SlideShare a Scribd company logo
Hvað er Netscaler
Samúel Jón Gunnarsson



   BSc DataIngenør frá SDU Sönderborg 2004
     ▸   Red Hat Certified Engineer
     ▸   Rúm 7 ár hjá Advania
     ▸   Rekstur á Linux og unix stýrikerfum, lamplausnum og
         Oracle gagnagrunnum og viðfangamiðlurum
     ▸   Áhugamaður um opinn og frjálsan hugbúnað
Að framlengja sjálfið
Álagsjöfnum sem ekki er gefið að fari vel
Að framlengja sjálfið
Let me google that for you
Semsagt
Vélar skalast betur ?
Stundum þurfa þær aðstoð
       Þeas. vélarnar
Þrískölun - Triscale
 Skalað upp
   ▸ Greitt skv. notkun
   ▸ Í 100Mbps þrepum
 Skalað út
   ▸ Klasahögun
 Skalað inn
   ▸ Samþætting gagnavera
   ▸ Allt að 40 einangraðar NS
     uppsetningar á einu boxi
•Númer 7 – Forrit og ferlar
    Viðfang       •Viðmót notenda og ferli forrita




 Framsetning
                  •Númer 6 – Forrit og ferlar
                  •Forsnið sem birt eru af viðföngum.             Þegar Indriði var
                   •Dæmi myndir, texti


                  •Númer 5 – Forrit og ferlar
                                                                   beðinn um að hanna
     Seta         •Sér um setu meðhöndlun
                   •RPC, SQL, NFS, NetBIOS                         OSI lagskiptinguna
                  •Númer 4 – Host to Host
  Flutningur      •Sér um flutning skilaboða milli staða
                   •TCP, UDP


                  •Númer 3 - Internet
   Netkerfi       •Beinir umferð á neti réttar leiðir
                   •IP, IPX, ICMP


                  •Númer 2 - Net
Gagnatengingar    •Tryggir flutning á gagnarömmum (e. Frames)
                   •Switch, Bridge, WAP, PPP


                  •Númer 1 – Net
Raunlæg tenging   •Hrár gagnastraumur yfir raunlægar tengingar
                   •Kaplar, Hub
Meðhöndlun
              Öryggi og
umferðar á
               aðgengi
   L4-7




  Hröðun     Samþætting
Meðhöndlun

Meðhöndlun umferðar á L4-7
                                                                Öryggi og
                                                  umferðar á
                                                                aðgengi
                                                     L4-7




                                                    Hröðun     Samþætting


   TCP, UDP,HTTP(S), DNS, SIP, RDP...
   Algrími: RR, fæstir pakkar, minnsta bandbreidd, SNMP...
   Þrástaða setu: Source IP, dúsur, ssl setur
   Vöktun bakenda: Ping, TCP, URL, sérsmíði
Meðhöndlun

Meðhöndlun umferðar á L4-7 frh.
                                                        Öryggi og
                                          umferðar á
                                                        aðgengi
                                             L4-7




                                            Hröðun     Samþætting


 Álagsjöfnun á gagnagrunum
   ▸ Styður MSSQL og MySQL
 Rate-based policy enforcement
   ▸   Tengifjöldi eða pakkar á sekúndu
   ▸   Bandbreidd
   ▸   HEADER upplýsingar
   ▸   Uppruni áfangastaður
Meðhöndlun

Öryggi
                                                                          Öryggi og
                                                            umferðar á
                                                                          aðgengi
                                                               L4-7




                                                              Hröðun     Samþætting


 Fullkominn vefeldveggur
   ▸   Cross-site-Scripting (XSS), Cross Site Request Forgery (CSRF)
   ▸   SQL innspýtingar, Setu eitranir
   ▸   DDOS, xDOS og margt margt fleira
   ▸   Lappar upp á veikleika: Well-known-platform-vulnerabilities
Meðhöndlun

Aðgengi
                                                               Öryggi og
                                                 umferðar á
                                                               aðgengi
                                                    L4-7



 Aðgengi                                          Hröðun     Samþætting
   ▸   Client Access GW – SSL VPN
   ▸   Tveggja þátta auðkenning
   ▸   Skilríkjaauðkenningar
   ▸   SAML2 og NTML1/2 fyrir Single-sign-on
   ▸   AD,LDAP og Radius auðkenningar sem dæmi
 Netscaler Cloud Bridge
   ▸ IPSec, GRE tengingar
 Pakkasíun
   ▸ ACL og NAT
Meðhöndlun

Hröðun
                                                                       Öryggi og
                                                         umferðar á
                                                                       aðgengi
                                                            L4-7




