SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Downloaden Sie, um offline zu lesen
© 2014 Citrix. Confidential.1
© 2014 Citrix. Confidential.2
•  As	
  a	
  tradi)on,	
  every	
  Synergy,	
  we	
  highlight	
  the	
  coolest	
  NetScaler	
  features	
  in	
  this	
  session.	
  My	
  name	
  is	
  
Anoop	
  Reddy.	
  Along	
  with	
  me	
  I	
  have	
  Tushar	
  Kanekar,	
  Anoop	
  Agarwal,	
  Minoo	
  Gupta	
  and	
  Sanjay	
  Gupta.	
  
	
  
•  This	
  year	
  we	
  have	
  really	
  cool	
  things	
  to	
  discuss.	
  Given	
  the	
  overall	
  Citrix	
  focus	
  on	
  Mobile,	
  we	
  will	
  talk	
  
about	
  the	
  new	
  NetScaler	
  features	
  that	
  op)mize	
  mobile	
  access	
  and	
  Mobile	
  Security.	
  We	
  will	
  then	
  talk	
  
about	
  our	
  innova)ons	
  for	
  the	
  Next	
  Gen	
  Data	
  Centers.	
  	
  
	
  
•  We	
  will	
  finish	
  off	
  with	
  some	
  of	
  the	
  exci)ng	
  User	
  Experience	
  and	
  automa)on	
  enhancements	
  
•  We	
  have	
  a	
  lot	
  of	
  stuff	
  to	
  cover.	
  We	
  will	
  have	
  5	
  mins	
  for	
  Q&A	
  at	
  the	
  very	
  end.	
  
© 2014 Citrix. Confidential.3
•  Please	
  tweet/blog	
  about	
  this	
  session	
  with	
  hashtags	
  SYN207	
  and	
  citrixsynergy.	
  For	
  those	
  of	
  you	
  who	
  
tweet/blog,	
  we	
  have	
  giveaways	
  at	
  the	
  end	
  of	
  this	
  session.	
  
© 2014 Citrix. Confidential.4
Mobile	
  is	
  different.	
  	
  
	
  
Mobile	
  networks	
  are	
  characterized	
  by	
  high	
  latency	
  lossy	
  pipes,	
  last	
  mile	
  bandwidth/capacity/connec)on	
  
constraints,	
  connec)on	
  breaks	
  when	
  switching	
  between	
  cell	
  towers	
  and	
  even	
  device	
  contraints	
  -­‐	
  baYery	
  
life	
  is	
  important	
  and	
  the	
  viewport	
  is	
  smaller.	
  
	
  
This	
  year	
  we	
  introduce	
  a	
  bunch	
  of	
  NetScaler	
  op)miza)on	
  features	
  specifically	
  geared	
  towards	
  op)mizing	
  
applica)on	
  delivery	
  in	
  the	
  mobile	
  context	
  not	
  just	
  at	
  the	
  tcp/hYp	
  level	
  but	
  also	
  by	
  moving	
  deeper	
  into	
  
the	
  applica)on	
  and	
  op)mizing	
  html	
  content.	
  
© 2014 Citrix. Confidential.5
•  Let’s	
  just	
  cut	
  to	
  the	
  chase	
  and	
  first	
  see	
  a	
  demo.	
  	
  On	
  the	
  le]	
  hand	
  side	
  you	
  will	
  see	
  the	
  details	
  of	
  directly	
  
accessing	
  an	
  applica)on	
  while	
  on	
  the	
  right	
  hand	
  side	
  with	
  NetScaler	
  in	
  the	
  path	
  with	
  our	
  Front	
  End	
  
Op)miza)ons	
  turned	
  on.	
  
•  You	
  will	
  see	
  a	
  100%	
  improvement	
  in	
  page	
  load	
  )me,	
  with	
  a	
  40%	
  reduc)on	
  in	
  the	
  number	
  of	
  bytes	
  
downloaded	
  and	
  a	
  30%	
  reduc)on	
  in	
  the	
  number	
  of	
  requests	
  made	
  to	
  the	
  server.	
  	
  
5
© 2014 Citrix. Confidential.6
•  Now,	
  let’s	
  analyze	
  the	
  top	
  1000	
  sites	
  as	
  reported	
  by	
  hYparchive.org	
  /*which	
  tracks	
  web	
  trends,	
  stats	
  
and	
  performance	
  */	
  and	
  see	
  what	
  kind	
  of	
  op)miza)ons	
  are	
  possible.	
  As	
  you	
  can	
  see,	
  javascript	
  and	
  
images	
  dominate	
  the	
  content	
  in	
  a	
  scenario	
  where	
  individual	
  pages	
  are	
  becoming	
  heavier.	
  So,	
  any	
  
op)miza)ons	
  for	
  javascript	
  and	
  images	
  can	
  be	
  very	
  effec)ve.	
  Only	
  25%	
  of	
  the	
  images	
  are	
  op)mized	
  
and	
  more	
  than	
  50%	
  of	
  the	
  content	
  doesn’t	
  leverage	
  browser	
  cache.	
  
•  So,	
  there	
  is	
  a	
  lot	
  of	
  scope	
  for	
  op)miza)on.	
  
6
© 2014 Citrix. Confidential.7
•  Now,	
  let’s	
  see	
  how	
  we	
  achieve	
  these	
  amazing	
  results.	
  Most	
  of	
  the	
  techniques	
  for	
  Front	
  End	
  
Op)miza)ons	
  are	
  fairly	
  well	
  known	
  that	
  either	
  require	
  changes	
  in	
  your	
  web	
  server	
  config,	
  applica)on	
  
code	
  or	
  get	
  the	
  app	
  server	
  to	
  talk	
  to	
  new	
  processes	
  and/or	
  setup	
  extra	
  proxies	
  in	
  the	
  path.	
  Instead	
  you	
  
can	
  achieve	
  all	
  of	
  these	
  op)miza)ons	
  by	
  applying	
  a	
  simple	
  config	
  on	
  NetScaler.	
  
•  A	
  typical	
  web	
  page	
  access	
  can	
  be	
  broken	
  down	
  into	
  ini)al	
  connec)on	
  setup	
  stage,	
  the	
  page	
  content,	
  
embedded	
  object	
  downloads	
  followed	
  by	
  rendering	
  the	
  page.	
  We	
  op)mize	
  each	
  of	
  these	
  stages.	
  
	
  
•  Before	
  we	
  go	
  into	
  the	
  details	
  I	
  would	
  like	
  to	
  emphasize	
  that	
  it	
  is	
  important	
  to	
  not	
  be	
  very	
  aggressive	
  
with	
  op)miza)ons	
  that	
  might	
  break	
  apps/browser	
  compa)libitliy	
  etc.	
  We	
  have	
  chosen	
  middle	
  path	
  by	
  
op)ng	
  for	
  the	
  least	
  intrusive	
  features	
  that	
  give	
  us	
  the	
  maximum	
  performance	
  boost.	
  
7
© 2014 Citrix. Confidential.8
•  Browsers	
  enforce	
  a	
  limit	
  on	
  how	
  many	
  connec)ons	
  can	
  be	
  open	
  for	
  a	
  single	
  domain.	
  To	
  improve	
  
parallel	
  downloads	
  we	
  split	
  the	
  requests	
  across	
  mul)ple	
  domains	
  and	
  also	
  insert	
  html	
  direc)ves	
  to	
  
prefetch	
  domain	
  dns.	
  
