Netscaler+Guide+2017+2 1
Netscaler+Guide+2017+2 1
Basic Authentication 25
Creating an LDAP Authentication Policy - Administrators 25
NetScaler SSH Command References: 28
Binding an LDAP Authentication Policy - Administrators 29
Granting AD Group Permissions to the NetScaler 31
Creating an LDAP Authentication Policy – NetScaler Users 34
NetScaler SSH Command References: 37
Certificates 38
Creating a Private RSA 38
Creating a CSR Request 40
Submitting the CSR to a 3rd party CA - Comodo Free SSL 43
Upload the CA CRT file and Install the Certificate on the NetScaler 48
Intermediary Certificate Linking 50
StoreFront Configuration 82
Prerequisites 82
Disclaimer
This guide is offered as a companion to the online video training series from
www.mastersof.cloud, or free directly from the www.mastersof.cloud website.
This guide can also be used as a stand alone guide. Please note that this guide is
provided without warranty of any kind, express or implied, and was designed to be
used in a test lab for educational purposes only. Use this guide at your own risk. You
should always have multiple backups of your environment, configuration and
infrastructure before doing any changes to your environment. Never make untested
or unsolicited changes to any production environment.
Accuracy of the material contained within this document is very important to us.
Every effort has been made to ensure the accuracy of this document at the time of
writing however should you notice any discrepancies or incorrect information please
notify us immediately at t [email protected] so we can review and
update where necessary.
Introduction
Welcome to the ‘Citrix NetScaler - Introduction’ guide. The purpose of this guide is to provide
you with the basics you need to deploy and configure a NetScaler device either in a lab or in
an enterprise environment. This document is designed to accompany the online courses
now available at www.mastersof.cloud and also available at www.udemy.com.
We hope you find this course informative and easy to follow.
Please do feel free to ask questions or provide any feedback on the training website at
www.mastersof.cloud or email [email protected]
Note: This guide uses many example screenshots, IP addresses and DNS settings that are
specific to the demo environment being used at the time. You will need to use your own
settings in place of the examples provided to ensure a working setup. If you are not sure of
the configuration options you should consult with your AD, Network, Virtualisation and Cloud
teams first for the correct details that are specific to your environment.
Prerequisites
1) A basic level of understanding of network principles, TCP-IP, DNS, Firewalls and
Network routing
2) Familiarity with connecting to devices via SSH or Putty
3) Familiarity with all Citrix products in general
4) Competency with the latest versions of Microsoft Windows operating systems
This document also serves as a complimentary printed walk through for the Citrix NetScaler
Introduction online training at www.mastersof.cloud and also available at www.udemy.com.
1. Connect to
http://www.citrix.c
om/products/
4. Enter your
registration
details (username
and password) for
your trial license
Select the
download most
appropriate to you
and your hypervisor
1. Connect to
http://www.mycitri
x.com
2. Click Downloads
Select NetScaler
ADC as the product
4. Select VPX
Package for New
Installation
1. Connect and
authenticate to your
VMWare ESX web
console
Note: In this example we are connecting to VMWare ESXi 6.0 with a private IP of
192.168.1.1. The default URL is http://192.168.1.1/ui
2. Click Virtual
Machines
Click Create /
Register VM
3. Select Deploy a
virtual machine
from an OVF or
OVA File
5. Select an
appropriate
storage location
for your hypervisor
to deploy the
NetScaler VM
6. Choose the
network mappings
and disk
provisioning best
for you
Note: Disk provisioning is set to thin in this example only to save on local hypervisor
disk space.
11. Success!
2. Your NetScaler
should be finished
initializing and
prompting for an
IPv4 Address as
part of the first run
wizard
Provide an
appropriate free IP
address, subnet
and default
gateway from your
local network
Once the details Note: In this guide we will use the following details for the NSIP
are entered type ‘4’ IP address: 192.168.1.50
to save and quit Subnet Mask: 255.255.255.0 (also known as /24)
and press enter to Default Gateway (internet router): 192.168.1.254
execute However you should use an appropriate IP address, netmask and gateway for your
network and specific configuration. If you are unsure consult with your network
The NetScaler will administration team.
