-
Getting Started with NetScaler
-
Deploy a NetScaler VPX instance
-
Optimize NetScaler VPX performance on VMware ESX, Linux KVM, and Citrix Hypervisors
-
Apply NetScaler VPX configurations at the first boot of the NetScaler appliance in cloud
-
Configure simultaneous multithreading for NetScaler VPX on public clouds
-
Install a NetScaler VPX instance on Microsoft Hyper-V servers
-
Install a NetScaler VPX instance on Linux-KVM platform
-
Prerequisites for installing NetScaler VPX virtual appliances on Linux-KVM platform
-
Provisioning the NetScaler virtual appliance by using OpenStack
-
Provisioning the NetScaler virtual appliance by using the Virtual Machine Manager
-
Configuring NetScaler virtual appliances to use SR-IOV network interface
-
Configuring NetScaler virtual appliances to use PCI Passthrough network interface
-
Provisioning the NetScaler virtual appliance by using the virsh Program
-
Provisioning the NetScaler virtual appliance with SR-IOV on OpenStack
-
Configuring a NetScaler VPX instance on KVM to use OVS DPDK-Based host interfaces
-
-
Deploy a NetScaler VPX instance on AWS
-
Deploy a VPX high-availability pair with elastic IP addresses across different AWS zones
-
Deploy a VPX high-availability pair with private IP addresses across different AWS zones
-
Protect AWS API Gateway using the NetScaler Web Application Firewall
-
Configure a NetScaler VPX instance to use SR-IOV network interface
-
Configure a NetScaler VPX instance to use Enhanced Networking with AWS ENA
-
Deploy a NetScaler VPX instance on Microsoft Azure
-
Network architecture for NetScaler VPX instances on Microsoft Azure
-
Configure multiple IP addresses for a NetScaler VPX standalone instance
-
Configure a high-availability setup with multiple IP addresses and NICs
-
Configure a high-availability setup with multiple IP addresses and NICs by using PowerShell commands
-
Deploy a NetScaler high-availability pair on Azure with ALB in the floating IP-disabled mode
-
Configure a NetScaler VPX instance to use Azure accelerated networking
-
Configure HA-INC nodes by using the NetScaler high availability template with Azure ILB
-
Configure a high-availability setup with Azure external and internal load balancers simultaneously
-
Configure a NetScaler VPX standalone instance on Azure VMware solution
-
Configure a NetScaler VPX high availability setup on Azure VMware solution
-
Configure address pools (IIP) for a NetScaler Gateway appliance
-
Deploy a NetScaler VPX instance on Google Cloud Platform
-
Deploy a VPX high-availability pair on Google Cloud Platform
-
Deploy a VPX high-availability pair with external static IP address on Google Cloud Platform
-
Deploy a single NIC VPX high-availability pair with private IP address on Google Cloud Platform
-
Deploy a VPX high-availability pair with private IP addresses on Google Cloud Platform
-
Install a NetScaler VPX instance on Google Cloud VMware Engine
-
-
Solutions for Telecom Service Providers
-
Load Balance Control-Plane Traffic that is based on Diameter, SIP, and SMPP Protocols
-
Provide Subscriber Load Distribution Using GSLB Across Core-Networks of a Telecom Service Provider
-
Authentication, authorization, and auditing application traffic
-
Basic components of authentication, authorization, and auditing configuration
-
Web Application Firewall protection for VPN virtual servers and authentication virtual servers
-
On-premises NetScaler Gateway as an identity provider to Citrix Cloud
-
Authentication, authorization, and auditing configuration for commonly used protocols
-
Troubleshoot authentication and authorization related issues
-
-
-
-
-
-
Persistence and persistent connections
-
Advanced load balancing settings
-
Gradually stepping up the load on a new service with virtual server–level slow start
-
Protect applications on protected servers against traffic surges
-
Retrieve location details from user IP address using geolocation database
-
Use source IP address of the client when connecting to the server
-
Use client source IP address for backend communication in a v4-v6 load balancing configuration
-
Set a limit on number of requests per connection to the server
-
Configure automatic state transition based on percentage health of bound services
-
-
Use case 2: Configure rule based persistence based on a name-value pair in a TCP byte stream
-
Use case 3: Configure load balancing in direct server return mode
-
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field
-
Use case 7: Configure load balancing in DSR mode by using IP Over IP
-
Use case 10: Load balancing of intrusion detection system servers
-
Use case 11: Isolating network traffic using listen policies
-
Use case 12: Configure Citrix Virtual Desktops for load balancing
-
Use case 13: Configure Citrix Virtual Apps and Desktops for load balancing
-
Use case 14: ShareFile wizard for load balancing Citrix ShareFile
-
Use case 15: Configure layer 4 load balancing on the NetScaler appliance
-
-
-
-
Authentication and authorization for System Users
-
User Account and Password Management
-
-
Configuring a CloudBridge Connector Tunnel between two Datacenters
-
Configuring CloudBridge Connector between Datacenter and AWS Cloud
-
Configuring a CloudBridge Connector Tunnel Between a Datacenter and Azure Cloud
-
Configuring CloudBridge Connector Tunnel between Datacenter and SoftLayer Enterprise Cloud
-
Configuring a CloudBridge Connector Tunnel Between a NetScaler Appliance and Cisco IOS Device
-
CloudBridge Connector Tunnel Diagnostics and Troubleshooting
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
User account and password management
NetScaler enables you to manage user accounts and password configuration. Following are some of the activities that you can perform using a system user account or nsroot
administrative user account.