8
© 2014 Citrix. Confidential.9
•  We	
  improve	
  browser	
  content	
  caching	
  (basically	
  avoid	
  unnecessary	
  304	
  not	
  modified)	
  by	
  1)	
  versioning	
  
image	
  urls	
  instead	
  of	
  ar)ficial	
  and	
  inaccurate	
  cache	
  )meouts	
  2)	
  	
  we	
  can	
  insert	
  etags	
  to	
  signal	
  content	
  
changes	
  and	
  leverage	
  NetScaler	
  compression.	
  
9
© 2014 Citrix. Confidential.10
•  A	
  lot	
  of	
  op)miza)ons	
  are	
  possible	
  in	
  embedded	
  object	
  sec)ons.	
  We	
  do	
  javascript/css	
  minifica)on	
  to	
  
compress	
  the	
  objects,	
  we	
  can	
  inline	
  smaller	
  css/javascript/images	
  and	
  combine	
  css	
  to	
  reduce	
  #	
  of	
  
requests.	
  
10
© 2014 Citrix. Confidential.11
•  We	
  improve	
  page	
  rendering	
  by	
  defering	
  javascript	
  loading	
  and	
  moving	
  objects	
  such	
  as	
  css	
  that	
  affect	
  
the	
  visible	
  por)on	
  and	
  parallel	
  downloads	
  to	
  the	
  top.	
  We	
  also	
  only	
  load	
  images	
  in	
  the	
  current	
  viewport	
  
–	
  this	
  is	
  especially	
  significant	
  for	
  mobile	
  devices	
  where	
  content	
  not	
  in	
  the	
  current	
  view	
  doesn’t	
  need	
  to	
  
be	
  loaded.	
  
11
© 2014 Citrix. Confidential.12
•  To	
  summarize,	
  we	
  op)mize	
  at	
  every	
  stage	
  of	
  the	
  page	
  load	
  process.	
  
© 2014 Citrix. Confidential.13
•  Now,	
  going	
  down	
  the	
  stack	
  to	
  op)mize	
  at	
  the	
  lower	
  layers	
  taking	
  into	
  account	
  mobile	
  network	
  
characteris)cs.	
  In	
  the	
  past	
  we	
  have	
  talked	
  about	
  NetScaler	
  as	
  a	
  speedy	
  gateway.	
  This	
  is	
  extremely	
  
relevant	
  in	
  mobile	
  networks	
  for	
  performance.	
  We	
  have	
  also	
  talked	
  about	
  MPTCP	
  support	
  in	
  NetScaler	
  
that	
  can	
  leverage	
  mul)ple	
  available	
  networks	
  parallelly	
  while	
  also	
  smoothening	
  out	
  cell	
  tower	
  to	
  wifi	
  
transi)ons.	
  
•  Packet	
  losses	
  in	
  the	
  mobile	
  context	
  are	
  not	
  just	
  because	
  of	
  conges)on	
  but	
  due	
  to	
  losses	
  in	
  the	
  medium	
  
and	
  also	
  due	
  to	
  transi)ons	
  between	
  cell	
  towers.	
  
•  This	
  year,	
  we	
  announce	
  Cubi/Bic	
  which	
  are	
  	
  mobile	
  specific	
  tcp	
  conges)on	
  and	
  flow	
  control	
  protocols	
  
that	
  take	
  into	
  account	
  such	
  characteris)cs	
  and	
  op)mize	
  delivery	
  in	
  mobile	
  networks.	
  
© 2014 Citrix. Confidential.14
•  NetScaler	
  can	
  now	
  op)mize	
  at	
  a	
  much	
  deeper	
  level	
  in	
  the	
  html	
  content	
  for	
  mobile	
  networks.	
  Most	
  
important	
  to	
  note	
  -­‐	
  	
  	
  we	
  chose	
  the	
  least	
  intrusive	
  features	
  that	
  do	
  not	
  break	
  browser	
  compa)bility	
  or	
  
apps	
  while	
  giving	
  us	
  the	
  maximum	
  op)miza)on.	
  
•  We	
  con)nued	
  to	
  op)mize	
  TCP	
  for	
  mobile	
  by	
  introducing	
  support	
  for	
  mobile	
  specific	
  conges)on/flow	
  
control	
  TCP	
  protocols	
  such	
  as	
  Cubic/Bic.	
  
•  If	
  your	
  apps	
  are	
  used	
  on	
  mobile	
  devices	
  and	
  delivered	
  through	
  mobile	
  networks	
  –	
  you	
  have	
  to	
  try	
  the	
  
latest	
  version	
  of	
  NetScaler!!	
  
•  With	
  that	
  I	
  hand	
  the	
  presenta)on	
  over	
  to	
  Tushar	
  Kanekar.	
  
© 2014 Citrix. Confidential.15
© 2014 Citrix. Confidential.16
•  NetScaler	
  –	
  industry	
  leader	
  in	
  secure,	
  op)mized	
  and	
  reliable	
  delivery	
  of	
  web-­‐apps	
  and	
  is	
  also	
  best	
  in	
  
class	
  Mobile-­‐apps.	
  
•  Security imperatives to address –
-  SSL everywhere, you cannot have few pages over SSL and others in clear.
-  Need per App micro-VPN, for isolation and per-app access control, security.
-  Support for 2048bit RSA key, the new guidelines from NIST.
-  Device efficient crypto - to conserve precious battery of handheld device.
-  To top this off, you need protection from the every changing threat landscape –
with Beast, Crime and latest Heartbleed to name a few.
Given this, you need a very robust delivery mechanism to protect your apps
and your infrastructure – that’s where NetScaler ADC device come to the
rescue.
How NetScaler helps to meet the imperatives?	
  
	
  
© 2014 Citrix. Confidential.17
•  NetScaler+XenMobile deployment, note NS is in DMZ providing all the
protection.
© 2014 Citrix. Confidential.18
•  Security:
- NetScaler provides protection from various L2-7 attacks, including but not limited
to – Syn Attack, DDoS, HTTP DoS like Slowloris, Slowpost.
- SSL – hardened SSL/TLS engine with HW acceleration to do SSL termination
and offload. Not affected by the latest openssl Heartbleed bug
-  Support for FIPS and new ciphers like AES-GCM/SHA-2, part of NIST’s Suite-B
list of algorithms.
- Ext. HSM – we are working to integrate NetScaler with external HSM vendors
like Thales. This will enable a non-FIPS device (VPX, MPX, SDX instances) to
utilize the security of a FIPS 140-2 Level-2/3 certified HSM device.	
  
- ECC cipher suite, this provides same level of security as RSA, but at lower key
size. It can be efficiently done on low-powered handhelds and thus helps to
conserve precious battery life. To give an example 224 bit ECC == 2048bit RSA
- Strong access control – a critical piece of mobile app with single sign-on and
multi factor authentication including client/device level certificate checks.
- Various protections for your app and backend servers – Application Firewall for
protecting against sql injection and XSS attacks. ActiveSync filtering to prevent 	
  
© 2014 Citrix. Confidential.19
•  ActiveSync Filtering – NS does a call out to XNC server, asking for the managed
status of the incoming device, based on the ActiveSync ID present in the header.
XNC provides a managed / unmanaged response, and NS acts on it.	
  
