0% found this document useful (0 votes)
14 views

validated-reference-design-netscaler-and-amazon-aws

This solution guide provides guidelines for implementing Citrix NetScaler VPX on Amazon AWS, detailing its features, limitations, and supported use cases such as production delivery, hybrid cloud designs, and business continuity. It outlines the necessary configurations for deploying NetScaler within an AWS VPC, including network architecture and instance requirements. Additionally, it highlights the benefits of using NetScaler for application delivery and management in cloud environments.

Uploaded by

Taha Abdullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

validated-reference-design-netscaler-and-amazon-aws

This solution guide provides guidelines for implementing Citrix NetScaler VPX on Amazon AWS, detailing its features, limitations, and supported use cases such as production delivery, hybrid cloud designs, and business continuity. It outlines the necessary configurations for deploying NetScaler within an AWS VPC, including network architecture and instance requirements. Additionally, it highlights the benefits of using NetScaler for application delivery and management in cloud environments.

Uploaded by

Taha Abdullah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Solution Guide

Validated Reference Design


NetScaler and Amazon AWS

Solution Guide

This guide focuses on providing guidelines to customers on implementing


NetScaler and Amazon AWS based on their use cases.

Citrix.com 1
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Table of Contents
Overview NetScaler VPX 3
Overview NetScaler in Amazon AWS 3
Limitations and Usage Guidelines 4
Supported EC2 instances 5
ENI Support 5
Use Cases 6
Production Delivery for Web and XenDesktop Applications 6
Hybrid Cloud Designs 6
Business Continuity 7
Development and Testing 7
AWS Network Architecture – ENI and EIP 7
EC2 versus VPC 8
Regions and Availability Zones 8
Section 1: Configure VPX on AWS 9
Step 1: Create the VPC 9
Step 2: Create a Security Group 12
Step 3: Launch an Instance into Your VPC 14
Step 4: Assign an Elastic IP Address to Your Instance 15
Section 2: Configure Unified Gateway for XenDesktop 16
Section 3: High Availability Load Balancing for Storefront 18
Section 4: Configure GSLB in Two AWS locations 18
Section 5: Domain Based GSLB with ELB 19
Section 6: Configuring NetScaler GSLB 20
Section 7: Configuring AWS AutoScale Components 33
Section 8: Auto Scaling Groups & Configuring Scaling Policies 36
Section 9: Configuring NetScaler to w/ AWS AutoScalie 41
Additional References 42

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 2
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Overview NetScaler VPX


Citrix NetScaler is an all-in-one application delivery controller that makes applications run up to five times better, re-
duces application ownership costs, optimizes the user experience and ensures that applications are always available
by using:

• Advanced L4-7 load balancing and traffic management
• Proven application acceleration such as HTTP compression and caching
• An integrated application firewall for application security
• Server offloading to significantly reduce costs and consolidate servers

As an undisputed leader of service and application delivery, Citrix NetScaler is deployed in thousands of networks
around the world to optimize, secure and control the delivery of all enterprise and cloud services. Deployed directly
in front of web and database servers, NetScaler combines high-speed load balancing and content switching, http
compression, content caching, SSL acceleration, application flow visibility and a powerful application firewall into an
integrated, easy-to-use platform. Meeting SLAs is greatly simplified with end-to-end monitoring that transforms net-
work data into actionable business intelligence. NetScaler allows policies to be defined and managed using a simple
declarative policy engine with no programming expertise required.

Overview NetScaler in Amazon AWS


Support for the Citrix® NetScaler VPX within Amazon Web Services (AWS) is available beginning with version 10.5-
61.11. NetScaler VPX is available as an Amazon Machine Image (AMI) in AWS marketplace. NetScaler VPX on AWS
enables customers to leverage AWS Cloud computing capabilities and use NetScaler load balancing and traffic
management features for their business needs. NetScaler on AWS supports all the traffic management features of a
physical NetScaler appliance. NetScaler instances running in AWS can be deployed as standalone instances or in HA
pairs.

The NetScaler VPX AMI is packaged as an EC2 instance that is launched within an AWS VPC. The VPX AMI instance
requires a minimum of 2 virtual CPUs and 2 GB of memory. An EC2 instance launched within an AWS VPC can also
provide the multiple interfaces, multiple IP addresses per interface, and public and private IP addresses needed for
VPX configuration. Currently, on Amazon AWS, VPX can be launched only within a VPC, because each VPX instance
requires at least three IP addresses. (Although VPX on AWS can be implemented with one or two elastic network
interfaces, Citrix recommends three network interfaces for a standard VPX on AWS installation.) AWS currently makes
multi-IP functionality available only to instances running within an AWS VPC. A VPX instance in a VPC can be used to
load balance servers running in EC2 instances.

