-
Getting Started with NetScaler
-
Deploy a NetScaler VPX instance
-
Optimize NetScaler VPX performance on VMware ESX, Linux KVM, and Citrix Hypervisors
-
Apply NetScaler VPX configurations at the first boot of the NetScaler appliance in cloud
-
Install a NetScaler VPX instance on Microsoft Hyper-V servers
-
Install a NetScaler VPX instance on Linux-KVM platform
-
Prerequisites for installing NetScaler VPX virtual appliances on Linux-KVM platform
-
Provisioning the NetScaler virtual appliance by using OpenStack
-
Provisioning the NetScaler virtual appliance by using the Virtual Machine Manager
-
Configuring NetScaler virtual appliances to use SR-IOV network interface
-
Configuring NetScaler virtual appliances to use PCI Passthrough network interface
-
Provisioning the NetScaler virtual appliance by using the virsh Program
-
Provisioning the NetScaler virtual appliance with SR-IOV on OpenStack
-
Configuring a NetScaler VPX instance on KVM to use OVS DPDK-Based host interfaces
-
-
Deploy a NetScaler VPX instance on AWS
-
Deploy a VPX high-availability pair with elastic IP addresses across different AWS zones
-
Deploy a VPX high-availability pair with private IP addresses across different AWS zones
-
Protect AWS API Gateway using the NetScaler Web Application Firewall
-
Configure a NetScaler VPX instance to use SR-IOV network interface
-
Configure a NetScaler VPX instance to use Enhanced Networking with AWS ENA
-
Deploy a NetScaler VPX instance on Microsoft Azure
-
Network architecture for NetScaler VPX instances on Microsoft Azure
-
Configure multiple IP addresses for a NetScaler VPX standalone instance
-
Configure a high-availability setup with multiple IP addresses and NICs
-
Configure a high-availability setup with multiple IP addresses and NICs by using PowerShell commands
-
Deploy a NetScaler high-availability pair on Azure with ALB in the floating IP-disabled mode
-
Configure a NetScaler VPX instance to use Azure accelerated networking
-
Configure HA-INC nodes by using the NetScaler high availability template with Azure ILB
-
Configure a high-availability setup with Azure external and internal load balancers simultaneously
-
Configure a NetScaler VPX standalone instance on Azure VMware solution
-
Configure a NetScaler VPX high availability setup on Azure VMware solution
-
Deploy NetScaler GSLB and domain-based services back-end autoscale with cloud load balancer
-
Configure address pools (IIP) for a NetScaler Gateway appliance
-
Deploy a NetScaler VPX instance on Google Cloud Platform
-
Deploy a VPX high-availability pair on Google Cloud Platform
-
Deploy a VPX high-availability pair with external static IP address on Google Cloud Platform
-
Deploy a single NIC VPX high-availability pair with private IP address on Google Cloud Platform
-
Deploy a VPX high-availability pair with private IP addresses on Google Cloud Platform
-
Install a NetScaler VPX instance on Google Cloud VMware Engine
-
-
Upgrade and downgrade a NetScaler appliance
-
Solutions for Telecom Service Providers
-
Load Balance Control-Plane Traffic that is based on Diameter, SIP, and SMPP Protocols
-
Provide Subscriber Load Distribution Using GSLB Across Core-Networks of a Telecom Service Provider
-
Authentication, authorization, and auditing application traffic
-
Basic components of authentication, authorization, and auditing configuration
-
On-premises NetScaler Gateway as an identity provider to Citrix Cloud
-
Authentication, authorization, and auditing configuration for commonly used protocols
-
Troubleshoot authentication and authorization related issues
-
-
-
-
-
-
Persistence and persistent connections
-
Advanced load balancing settings
-
Gradually stepping up the load on a new service with virtual server–level slow start
-
Protect applications on protected servers against traffic surges
-
Retrieve location details from user IP address using geolocation database
-
Use source IP address of the client when connecting to the server
-
Use client source IP address for backend communication in a v4-v6 load balancing configuration
-
Set a limit on number of requests per connection to the server
-
Configure automatic state transition based on percentage health of bound services
-
-
Use case 2: Configure rule based persistence based on a name-value pair in a TCP byte stream
-
Use case 3: Configure load balancing in direct server return mode
-
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field
-
Use case 7: Configure load balancing in DSR mode by using IP Over IP
-
Use case 10: Load balancing of intrusion detection system servers
-
Use case 11: Isolating network traffic using listen policies
-
Use case 12: Configure Citrix Virtual Desktops for load balancing
-
Use case 13: Configure Citrix Virtual Apps and Desktops for load balancing
-
Use case 14: ShareFile wizard for load balancing Citrix ShareFile
-
Use case 15: Configure layer 4 load balancing on the NetScaler appliance
-
-
-
Authentication and authorization for System Users
-
-
Configuring a CloudBridge Connector Tunnel between two Datacenters
-
Configuring CloudBridge Connector between Datacenter and AWS Cloud
-
Configuring a CloudBridge Connector Tunnel Between a Datacenter and Azure Cloud
-
Configuring CloudBridge Connector Tunnel between Datacenter and SoftLayer Enterprise Cloud
-
Configuring a CloudBridge Connector Tunnel Between a NetScaler Appliance and Cisco IOS Device
-
CloudBridge Connector Tunnel Diagnostics and Troubleshooting
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Release Notes for NetScaler 13.1-42.47 Release
This release notes document describes the enhancements and changes, fixed and known issues that exist for the NetScaler release Build 13.1-42.47.