 TCP Bestun                                               Hröðun     Samþætting

  ▸ Mux, buffering, conn. Keep-alive, Gluggaskölun....
 Þjöppun
  ▸ Gzip f. HTTP traffík
  ▸ Skyndiminni fyrir bæði statískt og dýnamískt efni
 CloudConnectors
  ▸ Netsel (e. Proxy)
       TCP bestun og De-duplication
Meðhöndlun

Samþætting í neti
                                                      Öryggi og
                                        umferðar á
                                                      aðgengi
                                           L4-7




                                          Hröðun     Samþætting


 Static routes, monitored
  static routes,
 weighted static routes     High availability
                             • Active/Passive
 OSPF, RIP1/2, BGP5
                             • Active/Active
 VLAN 802.1Q                • VRRP
 Link Aggregation 802.3ad   • ECMP
 IPv6/ IPv4 gateway         • Connection Mirroring
Meðhöndlun

Eftirlit
                                    Öryggi og
                      umferðar á
                                    aðgengi
                         L4-7




 Citrix Edge Site      Hröðun     Samþætting


   ▸ Rauntímavöktun
Fartölva                   Póstnotandi
                                                          CAS_SSL offloading




                                                                                  CAS_HTTP


PC                     Internet   NetScaler MPX




                                          DAG01                                   CAS_MAPI
                                                                                  HUB_TCP_25
       Snjallsími




AD01            AD02
                                  MBX01           MBX02         CASHUB01       CASHUB02
Dæmi um álagsdreifðan gagnagrunn


      Fartölva

                                             Gagnagrunnur XX
                                               Lesaðgangur



PC                Internet   NetScaler MPX




                                             Gagnagrunnur X.Y
     Snjallsími                               Skrifaðgangur
Dæmi um DB klasa og álagsdreifða vefþjóna

       Fartölva




 PC                Internet   NetScaler MPX




      Snjallsími
Spurningar ?
Sérfræðingar á kantinum
So Long, and Thanks for All the Fish

       samuel.gunnarsson (hjá) advania.is

       Einnig á samfélagsmiðlum sem “samueljon”
          Twitter: http://www.twitter.com/samueljon
          LinkedIN: http://is.linkedin.com/in/samueljon
          SlideShare: http://www.slideshare.net/samueljon

