virtualised infrastructure. Designing an applications micro segmentation policy just got a whole lot easier.
This document discusses best practices for deploying VMware Infrastructure 3.x and VMware ESX Server 3.x in a Cisco network environment. It provides details on the internal constructs of the ESX Server and how they relate to external Cisco network devices. The document is intended for network architects, engineers, and server administrators interested in virtualization deployments within Cisco data centers. It covers ESX Server networking components, virtual switching, LAN and storage connectivity, design considerations, and VMotion.
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks
Use this VNS3 set up guide to get started in CenturyLink Cloud environments.
About VNS3:
VNS3 delivers cloud networking and NFV functionality for virtual and cloud environments. The VNS3 virtual network security appliance includes a router, switch, stateful firewall, VPN support (IPsec and SSL), and protocol redistributor, and extensible NFV optimized for all major cloud providers. VNS3 cloud networks are configured and managed through the VNS3 Manager web-based UI or resetful API.
VNS3 is available in: Amazon Web Services EC2, Amazon Web Services VPC, Microsoft Azure, CenturyLink Cloud, Google Compute Engine (GCE), Rackspace, IBM SoftLayer, ElasticHosts, Verizon Terremark vCloud Express, InterRoute, Abiquo, Openstack, Flexiant, Eucalyptus, Abiquo, HPE Helion, VMware (all formats), Citrix, Xen, KVM, and more.
VNS3 supports most IPsec data center solutions, including: Preferred Most models from Cisco Systems*, Juniper, Watchguard, Dell SONICWALL, Netgear, Fortinet, Barracuda Networks, Check Point*, Zyxel USA, McAfee Retail, Citrix Systems, Hewlett Packard, D-Link, WatchGuard, Palo Alto Networks, OpenSwan, pfSense, Vyatta, and any IPsec device that supports IKE1 or IKE2, AES256 or AES128 or 3DES, SHA1 or MD5, and most importantly NAT-Traversal standards.
The document discusses Cisco Nexus 1000V and the Nexus 1010 appliance. It provides an overview of the Nexus 1000V architecture, comparing it to a physical modular switch. It describes how the Nexus 1000V uses Virtual Supervisor Modules (VSMs) and Virtual Ethernet Modules (VEMs) to replace the functionality of physical linecards and supervisors. It also discusses how the Nexus 1010 appliance allows hosting of VSMs on a physical device for improved performance and redundancy.
The document provides an overview of network virtualization and Quantum, an OpenStack module that provides network as a service. It discusses how Quantum uses plug-ins and extensions to provide layer 2 isolation using mechanisms like VLANs and tunnels. It also describes Quantum's layer 3 networking extension which allows creation of routers to connect different networks, and how security groups can specify ingress/egress traffic rules for ports.
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
Cisco Virtual Security Gateway (VSG) provides security policies and controls for virtual machine to virtual machine traffic. It analyzes VM attributes and context to dynamically apply access controls. VSG inserts transparently without relying on VLANs to protect intra-segment communication. It also supports multi-tenant environments through security domain separation and granular policy assignment.
Session: The Data Center Network Evolution: Journey to the Programmable Fabric
Presenter: Robert Zalobinski, Technical Solutions Architect
Date: October 6, 2015
Bridges and Tunnels a Drive Through OpenStack Networkingmarkmcclain
This document summarizes OpenStack networking and some of its key components and capabilities. It discusses the motivation for creating Neutron as a networking service, challenges in cloud networking like multi-tenancy and on-demand provisioning, and how Neutron tackles these challenges through network virtualization and SDN. It provides an overview of Neutron's architecture, including its plugin-based model, agents, and common features like security groups. It also describes new capabilities in OpenStack Juno like IPv6 support and distributed virtual routing.
Quantum provides an API for managing virtual networks in OpenStack. It allows tenants to create multiple private networks with their own IP addressing, and attach virtual machines to these networks. Quantum uses a plugin architecture that supports various networking technologies by exposing a generic API and allowing operators to choose different backend implementations, such as VLANs, VXLAN, or SDN controllers. This provides tenants with advanced network automation capabilities and operators with network technology choices.
