-
Getting Started with NetScaler
-
Deploy a NetScaler VPX instance
-
Optimize NetScaler VPX performance on VMware ESX, Linux KVM, and Citrix Hypervisors
-
Apply NetScaler VPX configurations at the first boot of the NetScaler appliance in cloud
-
Configure simultaneous multithreading for NetScaler VPX on public clouds
-
Install a NetScaler VPX instance on Microsoft Hyper-V servers
-
Install a NetScaler VPX instance on Linux-KVM platform
-
Prerequisites for installing NetScaler VPX virtual appliances on Linux-KVM platform
-
Provisioning the NetScaler virtual appliance by using OpenStack
-
Provisioning the NetScaler virtual appliance by using the Virtual Machine Manager
-
Configuring NetScaler virtual appliances to use SR-IOV network interface
-
Configure a NetScaler VPX on KVM hypervisor to use Intel QAT for SSL acceleration in SR-IOV mode
-
Configuring NetScaler virtual appliances to use PCI Passthrough network interface
-
Provisioning the NetScaler virtual appliance by using the virsh Program
-
Provisioning the NetScaler virtual appliance with SR-IOV on OpenStack
-
Configuring a NetScaler VPX instance on KVM to use OVS DPDK-Based host interfaces
-
-
Deploy a NetScaler VPX instance on AWS
-
Deploy a VPX high-availability pair with elastic IP addresses across different AWS zones
-
Deploy a VPX high-availability pair with private IP addresses across different AWS zones
-
Protect AWS API Gateway using the NetScaler Web Application Firewall
-
Configure a NetScaler VPX instance to use SR-IOV network interface
-
Configure a NetScaler VPX instance to use Enhanced Networking with AWS ENA
-
Deploy a NetScaler VPX instance on Microsoft Azure
-
Network architecture for NetScaler VPX instances on Microsoft Azure
-
Configure multiple IP addresses for a NetScaler VPX standalone instance
-
Configure a high-availability setup with multiple IP addresses and NICs
-
Configure a high-availability setup with multiple IP addresses and NICs by using PowerShell commands
-
Deploy a NetScaler high-availability pair on Azure with ALB in the floating IP-disabled mode
-
Configure a NetScaler VPX instance to use Azure accelerated networking
-
Configure HA-INC nodes by using the NetScaler high availability template with Azure ILB
-
Configure a high-availability setup with Azure external and internal load balancers simultaneously
-
Configure a NetScaler VPX standalone instance on Azure VMware solution
-
Configure a NetScaler VPX high availability setup on Azure VMware solution
-
Configure address pools (IIP) for a NetScaler Gateway appliance
-
Deploy a NetScaler VPX instance on Google Cloud Platform
-
Deploy a VPX high-availability pair on Google Cloud Platform
-
Deploy a VPX high-availability pair with external static IP address on Google Cloud Platform
-
Deploy a single NIC VPX high-availability pair with private IP address on Google Cloud Platform
-
Deploy a VPX high-availability pair with private IP addresses on Google Cloud Platform
-
Install a NetScaler VPX instance on Google Cloud VMware Engine
-
-
Data governance
-
Solutions for Telecom Service Providers
-
Load Balance Control-Plane Traffic that is based on Diameter, SIP, and SMPP Protocols
-
Provide Subscriber Load Distribution Using GSLB Across Core-Networks of a Telecom Service Provider
-
Authentication, authorization, and auditing application traffic
-
Basic components of authentication, authorization, and auditing configuration
-
Web Application Firewall protection for VPN virtual servers and authentication virtual servers
-
On-premises NetScaler Gateway as an identity provider to Citrix Cloud
-
Authentication, authorization, and auditing configuration for commonly used protocols
-
Troubleshoot authentication and authorization related issues
-
-
-
-
-
-
Configure DNS resource records
-
Configure NetScaler as a non-validating security aware stub-resolver
-
Jumbo frames support for DNS to handle responses of large sizes
-
Caching of EDNS0 client subnet data when the NetScaler appliance is in proxy mode
-
Use case - configure the automatic DNSSEC key management feature
-
Use Case - configure the automatic DNSSEC key management on GSLB deployment
-
-
-
Persistence and persistent connections
-
Advanced load balancing settings
-
Gradually stepping up the load on a new service with virtual server–level slow start
-
Protect applications on protected servers against traffic surges
-
Retrieve location details from user IP address using geolocation database
-
Use source IP address of the client when connecting to the server
-
Use client source IP address for backend communication in a v4-v6 load balancing configuration
-
Set a limit on number of requests per connection to the server
-
Configure automatic state transition based on percentage health of bound services
-
-
Use case 2: Configure rule based persistence based on a name-value pair in a TCP byte stream
-
Use case 3: Configure load balancing in direct server return mode
-
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field
-
Use case 7: Configure load balancing in DSR mode by using IP Over IP
-
Use case 10: Load balancing of intrusion detection system servers
-
Use case 11: Isolating network traffic using listen policies
-
Use case 12: Configure Citrix Virtual Desktops for load balancing
-
Use case 13: Configure Citrix Virtual Apps and Desktops for load balancing
-
Use case 14: ShareFile wizard for load balancing Citrix ShareFile
-
Use case 15: Configure layer 4 load balancing on the NetScaler appliance
-
-
-
-
-
Authentication and authorization for System Users
-
-
-
Configuring a CloudBridge Connector Tunnel between two Datacenters
-
Configuring CloudBridge Connector between Datacenter and AWS Cloud
-
Configuring a CloudBridge Connector Tunnel Between a Datacenter and Azure Cloud
-
Configuring CloudBridge Connector Tunnel between Datacenter and SoftLayer Enterprise Cloud
-
Configuring a CloudBridge Connector Tunnel Between a NetScaler Appliance and Cisco IOS Device
-
CloudBridge Connector Tunnel Diagnostics and Troubleshooting
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Data governance
What is Console Advisory Connect?