An Amazon VPC allows you to create and control a virtual networking environment, including your own IP address
range, subnets, route tables, and network gateways.

Note: By default, you can create up to 5 VPC instances per AWS region for each AWS account. You can request higher
VPC limits by submitting Amazon's request form (http://aws.amazon.com/contact-us/vpc-request/).

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 3
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

An EC2 instance of NetScaler VPX (AMI image) is launched within the AWS VPC.

The following figure shows a typical VPX on AWS deployment.

The figure shows a simple topology of an AWS VPC with a NetScaler VPX deployment. The AWS VPC has:
1. A single Internet gateway to route traffic in and out of the VPC.
2. Network connectivity between the Internet gateway and the Internet.
3. Three subnets, one each for management, client, and server.
4. Network connectivity between the Internet gateway and the two subnets (management and client).
5. A single NetScaler VPX deployed within the VPC. The VPX instance has three Elastic Network
Interfaces (ENIs), one attached to each subnet.

Limitations and Usage Guidelines


• The clustering feature is not supported for VPX.
• For HA to work as expected, associate a dedicated NATing device to management Interface or
associate EIP to NSIP. For more information on NAT, in the AWS documentation, see NAT Instances.
• Data traffic and management traffic should be segregated by using ENIs belonging to different
subnets.
• Only the NSIP address should be present on the management ENI.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 4
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

• If a NAT instance is used for security instead of assigning an EIP to the NSIP, appropriate VPC level
routing changes are required. For instructions on making VPC level routing changes, in the AWS
documentation, see "Scenario 2: VPC with Public and Private Subnets."
• A VPX instance can be moved from one EC2 instance type to another (for example, from m3.large to
an m3.xlarge).
• For storage options for VPX on AWS, Citrix recommends EBS, because it is durable and the data is
available even after it is detached from instance.
• Dynamic addition of ENIs to VPX is not supported. You have to restart the VPX instance to apply the
update. Citrix recommends you to stop the standalone or HA instance, attach the new ENI, and then
restart the instance.
• You can assign multiple IP addresses to an ENI. The maximum number of IP addresses per ENI is deter
mined by the EC2 instance type, see EC2 Support for ENIs and IP Addresses.
• Citrix recommends that you avoid using the enable and disable interface commands on NetScaler VPX
interfaces.

Due to Amazon AWS limitations, these features are not supported:


Layer 3 Limitations:
• Dynamic Routing
• IPV6
Layer 2 Limitations:
• Gratuitous ARP(GARP)
• L2 mode
• Tagged VLAN
• Virtual MAC (VMAC)

Supported EC2 instances


The NetScaler AMI can be launched on any of the following EC2 instance types:
• m4.large
• m4.xlarge
• m4.2xlarge
• m4.4xlarge
• m4.10xlarge
• m3.large
• m3.xlarge
• m3.2xlarge

For more information about Amazon EC2 instances, see:


http://docs.amazonwebservices.com/AWSEC2/latest/UserGuide/instance-types.html

ENI Support

The following table lists the EC2 instance types and corresponding number of supported ENIs and number of
private IP addresses per ENI.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 5
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Instance Name Number of ENIs Private IP


Addresses per ENI
m4.large 2 10
m4.xlarge 4 15
m4.2xlarge 4 15
m4.4xlarge 8 30
m4.10xlarge 8 30
m3.large 3 10
m3.xlarge 4 15
m3.2xlarge 4 30

Use Cases
Compared to alternative solutions that require each service to be deployed as a separate virtual appliance,
NetScaler on AWS combines L4 load balancing, L7 traffic management, server offload, application acceleration,
application security and other essential application delivery capabilities in a single VPX instance, conveniently
available via the AWS Marketplace. Furthermore, everything is governed by a single policy framework and man-
aged with the same, powerful set of tools used to administer on-premise NetScaler deployments. The net result
is that NetScaler on AWS enables several compelling use cases that not only support the immediate needs of
today’s enterprises, but also the ongoing evolution from legacy computing infrastructures to enterprise cloud
datacenters.