Notes
- This release notes document does not include security related fixes. For a list of security related fixes and advisories, see the security bulletin.
What’s New
The enhancements and changes that are available in Build 13.1-42.47.
Bot Management
-
Support to stop the IP reputation downloads in bot settings
After you disable the IP reputation feature, set the Default Nonintrusive Profile to BOT_BYPASS in the NetScaler bot management settings. This configuration stops the IP reputation downloads.
To change the bot management settings, navigate to Security > NetScaler bot Management > Change NetScaler bot Management Settings.
[NSBOT-1050, NSHELP-34310, NSHELP-33835, NSHELP-34410]
-
New bot violations appear in the NetScaler ADM GUI
The following bot violations are newly introduced in the NetScaler ADM GUI:
- No user-agent header
- Multiple user-agent headers
An application server uses the user-agent header information to know more about an incoming request. Some bot requests can have multiple user-agent headers or no user-agent header. You can detect such bot violations using a NetScaler bot management profile. Then, use the NetScaler ADM GUI to monitor bot violations. For more information, see Violation categories.
[NSBOT-1023]
NetScaler SDX Appliance
-
SD-WAN support is deprecated from the Management Service
From release 13.1 build 42.x and later, SD-WAN support is deprecated from the NetScaler SDX appliance.
[NSSVM-5465]
-
“Gateway” and “Nexthop” fields are optional while provisioning or editing the VPX
In a NetScaler SDX appliance Management Service, the
Gateway
andNexthop
fields are no longer mandatory for provisioning, editing, taking backup, or restoring VPX when the following conditions are met:- Either of the following options is true:
- “Manage through the internal network” is enabled for VPX.
- VPX IP address is in the same subnet as the Management Service IP address.
- VPX is provisioned with version 13.0-88.9 or 13.1-37.8, and their higher versions.
For more information, see Provision NetScaler instances.
[NSSVM-5307]
- Either of the following options is true:
NetScaler Gateway
-
Support to enable DF bit propagation for EDT by default
On the NetScaler Gateway appliance, the DF bit enforcement for the EDT path maximum transmission unit discovery (PMTUD) option is now enabled, by default. This option prevents EDT fragmentation that might result in performance degradation or failure to establish a session. Previously, this option was disabled, by default. Administrators had to enable the option using the ICA parameter settings.
[CGOP-22615]
NetScaler Web App Firewall
-
Use CLI or API to enable signatures in your NetScaler Web App Firewall
You can now enable individual signatures in your NetScaler Web App Firewall through CLI commands or API calls. To do so, select signatures by their IDs or categories and then set actions. Earlier, you were able to enable signatures only by uploading a signature file.
Example-1:
import appfw signature DEFAULT object_name -sigRuleId 1001 9882 2000 1250 810 -Enabled ON -Action LOG BLOCK
Example-2:
import appfw signature DEFAULT object_name -sigCategory web-misc -Enabled ON -Action LOG BLOCK
See, To add individual signatures by using CLI.
[NSWAF-9333]
-
New match patterns for the NetScaler Web App Firewall signatures
For the NetScaler Web App Firewall signatures, you can now select the following new match patterns:
- Command Injection
- SQL Injection Grammar
- Command Injection Grammar
The NetScaler Web App Firewall looks for the selected pattern and categorizes the attack.
Note: You can modify the signature rule patterns only for the custom signatures.
For more information, see Add signature rule patterns.
[NSWAF-9280]
-
Configure global lists to bypass WAF or deny requests
You can now configure global lists in a NetScaler Web App Firewall profile to bypass Web App Firewall or deny requests. If the incoming requests match the global bypass list, they skip the Web App Firewall in NetScaler. If the incoming requests match the global deny list, NetScaler Web App Firewall blocks those requests and applies the defined action.
The bypass and deny lists support URL, IPv4, and IPv6 addresses. You can specify them using literals, PCRE, and expressions. For more information, see Manage global lists to bypass WAF or deny requests.
[NSWAF-8981]
-
Simplified the NetScaler Web App Firewall profile creation to protect from CVEs
Protect your NetScaler appliance by applying an appropriate signature in the NetScaler Web App Firewall. You might want to secure the appliance from CVEs without performing any other security checks. In this case, you can now create a profile that disables the remaining checks from the NetScaler Web App Firewall.
In a NetScaler Web App Firewall profile, select the CVE option as defaults. With this option, you need to simply add and bind a signature. It automatically disables the remaining checks. Earlier, you had to manually disable the security checks from the profile one by one.
For more information, see Creating Web App Firewall profiles.
[NSWAF-8970]
Platform
-
Support for VMware vSphere 8.0.0b
The NetScaler VPX instance now supports the VMware vSphere 8.0.0b (build 20513097).
[ NSPLAT-25844 ]
-
Support for multiple services with the same Autoscaling group in public cloud
For the back-end Autoscaling feature in public cloud, the NetScaler VPX instance now supports multiple services with the same autoscaling group. This feature is supported on Azure, AWS, and GCP clouds. In the NetScaler GUI, you can create different cloud profiles for different services (using different ports) with the same autoscaling group in cloud.
Earlier, the NetScaler VPX instance support was limited to a single service per autoscaling group. You had to add different autoscaling groups for different services.
[NSPLAT-21596]
-
Support for Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor
The NetScaler VPX instance now supports Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor.