- System user account lockout
- Lock system user account for management access
- Unlock a locked system user account for management access
- Disable management access for system user account
- Force password change for
nsroot
administrative users - Remove sensitive files in a system user account
- Strong password configuration for system users
System user account lockout
To prevent brute force security attacks, you can configure the user lockout configuration. The configuration enables a network administrator to prevent a system user to log on to NetScaler. Also, unlock the user account before the lock period expires.
To get the details of the unsuccessful user login attempts across reboots, the persistentLoginAttempts
parameter can be enabled.
At the command prompt, type:
set aaa parameter -maxloginAttempts <value> -failedLoginTimeout <value> -persistentLoginAttempts (ENABLED | DISABLED)
Example:
set aaa parameter -maxloginAttempts 3 -failedLoginTimeout 10 -persistentLoginAttempts ENABLED
Note:
For the
aaa.user.login_attempts
expression to take effect, you must disable the “Persistent Login Attempts” parameter.Run the
unset aaa parameter -persistentLoginAttempts
command to disable (if enabled) the persistent login attempts.For details about the login attempt functionality, see Support to retrieve current login attempts for a user.
The following show command output displays the configuration status of the authentication, authorization, and auditing parameters:
show aaaparameter
Configured AAA parameters
EnableStaticPageCaching: YES
EnableEnhancedAuthFeedback: NO
DefaultAuthType: LOCAL MaxAAAUsers: Unlimited
AAAD nat ip: None
EnableSessionStickiness : NO
aaaSessionLoglevel: INFORMATIONAL
AAAD Log Level: INFORMATIONAL
...
Persistent Login Attempts: DISABLED
<!--NeedCopy-->
Configure system user account lockout by using the GUI
- Navigate to Configuration > Security > AAA-Application Traffic > Authentication Settings > Change authentication AAA Settings.
-
In the Configure AAA Parameter page, set the following parameters:
- Max Login Attempts. The maximum number of logon attempts allowed for the user to try.
- Failed Login Timeout. The maximum number of invalid logon attempts by the user.
- Persistent Login Attempts. Persistent storage of unsuccessful user login attempts across reboots.
-
Click OK.
When you set the parameters, the user account gets locked for 10 minutes for three or more invalid login attempts. Also, the user cannot log on even with valid credentials for 10 minutes.
Note
If a locked user tries to log on to NetScaler, an error message,
RBA Authentication Failure: maxlogin attempt reached for test.
appears.
Lock system user account for management access
NetScaler enables you to lock a system user for 24 hours and deny access to the user.
NetScaler supports the configuration for both system user and external users.
Note
The feature is supported only if you disable the
persistentLoginAttempts
option in theaaa
parameter.
At the command prompt type:
set aaa parameter –persistentLoginAttempts DISABLED
Now, to lock a user account, at the command prompt, type:
lock aaa user test
Lock a system user account by using the GUI
- Navigate to Configuration > Security > AAA-Application Traffic > Authentication Settings > Change authentication AAA Settings.
- In Configure AAA Parameter, in the Persistent Login Attempts list, select DISABLED.
- Navigate to System > User Administration > Users.
- Select a user.
-
In the Select Action list, select Lock.
Note
The NetScaler GUI does not have an option to lock external users. To lock an external user, the ADC administrator must use the CLI. When a locked system user (locked with lock authentication, authorization, and auditing user command) attempts to log in to NetScaler, an error message, “RBA Authentication Failure: User test is locked down for 24 hours.” appears.
When a user is locked to log on to management access, console access is exempted. Locked user is able to log on to console.