Production Delivery for Web and XenDesktop Applications

Enterprises actively embracing AWS as an infrastructure- as-a-service (IaaS) offering for production delivery of
applications can now front-end those applications with the same cloud networking platform used by the largest
websites and cloud service providers in the world. Extensive offload, acceleration and security capabilities can
be leveraged to enhance performance and reduce costs.

XenDesktop 7.5 and XenApp 7.5 have been redesigned as cloud ready solutions for delivering any Windows
application or desktop into a cloud service delivered across any network, to any device. By deploying this
expanded app and desktop delivery platform today, you will be positioned to leverage any virtual infrastructure
or cloud management platform giving you the ability to take advantage of the automation and orchestration
capabilities of cloud computing.

Hybrid Cloud Designs

Enterprise IT organizations that follow a hybrid cloud strategy get the best of both worlds by selecting which
applications and which usage scenarios fit best in their private cloud and which fit best in a public cloud en-
abling them to flex, grow and transform to meet the demands of the modern workplace.

With NetScaler on AWS, hybrid clouds that span enterprise datacenters and extend into AWS can benefit from
the same NetScaler cloud networking platform, significantly easing the transition of applications and workloads
back and forth between a private datacenter and AWS. The full suite of NetScaler capabilities, ranging from
intelligent database load balancing with DataStream to unprecedented application visibility with AppFlow® and
real-time monitoring and response with Action Analytics, can be leveraged with NetScaler on AWS.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 6
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Business Continuity

Enterprises looking to use AWS as part of their disaster recovery and business continuity plans can rely upon
NetScaler global server load balancing running both on-premise and within AWS to continuously monitor avail-
ability and performance of both enterprise datacenters and AWS environments, ensuring users are always sent
to the optimal location.

When you configure GSLB on NetScaler appliances and enable Metric Exchange Protocol (MEP), the appliances
use the DNS infrastructure to connect the client to the data center that best meets the criteria that you set. The
criteria can designate the least loaded data center, the closest data center, the data center that responds most
quickly to requests from the client’s location, a combination of those metrics, and SNMP metrics. An appliance
keeps track of the location, performance, load, and availability of each data center and uses these factors to
select the data center to which to send a client request.
A GSLB configuration consists of a group of GSLB entities on each appliance in the configuration. These entities
include GSLB sites, GSLB services, GSLB virtual servers, load balancing and/or content switching servers, and
ADNS services.

Development and Testing

Enterprises running production delivery on-premise but using AWS for development and testing can now in-
clude NetScaler within their AWS test environments, speeding time-to-production due to better mimicry of the
production implementation within their test environments.

In each use case, network architects can also leverage Citrix CloudBridge— configured either as a stand-
alone instance or as feature of a NetScaler platinum edition instance—to secure and optimize the connection
between the enterprise datacenter(s) and the AWS Cloud, thereby speeding data transfer/synchronization and
minimizing network cost.

AWS Network Architecture – ENI and EIP


NetScaler instances launched into a VPC can have up to eight elastic network interfaces (ENIs). In turn, each ENI
can be assigned one or more private IP addresses, with each of these optionally being mapped to an elastic IP
address that is publicly routable.

What makes the network interfaces and IP addresses “elastic” in this case is the ability to programmatically re-
map them to other instances—a feature that enables recovery from instance or Availability Zone failures with-
out having to wait for hardware replacements, or for DNS changes to fully propagate to all of your customers.

Other details to account for include the following:


• An instance can have different ENIs in different subnets (but not in different Availability Zones).
• Each ENI must have at least one IP address assigned to it, and must be assigned to a Security Group
(see below).
• Addresses 1 to 4 for each subnet (i.e., 10.x.x.1-4) are reserved for use by Amazon.
• NetScaler is only aware of private IP addresses. Any EIPs that are assigned will not show up within the
NetScaler CLI or any related management tools.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 7
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

EC2 versus VPC

AWS encompasses multiple different services, such as Amazon Simple Storage Services (S3), Amazon Elastic
Compute Cloud (EC2), and Amazon Virtual Private Cloud (VPC). The distinction between the latter two is import-
ant in this case. In particular, with EC2, virtual machine instances are limited to a single networking interface
and single IP address. Furthermore, there are minimal networking features and controls. This precludes the use
of EC2 for NetScaler— which requires a minimum of three IP addresses—and is why NetScaler instances can
only be launched within an AWS VPC.