Quantum - Virtual networks for Openstacksalv_orlando
An overview of Quantum, the soon-to-be default Openstack network service.
These slides introduce Quantum, its design goals, and discusses the API. It also tries to address how quantum relates to Software Defined Networking (SDN)
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld
This document summarizes a presentation about VMware's NSX virtualized networking solution. It introduces NSX Edge gateways which provide routing, firewalling, load balancing, and VPN services. It discusses how NSX addresses the needs of cloud computing through automation, standard hardware, and a single management plane. Example use cases are shown. Key features of the NSX Edge including scalable performance are outlined. The document also briefly discusses NSX operations and management tools, and its deployment on VMware vCloud Hybrid Service.
Presentation given at the 2017 LinuxCon China
With the booming of Container technology, it brings obvious advantages for cloud: simple and faster deployment, portability and lightweight cost. But the networking challenges are significant. Users need to restructure their network and support container deployment with current cloud framework, like container and VMs.
In this presentation, we will introduce new container networking solution, which provides one management framework to work with different network componenets through Open/friendly modelling mechnism. iCAN can simplify network deployment and management with most orchestration systems and a variety of data plane components, and design extendsible architect to define and validate Service Level Agreement(SLA) for cloud native applications, which is important factor for enterprise to deliver successful and stable service via containers.
Software Defined Networking is seeing a lot of momentum these days. With server virtualization solving the virtual machines problem, and large scale object storage solving the distributed storage challenge, SDN is seen as key in virtual networking.
In this talk we don't try to define SDN but rather dive straight into what in our opinion is the core enabled of SDN: the virtual switch OVS.
OVS can help manage VLAN for guest network isolation, it can re-route any traffic at L2-L4 by keeping forwarding tables controlled by a remote controller (Openfow controller). We show these few OVS capabilities and highlight how they are used in CloudStack and Xen.
Xen Summit presentation of CloudStack and Software Defined Networks. OpenVswitch is the default bridge in Xen and supported in XenServer and Xen Cloud Platform
The document provides details about a student's Master of Computer Science program coursework including an introduction to cloud computing, OpenStack, and demonstrating an OpenStack cloud infrastructure. It discusses key OpenStack components, architecture, and services for compute, networking, and storage. It also includes OpenStack deployment diagrams, user interfaces, test cases, and tools used in setting up an OpenStack lab topology.
The document discusses Cisco's virtualized network services that are designed for cloud environments. It introduces several virtual appliances that provide network services including the Virtual Supervisor Module (VSM), Virtual Security Gateway (VSG), virtual WAAS (vWAAS), ASA 1000V, and Nexus 1000V. These virtual appliances can provide services like distributed switching, firewalling, VPN, WAN optimization, and security policies on a per-tenant basis to virtualized and multi-tenant cloud environments.
Netscaler vpx implementation and troubleshootingsolarisyougood
This document discusses the NetScaler VPX virtual appliance. It begins with an introduction to the NetScaler VPX, noting that it provides application delivery without expensive hardware. It then covers installation and licensing, troubleshooting, and use cases. The document reviews the VPX installation process, licensing options, common troubleshooting issues like missing licenses, and examples of how organizations use the VPX in test environments, proofs-of-concept, and to simulate real-world networks.
OpenStack Paris Summit: Bridges and Tunnels: A Drive Through OpenStack Networ...markmcclain
This document summarizes OpenStack networking and some key improvements in recent releases. It discusses the motivation for creating Neutron as a networking component separate from Nova, challenges in cloud networking like multi-tenancy and scalability, and how Neutron addresses these through network virtualization and SDN. The basics of Neutron's architecture, plugins, agents, and abstraction of network resources are covered. Features like security groups, IPv6 support, distributed virtual routing, and load balancing are also summarized. Upcoming work in areas like metadata service, IPAM, and dynamic routing is mentioned.