[NSPLAT-20295]
Policies
-
Increase in the limit of patterns that can be bound to a pattern set
In a NetScaler appliance, you can now bind 50000 patterns to a pattern set. With the pattern set file, only 10000 patterns can be bound to a pattern set. Also, If the pattern set is used in streaming, then only 5000 patterns can be bound to that pattern set. A pattern set for streaming is used in the rewrite action search parameter, HTTP body, or TCP payload based expression. Previously, you could only bind 5000 patterns to a pattern set.
[NSPOLICY-2733]
-
Support for all the expressions associated with the UDP headers and payloads on the client side and the server side
The following enhancements are done for UDP headers and payloads on the client side and server side:
- Expressions associated with the UDP protocol are split into client side and server side expressions.
- Earlier support was available only for client side expressions and the same expressions were used for the server side.
- The UDP protocol now has support for server side expressions. This expression can be used to extract the UDP Source port, Destination port, Length, Checksum, and Payload.
- The client side expressions are also enhanced to extract Length, Checksum, and Payload from a given UDP packet.
- For backward compatibility, if a client side expression is used on the server side it continues to be supported. Citrix recommends you to use the server side expressions for the server side.
For more information, see Expressions for TCP, UDP, and VLAN data.
[NSPOLICY-1829]
SSL
-
Support for cross-signed certificate validation
The NetScaler appliance now supports cross-signed certificate validation. If a certificate is signed by multiple issuers, the validation passes if there is at least one valid path to the root certificate.
Earlier, if one of the certificates in the certificate chain was cross-signed and had multiple paths to the root certificate, the ADC appliance only checked for one path. And if that path was not valid, the validation failed.
[NSSSL-11259]
System
-
Support for exporting metrics directly to Prometheus from the NetScaler appliance
NetScaler now supports the direct export of metrics to Prometheus. With this feature, Prometheus pulls metrics directly from the NetScaler instances without the need for any external exporter. Previously, an exporter resource was required outside the appliance to export metrics from NetScaler to the Prometheus server.
For more information, see Monitoring NetScaler and applications using Prometheus.
[NSBASE-17100]
User Interface
-
8 MB upload limit support for
systemfile
NITRO APIThe maximum upload limit for the
systemfile
NITRO API has been increased from 2 MB to 8 MB.[NSCONFIG-7089]
-
Support for 64-bit numerical value in NITRO API responses
Earlier, the NetScaler appliance returned an unsigned integer or a long property-type value as a string in the NITRO API response because integer response was not supported for these types. Also, the appliance returned a double-data type stats-counter-rate value as an integer.
The NITRO APIs now support 64-bit integers. This support enables the appliance to return the following in the NITRO API responses:
- the exact integer value instead of a string for an unsigned integer or long integer data type.
- the exact serialized counter rate value instead of an integer.
A new query parameter
largeintsupport
has been introduced for enabling the 64-bit integers support in the NITRO APIs.When
largeintsupport
is set toyes
in a NITRO API request, the NetScaler appliance returns the exact integer value, in the NITRO API response. The earlier functionality is retained whenlargeintsupport
is set tono
, which is also the default setting.[NSCONFIG-5399]
Fixed Issues
The issues that are addressed in Build 13.1-42.47.
Authentication, authorization, and auditing
-
When a NetScaler appliance is upgraded, users cannot access the NetScaler appliance using RADIUS authentication.
[NSHELP-33200]
-
On the NetScaler GUI, the Response Policies section on the Authentication Virtual Server page does not display the responder type cache policies.
[NSHELP-33111]
-
Gateway authentication via CWA client or native VPN clients might fail because of missing strings in the
ns_aaa_relaystate_param_whitelist
patset.[NSHELP-33054]
-
Kerberos SSO impersonation with advanced encryption types might fail when an incorrect user principal name is used in the SSO credentials.
[NSHELP-32890, NSHELP-34087]
Bot Management
-
NetScaler appliance crashes while processing a bot signature if the format of the signature file is invalid.
[NSHELP-33690]
-
In the NetScaler GUI, the user-defined bot signature displays an incorrect base version.
[NSHELP-33546]
NetScaler SDX Appliance
-
When you upgrade a NetScaler SDX appliance, in rare cases the following incorrect event appears in the Management Service GUI:
“SVM version and Hypervisor version are not compatible”
[NSHELP-32949]
NetScaler Gateway
-
A NetScaler Gateway appliance crashes when evaluating a policy for a VPN URL.
[NSHELP-33683, CGOP-20369, NSHELP-34002, NSHELP-34030, NSHELP-34052, NSHELP-34076, NSHELP-34077, NSHELP-34100, NSHELP-34151, NSHELP-34180, NSHELP-34243, NSHELP-34276, NSHELP-34327, NSHELP-34402]
-
After upgrading a NetScaler appliance, the RDP proxy URLs do not work with the X1 portal theme and the message
“Http/1.1 Object Not Found” appears.[NSHELP-33676, NSHELP-33845, NSHELP-33921, NSHELP-34032]
-
When a NetScaler appliance is upgraded, the appliance might crash while processing the UDP traffic.
[NSHELP-33417, NSHELP-34031]
-
After upgrading a NetScaler appliance, the RDP proxy URLs become inaccessible and the error message “Http/1.1 Object Not Found” appears. This issue occurs when the custom parameters of the RDP URLs contain spaces.