VPCs not only support virtual machines with multiple interfaces and multiple private and public IP addresses,
but also allow you to create and control an isolated virtual networking environment, with its own IP address
range, subnets, routing tables and network gateways.

Regions and Availability Zones

Within the AWS Cloud, Regions refer to a specific geographic location, such as US East. Within each Region
there are at least two Availability Zones, each of which can be thought of as an independent cloud datacenter
that has been engineered to be insulated from failures in other Availability Zones and to provide inexpensive,
low-latency network connectivity to other Availability Zones within the same Region.

By implementing instances in separate Availability Zones, you can protect your applications from failures that
impact a single location.

Limitations and dependencies for network architects to be aware of at this level include the following:
• Although a Virtual Private Cloud can span multiple Availability Zones, it cannot span multiple Regions.
• Individual subnets within a VPC cannot span multiple Availability Zones.
• All traffic entering or leaving a VPC must be routed via a corresponding default Internet gateway.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 8
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Section 1: Configure VPX on AWS


In this exercise, you'll create a VPC and subnet, and launch a public-facing instance into your subnet. Your in-
stance will be able to communicate with the Internet, and you'll be able to access your instance from your local
computer using SSH (if it's a Linux instance) or Remote Desktop (if it's a Windows instance). In your real world
environment, you can use this scenario to create a public-facing web server; for example, to host a blog.

Note:
This exercise is intended to help you set up your own nondefault VPC quickly. If you already have a default VPC
and you want to get started launching instances into it (and not creating or configuring a new VPC), see
Launching an EC2 Instance into Your Default VPC.

To complete this exercise, you'll do the following:


• Create a nondefault VPC with a single public subnet. Subnets enable you to group instances based
on your security and operational needs. A public subnet is a subnet that has access to the Internet
through an Internet gateway.
• Create a security group for your instance that allows traffic only through specific ports.
• Launch an Amazon EC2 instance into your subnet.
• Associate an Elastic IP address with your instance. This allows your instance to access the Internet.

Before you can use Amazon VPC for the first time, you must sign up for Amazon Web Services (AWS). When you
sign up, your AWS account is automatically signed up for all services in AWS, including Amazon VPC. If you hav-
en't created an AWS account already, go to http://aws.amazon.com, and then choose Create a Free Account.

Step 1: Create the VPC

In this step, you'll use the Amazon VPC wizard in the Amazon VPC console to create a VPC. The wizard performs
the following steps for you:
• Creates a VPC with a /16 CIDR block (a network with 65,536 private IP addresses). For more
information about CIDR notation and the sizing of a VPC, see Your VPC.
• Attaches an Internet gateway to the VPC. For more information about Internet gateways, see
Internet Gateways.
• Creates a size /24 subnet (a range of 256 private IP addresses) in the VPC.
• Creates a custom route table, and associates it with your subnet, so that traffic can flow between the
subnet and the Internet gateway. For more information about route tables, see Route Tables.

The following diagram represents the architecture of your VPC after you've completed this step.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 9
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Create a VPC using the Amazon VPC Wizard

1. Open the Amazon VPC console at https://console.aws.amazon.com/vpc/.


2. In the navigation bar, on the top-right, take note of the region in which you'll be creating the VPC.
Ensure that you continue working in the same region for the rest of this exercise, as you cannot
launch an instance into your VPC from a different region. For more information about regions, see
Regions and Availability Zones.
3. In the navigation pane, choose VPC dashboard, and then choose Start VPC Wizard.

Note:
Do not choose Your VPCs in the navigation pane; you cannot access the VPC wizard from this page.

4. Choose the first option, VPC with a Single Public Subnet, and then choose Select.
5. On the configuration page, enter a name for your VPC in the VPC name field; for example, my-vpc,
and enter a name for your subnet in the Subnet name field. This helps you to identify the VPC and

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 10
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

subnet in the Amazon VPC console after you've created them. For this exercise, you can leave the rest
of the configuration settings on the page, and choose Create VPC.