perform a quick,
warm reboot
4. Once successfully
authenticated
type ‘show ip’ and
press return
Note: This command will show you all IP addresses registered on the active
NetScaler
Tip: the NetScaler recognises short versions of the same command (provided it’s
unique) for example the command ‘sh ip’ will also work
Note: you can use the shell to perform more traditional BSD based Linux commands
like ifconfig, route, ping, traceroute
Note: This page shows you that you have already set a NetScaler IP address (NSIP)
which can be used for management of the NetScaler device, however you still need
to set your DNS, Time Zone, Hostname, SNIP and to add licenses
Note: In this guide we will use the following details for the SNIP
IP address: 192.168.1.51
Subnet mask: 255.255.255.0 (also known as /24)
Default gateway (internet router): 192.168.1.254
However you should use an appropriate IP address, netmask and gateway for your
network and specific configuration. If you are unsure consult with your network
administration team
Note: A NetScaler will use its NSIP as a management IP address. It will utilise the
Subnet IP address (SNIP) to communicate with back end servers etc on that specific
assigned subnet
Hostname
DNS IP Address
Time Zone
Note: In this guide we will use the following details for the Hostname, DNS and
TimeZone
Hostname: ns1
DNS IP Address: 192.168.1.11 & 192.168.1.12 (the IP addresses of my singular
Active Directory LDAP servers)
Time Zone: GMT+ 00:00-GMT-Europe/London
However you should use an appropriate IP address, netmask and gateway for your
network and specific configuration. If you are unsure consult with your network
administration team
Click Continue
3. Deploy your
NetScaler and
obtain its Host ID
(MAC Address)
Type ‘lmutil
lmhostid –ether’
then press enter
Click continue
5. Click confirm
Click Browse
Restart your
NetScaler
Basic Authentication
This will involve creating a server to bind to (i.e. telling the NetScaler what server to
communicate with for LDAP services) and we will create a policy that will be bound to this
newly created server record. Finally the policy and its associated server profile must be
bound to the NetScaler so it knows where and when to use this LDAP policy. We will bind
this policy globally to the NetScaler which means all users in the policy will be able to
administer the NetScaler device.
Tip: If you keep the naming of the policies, servers and profile
creations consistent it is much easier to find them when you
have many multiple policies created on the NetScaler
Tip: be sure to click the test connection Note: You should use appropriate LDAP details. If you are
button once you have finished the setup unsure consult with your AD/LDAP/Authentication team.
of this LDAP server profile to ensure it
connects to your LDAP server
successfully
If you need to obtain the Group details for the ‘Search Filter’
Note: the Admin Password is not copied when you duplicate
these settings at a later stage so always be sure to re-enter
them when creating additional AUTHSERVERS
Click Done
Here you can see that the user is able to authenticate, but not
perform any tasks on the NetScaler.
Click Bind
Tick Sysadmin
Click Insert
4. Click Create
Note: The LDAP bind password is not copied when you
duplicate these settings from a previously created policy so
always be sure to re-enter them when creating additional
AUTHSERVERS and test
Click Add
Click Create
Certificates
http://192.168.1.50
2. Expand traffic
management
Disabled
Enabled
5. Note: The private key should be downloaded and stored away from the NetScaler device (especially if the
NetScaler is stored in a DMZ). This is in case the NetScaler device is compromised in any way. If your
private keys are lost or compromised you would have to revoke your existing certificates and new
certificates should be generated.
http://192.168.1.50
Click CSRs
Expand Traffic
Management >
SSL > SSL Files >
CSRs tab
4. Open the
downloaded CSR
file from step 1 and
copy and paste
the entire contents
into the Comodo
SSL site
Click Next
Upload the CA CRT file and Install the Certificate on the
NetScaler
We will now take the CRT file and install it onto the NetScaler device, then use both the CRT
and Private key to combine and finally create a fully functional NetScaler certificate.
1. Expand Traffic
Management >
SSL > SSL Files
Click Upload
Click Open
Click Install
Certificate File:
Choose the
Certificate you just
uploaded in step 2
Click Install
When some operating systems don’t have the full chain of intermediary certificates installed
(and trusted) they will display a ‘certificate invalid’ message even when the certificate itself is
valid. This is because the operating system is unable to verify your server certificate all the
way up the certificate chain to the root certificate. These certificates can be installed and
provide to the end users to greater enhance the user’s ability to connect to the NetScalers
regardless of their endpoint or client device.