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Hvað er netscaler

  • 2. Samúel Jón Gunnarsson  BSc DataIngenør frá SDU Sönderborg 2004 ▸ Red Hat Certified Engineer ▸ Rúm 7 ár hjá Advania ▸ Rekstur á Linux og unix stýrikerfum, lamplausnum og Oracle gagnagrunnum og viðfangamiðlurum ▸ Áhugamaður um opinn og frjálsan hugbúnað
  • 3. Að framlengja sjálfið Álagsjöfnum sem ekki er gefið að fari vel
  • 4. Að framlengja sjálfið Let me google that for you
  • 6. Stundum þurfa þær aðstoð Þeas. vélarnar
  • 7. Þrískölun - Triscale  Skalað upp ▸ Greitt skv. notkun ▸ Í 100Mbps þrepum  Skalað út ▸ Klasahögun  Skalað inn ▸ Samþætting gagnavera ▸ Allt að 40 einangraðar NS uppsetningar á einu boxi
  • 8. •Númer 7 – Forrit og ferlar Viðfang •Viðmót notenda og ferli forrita Framsetning •Númer 6 – Forrit og ferlar •Forsnið sem birt eru af viðföngum.  Þegar Indriði var •Dæmi myndir, texti •Númer 5 – Forrit og ferlar beðinn um að hanna Seta •Sér um setu meðhöndlun •RPC, SQL, NFS, NetBIOS OSI lagskiptinguna •Númer 4 – Host to Host Flutningur •Sér um flutning skilaboða milli staða •TCP, UDP •Númer 3 - Internet Netkerfi •Beinir umferð á neti réttar leiðir •IP, IPX, ICMP •Númer 2 - Net Gagnatengingar •Tryggir flutning á gagnarömmum (e. Frames) •Switch, Bridge, WAP, PPP •Númer 1 – Net Raunlæg tenging •Hrár gagnastraumur yfir raunlægar tengingar •Kaplar, Hub
  • 9. Meðhöndlun Öryggi og umferðar á aðgengi L4-7 Hröðun Samþætting
  • 10. Meðhöndlun Meðhöndlun umferðar á L4-7 Öryggi og umferðar á aðgengi L4-7 Hröðun Samþætting  TCP, UDP,HTTP(S), DNS, SIP, RDP...  Algrími: RR, fæstir pakkar, minnsta bandbreidd, SNMP...  Þrástaða setu: Source IP, dúsur, ssl setur  Vöktun bakenda: Ping, TCP, URL, sérsmíði
  • 11. Meðhöndlun Meðhöndlun umferðar á L4-7 frh. Öryggi og umferðar á aðgengi L4-7 Hröðun Samþætting  Álagsjöfnun á gagnagrunum ▸ Styður MSSQL og MySQL  Rate-based policy enforcement ▸ Tengifjöldi eða pakkar á sekúndu ▸ Bandbreidd ▸ HEADER upplýsingar ▸ Uppruni áfangastaður
  • 12. Meðhöndlun Öryggi Öryggi og umferðar á aðgengi L4-7 Hröðun Samþætting  Fullkominn vefeldveggur ▸ Cross-site-Scripting (XSS), Cross Site Request Forgery (CSRF) ▸ SQL innspýtingar, Setu eitranir ▸ DDOS, xDOS og margt margt fleira ▸ Lappar upp á veikleika: Well-known-platform-vulnerabilities
  • 13. Meðhöndlun Aðgengi Öryggi og umferðar á aðgengi L4-7  Aðgengi Hröðun Samþætting ▸ Client Access GW – SSL VPN ▸ Tveggja þátta auðkenning ▸ Skilríkjaauðkenningar ▸ SAML2 og NTML1/2 fyrir Single-sign-on ▸ AD,LDAP og Radius auðkenningar sem dæmi  Netscaler Cloud Bridge ▸ IPSec, GRE tengingar  Pakkasíun ▸ ACL og NAT
  • 14. Meðhöndlun Hröðun Öryggi og umferðar á aðgengi L4-7  TCP Bestun Hröðun Samþætting ▸ Mux, buffering, conn. Keep-alive, Gluggaskölun....  Þjöppun ▸ Gzip f. HTTP traffík ▸ Skyndiminni fyrir bæði statískt og dýnamískt efni  CloudConnectors ▸ Netsel (e. Proxy)  TCP bestun og De-duplication
  • 15. Meðhöndlun Samþætting í neti Öryggi og umferðar á aðgengi L4-7 Hröðun Samþætting  Static routes, monitored static routes,  weighted static routes High availability • Active/Passive  OSPF, RIP1/2, BGP5 • Active/Active  VLAN 802.1Q • VRRP  Link Aggregation 802.3ad • ECMP  IPv6/ IPv4 gateway • Connection Mirroring
  • 16. Meðhöndlun Eftirlit Öryggi og umferðar á aðgengi L4-7  Citrix Edge Site Hröðun Samþætting ▸ Rauntímavöktun
  • 17. Fartölva Póstnotandi CAS_SSL offloading CAS_HTTP PC Internet NetScaler MPX DAG01 CAS_MAPI HUB_TCP_25 Snjallsími AD01 AD02 MBX01 MBX02 CASHUB01 CASHUB02
  • 18. Dæmi um álagsdreifðan gagnagrunn Fartölva Gagnagrunnur XX Lesaðgangur PC Internet NetScaler MPX Gagnagrunnur X.Y Snjallsími Skrifaðgangur
  • 19. Dæmi um DB klasa og álagsdreifða vefþjóna Fartölva PC Internet NetScaler MPX Snjallsími
  • 21. So Long, and Thanks for All the Fish samuel.gunnarsson (hjá) advania.is Einnig á samfélagsmiðlum sem “samueljon” Twitter: http://www.twitter.com/samueljon LinkedIN: http://is.linkedin.com/in/samueljon SlideShare: http://www.slideshare.net/samueljon