(Optional) If you prefer, you can modify the configuration settings as follows, and then choose Create VPC.
• The IP CIDR block displays the IP address range that you'll use for your VPC (10.0.0.0/16), and the
Public subnet field displays the IP address range you'll use for the subnet (10.0.0.0/24). If you don't
want to use the default CIDR ranges, you can specify your own. For more information, see
VPC and Subnet Sizing.
• The Availability Zone list enables you to select the Availability Zone in which to create the subnet. You
can leave No Preference to let AWS choose an Availability Zone for you. For more information, see
Regions and Availability Zones.
• In the Add endpoints for S3 to your subnets section, you can select a subnet in which to create a VPC
endpoint to Amazon S3 in the same region. For more information, see VPC Endpoints.
• The Enable DNS hostnames option, when set to Yes, ensures that instances that are launched into
your VPC receive a DNS hostname. For more information, see Using DNS with Your VPC.
• The Hardware tenancy option enables you to select whether instances launched into your VPC are
run on shared or dedicated hardware. Selecting a dedicated tenancy incurs additional costs. For more
information about hardware tenancy, see Dedicated Instances.

6. A status window shows the work in progress. When the work completes, choose OK to close the
status window.
7. The Your VPCs page displays your default VPC and the VPC that you just created. The VPC that you
created is a nondefault VPC, therefore the Default VPC column displays No.

Viewing Information About Your VPC

After you've created the VPC, you can view information about the subnet, the Internet gateway, and the route
tables. The VPC that you created has two route tables — a main route table that all VPCs have by default, and
a custom route table that was created by the wizard. The custom route table is associated with your subnet,
which means that the routes in that table determine how the traffic for the subnet flows. If you add a new
subnet to your VPC, it uses the main route table by default.

To view information about your VPC

1. Open the Amazon VPC console at https://console.aws.amazon.com/vpc/.


2. In the navigation pane, choose Your VPCs. Take note of the name and the ID of the VPC that you
created (look in the Name and VPC ID columns). You will use this information to identify the
components that are associated with your VPC.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 11
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

3. In the navigation pane, choose Subnets. The console displays the subnet that was created when you
created your VPC. You can identify the subnet by its name in Name column, or you can use the VPC
information that you obtained in the previous step and look in the VPC column.
4. In the navigation pane, choose Internet Gateways. You can find the Internet gateway that's attached
to your VPC by looking at the VPC column, which displays the ID and the name (if applicable) of
the VPC.
5. In the navigation pane, choose Route Tables. There are two route tables associated with the VPC.
Select the custom route table (the Main column displays No), and then choose the Routes tab to dis
play the route information in the details pane:
• The first row in the table is the local route, which enables instances within the VPC to
communicate. This route is present in every route table by default, and you can't remove it.
• The second row shows the route that the Amazon VPC wizard added to enable traffic
destined for an IP address outside the VPC (0.0.0.0/0) to flow from the subnet to the
Internet gateway.
6. Select the main route table. The main route table has a local route, but no other routes.

Step 2: Create a Security Group

A security group acts as a virtual firewall to control the traffic for its associated instances. To use a security
group, you add the inbound rules to control incoming traffic to the instance, and outbound rules to control the
outgoing traffic from your instance. To associate a security group with an instance, you specify the security
group when you launch the instance. If you add and remove rules from the security group, we apply those
changes to the instances associated with the security group automatically.

Your VPC comes with a default security group. Any instance not associated with another security group during
launch is associated with the default security group. In this exercise, you'll create a new security group,
WebServerSG, and specify this security group when you launch an instance into your VPC.

Topics

• Creating Your WebServerSG Security Group


• Rules for the WebServerSG Security Group

Creating Your WebServerSG Security Group

You can create your security group using the Amazon VPC console.

Rules for the WebServerSG Security Group

The following table describes the inbound and outbound rules for the WebServerSG security group. You'll add
the inbound rules yourself. The outbound rule is a default rule that allows all outbound communication to any-
where — you do not need to add this rule yourself.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 12
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Inbound
Source IP Protocol Port Comments
Range
0.0.0.0/0 TCP 80 Allows inbound HTTP access from anywhere.
0.0.0.0/0 TCP 443 Allows inbound HTTPS access from anywhere.
Public IP address range TCP 22 Allows inbound SSH access from your home
of your home network network to a Linux/UNIX instance.
Public IP address range TCP 3389 Allows inbound RDP access from your home
of your home network network to a Windows instance.
Outbound
Destination IP Protocol Port Comments
Range
0.0.0.0/0 All All The default outbound rule that allows all
outbound communication.