Step Description Screenshot
1. Example:
Connecting to a
service or VIP on
the NetScaler
interface where we
have bound the
new Certificate
shows an error in
Chrome on Mac
OSX
http://192.168.1.50
Click Install
4. Upload the
bundled
certificate from
your 3rd
party CA
Click Install
Select Action -
‘Link’
Prerequisites
Description
● You have patched the server and installed KB2919355 - Windows RT 8.1, Windows 8.1, and
Windows Server 2012 R2 update: April 2014 (prerequisite patch)
(Note: If you download this update without updating the Operating system first it may say the patch is not
applicable – If this happens run windows updates for the first time before then try reinstalling the patch)
● Local administrative rights to the W2012 Server where you are installing XA/XD
● You can avoid the locate media prompts if you extract the ISO locally for a ‘locatable’
installation post reboots
5. Click Delivery
Controller
Click Next
9. Click Next
11. Reboot
Select XenDesktop
Select Delivery
Controller
Select XenDesktop
Select Delivery
Controller
3. Select Fully
Configured
8. Review the
summary page and
click Finish
2. Select Prepare
Machines and
Images – Virtual
Delivery Agent for
Windows Server
OS
3. Select Enable
connections to a
server machine
Click Next
Click Test
Connection and
click Add
(next button will
only highlight after
this)
Click Next
production
environment)
Click Next
8. Click Next
9. Click Install
Click Setup
machines for
desktops and
applications or
remote PC access
2. Click Next
(not recommended
in Production)
5. Click add
computers
Click Next
Click Finish
7. Click Delivery
Groups 3 – Setup
delivery groups to
assign to desktops
and applications to
your users
8. Click Next
Click Next
Ensure Enable
desktop is selected
Click Next
3. Select the
Desktops Tab and
click the Server
Desktop
StoreFront Configuration
Whilst the StoreFront site will already be preconfigured by the XA/XD Setup wizard, there
are some settings we need to set up in order for NetScaler to be able to connect to the
StoreFront server and launch sessions.
Prerequisites
Item Description
● You will need to know the FQDN of your NetScaler Gateway
● The internal or private IP Address of the VIP assigned to the NetScaler Gateway*
● Know the details of your Citrix Server STA (our Citrix DDC(s))
* The StoreFront server must be able directly communicate with the VIP of the NetScaler
Gateway, otherwise when the StoreFront server resolves the FQDN it will resolve the
internet IP address and potentially will not work.
Expand Citrix
StoreFront
Click Manage
NetScaler
Gateways
2. Click Add
Click Next
3. Click Add
Click Next
Click Create
6. Ensure the
StoreFront / Citrix
server can resolve
the FQDN to the
inside IP Address
of the NetScaler
Gateway
Use locally
managed DNS if
you have the Zone
configured on your
local DNS server(s)
7. Ensure the
StoreFront server
resolves the FQDN
to the NetScaler
inside VIP address
Note: In production environments ping may not be allowed between the NetScaler
network and the StoreFront network(s) – you need to ensure that 443 TCP is opened
and allowed through the Firewall from the StoreFront servers to the NetScaler VIP
9. Ensure
Pass-through
from NetScaler
Gateway is ticked
Click OK
Expand Citrix
StoreFront
Click Stores
2. Click Next
Click Next
4. Click Add
Add Delivery
Controllers FQDN
Select Transport
type as HTTP
(you should use
HTTPS if the SF
server is in a DMZ
or for extra
security)
Click OK
5. Click Next
6. Enable Remote
Access
Ensure Allow
Users to access
resources only
delivered through
StoreFront (No
VPN Tunnel) is
selected
Click Add
Example: my
gateway is called
gateway.jsconsultin
g.services and the
URL is
https://gateway.jsco
nsulting.services
Click Next
Click Add
Click OK
Tick Enable
session reliability
Untick request
tickets from two
stas, where
available
Click Next
Enter Callback
URL as the same
entered in step 6
https://gateway.jsco
nsulting.services
Click Create
Click Next
Click Next
Click Create
Overview Diagram
Prerequisites
Item Description
● The internal or private IP Address of the VIP assigned to the NetScaler Gateway *
● Know the details of your Citrix Server STA (our Citrix DDC(s))
● Firewall ports are open between the NetScaler and the StoreFront server
● StoreFront already configured and setup (otherwise retrieve attributes won’t work)
In this section of the course we will connect the NetScaler to our basic Citrix XA/XD
Environment. Here you will see how quickly you can set up, secure and enable remote
access to your Citrix environment via the NetScaler Gateway.