[NSHELP-33333]
-
In a NetScaler Gateway high availability setup, the primary and the secondary appliances might crash during a failover.
[NSHELP-33198, NSHELP-33483]
-
Some of the VPN sessions might get cleared or removed from the secondary ADC appliance after a failover.
[NSHELP-33125]
-
The NetScaler Gateway appliance might crash if HDX Insight is enabled and a user logs in to StoreFront immediately after logging out.
[NSHELP-32907, NSHELP-33079, NSHELP-33289]
-
In a rare case, the NetScaler appliance might crash while fetching a STA monitor in a VPN deployment.
[NSHELP-32893]
-
After upgrading a NetScaler Gateway appliance, the Configuration > Integrate with NetScaler products section is not displayed in the NetScaler GUI.
[NSHELP-32335]
-
The EPA scan to check the CA certificate of a client device fails on the NetScaler appliance when the CA certificates are of different domains.
[NSHELP-32118]
-
Citrix EPA plug-in for macOS crashes when GSLB is enabled on a NetScaler appliance.
[CGOP-22722]
NetScaler Web App Firewall
-
In the NetScaler Web App Firewall, when you enable the streaming and field consistency checks, it delays the transfer of the payload to the origin server. As a result, the POST method for the payload fails.
[NSHELP-33700]
-
The cookie hijacking redirect drops the query parameters from the request URL. As a result, the redirected request might fail.
[NSHELP-33633, NSHELP-33812]
Load Balancing
-
The secondary node might crash if you use the same GSLB virtual server as the backup for multiple GSLB virtual servers.
[NSHELP-33400, NSHELP-34247]
-
The NetScaler appliance does not respond with the correct service IP address for GSLB domain query if the following settings are configured on the GSLB virtual server:
- ECS option is enabled.
- Static proximity is configured as the load balancing method.
[NSHELP-32879]
Networking
-
In a high availability setup in INC mode, when there is an HA version mismatch, the secondary node might learn invalid routes from the primary node.
[NSHELP-33948]
-
In a NetScaler appliance with OSPF routing configured, the default route is not installed even when the OSPF default route LSA is present.
[NSHELP-33070]
-
The
nstrace
of a few incoming packets of an SSH session might incorrectly display a different receiving interface number and VLAN ID when all of the following conditions are met:- ECMP routes for the client of the SSH session are present on the NetScaler appliance.
- SSH session is idle for a few seconds.
[NSHELP-32734]
-
The loading of SNMP MIB file to a network morning tool might fail because the SNMP trap name
dataStreamRateLimitHit
in the file is not in camel case.[NSHELP-32634]
-
In a large scale NAT 64 setup, the NetScaler appliance might crash because of an internal packet engine mismatch issue.
[NSHELP-31985]
-
In a GSLB setup with one of the GSLB site IP address is configured in an admin partition, ARP requests for this GSLB site IP address from upstream routers fails to reach the admin partition. This issue occurs when all of the following conditions are met:
- A shared VLAN is bound to the admin partition.
- A SNIP IP address, say SNIP-1, in the same subnet as the GSLB site IP address is present on the shared VLAN.
- Another SNIP IP address, say SNIP-2, in the same subnet as the GSLB site IP address is added and SNIP-1 is removed.
[NSHELP-30552]
Platform
-
For a NetScaler VPX release 13.1 build 37.38 on VMware ESX hypervisor with VMXNET3 interfaces, you see the following behavior in the HA setup:
The NetScaler VPX HA pair is not configured because the communication between the HA nodes is not established. As a result, the peer node status is displayed as UNKNOWN.
[NSPLAT-25677]
-
When you provide preboot user data in an OVF template from the ESX vSphere client, the ESXi host does not apply the preboot configuration.
[NSPLAT-24233, NSPLAT-25551]
-
DNS resolution fails if you configure more than three DNS server names in the DHCP option set in AWS VPC. This issue is seen in NetScaler VPX instances with releases earlier than 13.1 build 42.x.
[NSHELP-33171]
-
On the NetScaler SDX 8015/8400/8600 platform, you might see increased memory consumption on Xen Server.
[NSHELP-32260]
-
You might experience transmit stalls on a NetScaler SDX appliance with a 10G interface when heavy traffic is sent on this interface.
[NSHELP-31232]
SSL
-
A virtual server crashes due to a failed TLS1.3 connection, because the NetScaler appliance runs out of memory and a memory allocation request fails during the start of a TLS 1.3 handshake.
With this fix, the TLS 1.3 connection fails but the appliance does not crash.
[NSSSL-12200]
-
A virtual server may incorrectly terminate a TLS 1.3 handshake with a
decrypt_error
alert if the following conditions are met:- The client is authenticating with a certificate.
- The virtual server is configured to perform a certificate status check using OCSP or a CRL.
- The client sends both Certificate and CertificateVerify messages in the same TLS record.
[NSHELP-33355]
-
After unbinding the DEFAULT cipher, when you disable a protocol version on a virtual server and later try to bind a cipher with this protocol listed in the description, the following error message appears.
No usable ciphers configured on the SSL vserver/service
This message is incorrect because the cipher is supported with other protocols that are enabled on the virtual server. For example,
Cipher Name: TLS1-ECDHE-RSA-AES256-SHA
Description: SSLv3 Kx=ECC-DHE Au=RSA Enc=AES(256) Mac=SHA1 HexCode=0xc014This cipher is supported for all the protocols starting from SSLv3 (SSLv3, TLS1, TLS11, TLS12). When you disable SSLv3 on a virtual server and then try to bind this cipher to that virtual server, the warning appears even though TLS1, TLS11, TLS12 protocols are still enabled on the virtual server.