Midokura OpenStack Day Korea Talk: MidoNet Open Source Network Virtualization...Dan Mihai Dumitriu
OpenStack deployments for public or private clouds require overlay networking. Due to the scale and rate of change of virtual resources, it isn't practical to rely on traditional network constructs and isolation mechanims. Today's deployments require performance, resilience, and high availability to be considered truly production-ready. In this session, we deep dive into the MidoNet architecture, and process of sending a data packet across an OpenStack environment through a network overlay. A distributed architecture implements logical constructs that are used to build networks without a single point of failure, all while adding network functionality in a highly-scalable manner. Network functions are applied in a single virtual hop. By applying network services right at the ingress host, the network is free from unnecessary clogging and bottlenecks by avoiding additional hops. Packets reach their destination more efficiently with the single virtual hop. After this session, the audience will understand how distributed architectures allow efficient networking with routing decisions and network services applied at the edge. Also, the audience will understand how it is easier to scale clouds when the network intelligence is distributed.
Understanding network and service virtualizationSDN Hub
This document discusses network and service virtualization technologies. It begins with an overview of challenges with current network architectures and how virtualization addresses them. It then covers three key trends: 1) network virtualization using SDN to program networks dynamically, 2) service virtualization using NFV to virtualize network functions, and 3) new infrastructure tools like Open vSwitch, OpenDaylight, and Docker networking. Finally, it discusses approaches to deploying network and service virtualization and provides a vendor landscape.
This document provides an overview of software defined networking (SDN) and network virtualization. It discusses how SDN separates the control plane from the data plane in networking equipment to provide more agility, speed, and flexibility. Network functions can be virtualized and run in software rather than proprietary hardware. Use cases for SDNs include improving issues in telecommunications networks like vendor lock-in. The document also outlines NSX, VMware's SDN solution, which provides a virtual network that is decoupled from physical hardware and allows distributed network and security services.
This document provides information about CloudStack networking and its architecture. It discusses how CloudStack supports both basic and advanced networking models, including options that utilize a virtual router or external network appliances. It also provides details on CloudStack's software-defined networking approach and use of technologies like VLANs. The document aims to educate about CloudStack's networking services and flexibility in supporting both internal and external network configurations.
Network and Service Virtualization tutorial at ONUG Spring 2015SDN Hub
Tutorial at ONUG Spring 2015 on Network and Service Virtualization. The tutorial covers three converging trends 1) Network virtualization, 2) Service virtualization, 3) overlay networking for Docker and OpenStack. The talk concludes with pointers to the hands-on portion of the tutorial that uses LorisPack, and the operational lessons learned.
Trystakc.cn was announced in OpenStack Summit San Diego 2012(www.slideshare.net/openstack/trystack-introfinalpdf
).It was a Non-profit OpenStack community projects.
By Stackers, for stackers.Experience the latest OpenStack features.
Welcoming contributions and feedback, Join the fun !
This session will focus on the Network capabilities of OpenStack (Neutron).
A presentation of all the current built-in network services will be offered as well as a preview of the coming ones.
The strengths and limitations of Neutron will also be presented and how NSX Neutron plugin makes it perfect for large scale cloud.
2. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Table of Contents
Introduction .........................................................................................................................................3
Solution Requirements ........................................................................................................................4
Prerequisites ........................................................................................................................................4
Network Diagram ................................................................................................................................5
XenApp ................................................................................................................................................7
Configuration - Web Interface ........................................................................................................7
XenApp ..............................................................................................................................................13
Configuration - XenApp Plugin .....................................................................................................13
NetScaler AGEE ................................................................................................................................19
Self Signed Root CA .....................................................................................................................19
Private Server Certificate ..............................................................................................................21
Public Server Certificate ...............................................................................................................23
Link Public & CA Certificate .........................................................................................................25
Link Private & CA Certificate ........................................................................................................26
NetScaler AGEE ................................................................................................................................27
Public VIP .....................................................................................................................................27
NetScaler AGEE ................................................................................................................................31
Private VIP ....................................................................................................................................31
Secure Ticket Authority ................................................................................................................35
Proxy Group - Web Interface ........................................................................................................36
Proxy Group - XenApp Plugin ......................................................................................................40
Testing Web Interface ........................................................................................................................45
Testing XenApp Plugin ......................................................................................................................47
3. Introduction
A member of the Citrix Delivery Center™ product family, Citrix NetScaler
is a purpose-built web application delivery solution that accelerates applica-
tion performance up to five times while improving security and reducing web
infrastructure costs. In addition to delivering web applications for thousands
of corporate customers, NetScaler is also the delivery infrastructure of choice
for most of the world’s largest consumer websites, touching an estimated 75
percent of all Internet users each day.
Citrix Access Gateway™, a member of the Citrix Delivery Center, is the only
SSL VPN to securely deliver any application with policy-based SmartAccess
control. Users will have easy-to-use secure access to all of the enterprise appli-
cations and data they need to be productive, and IT can cost effectively extend
access to applications while maintaining security through SmartAccess appli-
cation-level policies. With Access Gateway, organizations are empowered to
cost-effectively meet the anywhere access demands of all workers – enabling
flexible work options, easier outsourcing and non-employee access, and busi-
ness continuity readiness – while ensuring the highest level of information se-
curity. The newest release of the company’s popular Citrix Access Gateway™
appliance now includes integration with Citrix XenDesktop™, allowing com-
panies to deliver virtual desktops securely to thousands of end users based on
their unique identity, location and security status.
Citrix XenApp™, a member of the Citrix Delivery Center™ product family,
is the industry’s de facto standard for delivering Windows-based applications
with the best performance, security and cost savings. XenApp is the most
complete application virtualization system available with the ability to virtu-
alize applications on both the client side and server side, delivering them on
demand based on the user, the application or the location (online or offline).
By centralizing applications and data in secure datacenters, IT can reduce the
costs of management and support, increase data security and facilitate busi-
ness continuity. XenApp Platinum Edition adds critical capabilities for appli-
cation performance monitoring, secure remote access, WAN optimization and
single-sign-on application security.
Citrix Delivery Center is the first solution on the market to deliver applica-
tions and desktops to any user, anytime, anywhere from a secure central loca-
tion. Citrix Delivery Center’s market leading application delivery technologies
- XenServer, NetScaler, XenApp and XenDesktop - enable IT to dramatically
improve agility, while enabling the best performance and highest security at
the lowest cost.
3
4. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Solution Requirements
• ICA Proxy for XenApp Web Interface
• ICA Proxy for XenApp Plugin
Prerequisites
• Citrix NetScaler L4/7 Application Switch, version 9.0+ running Access
Gateway (Quantity x 2 for High Availability)
• Citrix XenApp Server 5.0+
• Microsoft Server with Active Directory
4
5. Network Diagram
The following is the Network that was used to develop this deployment guide.
Citrix
“ICA Proxy for XenApp”
Logical Network Diagram
Win2k3 (S1 & DC)
Private: 10.217.105.151
FQDN: srv1.xencloud.net
Primary Domain Controller LDAP Auth CA: xencloud.net
Public Cert: ag.xencloud.net
Private Cert: ns.xencloud.net
NetScaler
XenApp Public URL
https://ag.xencloud.net
Private: 10.217.105.155 ICA Proxy FQDN: ns.xencloud.net
FQDN: ws2008.xencloud.net 10.217.105.5
FQDN: ag.xencloud.net
67.97.253.89
VLAN Legend NetScaler
VLAN 1 VLAN 1:
Interface 1/7, Untagged
VLAN 67 NSIP: 10.217.105.53 / 24
SNIP: 10.217.105.3 / 24
VIP-SSO: 10.217.105.5 / 24
VLAN 67:
Interface 1/8, Untagged
VIP: 67.97.253.89 / 24
5
6. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Citrix
“ICA Proxy for XenApp”
Certificate Chain of Trust
Trusted Root
CA Certificate
(xencloud.net)
Private Public
Server Certificate Server Certificate
(ns.xencloud.net) (ag.xencloud.net)
NetScaler
Import: Import:
Trusted Root CA Certificate Trusted Root CA Certificate
~and~ ~and~
Private Server Certificate Public Server Certificate
Win2k3 (S1 & DC)
Client
XenApp
6
7. XenApp
Configuration - Web Interface
Once you have installed Citrix XenApp you will need to configure it such that
it will work with the Citrix NetScaler in an ICA Proxy deployment. Creating
a Web Interface will publish the XenApp applications in a web browser to the
client.