NOTE: you must have an active Citrix XenApp/XenDesktop server and a StoreFront server
to proceed with the following steps. If not – please just follow along this guide to understand
the steps involved or follow the previous XA/XD and StoreFront setup guides.
2. Under Integrate
with Citrix
Products - Click
XenApp and
XenDesktop
3. Ensure StoreFront
Is selected and
Click Continue on
the Prerequisites
Gateway FQDN:
gateway.jsconsultin
g.services
Gateway IP
Address: Inside
private IP address
for the Virtual
Server. (aka VIP)
Port: 443 (SSL)
Redirect: Tick this
option if you are
also forwarding http
traffic to this VIP so
the NetScaler will
redirect the users to
https.
Then click
Continue
5. Because we
enabled port 80
redirection the
wizard will enable
the LoadBalancing
Feature on the
NetScaler – Click
Yes
6. Select the
certificate you
have previously
installed on the
NetScaler.
Click Continue
7. Keep
Authentication as
Domain
Select Use
Existing Server
8. Click Continue
Prerequisites
Item Description
● The internal or private IP Address of the VIP assigned to the NetScaler Gateway *
● Know the details of your Citrix Server STA (our Citrix DDC(s))
● Firewall ports are open between the NetScaler and the StoreFront server
● StoreFront already configured and setup (otherwise retrieve attributes doesn't work)
In this section of the course we will connect the NetScaler to our basic Citrix XA/XD
Environment. Here you will see how quickly you can set up, secure and enable remote
access to your Citrix environment via the NetScaler Gateway.
NOTE: you must have an active Citrix XenApp/XenDesktop server and a StoreFront server
to proceed with the following steps. If not – please just follow along this guide to understand
the steps involved or follow the previous XA/XD and StoreFront setup videos.
Click Unified
Gateway in the Left
Pane under
‘Integrate with Citrix
Products’
3. Click Continue
Click Continue
6. Select the
appropriate LDAP
server
Click Continue
7. Change Portal
Theme to the New
RFWebUI
(note RFWebUI
does not currently
work with SAML)
Select Integration
point as
StoreFront
Click Continue
Click Desktops
and ensure you can
see your XA&XD
Desktops
Prerequisites
Item Description
● NetScaler configured with IP Address, Certificates and accessible from the clients either
internally or remotely over the internet.
● Port 443 forwarded from firewall / router to the NetScaler VIP
● Ensure the Default Authorization on the global configuration is set to allow
2. Ensure Global
settings for NS
Gateway is set to
Allow
3. Expand NetScaler
Gateway
Click NetScaler
Gateway Wizard
4. A Separate Wizard
page will open
Click Continue
User
Administration>
AAA Users > Add
Button
Click Continue
Login
10. Success!
Prerequisites
Item Description
● You should be a local administrator of the device where you are install the gateway plug-in
Login
Select Network
Access
Click Download
Click Run
Click Install
Click Finish
1. Expand >NetScaler
Gateway > Policies
>
Preauthentication
2. Click Add
4. Click Create
5. Click Expression
Editor
Select Expression
Type of: Client
Security
Component:
Process
Name*:
notepad.exe
Operator: EXISTS
7. Click Create
Select NetScaler
Gateway >
NetScaler Gateway
Policy Manager
Click Select
Click Yes
NetScaler gateway
> Global Settings >
Change Global
Settings
Change Split
Tunnel* to ON
Click OK
3. Expand NetScaler
gateway >
Resources >
Intranet
Applications
Click Add
Click Create
Click Define
intranet
applications...