With this fix, the warning appears only when a cipher is not supported for the configuration.
[NSHELP-32739]
-
The NetScaler appliance does not allow configuring certificates with a
notBefore date
older than 1970.[NSHELP-32677]
-
The NetScaler appliance might crash if the following conditions are met:
- A client sends TLS1.3 early data in the Client Hello message to an SSL Insight virtual server.
- ECDHE ciphers are enabled on this virtual server.
[NSHELP-31560]
System
-
Customer applications that are not RFC compliant (RFC 7230) might fail after an upgrade to NetScaler 13.1. This failure occurs because of a mandatory compliance check that is enforced on the NetScaler appliance to comply with RFC 7230.
As part of the fix, this specific compliance check is moved under the HTTP profile parameter “-markRfc7230NonCompliantInval.“ Customers can disable this compliance check that was previously enforced.
[NSHELP-34046]
-
A NetScaler appliance might crash when both of the following conditions are met:
- The content inspection device sends a reset (RST) response to the ADC appliance and one of the Intrusion Prevention System (IPS) resources is not cleared properly.
- The same IPS resource is accessed in further transactions.
[NSHELP-33691]
-
In some cases, a NetScaler appliance might crash while processing a corrective acknowledgment sent by a server connection that is in the TIME_WAIT state.
[NSHELP-33469]
-
A NetScaler appliance might crash when it tries to access resources on the freed ICAP. This condition happens when the ICAP is in response modification (RESPMOD) mode.
[NSHELP-33403]
-
The NetScaler appliance is unable to send Logstream data from partitions consistently.
[NSHELP-33237]
-
The NetScaler appliance aborts the connection when it fails to parse the chunked value. This issue occurs when the Transfer-Encoding header has multiple values and Chunked is not the first value.
[NSHELP-32420]
-
The NetScaler appliance might crash if it processes a corrective ACK packet related to a server-side TCP connection.
[NSHELP-32290]
-
The NetScaler appliance configured with an SSL service crashes when the appliance receives a TCP FIN control packet followed by a TCP RESET control packet.
[NSHELP-31656]
User Interface
-
When you create a NetScaler Web App Firewall profile of the JSON type and try to update the Profile Settings, the JSON Error Object displays an empty list.
[NSUI-18453]
-
A system user account bound to a set of admin partitions might not be able to access the default partition through the NITRO APIs even if the Allow Default Partition option is enabled as part of the system global settings.
[NSHELP-33990]
-
The link for NetScaler bot management profiles incorrectly appears in the Traffic Management > Content Switching page. When you click on that link, it renders a blank page. This issue occurs if you bind a bot policy to the content-switching virtual server.
[NSHELP-33697]
-
Logging on to the NetScaler GUI fails if your user name or domain name has a special character.
[NSHELP-33684]
-
When you clear the running NetScaler configurations, the NetScaler management session created by a classic TACACS configuration is disconnected even when the
RBAconfig
parameter is set to NO.[NSHELP-33655]
-
When a user views the binding on a content switching policy, the content switching virtual server details are not displayed in the same row under Show Bindings.
[NSHELP-33149]
-
Support for power off option in the shutdown NITRO API
The
shutdown
NITRO API now supports the “-p now” option to shut down and power off a NetScaler appliance.Example:
In the following example of a curl request, the
shutdown
NITRO API is used with the “-p now” option to shut down and power off a NetScaler appliance having the IP address 192.0.0.33.curl -v -X POST -H Content-Type: application/json -u nsroot:examplepassword [http://192.0.0.33/nitro/v1/config/install?warning=yes](http://192.0.0.33/nitro/v1/config/install?warning=yes) -d '{"shutdown": {"args":"-p now"}}'
[NSHELP-32915]
-
After you create a profile for NetScaler Web App Firewall and try to generate the configuration report of the application firewall in System > Reports, the following error appears:
“Failed to load PDF document.”
[NSHELP-32469]
-
In the cluster setup, the TFTP option is not displayed in the Protocol list, when creating a virtual server using the NetScaler GUI.
[NSHELP-32036]
-
On the NetScaler GUI, the System Log Files page (Configuration > System > Auditing > Syslog messages) and the Logs page (Configuration > Authentication > Logs) fail to load the log files.
[NSHELP-30868]
-
On the NetScaler GUI, the Saved vs Running configuration screen (System > Diagnostics) incorrectly displays HTML tags instead of displaying plain text.
[NSHELP-27169]
-
While viewing the policies bound to a content switching policy label in the NetScaler GUI, only 25 policies are displayed even though there are more policies bound to that policy label.
[NSHELP-23428]
Known Issues
The issues that exist in release 13.1-42.47.
AppFlow
-
HDX Insight does not report an application launch failure caused by a user trying to launch an application or desktop to which the user does not have access.
[NSINSIGHT-943]
Authentication, authorization, and auditing
-
Administrators cannot perform custom logging for authentication failures that happen due to invalid credentials. This issue occurs because the NetScaler responder policies fail to detect errors for login failures.