© 2014 Citrix. Confidential.20
•  Reliable	
  =	
  capacity	
  to	
  grow.	
  
•  We talked about security features, but what the use if you cannot reliably deliver
your apps? NetScaler provides the capacity to handle different work-loads.
•  Remember the per App micro-VPN, each of this will open a isolated SSL
connection, now imagine each handheld has 3-4 apps and 1000s of such
handhelds connecting to an enterprise at any given time.
•  NetScaler has best in class TPS and throughput numbers. The numbers quoted
here are for the 22120 MPX system.
•  Note: TPS here, stands for transactions per sec, which are new handshakes per sec without
any reuse thrown in.
•  HA support to protect against system failure and GSLB for site-failures.
© 2014 Citrix. Confidential.21
•  Perfect forward Secrecy: In this new snowden era, many companies are
investing in PFS to secure user-data. PFS provides the security of protecting old/
existing data even if the private-key is compromised. You need ECDHE or EDH
to achieve this and not RSA.
•  Support for RFC 5746 for secure renegotiation – to mitigate different MITM
attacks.
•  DTLS – Datagram TLS to secure your application over UDP. For example, Voice,
Video.
© 2014 Citrix. Confidential.22
•  NetScaler Application Firewall (AppFW) wins Best of Web Application Firewalls
2013 (By the Essential Guide – Security Readers’ Choice Awards) This award is
based on vote from the Security Readers on what they think is the top Web
application firewalls in 2013: Standalone WAFs and products that are part of
application acceleration/delivery systems. Criteria are based on essential
security features and at same time ease of use, configuration and administration.
•  Link:	
  hYp://searchsecurity.techtarget.com/feature/Best-­‐of-­‐Web-­‐applica)on-­‐firewalls-­‐2013	
  
© 2014 Citrix. Confidential.23
© 2014 Citrix. Confidential.24
•  Light	
  weight	
  mul)-­‐tenancy	
  solu)on	
  
•  Each	
  tenant	
  gets	
  the	
  experience	
  of	
  a	
  logical	
  NetScaler	
  while	
  actually	
  sharing	
  the	
  same	
  instance.	
  
	
  
© 2014 Citrix. Confidential.25
•  To	
  appreciate	
  Par))ons,	
  let	
  us	
  walk	
  through	
  the	
  NetScaler	
  architecture	
  evolu)on	
  
•  First	
  we	
  had	
  what	
  today	
  we	
  call	
  Classic	
  Architecture	
  
•  Then	
  with	
  9.2	
  we	
  introduced	
  nCore.	
  
•  With	
  10.0,	
  we	
  introduced	
  cluster	
  
•  Now	
  in	
  2014,	
  we	
  are	
  planning	
  to	
  introduce	
  Par))ons.	
  
© 2014 Citrix. Confidential.26
•  This	
  is	
  how	
  the	
  user	
  work	
  flow	
  will	
  look	
  like	
  
•  First	
  System	
  admin	
  will	
  create	
  par))ons	
  
•  Expecta)on	
  will	
  be	
  that	
  the	
  system	
  will	
  enforce	
  the	
  set	
  up	
  limits,	
  while	
  allowing	
  sharing	
  of	
  the	
  
underlying	
  resources	
  
•  Then	
  the	
  Par))on	
  admin	
  will	
  create	
  work	
  flows	
  within	
  his/her	
  logical	
  netscaler	
  
•  Expecta)on	
  will	
  be	
  that	
  the	
  system	
  will	
  provide	
  sandboxes	
  views	
  for	
  configura)on,	
  monitoring,	
  logs	
  etc	
  
© 2014 Citrix. Confidential.27
•  Default	
  or	
  system	
  admin	
  logs	
  in	
  
© 2014 Citrix. Confidential.28
•  He	
  or	
  she	
  works	
  under	
  default	
  par))on.	
  
•  He	
  creates	
  par))ons.	
  Here	
  for	
  demo,	
  we	
  are	
  crea)ng	
  two	
  par))ons,	
  one	
  called	
  PartUS,	
  and	
  another	
  
PartEMEA	
  
© 2014 Citrix. Confidential.29
•  System	
  admin	
  also	
  creates	
  two	
  users	
  and	
  associates	
  them	
  with	
  the	
  par))ons	
  just	
  created.	
  Namely	
  
UserUS	
  and	
  UserEMEA	
  
© 2014 Citrix. Confidential.30
© 2014 Citrix. Confidential.31
•  Then	
  individual	
  users	
  log	
  in	
  with	
  their	
  creden)als.	
  	
  
© 2014 Citrix. Confidential.32
•  They	
  have	
  their	
  own	
  configura)on	
  screens.	
  	
  They	
  create	
  their	
  own	
  workflows	
  and	
  applica)ons.	
  
•  In	
  this	
  demo,	
  each	
  of	
  our	
  two	
  users	
  create	
  a	
  Load	
  Balancer	
  service,	
  namely	
  LBUS,	
  and	
  LBEMEA	
  
© 2014 Citrix. Confidential.33
•  They	
  can	
  monitor	
  the	
  state	
  of	
  their	
  service	
  in	
  their	
  respec)ve	
  configura)on	
  screens	
  
© 2014 Citrix. Confidential.34
•  They	
  also	
  have	
  their	
  separate	
  dashboards,	
  which	
  shows	
  the	
  state	
  of	
  affairs	
  for	
  that	
  par))on.	
  
•  In	
  this	
  demo,	
  LBUS	
  is	
  handling	
  8	
  req/sec	
  and	
  LBEMEA	
  is	
  handling	
  24	
  req/sec	
  
© 2014 Citrix. Confidential.35
•  Some	
  more	
  details	
  about	
  the	
  feature	
  
•  We	
  collect	
  sta)s)cs	
  per	
  par))on	
  for	
  metering	
  and	
  for	
  burs)ng	
  
•  Limits	
  per	
  par))on	
  are	
  enforced	
  
•  However,	
  transient	
  burs)ng	
  is	
  allowed	
  beyond	
  thresholds	
  
•  This	
  allows	
  for	
  sta)s)cal	
  mul)plexing	
  and	
  oversubscrip)on	
  of	
  capacity,	
  without	
  viola)ng	
  performance	
  
SLA	
  
© 2014 Citrix. Confidential.36
•  So	
  how	
  does	
  Par))ons	
  fit	
  into	
  rest	
  of	
  the	
  porpolio?	
  
•  Par))ons	
  are	
  created	
  within	
  one	
  instance.	
  	
  They	
  can	
  be	
  created	
  on	
  the	
  MPX.	
  They	
  can	
  be	
  created	
  on	
  
VPX	
  instance.	
  
•  They	
  can	
  also	
  be	
  created	
  on	
  each	
  of	
  the	
  SDX	
  instance.	
  In	
  fact	
  this	
  could	
  be	
  a	
  very	
  effec)ve	
  way	
  of	
  
controlling	
  the	
  blast	
  radius.	
  