To create the WebServerSG security group and add rules

1. Open the Amazon VPC console at https://aws.amazon.com/console/.


2. In the navigation pane, choose Security Groups.
3. Choose Create Security Group.
4. In the Group name field, enter WebServerSG as the name of the security group, and provide a
description. You can optionally use the Name tag field to create a tag for the security group with a
key of Name and a value that you specify.
5. Select the ID of your VPC from the VPC menu, and then choose Yes, Create.
6. Select the WebServerSG security group that you just created (you can view its name in the
Group Name column).
7. On the Inbound Rules tab, choose Edit and add rules for inbound traffic as follows, and then choose
Save when you're done:
a. Select HTTP from the Type list, and enter 0.0.0.0/0 in the Source field.
b. Choose Add another rule, then select HTTPS from the Type list, and enter 0.0.0.0/0 in the
Source field.
c. Choose Add another rule. If you're launching a Linux instance, select SSH from the Type
list, or if you're launching a Windows instance, select RDP from the Type list. Enter your
network's public IP address range in the Source field. If you don't know this address range,
you can use 0.0.0.0/0 for this exercise.

Caution:

If you use 0.0.0.0/0, you enable all IP addresses to access your instance using SSH or RDP. This is
acceptable for the short exercise, but it's unsafe for production environments. In production, you'll
authorize only a specific IP address or range of addresses to access your instance.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 13
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 3: Launch an Instance into Your VPC

When you launch an EC2 instance into a VPC, you must specify the subnet in which to launch the instance. In
this case, you'll launch an instance into the public subnet of the VPC you created. You'll use the Amazon EC2
launch wizard in the Amazon EC2 console to launch your instance.

The following diagram represents the architecture of your VPC after you've completed this step.

To launch an EC2 instance into a VPC

1. Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.


2. In the navigation bar, on the top-right, ensure that you select the same region in which you created
your VPC and security group.
3. From the dashboard, choose Launch Instance.
4. On the first page of the wizard, choose the AMI that you want to use. For this exercise, we recommend
that you choose an Amazon Linux AMI or a Windows AMI.
5. On the Choose an Instance Type page, you can select the hardware configuration and size of the
instance to launch. By default, the wizard selects the first available instance type based on the AMI
you selected. You can leave the default selection, and then choose Next: Configure Instance Details.
6. On the Configure Instance Details page, select the VPC that you created from the Network list, and
the subnet from the Subnet list. Leave the rest of the default settings, and go through the next pages
of the wizard until you get to the Tag Instance page.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 14
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

7. On the Tag Instance page, you can tag your instance with a Name tag; for example,
Name=MyWebServer. This helps you to identify your instance in the Amazon EC2 console after you've
launched it. Choose Next: Configure Security Group when you are done.
8. On the Configure Security Group page, the wizard automatically defines the launch-wizard-x security
group to allow you to connect to your instance. Instead, choose the Select an existing security group
option, select the WebServerSG group that you created previously, and then choose Review and
Launch.
9. On the Review Instance Launch page, check the details of your instance, and then choose Launch.
10. In the Select an existing key pair or create a new key pair dialog box, you can choose an existing key
pair, or create a new one. If you create a new key pair, ensure that you download the file and store it
in a secure location. You'll need the contents of the private key to connect to your instance after it's
launched. To launch your instance, select the acknowledgment check box, and then choose Launch
Instances.
11. On the confirmation page, choose View Instances to view your instance on the Instances page. Select
your instance, and view its details in the Description tab. The Private IPs field displays the private IP
address that's assigned to your instance from the range of IP addresses in your subnet.

Step 4: Assign an Elastic IP Address to Your Instance

In the previous step, you launched your instance into a public subnet — a subnet that has a route to an Internet
gateway. However, the instance in your subnet also needs a public IP address to be able to communicate with
the Internet. By default, an instance in a nondefault VPC is not assigned a public IP address. In this step, you'll
allocate an Elastic IP address to your account, and then associate it with your instance. For more information
about Elastic IP addresses, see Elastic IP Addresses.

The following diagram represents the architecture of your VPC after you've completed this step.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 15
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

To allocate and assign an Elastic IP address

1. Open the Amazon VPC console at https://console.aws.amazon.com/vpc/.


2. In the navigation pane, choose Elastic IPs.
3. Choose Allocate New Address, and then Yes, Allocate.

Note
If your account supports EC2-Classic, first select EC2-VPC from the Network platform list.

4. Select the Elastic IP address from the list, choose Actions, and then choose Associate Address.
5. In the dialog box, choose Instance from the Associate with list, and then select your instance from
the Instance list. Choose Yes, Associate when you're done.