Console Advisory Connect is a feature to enable seamless onboarding of NetScaler MPX, SDX, and VPX instances, and NetScaler Gateway appliances onto NetScaler Console service. This feature lets the NetScaler instance or NetScaler Gateway appliance automatically, securely connect with NetScaler Console service, and send system, usage, and telemetry data to it. Based on this data, you get insights and recommendations for your NetScaler infrastructure on NetScaler Console service.
By using the Console Advisory Connect feature and onboarding your NetScaler instances or NetScaler Gateway appliances to NetScaler Console service. You can also manage all your NetScaler and NetScaler Gateway assets whether on-premises or in the cloud. Also, you benefit from access to a rich set of visibility features that help in quick identification of performance issues, high resource usage, critical errors, and so on. NetScaler Console service provides a wide range of capabilities for your NetScaler instances and applications. For more information on NetScaler Console service, see NetScaler Application Delivery Management Service
Important
- NetScaler Gateway appliance also supports the Console Advisory Connect feature. For better ease, the NetScaler Gateway appliance isn’t called explicitly in the consecutive sections.
What is NetScaler Console service?
NetScaler Console service is a cloud-based solution that helps you manage, monitor, orchestrate, automate, and troubleshoot your NetScaler instances. It also provides you analytical insights and curated machine learning based recommendations about NetScaler instances and about application health, performance, and security. For more information, see NetScaler Console service Overview
How the Console Advisory Connect is enabled?
Console Advisory Connect is enabled by default, after you install or upgrade NetScaler or Gateway to release 13.0 build 61.xx and above.
What data is captured using Console Advisory Connect?
The following details are captured using Console Advisory Connect:
-
NetScaler details
- Serial ID
- Encoded Serial ID
- Host ID
- UUID
- Management IP address
- Host name
- Version
- Build type
- Build
- License type
- Hypervisor
- Deployment type(standalone/HA)
- Platform type
- Platform description
- System ID
- Modes enabled on ADC
- Features enabled on ADC
-
License Information
- Features licensed on NetScaler
- License number
-
Key usage metrics
- System date time
- CPU usage percentage
- Management CPU percentage
- Throughput
- SSL new sessions
- SSL encryption throughput
- SSL decryption throughput
- System Uptime
-
Configuration
- ns.conf file
Note
Before the Console Advisory Connect sends the
ns.conf
file from NetScaler appliance to the NetScaler Console service, it anonymizes the encrypted or hashed passwords. The Console Advisory Connect checks for-encrypted
or-passcrypt
parameters and replaces the associated encrypted or hashed value withXXXX
. The Console Advisory Connect then encodes and compresses thens.conf
file, and sends it to the NetScaler Console service endpoint. -
Critical error details
- Hard disk failures
- SSL card failures
- Power Supply Unit (PSU) failures
- Flash drive failure
- Warm reboot
- Sustained memory usage above 90% or a memory leak
- Sustained rate limit drops
-
Usage of NITRO automation tools
- Usage of automation tools such as Ansible, Terraform, or NITRO SDKs.
-
Diagnostics details
Note:
The ADM diagnostic tool uses the following diagnostic details. For more information, see the Diagnostic tool topic in NetScaler Console.
- ADC CLI status
- ADC DNS status
- network connection status to ADM endpoint “adm.cloud.com”
- network connection status to ADM endpoint “agent.adm.cloud.com”
- network connection status to ADM trust service “trust.citrixnetworkapi.net”
- network connection status to ADM download site “download.citrixnetworkapi.net”
How the data is used?
By collecting the data, NetScaler can provide you with timely and in-depth insights about your NetScaler installations, which include the following:
- Key metrics. Details of key metrics about CPU, memory, throughput, SSL throughput, and highlight anomalous behavior on NetScaler instances.
- Critical errors. Any critical errors that might have occurred on your NetScaler instances.
- Deployment advisory. Identify NetScaler instances that are deployed in standalone mode but have high throughput and are vulnerable to a single point of failure.
- Diagnostic tool. When you onboard an ADC instance onto NetScaler Console, you might experience a few issues that prevent the ADC instance from successfully onboarding. To troubleshoot the issues, you can either manually use the diagnostic tool or see the diagnostic information in the ADM GUI. For more information, see Diagnostic tool.
How long the collected data is kept?
Any data collected is kept for no longer than 13 months.
If you decide to terminate the use of the service by disabling the Console Advisory Connect feature from the NetScaler, any previously collected data is deleted after a period of 30 days.
Where the data is stored and how secure is it?
All data collected by Console Advisory Connect is stored in one of the three regions–United States, European Union, and Australia and New Zealand (ANZ). For more information, see Geographical Considerations.
The data is stored securely with strict tenant isolation at the database layer.
How to disable Console Advisory Connect?
If you want to disable data collection through Console Advisory Connect, see How to enable and disable Console Advisory Connect.
Share
Share
In this article
- What is Console Advisory Connect?
- What is NetScaler Console service?
- How the Console Advisory Connect is enabled?
- What data is captured using Console Advisory Connect?
- How the data is used?
- How long the collected data is kept?
- Where the data is stored and how secure is it?
- How to disable Console Advisory Connect?
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.