© 2014 Citrix. Confidential.37
© 2014 Citrix. Confidential.38
© 2014 Citrix. Confidential.39
•  Today’s	
  data	
  centers	
  are	
  big	
  and	
  complex	
  with	
  many	
  opera)onal	
  challenges.	
  Such	
  as	
  one	
  arm	
  mode	
  
deployment,	
  mul)	
  device	
  configura)on,	
  	
  and	
  dynamic	
  service	
  provisioning	
  and	
  management.	
  One	
  arm	
  
mode	
  deployments	
  require	
  rou)ng	
  and	
  service	
  changes	
  to	
  be	
  updated	
  manually	
  on	
  both	
  devices.	
  This	
  
can	
  be	
  error	
  prone,	
  hence	
  causing	
  unplanned	
  and	
  poten)ally	
  costly	
  down)me.	
  
© 2014 Citrix. Confidential.40
•  Cisco	
  Nexus	
  70000	
  provides	
  a	
  new	
  protocol	
  called	
  RISE,	
  Remote	
  Integrated	
  Service	
  Engine.	
  Citrix	
  
NetScaler	
  integrates	
  with	
  Cisco	
  N7K	
  and	
  supports	
  this	
  protocol	
  na)vely.	
  	
  The	
  cross	
  func)onal	
  teams	
  
with	
  Citrix	
  and	
  Cisco	
  have	
  been	
  working	
  very	
  closely	
  to	
  deliver	
  the	
  feature.	
  	
  
•  RISE	
  integrated	
  ADC	
  devices	
  appear	
  as	
  virtual	
  blade	
  on	
  the	
  Cisco	
  N7K	
  switch.	
  
•  The	
  deployment	
  and	
  configura)on	
  of	
  the	
  devices	
  can	
  be	
  made	
  plug	
  and	
  play.	
  	
  The	
  protocol	
  helps	
  
automate	
  changes	
  to	
  service	
  and	
  route	
  across	
  the	
  devices,	
  further	
  op)mizing	
  traffic	
  flows	
  within	
  the	
  
datacenter.	
  	
  
•  NetScaler	
  is	
  the	
  only	
  ADC	
  device	
  which	
  integrates	
  with	
  N7K	
  RISE	
  protocol	
  today.	
  
40
© 2014 Citrix. Confidential.41
•  N7K	
  can	
  discover	
  and	
  auto	
  aYach	
  to	
  devices	
  suppor)ng	
  RISE	
  protocol.	
  NetScaler	
  devices	
  can	
  be	
  
bootstrapped	
  by	
  retrieving	
  their	
  configura)on	
  from	
  N7K	
  via	
  RISE	
  protocol.	
  N7K	
  support	
  direct	
  aYach	
  
and	
  indirect	
  aYach	
  modes	
  for	
  bootstrap.	
  	
  
•  Direct	
  aYach	
  is	
  used	
  for	
  configuring	
  MPX	
  boxes	
  and	
  in-­‐direct	
  aYach	
  mode	
  is	
  used	
  to	
  configure	
  VPXes	
  
running	
  of	
  stock	
  hardware	
  or	
  SDX.	
  
•  N7K	
  and	
  NS	
  both	
  support	
  high	
  availability	
  configura)on	
  such	
  as	
  vPC	
  and	
  HA	
  along	
  with	
  RISE.	
  
© 2014 Citrix. Confidential.42
•  The	
  N7K	
  admin	
  starts	
  by	
  crea)ng	
  a	
  rise	
  service	
  with	
  Netscaler	
  IP,	
  assigning	
  port-­‐channel	
  and	
  
configuring	
  VLANs	
  for	
  the	
  NetScaler	
  to	
  be	
  configured.	
  	
  
•  Auto-­‐discovery	
  allows	
  configura)on	
  on	
  the	
  Nexus	
  7000.	
  	
  It	
  then	
  pushes	
  the	
  seungs	
  to	
  the	
  NetScaler.	
  	
  
•  	
  Simplifies	
  provisioning	
  significantly,	
  by	
  reducing	
  config	
  steps	
  from	
  30	
  to	
  8	
  in	
  some	
  use	
  cases.	
  
42
© 2014 Citrix. Confidential.43
•  RISE	
  allows	
  automa)on	
  of	
  service	
  changes	
  on	
  NetScaler,	
  by	
  propaga)ng	
  the	
  associated	
  routes	
  to	
  N7K	
  
programma)cally.	
  Hence	
  elimina)ng	
  the	
  need	
  for	
  N7K	
  admin	
  to	
  manually	
  add	
  or	
  delete	
  corresponding	
  
routes.	
  
•  This	
  preserves	
  the	
  client	
  IP	
  as	
  well	
  for	
  the	
  traffic	
  flow.	
  
© 2014 Citrix. Confidential.44
•  Auto	
  PBR	
  is	
  needed	
  to	
  eliminate	
  the	
  need	
  for	
  Source-­‐NAT	
  or	
  manual	
  PBR	
  configura)on	
  in	
  an	
  one-­‐arm	
  
mode	
  design	
  
•  APBR	
  feature	
  allows	
  the	
  NS	
  to	
  program	
  policies	
  on	
  the	
  N7k	
  server-­‐facing	
  interfaces	
  to	
  redirect	
  return	
  
traffic	
  to	
  the	
  NS	
  appliance	
  set	
  up	
  in	
  one-­‐arm	
  mode.	
  
•  NS	
  passes	
  IP	
  address,	
  port	
  #	
  ,	
  protocol	
  etc	
  of	
  the	
  real	
  servers	
  on	
  to	
  N7K	
  in	
  an	
  Auto	
  PBR	
  message	
  and	
  a	
  
route	
  map	
  is	
  applied	
  on	
  the	
  N7K	
  interface	
  through	
  which	
  the	
  real	
  server	
  can	
  be	
  best	
  reached.	
  	
  
•  Since	
  it	
  is	
  desirable	
  to	
  change	
  the	
  src	
  ip	
  to	
  VIP	
  for	
  the	
  return	
  traffic,	
  the	
  APBR	
  policies	
  set	
  the	
  nexthop	
  
ip	
  of	
  the	
  traffic	
  reaching	
  the	
  N7K	
  interface	
  to	
  the	
  NS	
  ip	
  without	
  modifying	
  the	
  packet.	
  	
  
•  The	
  NS	
  appliance	
  will	
  then	
  direct	
  the	
  packet	
  to	
  the	
  client	
  by	
  changing	
  the	
  source	
  IP	
  to	
  VIP	
  
•  	
  In	
  case	
  of	
  mul)ple	
  NS	
  connected	
  to	
  N7K	
  ,	
  RISE	
  Manager	
  on	
  N7K	
  will	
  create	
  an	
  ACL	
  for	
  each	
  NS’s	
  next	
  
hop	
  ip	
  and	
  incorporates	
  it	
  into	
  a	
  route	
  map.	
  	
  
44
© 2014 Citrix. Confidential.45
© 2014 Citrix. Confidential.46
•  Significantly	
  simplified	
  deployment	
  as	
  administrators	
  do	
  not	
  need	
  to	
  configure	
  complex	
  VLAN	
  and	
  
route	
  seungs	
  to	
  enable	
  rich	
  availability	
  and	
  rou)ng	
  features.	
  Na)vely	
  integrated	
  with	
  Nexus	
  7000	
  vDC	
  
and	
  vPC	
  architecture.	
  	