From the Access
Management Console:
Citrix Resources
Configuration Tools
Web Interface
Action
Create Site.
Select XenApp Web.
Select Next.
IIS Location:
IIS Site: Default Web Site
Path: /Citrix/XenApp/
Set as the default page for IIS.
7
8. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Point of Authentication:
At Access Gateway
Gateway Settings:
Authentication URL:
https://ns.xencloud.net/
CitrixAuthService/AuthService.
asmx
Note: ns.xencloud.net
resolves to 10.217.105.5 and
is the private interface of the
NetScaler Access Gateway.
8
9. Specify Server Farm:
Farm Name: <your farm name>
Servers: <XenApp Hostname>
Logon Screen:
Minimal or Full
9
11. Specify Access Method:
Client IP: Default
Method: Gateway Direct
Next.
Gateway Settings:
Address: <FQDN of NetScaler
Access Gateway>
Port: 443
Note: Your first thought might be
to configure the private FQDN
here, but that isn’t the case. Ac-
cording to the sentence in the
dialog box, this is the FQDN that
public users will use to access
the applications - through the
Access Gateway. Therefore, this
needs to be the public FQDN of
the AG, which in this example is
ag.xencloud.net, and resolves to
67.97.253.89.
11
13. XenApp
Configuration - XenApp Plugin
Once you have installed Citrix XenApp you will need to configure it such that
it will work with the Citrix NetScaler in an ICA Proxy deployment. Creating
a XenApp service will publish the XenApp applications through the Citrix cli-
ent, such as XenApp client or Citrix Receiver.
From the Access
Management Console:
Citrix Resources
Configuration Tools
Web Interface
Action
Create Site.
Select XenApp Services.
Select Next.
IIS Location:
IIS Site: Default Web Site
Path: /Citrix/PNAgent/
13
17. Gateway Settings:
Address: <FQDN of NetScaler
Access Gateway>
Port: 443
Note: Your first thought might be
to configure the private FQDN
here, but that isn’t the case. Ac-
cording to the sentence in the
dialog box, this is the FQDN that
public users will use to access
the applications - through the
Access Gateway. Therefore, this
needs to be the public FQDN of
the AG, which in this example is
ag.xencloud.net, and resolves to
67.97.253.89.
Secure Ticket Authority:
URL: <ip address of XenApp>/
scripts/ctxsta.dll
Select Finish
17
19. NetScaler AGEE
Self Signed Root CA
You will need three certificates. A self signed Root CA, a public server certifi-
cate and a private server certificate.
From the NetScaler GUI:
NetScaler
SSL
Certificate Wizard.
Create Key:
Type: RSA
Filename: xencloudCA.key
Size: 1024
Endpoint: F4
Format: PEM
Next.
Create CSR:
Filename: xencloudCA.req
Key: xencloudCA.key
Format: PEM
Passphrase: <passphrase>
CN: xencloud.net
City: Santa Clara
Org: Citrix
Country: United States
State: California
Email: admin@xencloud.net
OU: xencloud
Next.
Note: CN of xencloud.net must
match the DNS or Hosts file
entry name.
19
21. Private Server Certificate
The private server certificate is used for NetScaler AGEE-to-XenApp connec-
tions.
