-
Install and configure the NetScaler Gateway appliance
-
Maintain and monitor NetScaler Gateway systems
-
SSL support on NetScaler Gateway
-
Enable TLS 1.3 protocol on NetScaler Gateway
-
-
Configure DTLS VPN virtual server using SSL VPN virtual server
-
Integrate NetScaler Gateway with Citrix products
-
Integrate NetScaler Gateway with Citrix Virtual Apps and Desktops
-
Configure settings for your Citrix Endpoint Management Environment
-
Configure load balancing servers for Citrix Endpoint Management
-
Configure load balancing servers for Microsoft Exchange with Email Security Filtering
-
Configure Citrix Endpoint Management NetScaler Connector (XNC) ActiveSync Filtering
-
Allow Access from mobile devices with Citrix Mobile Productivity Apps
-
Configure domain and security token authentication for Citrix Endpoint Management
-
Configure client certificate or client certificate and domain authentication
-
-
NetScaler Gateway Enabled PCoIP Proxy Support for VMware Horizon View
-
Proxy Auto Configuration for Outbound Proxy support for NetScaler Gateway
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Enable TLS 1.3 protocol on NetScaler Gateway
NetScaler Gateway enhances its security and performance capabilities by introducing support for the TLS 1.3 protocol, the latest security standard. Starting from release 14.1 build 43.50, you can configure NetScaler Gateway to use TLS 1.3 to secure the connection between NetScaler Gateway and VDA.
Note:
If the TLS 1.3 protocol fails, NetScaler Gateway attempts to use the next highest available version.
Enable TLS 1.3 protocol using GUI
Note:
Use the default back-end profile (ns_default_ssl_profile_backend) to enable TLS 1.3 on the back-end connections. Use the default front-end profile (ns_default_ssl_profile_frontend) or a custom profile to enable TLS 1.3 on the front-end connections. For more information, Set SSL profile parameters by using the GUI.
The default front-end and default back-end SSL profiles contain all the default ciphers and ECC curves, in addition to the settings that were part of the old profiles. The Enable Default Profile operation automatically binds the default front-end profile to all front-end entities, and the default back-end profile to all back-end entities. You can modify a default profile to suit your deployment. You can also create custom profiles and bind them to SSL entities. Before enabling the default profile, refer to Enable the default profile to understand the implications of this action.
-
To enable the default profile, navigate to Traffic Management > SSL > Settings > Change advanced SSL settings, select Enable Default Profile, and click OK.
-
Navigate to System > Profiles > SSL Profile.
-
Select ns_default_ssl_profile_backend and click the edit icon to edit the back-end profile.
-
Under Protocol, select TLSv13 and click OK.
-
To enable TLS 1.3 protocol for front-end connections, either modify the default profile ns_default_ssl_profile_frontend or edit an existing SSL profile.
-
Under Protocol, select TLSv13 and click OK.
Enable TLS 1.3 protocol using CLI
To enable TLS 1.3 protocol on the default front-end and back-end profiles, at the command prompt, type:
set ssl parameter -defaultProfile enaBLED
set ssl profile ns_default_ssl_profile_frontend -tls13 enaBLED
set ssl profile ns_default_ssl_profile_backend -tls13 enaBLED
To create a new front-end profile and enable the TLS 1.3 protocol, at the command prompt, type:
add ssl profile <new SSL profile> -sslProfileType FrontEnd
set ssl profile <name> -tls13 ENABLED
Compatibility matrix
The following table provides a compatibility matrix for VDA platforms that support TLS 1.3 and TLS 1.3 with HDX Insight, ensuring secure end-to-end connections between NetScaler Gateway and VDA.
Supported platforms | TLS 1.3 | TLS 1.3 with HDX Insight |
---|---|---|
Windows | 2407 and later | 2503 and later |
Linux | 2407 and later | 2503 and later |
Limitations
-
In NetScaler Gateway release 13.1 and earlier, TLS 1.3 protocol is not supported for back-end connections from NetScaler Gateway to VDA.
-
TLS 1.3 protocol is supported only on Windows and Linux platforms of VDA.
-
TLS 1.3 is not supported on a NetScaler FIPS appliance.
-
TLS 1.3 handshake supports only RSA certificates with 1024-bit and larger keys.
Troubleshooting TLS 1.3 related issues
For back-end connections, check the status of TLS 1.3 encryption using the following command:
ctxsession -v
For front-end connections, check the status of TLS 1.3 encryption in the Citrix Workspace app. Navigate to Citrix Workspace Connection Center -> Client Connection Status and check the encryption status.
References
For more information on the TLS 1.3 protocol, see Support for TLS 1.3 protocol.
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.