  
46
© 2014 Citrix. Confidential.48
© 2014 Citrix. Confidential.49
© 2014 Citrix. Confidential.50
© 2014 Citrix. Confidential.51
© 2014 Citrix. Confidential.52
© 2014 Citrix. Confidential.53
© 2014 Citrix. Confidential.54
© 2014 Citrix. Confidential.55
© 2014 Citrix. Confidential.56
© 2014 Citrix. Confidential.57
© 2014 Citrix. Confidential.59
© 2014 Citrix. Confidential.60
© 2014 Citrix. Confidential.61
© 2014 Citrix. Confidential.62
© 2014 Citrix. Confidential.63
© 2014 Citrix. Confidential.64
© 2014 Citrix. Confidential.65

Weitere ähnliche Inhalte

Was ist angesagt?

VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301Kevin Groat
 
Implementing the Hybrid Data Center
Implementing the Hybrid Data CenterImplementing the Hybrid Data Center
Implementing the Hybrid Data CenterCisco Canada
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWSAmazon Web Services
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowAniekan Akpaffiong
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 VMwareJenn
 
Network Virtualization with VMware NSX
Network Virtualization with VMware NSXNetwork Virtualization with VMware NSX
Network Virtualization with VMware NSXScott Lowe
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerDavid McGeough
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machineCisco Canada
 
Successfully Interconnecting Data Centers
Successfully Interconnecting Data CentersSuccessfully Interconnecting Data Centers
Successfully Interconnecting Data CentersCisco Canada
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesAngel Villar Garea
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaVMUG IT
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data centerCisco Canada
 
The Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXThe Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXScott Lowe
 

Was ist angesagt? (20)

VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack
 
20150311 NSX update 301
20150311 NSX update 30120150311 NSX update 301
20150311 NSX update 301
 
Implementing the Hybrid Data Center
Implementing the Hybrid Data CenterImplementing the Hybrid Data Center
Implementing the Hybrid Data Center
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & How
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
VMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSXVMworld 2014: Introduction to NSX
VMworld 2014: Introduction to NSX
 
Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014 Reston Virtualization Group 9-18-2014
Reston Virtualization Group 9-18-2014
 
Network Virtualization with VMware NSX
Network Virtualization with VMware NSXNetwork Virtualization with VMware NSX
Network Virtualization with VMware NSX
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
Successfully Interconnecting Data Centers
Successfully Interconnecting Data CentersSuccessfully Interconnecting Data Centers
Successfully Interconnecting Data Centers
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
VMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use casesVMware NSX for vSphere - Intro and use cases
VMware NSX for vSphere - Intro and use cases
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
The Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSXThe Future of Cloud Networking is VMware NSX
The Future of Cloud Networking is VMware NSX
 

Andere mochten auch

企業の通信コストを大幅に削減! SD-WANの正体とは?
企業の通信コストを大幅に削減! SD-WANの正体とは?企業の通信コストを大幅に削減! SD-WANの正体とは?
企業の通信コストを大幅に削減! SD-WANの正体とは?Citrix Systems Japan
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011photomatt
 

Andere mochten auch (6)

Lo nuevo en XenServer 5.6
Lo nuevo en XenServer 5.6Lo nuevo en XenServer 5.6
Lo nuevo en XenServer 5.6
 
Citrix Day 2015 Cloud Bridge 7.3 and WSA v10
Citrix Day 2015 Cloud Bridge 7.3 and WSA v10Citrix Day 2015 Cloud Bridge 7.3 and WSA v10
Citrix Day 2015 Cloud Bridge 7.3 and WSA v10
 
NetScaler 11 Update
NetScaler 11 UpdateNetScaler 11 Update
NetScaler 11 Update
 
企業の通信コストを大幅に削減! SD-WANの正体とは?
企業の通信コストを大幅に削減! SD-WANの正体とは?企業の通信コストを大幅に削減! SD-WANの正体とは?
企業の通信コストを大幅に削減! SD-WANの正体とは?
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Ähnlich wie SYN207: Newest and coolest NetScaler features you should be jazzed about

Why I should Model my Network
Why I should Model my NetworkWhy I should Model my Network
Why I should Model my NetworkAPNIC
 
Service-mesh options with Linkerd, Consul, Istio and AWS AppMesh
Service-mesh options with Linkerd, Consul, Istio and AWS AppMeshService-mesh options with Linkerd, Consul, Istio and AWS AppMesh
Service-mesh options with Linkerd, Consul, Istio and AWS AppMeshChristian Posta
 
Navigating the service mesh landscape with Istio, Consul Connect, and Linkerd
Navigating the service mesh landscape with Istio, Consul Connect, and LinkerdNavigating the service mesh landscape with Istio, Consul Connect, and Linkerd
Navigating the service mesh landscape with Istio, Consul Connect, and LinkerdChristian Posta
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
FEVR - Micro Frontend
FEVR - Micro FrontendFEVR - Micro Frontend
FEVR - Micro FrontendMiki Lombardi
 
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlowCloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlowCohesive Networks
 
Micro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMicro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMiki Lombardi
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science PlatformDecision Science Community
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudNETSCOUT
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
Istio as an enabler for migrating to microservices (edition 2022)
Istio as an enabler for migrating to microservices (edition 2022)Istio as an enabler for migrating to microservices (edition 2022)
Istio as an enabler for migrating to microservices (edition 2022)Ahmed Misbah
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
The Future of Serverless
The Future of ServerlessThe Future of Serverless
The Future of ServerlessWSO2
 
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFV
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFVcross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFV
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFVKrishna-Kumar
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Ken Owens
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?NGINX, Inc.
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix
 
Running containers in production, the ING story
Running containers in production, the ING storyRunning containers in production, the ING story
Running containers in production, the ING storyThijs Ebbers
 
Working with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data ArchitecturesWorking with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data ArchitecturesDave McAllister
 
Ahead of the NFV Curve with Truly Scale-out Network Function Cloudification
Ahead of the NFV Curve with Truly Scale-out Network Function CloudificationAhead of the NFV Curve with Truly Scale-out Network Function Cloudification
Ahead of the NFV Curve with Truly Scale-out Network Function CloudificationMellanox Technologies
 

Ähnlich wie SYN207: Newest and coolest NetScaler features you should be jazzed about (20)

Why I should Model my Network
Why I should Model my NetworkWhy I should Model my Network
Why I should Model my Network
 
Service-mesh options with Linkerd, Consul, Istio and AWS AppMesh
Service-mesh options with Linkerd, Consul, Istio and AWS AppMeshService-mesh options with Linkerd, Consul, Istio and AWS AppMesh
Service-mesh options with Linkerd, Consul, Istio and AWS AppMesh
 
Navigating the service mesh landscape with Istio, Consul Connect, and Linkerd
Navigating the service mesh landscape with Istio, Consul Connect, and LinkerdNavigating the service mesh landscape with Istio, Consul Connect, and Linkerd
Navigating the service mesh landscape with Istio, Consul Connect, and Linkerd
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
FEVR - Micro Frontend
FEVR - Micro FrontendFEVR - Micro Frontend
FEVR - Micro Frontend
 
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlowCloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
 
Micro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - PlansoftMicro Front-End & Microservices - Plansoft
Micro Front-End & Microservices - Plansoft
 
Technology insights: Decision Science Platform
Technology insights: Decision Science PlatformTechnology insights: Decision Science Platform
Technology insights: Decision Science Platform
 