From the NetScaler GUI:
NetScaler
SSL
Certificate Wizard.
Create Key:
Type: RSA
Filename: xencloudNSSRV.key
Size: 1024
Endpoint: F4
Format: PEM
Next.
Create CSR:
Filename: xencloudNSSRV.req
Key: xencloudNSSRV.key
Format: PEM
Passphrase: <passphrase>
CN: ns.xencloud.net
City: Santa Clara
Org: Citrix
Country: United States
State: California
Email: admin@xencloud.net
OU: xencloud
Next.
Note: CN of ns.xencloud.net
must match the DNS or Hosts
file entry name.
21
22. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Create Certificate:
Filename: xencloudNSSRV.cer
Format: PEM
Type: Server
Req: xencloudNSSRV.req
Validity: 1800
CA Filename: xencloudCA.cer
CA Format: PEM
CA Key: xencloudCA.key
Key Format: PEM
Passphrase: <passphrase>
CA Serial File: ns-root.srl
Next.
Install Certificate:
Filename: xencloudNSSRV.
keypair
Location: Appliance
Cert File: xencloudNSSRV.cer
Key File: xencloudNSSRV.key
Password: <passphrase>
Format: PEM
Next.
Finish.
22
23. Public Server Certificate
The public server certificate is used for Client-to-AG connections.
From the NetScaler GUI:
NetScaler
SSL
Certificate Wizard.
Create Key:
Type: RSA
Filename: xencloudAGSRV.key
Size: 1024
Endpoint: F4
Format: PEM
Next.
Create CSR:
Filename: xencloudNAGSRV.req
Key: xencloudAGSRV.key
Format: PEM
Passphrase: <passphrase>
CN: ag.xencloud.net
City: Santa Clara
Org: Citrix
Country: United States
State: California
Email: admin@xencloud.net
OU: xencloud
Next.
Note: CN of ag.xencloud.net
must match the DNS or Hosts
file entry name.
23
24. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Create Certificate:
Filename: xencloudAGSRV.cer
Format: PEM
Type: Server
Req: xencloudAGSRV.req
Validity: 1800
CA Filename: xencloudCA.cer
CA Format: PEM
CA Key: xencloudCA.key
Key Format: PEM
Passphrase: <passphrase>
CA Serial File: ns-root.srl
Next.
Install Certificate:
Filename: xencloudAGSRV.
keypair
Location: Appliance
Cert File: xencloudAGSRV.cer
Key File: xencloudAGSRV.key
Password: <passphrase>
Format: PEM
Next.
Finish.
24
25. Link Public & CA Certificate
To establish a certificate chain of trust between the NetScaler AG and the
Client, you must link the public server certificate to the self signed CA certifi-
cate.
From the NetScaler GUI:
NetScaler
SSL
Certificates.
Select the public certificate by
the keypair name.
Name: xencloudAGSRV.keypair
Click on ‘Link;’.
Select the CA certificate.
Name: xencloudCA.keypair.
25
26. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Link Private & CA Certificate
To establish a certificate chain of trust between the NetScaler AG and the
XenApp server, you must link the private server certificate to the self signed
CA certificate.
From the NetScaler GUI:
NetScaler
SSL
Certificates.
Select the private certificate by
the keypair name.
Name: xencloudNSSRV.keypair
Click on ‘Link;’.
Select the CA certificate.
Name: xencloudCA.keypair.
26
27. NetScaler AGEE
Public VIP
Create the public facing VIP that users will connect to when they type in
https://ag.xencloud.net into their browser URL locator.
From the NetScaler GUI:
NetScaler
Access Gateway
Access Gateway
Wizard.
Create Virtual Server:
Type: New
IP Address: 67.97.253.89
Port: 443
Name: ag.xencloud.net
Next.
Server Certificate:
Options: Use an installed
certificate and private key pair
Certificate: xencloudAGSRV.
keypair
Next.