6. Click Add
Click OK
8. Save your
NetScaler
configuration
1. Expand >NetScaler
Gateway > Global
Settings > Change
Global Settings
Change Default
Authorization Action
to DENY
3. Expand NetScaler
Gateway > Policies
> Authorization
Policies
Click Add
Click Expression
Editor
7. Click Create
NetScaler Gateway
> User
Administration
>AAA Users
Click +
Authorization
Policies
Select the
Authorization policy
Click Bind
Choose Primary
Authentication
Click Continue
5. Click Done
Expand NetScaler
Gateway > User
Administration >
AAA Groups
Click Add
Click OK
9. Attach the
Authorization Policy
to this group
Click +
Authorization
Policies on the right
Prerequisites
Description
● SAML Provider acting as the iDP (Google in this instance)
● Access to edit Windows GPOS and OUs to assign the CFAS service its service location
1. Connect to
admin.google.com
2. Click Apps
9. Click Finish
Select
ON for everyone
Enter appropriate
details for your new
SAML profile
Choose Primary
Click Continue
NetScaler Gateway
> Click Session
Policies
3. Click Next
4. Click Next
5. Click Install
6. Click Finish
Service\PolicyDefini to
tions
open gpmc.msc
browse to
Computer >
Administrative
Templates:
Policy> Citrix
Components >
Authentication
Click OK
Select Issue
Remove domain
computers as they
will be set to ‘deny’
3. Click Passthrough
from NetScaler
Gateway >
Configure
Delegated
Authentication
4. Click OK
Open Powershell
type
‘Set-BrokerSite
-TrustRequestsSen
tToTheXmlService
Port $true’
Prerequisites
Description
● Two NetScaler devices on the same network both with NetScaler IPs (NSIPs) assigned
● The devices must be able to communicate to each other on TCP 3003
● Not have any other NetScaler devices already joined as part of an HA Pair
● On creation of the HA pair the NetScalers may temporarily disconnect active ICA sessions
● Must deploy the same firmware version on both NetScaler appliances before configuring HA
2. (Recommended)
During the setup –
Set the
Synchronisation
state of the
Primary (First)
NetScaler as ‘Stay
Primary’
3. Select NetScaler
Click Edit
Click OK
4. Click Add
7. Synchronisation
should read
‘Success’
2. Check IP
assignments on this
NetScaler are all
showing as Active
3. Check SSL
Certificates are
available on the
Secondary Node
and that they have
synchronised fully
Click OK
6. Click OK
9. Confirm settings
like all IPs are
active on the
NetScaler (and not
passive)
Prerequisites
Description
● Two Web Servers (Linux or Windows) publishing a simple html page as red or blue
background - A.K.A the services you want to load balance
● New Internal Virtual IP address for the Virtual server (a load balanced VIP) on a network
● A target service that represents the application on the servers (e.g. port 80 for web traffic)
1. Expand Traffic
Management
Select Enable
Feature (assuming
your NetScaler is
licensed for this)
2. The exclamation
mark should
disappear when the
feature is enabled
1. Expand Traffic
Management
Select Enable
Feature
2. Select Servers
Click Add
Click Create
3. Servers Added
for example:
Web Traffic (port 80
or 43)
Select HTTP
Monitor
click OK
7. Optional Create a
Service group
8. Click Traffic
Management >
Load Balancing >
Virtual Servers
Click Add
Note: Service
groups allow you to
manage multiple
groups of services
for things like
binding, monitoring
etc
Click OK
Click Done
NetScaler Support
From
the
Shell
3. Type ‘command
create system
backup ‘name’
-level <basic | full
> -comment
‘string’
Example: create system backup -level full (creates backup without comment)
Example: create system backup -level full -comment “This is a Full NS Backup”
Type ‘show
system backup’
From
the
GUI
5. Open the
NetScaler GUI
7. Click Backup
8. Enter the
information as
shown (leave
filename empty for
it to use the default
scheme again)
Click Backup
Type ‘show
system backup’
1. Download the
latest firmware for
Citrix NetScaler
VPX
Type ‘shell’
3. browse to
/var/nsinstall by
typing
‘cd /var/nsinstall’
Type
‘mkdir 12nsinstall’
5. Open WinSCP
Upload the
NetScaler
firmware
downloaded in step
1
7. When copying
completes
extract the tar file
type
‘tar -zxvf
./build-12.0-41.22_
ns_32.tgz’
type ‘./installns’
From
The
GUI
Click Clear
Configuration
under
‘Maintenance’
section
3. Select Full
Click Clear
From
the
Shell