[NSAUTH-11151]
-
ADFS proxy profile can be configured in a cluster deployment. The status for a proxy profile is incorrectly displayed as blank upon issuing the following command.
show adfsproxyprofile <profile name>
Workaround: Connect to the primary active NetScaler in the cluster and run the
show adfsproxyprofile <profile name>
command. It would display the proxy profile status.[NSAUTH-5916]
-
The Configure Authentication LDAP Server page on the NetScaler GUI becomes unresponsive if you pursue the following steps:
- The Test LDAP Reachability option is opened.
- Invalid login credentials are populated and submitted.
- Valid login credentials are populated and submitted.
Workaround: Close and open the Test LDAP Reachability option.
[NSAUTH-2147]
NetScaler SDX Appliance
-
Packet drops are seen on a VPX instance hosted on a NetScaler SDX appliance if the following conditions are met:
- Throughput allocation mode is burst.
- There is a large difference between the throughput and the maximum burst capacity.
[NSHELP-21992]
NetScaler Gateway
-
If the Citrix Secure Access related registry values are greater than 1500 characters, then the log collector fails to gather the error logs.
[NSHELP-33457]
-
When using Windows Filtering Platform (WFP) driver, sometimes intranet access does not work after the VPN is reconnected.
[NSHELP-32978]
-
The Citrix Secure Access client, version 21.7.1.2 and later, fails to upgrade to later versions for users with no administrative privileges. This issue is applicable only if the Citrix Secure Access client upgrade is done from a NetScaler appliance.
[NSHELP-32793]
-
When users click the Home Page tab on the Citrix Secure Access screen for Windows, the page displays the connection refused error.
[NSHELP-32510]
-
On a Mac device using Chrome, the VPN extension crashes while accessing two FQDNs.
[NSHELP-32144]
-
In some cases, empty proxy settings in NetScaler Gateway release 13.0 or 13.1 causes Citrix SSO to create improper proxy settings.
[NSHELP-31970]
-
Debug logging control for Citrix Secure Access client is now independent of NetScaler Gateway and it can be enabled or disabled from the plug-in UI for both machine and user tunnel.
[NSHELP-31968]
-
Direct connections to the resources outside of the tunnel established by Citrix Secure Access might fail if there is a significant delay or congestion.
[NSHELP-31598]
-
Customized EPA failure log message is not displayed on the NetScaler Gateway portal. Instead, the message “internal error” is displayed.
[NSHELP-31434]
-
Sometimes, the Windows auto logon does not work when a user logs into the windows machine in an Always-On service mode. The machine tunnel does not transition to the user tunnel and the message “Connecting…” is displayed in the VPN plug-in UI.
[NSHELP-31357, CGOP-21192, NSHELP-34211]
-
When Always on is configured, the user tunnel fails because of the incorrect version number (1.1.1.1) in the aoservice.exe file.
[NSHELP-30662]
-
Users cannot connect to the NetScaler Gateway appliance after changing the ‘networkAccessOnVPNFailure’ always on profile parameter from ‘fullAccess’ to ‘onlyToGateway`.
[NSHELP-30236]
-
The gateway home page is not displayed immediately after the gateway plug-in establishes the VPN tunnel successfully. To fix this issue, the following registry value is introduced.
HKLMSoftwareCitrixSecure Access ClientSecureChannelResetTimeoutSeconds
Type: DWORDBy default, this registry value is not set or added. When the value of “SecureChannelResetTimeoutSeconds” is 0 or not added, the fix to handle the delay does not work, which is the default behavior. Admin has to set this registry on the client to enable the fix (that is to display the home page immediately after the gateway plug-in establishes the VPN tunnel successfully).
[NSHELP-30189]
-
The Windows VPN client does not honor the ‘SSL close notify’ alert from the server and sends the transfer login request on the same connection.
[NSHELP-29675]
-
Client certificate authentication fails for Citrix SSO for macOS if there are no client certificates in the macOS Keychain.
[NSHELP-28551]
-
Sometimes, a user is logged out of NetScaler Gateway within a few seconds when the client idle timeout is set.
[NSHELP-28404]
-
VPN plug-in doesn’t establish tunnel after Windows logon, if the following conditions are met:
- NetScaler Gateway appliance is configured for Always On feature
- The appliance is configured for certificate-based authentication with two factor authentication “off”
[NSHELP-23584]
-
Sometimes while browsing through schemas, the error message “Cannot read property ‘type’ of undefined” appears.
[NSHELP-21897]
-
In a NetScaler cluster setup, HDX Insight and Gateway Insight cannot be enabled simultaneously.
[CGOP-23570]
-
The Windows OS option is not listed in the Expression Editor drop-down list for pre-authentication policies and authentication actions on the NetScaler GUI. However, if you have already configured the Widows OS scan on a previous NetScaler build using the GUI or the CLI, the upgrade does not impact the functionality. You can use the CLI to make changes, if required.
Workaround:
Use the CLI commands for the configuration.
- To configure advanced EPA action in nFactor authentication, use the following command.
add authentication epaAction adv_win_scan -csecexpr “sys.client_expr(“sys_0_WIN-OS_NAME_anyof_WIN-10[COMMENT: Windows OS]”)” - To configure a classic pre-authentication action, use the following commands.
add aaa preauthenticationaction win_scan_action ALLOW
add aaa preauthenticationpolicy win_scan_policy "CLIENT.SYSTEM('WIN-OS_NAME_anyof_WIN-10[COMMENT: Windows OS]') EXISTS" win_scan_action
[CGOP-22966]
- To configure advanced EPA action in nFactor authentication, use the following command.