Note:
1) ag.xencloud.net must resolve
to ip address 67.97.253.89 &
2) Common Name in Server
Certificate xencloudAGSRV.cer
must contain ag.xencloud.net.
27
28. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
DNS:
DNS Server: 10.217.105.151
Note:
In this example our Active Di-
rectory Domain Controller also
serves as our DNS.
Next.
Authentication:
Type: LDAP
IP: 10.217.105.151
Port: 636
Time-out: 3
Base DN: dc=xencloud,dc=net
Admin DN: cn=Administrator,cn
=users,dc=xencloud,dc=net
Password: <password>
Confirm: <password>
Login Attr: sAMAccountName
Filter:
Group Attr: memberOf
Sub Attr: CN
SSL Attr: sAMAccountName
Security Type: SSL
Next.
28
29. Additional:
Authorization: Allow
Redirect:
Redirect to secure web address
Address:
https://ag.xencloud.net
Next.
Clientless Access:
Use the Access Gateway Plugin
and allow access scenario
fallback.
Next.
Finish.
29
31. NetScaler AGEE
Private VIP
Create the private facing VIP that XenApp will connect to when it authenti-
cates users.
From the NetScaler GUI:
NetScaler
Access Gateway
Access Gateway
Wizard.
Create Virtual Server:
Type: New
IP Address: 10.217.105.5
Port: 443
Name: ns.xencloud.net-vip
Next.
Server Certificate:
Options: Use an installed
certificate and private key pair
Certificate: xencloudNSSRV.
keypair
Next.
Note:
1) ns.xencloud.net must resolve
to ip address 10.217.105.5 &
2) Common Name in Server
Certificate xencloudNSSRV.cer
must contain ns.xencloud.net.
31
32. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
DNS:
DNS Server: 10.217.105.151
Note:
In this case our Active Directory
Domain Controller also serves
as our DNS.
Next.
Authentication:
Type: LDAP
IP: 10.217.105.151
Port: 636
Time-out: 3
Base DN: dc=xencloud,dc=net
Admin DN: cn=Administrator,cn
=users,dc=xencloud,dc=net
Password: <password>
Confirm: <password>
Login Attr: sAMAccountName
Filter:
Group Attr: memberOf
Sub Attr: CN
SSL Attr: sAMAccountName
Security Type: SSL
Next.
32
33. Additional:
Authorization: Allow
Next.
Clientless Access:
Use the Access Gateway Plugin
and allow access scenario
fallback.
Next.
Finish.
33
35. Secure Ticket Authority
Communication between the XenApp Server and the NetScaler AG de-
pends on the Citrix Secure Ticket Authority. You must configure this in the
NetScaler AG. In this case the CTX STA resides on the XenApp server.
From the NetScaler GUI:
NetScaler
Access Gateway
Virtual Servers.
Open the public vip. In this
example it is ag.xencloud.net-
vip at IP Address 67.97.253.89.
Select Published Applications.
Under Secure Ticket Authority,
Add.
Enter the URL to the Secure
Ticket Authority, in this example
the same as the XenApp Server,
http://10.217.105.155/scripts/
ctxsta.dll
Create.
Create.
35
36. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Proxy Group - Web Interface
To proxy the ICA connections from the XenApp server using the XenApp
Web Interface, the NetScaler AG needs to be configured to do so. You do
this by adding a group, and configure the group for proxy ICA connections
via a session profile. The group name MUST match the ‘memberOf’ group
name in the LDAP/Active Directory server. Note: The same group must be
added to the LDAP/Active Directory server.
From the NetScaler GUI:
NetScaler
Access Gateway
Groups.
Select Add.
Group Name: <groupname>
In this example our group name
is: iproxy
Create.
Select the Policies tab, Add
Policy. Type in policy name, in
this example it is the same as
the group name: iproxy.
At Request Profile, select ‘New’
to create a new profile. In this
example, the request profile is
the same as the group name:
iproxy.
