Course Content
Getting Started
- NetScaler Overview
- Introduction to the NetScaler System
- NetScaler Functionality
- NetScaler Operating System
- Hardware Platforms
- Hardware Components
- Planning a NetScaler Deployment
- Deployment Scenarios
- TriScale
- NetScaler Configuration
- Logging in to the NetScaler System
- NetScaler Licenses
Basic Networking
- OSI Networking Model
- NetScaler Architecture
- Packet Forwarding
- NetScaler-Owned IP Addresses
- NetScaler IP Address
- Sending a Client IP Address to Servers
- Virtual Local Area Networks
- Network Address Translation
Basic Load Balancing
- Configure Basic Load Balancing
- Services Configuration Overview
- Virtual Servers Creation
- Services Bound to a Virtual Server
- Configuration Verification
- Load Balancing Methods
- Service Weights
- Session Persistence Methods
- Service Level Monitors
High Availability
- High Availability Functionality
- High Availability Node Configuration
- Propagation and Synchronization
- High Availability Management
Policies and Expressions
- Policies Overview
- Policy Basics
- Basic Policy Components
- Policy Bindings
- Policy Priorities
- Hypertext Transfer Protocol
- Expression Structures
- Wildcards
- Context-Sensitive Fields
- Simple Expressions
- Compound Expressions
- Advanced Policy Conversion
Content Switching
- Basics of Content Switching
- Configure a Load Balancing Setup for Content Switching
- Content Switching Policies
- Content Switching Rule Precedence without Priority Specified
- Content Switching Rule Precedence with Priority Specified
- Connection Tuning
- IPv6
- DNS and the NetScaler
- IP Routing
- Link Load Balancing
- SIP Load Balancing
- Custom Load
- Persistence and Persistence Connections
- Load Balancing Configuration Protection
- Load Balancing Setup Management
- Traffic Management
Global Server Load Balancing (GSLB)
- GSLB Deployment Methods
- GSLB Concepts
- GSLB DNS Methods
- Implementing Static GSLB
- Metric Exchange Protocol
- Configuring Site-to-Site Communication
- Customizing the GSLB Configuration
- GSLB Persistence
- Monitoring GSLB Services
- Protecting the GSLB Setup Against Failure
- Implementing GSLB Failover for Disaster Recovery
Clustering
- Features Supported by Clustering
- How Clustering Works
- Cluster Synchronization
- Cluster Connections
- Cluster Communication Interfaces
- Striped and Spotted IP Addresses
- Traffic Distribution
- Cluster and Node States
- NetScaler Cluster Set up
- NetScaler Cluster Traffic Distribution Mechanisms
- NetScaler Cluster Management
- NetScaler Cluster Troubleshooting
Security and Authentication
- SSL
- SSL Administration
- SSL Keys
- Digital Certificates
- Certificate Signing Request
- SSL Certificates
- Certificate Generation
- Certificate Key Pairs
- NetScaler System Communication
- Front-End SSL
- Front-End SSL_TCP
- Securing Traffic
- SSL_Bride
- SSL Termination Points
- SSL Offload
- Configuring SSL Offload
- Advanced SSL Settings
- Hardware Compliance
- Authentication Setup
- AAA for Traffic Management
- SAML 2.0 Consumer Support
- Enhanced NTLMv2 Support
- Authentication Policy Creation
- Single Sign-On Setup
- LDAP Authentication
- Detailed Access Control Lists Configuration
- Extended Access Control Lists
- Creation and Removal of Access Control Lists
- SYN, SSL Renegotiation, TLS Man-in-the-Middle, and DoS Protection
- Client Traffic Management Based on Traffic Rate
- Rewrite, Responder, and URL Transformation
- Packet Processing Flow
- Policies
- Policy Process Evaluation Flow
- Identifying Advanced Policy Expressions
- Actions
- Bind Points
- Policy Labels
- Pattern Sets
- Typecasting
Rewrite, Responder, and URL Transform
- Configuring Rewrite Policies and Actions
- Configuring Responder Policies and Actions
- Configuring URL Transformation Policies and Actions
Optimizing Traffic
- Compression
- Integrated Caching
- Reverse-Proxy-Cache Configuration
- Content Groups
- Cache Selectors and Policies
- Caching Static and Dynamic Content
- Request and Response Process Flow
- Cache Policies and Cache Expressions
- Action Analytics
- Evaluation Order
- Built-In Policies
- Graceful Cache Configuration Changes
- Cache Content Groups
- FlashCache
- Caching Management
- AppExpert Templates
- Terminology
- Methodology
- Advanced Monitoring
- Monitoring Needs
- Simple Network Management Protocol
- Dashboard
- Citrix Command Center
- Reporting Tools
- NetScaler Log Management
- Audit Logging
- Configuring NetScaler for Audit Logging
- Configuring an Audit Logging Server
- Global Auditing Parameters
- Configuring Auditing Policies
- Monitoring Methods
- Reporting Tools
- Monitoring Needs
- Simple Network Management Protocol
- Configure SMNPv1 and SMNPv2
- AppFlow on the NetScaler
- AppFlow Collectors and EdgeSight Monitoring
- AppFlow Actions and EdgeSight Monitoring
- Third-Party Collectors
Troubleshooting
- Troubleshooting Methodology
- Troubleshooting Resources
- Troubleshooting Tools
- Troubleshooting Network Issues
- Troubleshooting Hardware Issues
- Load Balancing Issues
- Authentication, Authorization, and Access (AAA) Issues
- SSL Troubleshooting
- SSL Offload Troubleshooting
- Policy Troubleshooting
- High Availability Troubleshooting
ACE Migration
- Review of Cisco Load Balancers and Terminology
- Application Delivery Networking Terminology
- Cisco Load Balancing Terminology
- Physical Deployments
- Cisco Data Centre Integration
- Networking Terminology
- Deploying NetScaler to Replace ACE
- SSL Service Options
- Choosing NetScaler Replacement Hardware
- Best Design and Deployment Practices
- Port an ACE Deployment to a NetScaler Platform
- ACE Conversion Tool (ACT)
- Translating CLI from ACE to Netscaler
- Added Customer Benefits