-
If you would like to use Always On VPN before Windows Logon functionality, it is recommended to upgrade to NetScaler Gateway 13.0 or later. This enables you to leverage the additional enhancements introduced in release 13.0 that is not available in the 12.1 release.
[CGOP-19355]
-
The Gateway Insight report incorrectly displays the value “Local” instead of “SAML” in the Authentication Type field for SAML error failures.
[CGOP-13584]
-
In a high availability setup, during NetScaler failover, SR count increments instead of the failover count in NetScaler ADM.
[CGOP-13511]
-
When an ICA connection is launched from a MAC receiver version 19.6.0.32 or Citrix Virtual Apps and Desktops version 7.18, HDX Insight feature is disabled.
[CGOP-13494]
-
When EDT Insight feature is enabled, sometimes audio channels might fail during network discrepancy.
[CGOP-13493]
-
While accepting local host connections from the browser, the Accept Connection dialog box for macOS displays content in the English language irrespective of the language selected.
[CGOP-13050]
-
The text “Home Page” in the Citrix SSO app > Home page is truncated for some languages.
[CGOP-13049]
-
An error message appears when you add or edit a session policy from the NetScaler GUI.
[CGOP-11830]
-
In Outlook Web App (OWA) 2013, clicking Options under the Setting menu displays a Critical error dialog box. Also, the page becomes unresponsive.
[CGOP-7269]
Load Balancing
-
In a high-availability setup, subscriber sessions of the primary node might not be synchronized to the secondary node. This is a rare case.
[NSLB-7679]
-
The serviceGroupName format in the
entityofs
trap for the service group is as follows:
<service(group)name>?<ip/DBS>?<port>
In the trap format, the service group is identified by an IP address or a DBS name and port. The question mark (“?”) is used as a separator. The NetScaler sends the trap with the question mark (“?”). The format appears the same in the NetScaler ADM GUI. This is the expected behavior.
[NSHELP-28080]
Miscellaneous
-
When a forced synchronization takes place in a high availability setup, the appliance executes the
set urlfiltering parameter
command in the secondary node.
As a result, the secondary node skips any scheduled update until the next scheduled time mentioned in the “TimeOfDayToUpdateDB” parameter.[NSSWG-849]
-
AlwaysOnAllow list registry does not work as expected if the registry value is greater than 2000 bytes.
[NSHELP-31836]
-
A NetScaler appliance might restart due to management CPU stagnation if connectivity issue occurs with the URL Filtering third party vendor.
[NSHELP-22409]
Networking
-
In a NetScaler BLX appliance with DPDK support, tagged VLANs are not supported for DPDK Intel i350 NIC ports. This is observed as it is a known issue present on the DPDK driver.
[NSNET-25299]
-
A NetScaler BLX appliance with DPDK might fail to restart if all of the following conditions are met:
- The NetScaler BLX appliance is allocated with a low number of
hugepages
. For example, 1G. - The NetScaler BLX appliance is allocated with a high number of worker-process. For example, 28.
The issue is logged as an error message in “/var/log/ns.log”:
BLX-DPDK:DPDK Mempool could Not be Initialized for PE-x
Note: x is a number <= number of worker-processes.
Workaround: Allocate a high number of
hugepages
and then restart the appliance.[NSNET-25173]
- The NetScaler BLX appliance is allocated with a low number of
-
A NetScaler BLX appliance in DPDK mode might take a little longer to restart because of the DPDK easiness functionality.
[NSNET-24449]
-
The following interface operations are not supported for Intel
X710 10G (i40e)
interfaces on a NetScaler BLX appliance with DPDK:- Disable
- Enable
- Reset
[NSNET-16559]
-
Installation of a NetScaler BLX appliance might fail on a Debian based Linux host (Ubuntu version 18 and later) with the following dependency error:
The following packages have unmet dependencies: blx-core-libs:i386 : PreDepends: libc6:i386 (>= 2.19) but it is not installable
Workaround: Run the following commands in the Linux host CLI before installing a NetScaler BLX appliance:
dpkg --add-architecture i386
apt-get update
apt-get install libc6:i386
[NSNET-14602]
-
In some cases of FTP data connections, the NetScaler appliance performs only NAT operation and not TCP processing on the packets for TCP MSS negotiation. As a result, the optimal interface MTU is not set for the connection. This incorrect MTU setting results in fragmentation of packets and impacts CPU performance.
[NSNET-5233]
-
The NetScaler appliance might not generate “coldStart” SNMP trap messages after a cold restart.
[NSHELP-27917]
-
When an admin partition memory limit is changed in NetScaler appliance, the TCP buffering memory limit gets automatically set to admin partition new memory limit.
[NSHELP-21082]
Platform
-
Some python packages are not installed, when you downgrade the NetScaler appliance from 13.1-4.x version and higher versions to any of the following versions:
- Any 11.1 build
- 12.1-62.21 and earlier
- 13.0-81.x and earlier
[NSPLAT-21691]
-
When you delete an autoscale setting or a VM scale set from an Azure resource group, delete the corresponding cloud profile configuration from the NetScaler instance. Use the
rm cloudprofile
command to delete the profile.[NSPLAT-4520]
-
In a high availability setup on Azure, upon logon to the secondary node through GUI, the first-time user (FTU) screen for autoscale cloud profile configuration appears.