A New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the CloudA New Approach to Continuous Monitoring in the Cloud
A New Approach to Continuous Monitoring in the Cloud
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Istio as an enabler for migrating to microservices (edition 2022)
Istio as an enabler for migrating to microservices (edition 2022)Istio as an enabler for migrating to microservices (edition 2022)
Istio as an enabler for migrating to microservices (edition 2022)
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
The Future of Serverless
The Future of ServerlessThe Future of Serverless
The Future of Serverless
 
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFV
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFVcross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFV
cross cloud inter-operability with iPaaS and serverless for Telco cloud SDN/NFV
 
Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!Enabling application portability with the greatest of ease!
Enabling application portability with the greatest of ease!
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects fail
 
Running containers in production, the ING story
Running containers in production, the ING storyRunning containers in production, the ING story
Running containers in production, the ING story
 
Working with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data ArchitecturesWorking with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data Architectures
 
Ahead of the NFV Curve with Truly Scale-out Network Function Cloudification
Ahead of the NFV Curve with Truly Scale-out Network Function CloudificationAhead of the NFV Curve with Truly Scale-out Network Function Cloudification
Ahead of the NFV Curve with Truly Scale-out Network Function Cloudification
 

Mehr von Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

Mehr von Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

SYN207: Newest and coolest NetScaler features you should be jazzed about

  • 1. © 2014 Citrix. Confidential.1
  • 2. © 2014 Citrix. Confidential.2 •  As  a  tradi)on,  every  Synergy,  we  highlight  the  coolest  NetScaler  features  in  this  session.  My  name  is   Anoop  Reddy.  Along  with  me  I  have  Tushar  Kanekar,  Anoop  Agarwal,  Minoo  Gupta  and  Sanjay  Gupta.     •  This  year  we  have  really  cool  things  to  discuss.  Given  the  overall  Citrix  focus  on  Mobile,  we  will  talk   about  the  new  NetScaler  features  that  op)mize  mobile  access  and  Mobile  Security.  We  will  then  talk   about  our  innova)ons  for  the  Next  Gen  Data  Centers.       •  We  will  finish  off  with  some  of  the  exci)ng  User  Experience  and  automa)on  enhancements   •  We  have  a  lot  of  stuff  to  cover.  We  will  have  5  mins  for  Q&A  at  the  very  end.  
  • 3. © 2014 Citrix. Confidential.3 •  Please  tweet/blog  about  this  session  with  hashtags  SYN207  and  citrixsynergy.  For  those  of  you  who   tweet/blog,  we  have  giveaways  at  the  end  of  this  session.  
  • 4. © 2014 Citrix. Confidential.4 Mobile  is  different.       Mobile  networks  are  characterized  by  high  latency  lossy  pipes,  last  mile  bandwidth/capacity/connec)on   constraints,  connec)on  breaks  when  switching  between  cell  towers  and  even  device  contraints  -­‐  baYery   life  is  important  and  the  viewport  is  smaller.     This  year  we  introduce  a  bunch  of  NetScaler  op)miza)on  features  specifically  geared  towards  op)mizing   applica)on  delivery  in  the  mobile  context  not  just  at  the  tcp/hYp  level  but  also  by  moving  deeper  into   the  applica)on  and  op)mizing  html  content.  
  • 5. © 2014 Citrix. Confidential.5 •  Let’s  just  cut  to  the  chase  and  first  see  a  demo.    On  the  le]  hand  side  you  will  see  the  details  of  directly   accessing  an  applica)on  while  on  the  right  hand  side  with  NetScaler  in  the  path  with  our  Front  End   Op)miza)ons  turned  on.   •  You  will  see  a  100%  improvement  in  page  load  )me,  with  a  40%  reduc)on  in  the  number  of  bytes   downloaded  and  a  30%  reduc)on  in  the  number  of  requests  made  to  the  server.     5
  • 6. © 2014 Citrix. Confidential.6 •  Now,  let’s  analyze  the  top  1000  sites  as  reported  by  hYparchive.org  /*which  tracks  web  trends,  stats   and  performance  */  and  see  what  kind  of  op)miza)ons  are  possible.  As  you  can  see,  javascript  and   images  dominate  the  content  in  a  scenario  where  individual  pages  are  becoming  heavier.  So,  any   op)miza)ons  for  javascript  and  images  can  be  very  effec)ve.  Only  25%  of  the  images  are  op)mized   and  more  than  50%  of  the  content  doesn’t  leverage  browser  cache.   •  So,  there  is  a  lot  of  scope  for  op)miza)on.   6
  • 7. © 2014 Citrix. Confidential.7 •  Now,  let’s  see  how  we  achieve  these  amazing  results.  Most  of  the  techniques  for  Front  End   Op)miza)ons  are  fairly  well  known  that  either  require  changes  in  your  web  server  config,  applica)on   code  or  get  the  app  server  to  talk  to  new  processes  and/or  setup  extra  proxies  in  the  path.  Instead  you   can  achieve  all  of  these  op)miza)ons  by  applying  a  simple  config  on  NetScaler.   •  A  typical  web  page  access  can  be  broken  down  into  ini)al  connec)on  setup  stage,  the  page  content,   embedded  object  downloads  followed  by  rendering  the  page.  We  op)mize  each  of  these  stages.     •  Before  we  go  into  the  details  I  would  like  to  emphasize  that  it  is  important  to  not  be  very  aggressive   with  op)miza)ons  that  might  break  apps/browser  compa)libitliy  etc.  We  have  chosen  middle  path  by   op)ng  for  the  least  intrusive  features  that  give  us  the  maximum  performance  boost.   7
  • 8. © 2014 Citrix. Confidential.8 •  Browsers  enforce  a  limit  on  how  many  connec)ons  can  be  open  for  a  single  domain.  To  improve   parallel  downloads  we  split  the  requests  across  mul)ple  domains  and  also  insert  html  direc)ves  to   prefetch  domain  dns.   8
  • 9. © 2014 Citrix. Confidential.9 •  We  improve  browser  content  caching  (basically  avoid  unnecessary  304  not  modified)  by  1)  versioning   image  urls  instead  of  ar)ficial  and  inaccurate  cache  )meouts  2)    we  can  insert  etags  to  signal  content   changes  and  leverage  NetScaler  compression.   9
  • 10. © 2014 Citrix. Confidential.10 •  A  lot  of  op)miza)ons  are  possible  in  embedded  object  sec)ons.  We  do  javascript/css  minifica)on  to   compress  the  objects,  we  can  inline  smaller  css/javascript/images  and  combine  css  to  reduce  #  of   requests.   10
  • 11. © 2014 Citrix. Confidential.11 •  We  improve  page  rendering  by  defering  javascript  loading  and  moving  objects  such  as  css  that  affect   the  visible  por)on  and  parallel  downloads  to  the  top.  We  also  only  load  images  in  the  current  viewport   –  this  is  especially  significant  for  mobile  devices  where  content  not  in  the  current  view  doesn’t  need  to   be  loaded.   11