36
37. Client Experience:
Home Page: none
Select Override Global.
Clientless Access: On.
Select Override Global.
Single Sign-on to Web
Applications: Selected
Select Override Global.
37
38. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Published Applications:
ICA Proxy:
On
Select Override Global
Web Interface Address:
https://10.217.105.155/Citrix/
XenApp
Select Override Global
Web Interface Portal Mode:
Normal
Select Override Global
Single Sign-on Domain:
<your domain>
Select Override Global
Note: Single Sign-on Domain in
this example is ‘xencloud’.
Select Ok.
Under named expressions,
select True Value, Add
Expression.
Then Create.
38
40. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Proxy Group - XenApp Plugin
To proxy the ICA connections from the XenApp server using the XenApp
Plugin on the users device, the NetScaler AG needs to be configured to do
so. You do this by adding a group, and configure the group for proxy ICA
connections via a session profile. The group name MUST match the ‘mem-
berOf’ group name in the LDAP/Active Directory server. Note: The same
group must be added to the LDAP/Active Directory server.
From the NetScaler GUI:
NetScaler
Access Gateway
Groups.
Select Add.
Group Name: <groupname>
In this example our group name
is: iproxy2
Create.
Select the Policies tab, Add
Note: by now you notice that you need two groups with associated poliicies. Policy. Type in policy name, in
One for Web Interface clients (groupname iproxy) and one for XenApp Plu- this example it is the same as
gin clients (groupname iproxy2) the group name: iproxy2.
At Request Profile, select ‘New’
to create a new profile. In this
example, the request profile is
the same as the group name:
iproxy2.
40
41. Client Experience:
Home Page: none
Select Override Global.
Clientless Access: On.
Select Override Global.
Single Sign-on to Web
Applications: Selected
Select Override Global.
41
42. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Published Applications:
ICA Proxy:
On
Select Override Global
Web Interface Address:
https://10.217.105.155/Citrix/
XenApp
Select Override Global
Web Interface Portal Mode:
Normal
Select Override Global
Single Sign-on Domain:
<your domain>
Select Override Global
Note: Single Sign-on Domain in
this example is ‘xencloud’.
Select Ok.
Under named expressions,
select True Value, Add
Expression.
Then Create.
42
45. Testing Web Interface
Once you have installed all of the components of this solution, you should test
it, by publishing a test application such as Notepad, in XenApp, then connect
and see if Single Sign-On works, and that the application launches.
From a web browser,
enter the FQDN of the
public vip:
In this example it is:
https://ag.xencloud.net
Enter login credentials, which
are consequently configured in
Active Directory. Because we
have configured this solution for
Single Sign-On, you should only
have to do this one time.
Web Interface:
Wait for the Web Interface to
load.
45
46. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Application:
At this point you should see
the Web Interface with the
application that is published for
this user.
Launch the application.
Application Delivery:
The application should be
delivered or proxied from
XenApp, through the NetScaler
Access Gateway, to the end
user.
46
47. Testing XenApp Plugin
Once you have installed all of the components of this solution, you should test
it, by publishing a test application such as Notepad, in XenApp, then connect
with Citrix XenApp Client and see if Single Sign-On works, and that the ap-
plication launches.
Download the Citrix:
Open a web browser, and
navigate to the downloads
section of http://citrix.com.
Download and install the
XenApp Plugin for Hosted
Apps.
Enter login credentials, which
are consequently configured in
Active Directory. Because we
have configured this solution for
Single Sign-On, you should only
have to do this one time.
Server Address:
Configure the Server Address to
point to the AG public VIP.
In this example:
https://ag.xencloud.net/Citrix/
PNAgent/config.xml
47
48. DEPLOYMENT GUIDE | XenApp, NetScaler, Access Gateway
Application:
At this point you should see the
Citrix XenApp Client with the
application that is published for
this user.
Launch the application.
Application Delivery:
The application should be
delivered or proxied from
XenApp, through the Citrix
Access Gateway, to the end
user.
48