Workaround: Skip the screen, and log on to the primary node to create the cloud profile. The cloud profile should be always configured on the primary node.[NSPLAT-4451]
Policies
-
Connections might hang if the size of processing data is more than the configured default TCP buffer size.
Workaround: Set the TCP buffer size to maximum size of data that needs to be processed.
[NSPOLICY-1267]
SSL
-
On a heterogeneous cluster of NetScaler SDX 22000 and NetScaler SDX 26000 appliances, there is a config loss of SSL entities if the SDX 26000 appliance is restarted.
Workaround:
- On the CLIP, disable SSLv3 on all the existing and new SSL entities, such as virtual server, service, service group, and internal services. For example,
set ssl vserver <name> -SSL3 DISABLED
. - Save the configuration.
[NSSSL-9572]
- On the CLIP, disable SSLv3 on all the existing and new SSL entities, such as virtual server, service, service group, and internal services. For example,
-
You cannot add an Azure Key Vault object if an authentication Azure Key Vault object is already added.
[NSSSL-6478]
-
You can create multiple Azure Application entities with the same client ID and client secret. The NetScaler appliance does not return an error.
[NSSSL-6213]
-
The following incorrect error message appears when you remove an HSM key without specifying KEYVAULT as the HSM type.
ERROR: crl refresh disabled
[NSSSL-6106]
-
Session Key Auto Refresh incorrectly appears as disabled on a cluster IP address. (This option cannot be disabled.)
[NSSSL-4427]
-
An incorrect warning message, “Warning: No usable ciphers configured on the SSL vserver/service,” appears if you try to change the SSL protocol or cipher in the SSL profile.
[NSSSL-4001]
-
An expired session ticket is honored on a non-CCO node and on an HA node after an HA failover.
[NSSSL-3184, NSSSL-1379, NSSSL-1394]
System
-
High RTT is observed for a TCP connection if the following condition is met:
- a high maximum congestion window (>4 MB) is set
- TCP NILE algorithm is enabled
For a NetScaler appliance to use the NILE algorithm for congestion control, the conditions must exceed the slow start threshold, which is coupled with the maximum congestion window
So, until the maximum configured congestion window is reached, the NetScaler continues to accept data and ends up with high RTT.
[NSHELP-31548]
-
The MAX_CONCURRENT_STREAMS value is set to 100 by default if the appliance does not receive the max_concurrent_stream settings frame from the client.
[NSHELP-21240]
-
The mptcp_cur_session_without_subflow counters incorrectly decrement to a negative value instead of zero.
[NSHELP-10972]
-
In rare case scenarios, the streams that were created before HTTP/2 WebSocket stream was created might get terminated when the WebSocket’s server-side connection closes.
This issue occurs because the NetScaler appliance does not support connection multiplexing for HTTP/2 WebSocket.
Workaround: Disable connection multiplexing for the related HTTP2 profile by using the following command:
set httpProfile <name> [-conMultiplex ( ENABLED | DISABLED )]
[NSBASE-17449]
-
In a cluster deployment, if you run “force cluster sync” command on a non-CCO node, the ns.log file contains duplicate log entries.
[NSBASE-16304, NSGI-1293]
-
When you install NetScaler ADM on a Kubernetes cluster, it does not work as expected because the required processes might not come up.
Workaround : Reboot the Management pod.
[NSBASE-15556]
-
Client IP and Server IP are inverted in HDX Insight SkipFlow record when LogStream transport type is configured for Insight.
[NSBASE-8506]
User Interface
-
In NetScaler GUI, the “Help” link present under the “Dashboard” tab is broken.
[NSUI-14752]
-
Create/Monitor CloudBridge Connector wizard might become unresponsive or fails to configure a cloudbridge connector.
Workaround: Configure cloudbridge connectors by adding IPSec profiles, IP tunnels, and PBR rules by using the NetScaler GUI or CLI.
[NSUI-13024]
-
If you create an ECDSA key by using the GUI, the type of curve is not displayed.
[NSUI-6838]
-
In a high availability setup, VPN user sessions get disconnected if the following condition is met:
- If two or more successive manual HA failover operations are performed when HA synchronization is in progress.
Workaround: Perform successive manual HA failover only after the HA synchronization is completed (Both the nodes are in Sync success state).
[NSHELP-25598]
-
If you (system administrator) perform all the following steps on a NetScaler appliance, the system users might fail to log in to the downgraded NetScaler appliance.
- Upgrade the NetScaler appliance to one of the builds
- 13.0 52.24 build
- 12.1 57.18 build
- 11.1 65.10 build
- Add a system user, or change the password of an existing system user, and save the configuration, and
- Downgrade the NetScaler appliance to any older build.
To display the list of these system users by using the CLI:
At the command prompt, type:query ns config -changedpassword [-config <full path of the configuration file (ns.conf)>]
Workaround: To fix this issue, use one of the following independent options:
- If the NetScaler appliance is not yet downgraded (step 3 in above mentioned steps), downgrade the NetScaler appliance using a previously backed up configuration file (ns.conf) of the same release build.
- Any system administrator whose password was not changed on the upgraded build, can log in to the downgraded build, and update the passwords for other system users.
- If none of the above options work, a system administrator can reset the system user passwords.
For more information, see /en-us/citrix-adc/13/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-reset-default-amin-pass-tsk.html.
[NSCONFIG-3188]
- Upgrade the NetScaler appliance to one of the builds
Share
Share
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select Do Not Agree to exit.