  • 12. © 2014 Citrix. Confidential.12 •  To  summarize,  we  op)mize  at  every  stage  of  the  page  load  process.  
  • 13. © 2014 Citrix. Confidential.13 •  Now,  going  down  the  stack  to  op)mize  at  the  lower  layers  taking  into  account  mobile  network   characteris)cs.  In  the  past  we  have  talked  about  NetScaler  as  a  speedy  gateway.  This  is  extremely   relevant  in  mobile  networks  for  performance.  We  have  also  talked  about  MPTCP  support  in  NetScaler   that  can  leverage  mul)ple  available  networks  parallelly  while  also  smoothening  out  cell  tower  to  wifi   transi)ons.   •  Packet  losses  in  the  mobile  context  are  not  just  because  of  conges)on  but  due  to  losses  in  the  medium   and  also  due  to  transi)ons  between  cell  towers.   •  This  year,  we  announce  Cubi/Bic  which  are    mobile  specific  tcp  conges)on  and  flow  control  protocols   that  take  into  account  such  characteris)cs  and  op)mize  delivery  in  mobile  networks.  
  • 14. © 2014 Citrix. Confidential.14 •  NetScaler  can  now  op)mize  at  a  much  deeper  level  in  the  html  content  for  mobile  networks.  Most   important  to  note  -­‐      we  chose  the  least  intrusive  features  that  do  not  break  browser  compa)bility  or   apps  while  giving  us  the  maximum  op)miza)on.   •  We  con)nued  to  op)mize  TCP  for  mobile  by  introducing  support  for  mobile  specific  conges)on/flow   control  TCP  protocols  such  as  Cubic/Bic.   •  If  your  apps  are  used  on  mobile  devices  and  delivered  through  mobile  networks  –  you  have  to  try  the   latest  version  of  NetScaler!!   •  With  that  I  hand  the  presenta)on  over  to  Tushar  Kanekar.  
  • 15. © 2014 Citrix. Confidential.15
  • 16. © 2014 Citrix. Confidential.16 •  NetScaler  –  industry  leader  in  secure,  op)mized  and  reliable  delivery  of  web-­‐apps  and  is  also  best  in   class  Mobile-­‐apps.   •  Security imperatives to address – -  SSL everywhere, you cannot have few pages over SSL and others in clear. -  Need per App micro-VPN, for isolation and per-app access control, security. -  Support for 2048bit RSA key, the new guidelines from NIST. -  Device efficient crypto - to conserve precious battery of handheld device. -  To top this off, you need protection from the every changing threat landscape – with Beast, Crime and latest Heartbleed to name a few. Given this, you need a very robust delivery mechanism to protect your apps and your infrastructure – that’s where NetScaler ADC device come to the rescue. How NetScaler helps to meet the imperatives?    
  • 17. © 2014 Citrix. Confidential.17 •  NetScaler+XenMobile deployment, note NS is in DMZ providing all the protection.
  • 18. © 2014 Citrix. Confidential.18 •  Security: - NetScaler provides protection from various L2-7 attacks, including but not limited to – Syn Attack, DDoS, HTTP DoS like Slowloris, Slowpost. - SSL – hardened SSL/TLS engine with HW acceleration to do SSL termination and offload. Not affected by the latest openssl Heartbleed bug -  Support for FIPS and new ciphers like AES-GCM/SHA-2, part of NIST’s Suite-B list of algorithms. - Ext. HSM – we are working to integrate NetScaler with external HSM vendors like Thales. This will enable a non-FIPS device (VPX, MPX, SDX instances) to utilize the security of a FIPS 140-2 Level-2/3 certified HSM device.   - ECC cipher suite, this provides same level of security as RSA, but at lower key size. It can be efficiently done on low-powered handhelds and thus helps to conserve precious battery life. To give an example 224 bit ECC == 2048bit RSA - Strong access control – a critical piece of mobile app with single sign-on and multi factor authentication including client/device level certificate checks. - Various protections for your app and backend servers – Application Firewall for protecting against sql injection and XSS attacks. ActiveSync filtering to prevent  
  • 19. © 2014 Citrix. Confidential.19 •  ActiveSync Filtering – NS does a call out to XNC server, asking for the managed status of the incoming device, based on the ActiveSync ID present in the header. XNC provides a managed / unmanaged response, and NS acts on it.  
  • 20. © 2014 Citrix. Confidential.20 •  Reliable  =  capacity  to  grow.   •  We talked about security features, but what the use if you cannot reliably deliver your apps? NetScaler provides the capacity to handle different work-loads. •  Remember the per App micro-VPN, each of this will open a isolated SSL connection, now imagine each handheld has 3-4 apps and 1000s of such handhelds connecting to an enterprise at any given time. •  NetScaler has best in class TPS and throughput numbers. The numbers quoted here are for the 22120 MPX system. •  Note: TPS here, stands for transactions per sec, which are new handshakes per sec without any reuse thrown in. •  HA support to protect against system failure and GSLB for site-failures.
  • 21. © 2014 Citrix. Confidential.21 •  Perfect forward Secrecy: In this new snowden era, many companies are investing in PFS to secure user-data. PFS provides the security of protecting old/ existing data even if the private-key is compromised. You need ECDHE or EDH to achieve this and not RSA. •  Support for RFC 5746 for secure renegotiation – to mitigate different MITM attacks. •  DTLS – Datagram TLS to secure your application over UDP. For example, Voice, Video.
  • 22. © 2014 Citrix. Confidential.22 •  NetScaler Application Firewall (AppFW) wins Best of Web Application Firewalls 2013 (By the Essential Guide – Security Readers’ Choice Awards) This award is based on vote from the Security Readers on what they think is the top Web application firewalls in 2013: Standalone WAFs and products that are part of application acceleration/delivery systems. Criteria are based on essential security features and at same time ease of use, configuration and administration. •  Link:  hYp://searchsecurity.techtarget.com/feature/Best-­‐of-­‐Web-­‐applica)on-­‐firewalls-­‐2013  
  • 23. © 2014 Citrix. Confidential.23
  • 24. © 2014 Citrix. Confidential.24 •  Light  weight  mul)-­‐tenancy  solu)on   •  Each  tenant  gets  the  experience  of  a  logical  NetScaler  while  actually  sharing  the  same  instance.    
  • 25. © 2014 Citrix. Confidential.25 •  To  appreciate  Par))ons,  let  us  walk  through  the  NetScaler  architecture  evolu)on   •  First  we  had  what  today  we  call  Classic  Architecture   •  Then  with  9.2  we  introduced  nCore.   •  With  10.0,  we  introduced  cluster   •  Now  in  2014,  we  are  planning  to  introduce  Par))ons.  
  • 26. © 2014 Citrix. Confidential.26 •  This  is  how  the  user  work  flow  will  look  like   •  First  System  admin  will  create  par))ons   •  Expecta)on  will  be  that  the  system  will  enforce  the  set  up  limits,  while  allowing  sharing  of  the   underlying  resources   •  Then  the  Par))on  admin  will  create  work  flows  within  his/her  logical  netscaler   •  Expecta)on  will  be  that  the  system  will  provide  sandboxes  views  for  configura)on,  monitoring,  logs  etc  