Unlock a locked system user account for management access
System users and external users can be locked for 24 hours using the lock authentication, authorization, and auditing user command.
Note
NetScaler allows admins to unlock the locked user and the feature does not require any settings in “persistentloginAttempts” command.
At the command prompt, type:
unlock aaa user test
Configure system user unlock by using the GUI
- Navigate to System > User Administration > Users.
- Select a user.
-
Click Unlock.
The NetScaler GUI only lists system users created in the ADC, so there is no option in the GUI to unlock external users. To unlock an external user, the nsroot
administrator must use the CLI.
Disable management access for system user account
When external authentication is configured and as an admin, if you prefer to deny access to system users to log on to management access, you must disable the localAuth option in the system parameter.
At the command prompt, type the following:
set system parameter localAuth <ENABLED|DISABLED>
Example:
set system parameter localAuth DISABLED
Disable management access to system user by using the GUI
- Navigate to Configuration > System > Settings > Change Global System Settings.
- In Command Line Interface (CLI) section, unselect the Local Authentication check box.
By disabling the option, local system users cannot log on to ADC management access.
Note
External authentication server must be configured and reachable to disallow local system user authentication in the system parameter. If external server configured in ADC for management access is unreachable, local system users can log on to NetScaler. The behavior is set up for recovery purpose.
Force password change for administrative users
For nsroot
secured authentication, NetScaler prompts the user to change the default password to a new one if the forcePasswordChange
option is enabled in the system parameter. You can change your nsroot
password either from CLI or GUI, on your first login with the default credentials.
At the command prompt, type:
set system parameter -forcePasswordChange ( ENABLED | DISABLED )
SSH session example for NSIP:
ssh nsroot@1.1.1.1
Connecting to 1.1.1.1:22...
Connection established.
To escape to local shell, press Ctrl+Alt+].
###############################################################################
WARNING: Access to this system is for authorized users only #
Disconnect IMMEDIATELY if you are not an authorized user! #
###############################################################################
Please change the default NSROOT password.
Enter new password:
Please re-enter your password:
Done
<!--NeedCopy-->
Remove sensitive files in a system user account
To manage sensitive data such as authorized keys and public keys for a system user account, you must enable the removeSensitiveFiles
option. The commands that remove sensitive files when the system parameter is enabled are:
- rm cluster instance
- rm cluster node
- rm high availability node
- clear config full
- join cluster
- add cluster instance
At the command prompt, type:
set system parameter removeSensitiveFiles ( ENABLED | DISABLED )
Example:
set system parameter -removeSensitiveFiles ENABLED
Strong password configuration for system users
For secured authentication, NetScaler prompts system users and administrators to set strong passwords to log on to the console. The password must be long and must be a combination of:
- One lower case character
- One upper case character
- One numeric character
- One special character
At the command prompt, type:
set system parameter -strongpassword <value> -minpasswordlen <value>
Where,
Strongpassword
. After enabling strong password (enable all
/ enablelocal
) all the passwords or sensitive information must have the following:
- At least 1 lower case character
- At least 1 upper case character
- At least 1 numeric character
- At least 1 special character
Exclude the list in enablelocal
is - NS_FIPS
, NS_CRL
, NS_RSAKEY
, NS_PKCS12
, NS_PKCS8, NS_LDAP, NS_TACACS
, NS_TACACSACTION
, NS_RADIUS
, NS_RADIUSACTION
, NS_ENCRYPTION_PARAMS
. So no Strong Password checks are performed on these ObjectType commands for the system user.
Possible values: enableall
, enablelocal
, disabled
Default value: disabled
minpasswordlen
. Minimum length of the system user password. When the strong password is enabled by default, the minimum length is 4. User entered value can be greater than or equal to 4. Default minimum value is 1 when the strong password is disabled. Maximum value is 127 in both cases.
Minimum value: 1 Maximum value: 127
Example:
set system parameter -strongpassword enablelocal -minpasswordlen 6
Default user account
The nsrecover
user account can be used by the administrator to recover the NetScaler appliance. You can log on to NetScaler using nsrecover
if the default system users (nsroot
) are unable to log in due to any unforeseen issues. The nsrecover
login is independent of user configurations and lets you access the shell prompt directly. You are always allowed to log in through the nsrecover
irrespective of the maximum configuration limit is reached.
Share
Share
In this article
- System user account lockout
- Lock system user account for management access
- Unlock a locked system user account for management access
- Disable management access for system user account
- Force password change for administrative users
- Remove sensitive files in a system user account
- Strong password configuration for system users
- Default user account
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.