Editor's Notes

  1. Mynd af http://thequirkyglobe.blogspot.com/2010/12/nagging-can-cause-serious-health.html
  2. Mynd af http://thequirkyglobe.blogspot.com/2010/12/nagging-can-cause-serious-health.html
  3. Mynd af http://www.neiltolbert.com/wp-content/uploads/2012/03/googlebrain.jpg
  4. Eða hvað finnst ykkur ?Mynd af http://www.neiltolbert.com/wp-content/uploads/2012/03/googlebrain.jpg
  5. Mynd af http://thequirkyglobe.blogspot.com/2010/12/nagging-can-cause-serious-health.html
  6. Pay as you grow módel. Einnig er boðið upp á sprengipakka til að anna tímabundnu álagi. Í klasahögun er nýtt sameiginlegt afl klasans Samþætting gerir lausnina mjög sveigjanlega og öflugaSjá nánar á: http://blogs.citrix.com/2012/04/17/netscaler-triscale-%E2%80%93-we%E2%80%99ve-delivered-the-missing-piece-to-the-enterprise-cloud/
  7. Open System InterconnectionLag 4 (Flutningur) og 7 (viðfang) eru þau lög sem Netscaler-inn framkvæmir mikið af sinni bestun.
  8. Layer 4 load balancing (LB)• Protocols supported: TCP, UDP, FTP, HTTP,HTTPS, DNS (TCP and UDP), SIP (over UDP),RTSP, RADIUS, DIAMETER, SQL, RDP, IS-IS• Algorithms: Round Robin, Least Packets, LeastBandwidth, Least Connections, Response Time,Hashing (URL, Domain, Source IP, Destination IP,and CustomID), SNMP-provided metric, ServerApplication State Protocol (SASP)• Session persistence: Source IP, cookie, server,group, SSL session, SIP CALLID, Token-based,JSESSIONID• Session protocols: TCP, UDP, SSL_TCP• Server monitoring: Ping, TCP, URL, ECV, scriptablehealth checks, Dynamic Server Response Time• Link load balancing• Citrix Branch Repeater load balancing
  9. Layer 7 content switching• Policies: URL, URL Query, URL Wildcard,Domain, Source/Destination IP, HTTP Header,Custom, HTTP and TCP Payload Values, UDP• Switch requests based on protocol ofincoming packetsDatabase load balancing• Support for: Microsoft SQL Server and MySQL• Switching algorithms include SQL queryparameters such as user and database namesand command parameters• Token-based load balancing providesadvanced configuration for persistence andfault tolerant deployments
  10. NetScaler Application Firewall with hybrid security model5• Positive security model protects against:Buffer Overflow, CGI-BIN Parameter Manipulation,Form/Hidden Field Manipulation, ForcefulBrowsing, Cookie or Session Poisoning, BrokenACLs, Cross-Site Scripting (XSS), CommandInjection, SQL Injection, Error Triggering SensitiveInformation Leak, Insecure Use of Cryptography,Server Misconfiguration, Back Doors and DebugOptions, Rate-based Policy Enforcement, WellknownPlatform Vulnerabilities, Zero-day Exploits,Cross Site Request Forgery (CSRF), credit cardand other sensitive data leakage prevention• Negative security model with signatures to protectagainst L7 and HTTP application vulnerabilities.• Integrates with third party scanning tools• Common event format (CEF) logs• XML security: XML Denial of Service (xDoS)• XML SQL injection and cross site scripting, XMLmessage validation, format checks, WS-I basic profilecompliance, XML, xPath injection attachment check ,XQuery Injection protection• WSDL scan prevention• Attachment checks• URL transformation• Cookie proxying and encryption• SOAP array attack protection
  11. NetScaler Application Firewall with hybrid security model5• Positive security model protects against:Buffer Overflow, CGI-BIN Parameter Manipulation,Form/Hidden Field Manipulation, ForcefulBrowsing, Cookie or Session Poisoning, BrokenACLs, Cross-Site Scripting (XSS), CommandInjection, SQL Injection, Error Triggering SensitiveInformation Leak, Insecure Use of Cryptography,Server Misconfiguration, Back Doors and DebugOptions, Rate-based Policy Enforcement, WellknownPlatform Vulnerabilities, Zero-day Exploits,Cross Site Request Forgery (CSRF), credit cardand other sensitive data leakage prevention• Negative security model with signatures to protectagainst L7 and HTTP application vulnerabilities.• Integrates with third party scanning tools• Common event format (CEF) logs• XML security: XML Denial of Service (xDoS)• XML SQL injection and cross site scripting, XMLmessage validation, format checks, WS-I basic profilecompliance, XML, xPath injection attachment check ,XQuery Injection protection• WSDL scan prevention• Attachment checks• URL transformation• Cookie proxying and encryption• SOAP array attack protection
  12. TCP optimization• Multiplexing, Buffering, Connection Keep-alive,Windows Scaling, Selective Acknowledgement,Fast RampAppCompress• Gzip-based compression for HTTPtraffic AppCache5• Caching for static and dynamic application content• HTTP GET and POST method support• Policies defined based upon HTTP headerand body valuesNetScaler CloudConnectors• On-premise proxy providing symmetricTCP optimizations, data compression and datade-duplication• Available on NetScaler MPX, SDX and VPX
  13. Network integration• Static routes, monitored static routes,weighted static routes• OSPF, RIP1/2, BGP5• VLAN 802.1Q• Link Aggregation 802.3ad• IPv6/ IPv4 gatewayHigh availability• Active/Passive• Active/Active• VRRP• ECMP• Connection Mirroring
  14. EdgeSight for NetScaler5• Real-time and historical userexperience monitoring• Trending and reporting for web applicationperformance service level management