  • 27. © 2014 Citrix. Confidential.27 •  Default  or  system  admin  logs  in  
  • 28. © 2014 Citrix. Confidential.28 •  He  or  she  works  under  default  par))on.   •  He  creates  par))ons.  Here  for  demo,  we  are  crea)ng  two  par))ons,  one  called  PartUS,  and  another   PartEMEA  
  • 29. © 2014 Citrix. Confidential.29 •  System  admin  also  creates  two  users  and  associates  them  with  the  par))ons  just  created.  Namely   UserUS  and  UserEMEA  
  • 30. © 2014 Citrix. Confidential.30
  • 31. © 2014 Citrix. Confidential.31 •  Then  individual  users  log  in  with  their  creden)als.    
  • 32. © 2014 Citrix. Confidential.32 •  They  have  their  own  configura)on  screens.    They  create  their  own  workflows  and  applica)ons.   •  In  this  demo,  each  of  our  two  users  create  a  Load  Balancer  service,  namely  LBUS,  and  LBEMEA  
  • 33. © 2014 Citrix. Confidential.33 •  They  can  monitor  the  state  of  their  service  in  their  respec)ve  configura)on  screens  
  • 34. © 2014 Citrix. Confidential.34 •  They  also  have  their  separate  dashboards,  which  shows  the  state  of  affairs  for  that  par))on.   •  In  this  demo,  LBUS  is  handling  8  req/sec  and  LBEMEA  is  handling  24  req/sec  
  • 35. © 2014 Citrix. Confidential.35 •  Some  more  details  about  the  feature   •  We  collect  sta)s)cs  per  par))on  for  metering  and  for  burs)ng   •  Limits  per  par))on  are  enforced   •  However,  transient  burs)ng  is  allowed  beyond  thresholds   •  This  allows  for  sta)s)cal  mul)plexing  and  oversubscrip)on  of  capacity,  without  viola)ng  performance   SLA  
  • 36. © 2014 Citrix. Confidential.36 •  So  how  does  Par))ons  fit  into  rest  of  the  porpolio?   •  Par))ons  are  created  within  one  instance.    They  can  be  created  on  the  MPX.  They  can  be  created  on   VPX  instance.   •  They  can  also  be  created  on  each  of  the  SDX  instance.  In  fact  this  could  be  a  very  effec)ve  way  of   controlling  the  blast  radius.  
  • 37. © 2014 Citrix. Confidential.37
  • 38. © 2014 Citrix. Confidential.38
  • 39. © 2014 Citrix. Confidential.39 •  Today’s  data  centers  are  big  and  complex  with  many  opera)onal  challenges.  Such  as  one  arm  mode   deployment,  mul)  device  configura)on,    and  dynamic  service  provisioning  and  management.  One  arm   mode  deployments  require  rou)ng  and  service  changes  to  be  updated  manually  on  both  devices.  This   can  be  error  prone,  hence  causing  unplanned  and  poten)ally  costly  down)me.  
  • 40. © 2014 Citrix. Confidential.40 •  Cisco  Nexus  70000  provides  a  new  protocol  called  RISE,  Remote  Integrated  Service  Engine.  Citrix   NetScaler  integrates  with  Cisco  N7K  and  supports  this  protocol  na)vely.    The  cross  func)onal  teams   with  Citrix  and  Cisco  have  been  working  very  closely  to  deliver  the  feature.     •  RISE  integrated  ADC  devices  appear  as  virtual  blade  on  the  Cisco  N7K  switch.   •  The  deployment  and  configura)on  of  the  devices  can  be  made  plug  and  play.    The  protocol  helps   automate  changes  to  service  and  route  across  the  devices,  further  op)mizing  traffic  flows  within  the   datacenter.     •  NetScaler  is  the  only  ADC  device  which  integrates  with  N7K  RISE  protocol  today.   40
  • 41. © 2014 Citrix. Confidential.41 •  N7K  can  discover  and  auto  aYach  to  devices  suppor)ng  RISE  protocol.  NetScaler  devices  can  be   bootstrapped  by  retrieving  their  configura)on  from  N7K  via  RISE  protocol.  N7K  support  direct  aYach   and  indirect  aYach  modes  for  bootstrap.     •  Direct  aYach  is  used  for  configuring  MPX  boxes  and  in-­‐direct  aYach  mode  is  used  to  configure  VPXes   running  of  stock  hardware  or  SDX.   •  N7K  and  NS  both  support  high  availability  configura)on  such  as  vPC  and  HA  along  with  RISE.  
  • 42. © 2014 Citrix. Confidential.42 •  The  N7K  admin  starts  by  crea)ng  a  rise  service  with  Netscaler  IP,  assigning  port-­‐channel  and   configuring  VLANs  for  the  NetScaler  to  be  configured.     •  Auto-­‐discovery  allows  configura)on  on  the  Nexus  7000.    It  then  pushes  the  seungs  to  the  NetScaler.     •   Simplifies  provisioning  significantly,  by  reducing  config  steps  from  30  to  8  in  some  use  cases.   42
  • 43. © 2014 Citrix. Confidential.43 •  RISE  allows  automa)on  of  service  changes  on  NetScaler,  by  propaga)ng  the  associated  routes  to  N7K   programma)cally.  Hence  elimina)ng  the  need  for  N7K  admin  to  manually  add  or  delete  corresponding   routes.   •  This  preserves  the  client  IP  as  well  for  the  traffic  flow.  
  • 44. © 2014 Citrix. Confidential.44 •  Auto  PBR  is  needed  to  eliminate  the  need  for  Source-­‐NAT  or  manual  PBR  configura)on  in  an  one-­‐arm   mode  design   •  APBR  feature  allows  the  NS  to  program  policies  on  the  N7k  server-­‐facing  interfaces  to  redirect  return   traffic  to  the  NS  appliance  set  up  in  one-­‐arm  mode.   •  NS  passes  IP  address,  port  #  ,  protocol  etc  of  the  real  servers  on  to  N7K  in  an  Auto  PBR  message  and  a   route  map  is  applied  on  the  N7K  interface  through  which  the  real  server  can  be  best  reached.     •  Since  it  is  desirable  to  change  the  src  ip  to  VIP  for  the  return  traffic,  the  APBR  policies  set  the  nexthop   ip  of  the  traffic  reaching  the  N7K  interface  to  the  NS  ip  without  modifying  the  packet.     •  The  NS  appliance  will  then  direct  the  packet  to  the  client  by  changing  the  source  IP  to  VIP   •   In  case  of  mul)ple  NS  connected  to  N7K  ,  RISE  Manager  on  N7K  will  create  an  ACL  for  each  NS’s  next   hop  ip  and  incorporates  it  into  a  route  map.     44
  • 45. © 2014 Citrix. Confidential.45
  • 46. © 2014 Citrix. Confidential.46 •  Significantly  simplified  deployment  as  administrators  do  not  need  to  configure  complex  VLAN  and   route  seungs  to  enable  rich  availability  and  rou)ng  features.  Na)vely  integrated  with  Nexus  7000  vDC   and  vPC  architecture.     46
  • 47. © 2014 Citrix. Confidential.48
  • 48. © 2014 Citrix. Confidential.49
  • 49. © 2014 Citrix. Confidential.50
  • 50. © 2014 Citrix. Confidential.51
  • 51. © 2014 Citrix. Confidential.52
  • 52. © 2014 Citrix. Confidential.53
  • 53. © 2014 Citrix. Confidential.54
  • 54. © 2014 Citrix. Confidential.55
  • 55. © 2014 Citrix. Confidential.56
  • 56. © 2014 Citrix. Confidential.57
  • 57. © 2014 Citrix. Confidential.59
  • 58. © 2014 Citrix. Confidential.60
  • 59. © 2014 Citrix. Confidential.61
  • 60. © 2014 Citrix. Confidential.62
  • 61. © 2014 Citrix. Confidential.63
  • 62. © 2014 Citrix. Confidential.64
  • 63. © 2014 Citrix. Confidential.65