Your instance is now accessible from the Internet. You can connect to your instance through its Elastic IP
address using SSH or Remote Desktop from your home network. For more information about how to connect to
a Linux instance, see Connecting to Your Linux Instance in the Amazon EC2 User Guide for Linux Instances. For
more information about how to connect to a Windows instance, see Connect to Your Windows Instance Using
RDP in the Amazon EC2 User Guide for Windows Instances.

This completes the exercise; you can choose to continue using your instance in your VPC, or if you do not need
the instance, you can terminate it and release its Elastic IP address to avoid incurring charges for them. You can
also delete your VPC — note that you are not charged for the VPC and VPC components created in this exercise
(such as the subnets and route tables).

Section 2: Configure Unified Gateway for XenDesktop


Navigate to the admin console of your NetScaler.

Log into the NetScaler using nsroot and the Instance ID that Amazon AWS assigned during the build process.

Install SSL Certificate:

1. Navigate to Traffic Management – SSL. Right click and enable this feature.
2. Import SSL certificate an key pair.

Install SSL Certificate:

1. Expand NetScaler Gateway and select Virtual Servers.


2. Click Add.

Enter a name for the gateway and IP Address that is in the Public Subnet you assigned during the NetScaler
Build process.

NOTE: Write down this IP Address as we will need it when allocating the Elastic IP Addresses later on.

3. Click on OK then click on “No Server Certificate” and select the certificate you imported earlier and
click bind.
4. Click on OK and Done and at this stage you should have a NetScaler Gateway being shown in an “Up”
state.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 16
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Configure the Unified Gateway:

Please refer to CTX Article:

https://support.citrix.com/article/CTX205485

Provide external access to the Unified Gateway Instance:

1. Login to your AWS Portal at aws.amazon.com and navigate to your instances.


2. Right click on your NetScaler, Select Networking and then Manage Private IP Addresses.

3. Click on Assign New IP on the interface you want to run the NetScaler Gateway on.
4. Assign the IP Address make sure you use the SAME address that you assigned to your NetScaler
Gateway.

5. Click on “Yes Update”. This will assign the new IP Address to the instance at an AWS level. You can
now assign a new Elastic IP to this Private IP.
6. Navigate to Network and Security and Elastic IP’s,
7. Click “Allocate New Address”, when prompted – select Yes to get a new IP Address.

8. Select the address from the list and select Associate Address.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 17
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

9. Select the NetScaler instance you built previously from the Instance List.
Once this is selected you will be able to select the IP Address you statically assigned to the instance
(the same address as your NetScaler Gateway) and select Associate.

10. Point your DNS name record to the elastic ip address Amazon assigned you.
11. Log into your NetScaler Gateway.

Section 3: High Availability Load Balancing for Storefront


Please refer to Citrix Configuration steps:

https://docs.citrix.com/en-us/storefront/3/integrate-with-netscaler-and-netscaler-gateway/load-balanc-
ing-with-netscaler.html

Section 4: Configure GSLB in Two AWS locations


Setting up GSLB for NetScaler on AWS largely consists of configuring the NetScaler to load balance traffic to
servers located outside the VPC that the NetScaler belongs to, such as within another VPC in a different Avail-
ability Region or an on-premise datacenter etc.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 18
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Section 5:
Domain-Name Based Services (GSLB DBS) with Cloud Load Bal-
ancers
GSLB and DBS Overview
NetScaler GSLB support using DBS (Domain Based Services) for Cloud load balancers allows for the auto discovery of dynam-
ic cloud services using a cloud load balancer solution.
This configuration allows the NetScaler to implement Global Server Load Balancing Domain-Name Based Services (GSLB
DBS) in an Active-Active environment. DBS allows the scaling of backend resources in an Amazon Web Services (AWS) and
Microsoft Azure environments from DNS discovery.

This section covers integrations between NetScaler in the AWS and Azure Auto Scaling environments. The final section of the
document details the ability to set up a HA pair of NetScalers that span two different Availability Zones (AZs) specific to an
AWS region.

Required Prerequisites
The prerequisites for the NetScaler GSLB Service Groups include a functioning Amazon Web Services / Microsoft Azure envi-
ronment with the knowledge and ability to configure Security Groups, Linux Web Servers, NetScalers within AWS, Elastic IPs
and Elastic Load Balancers.

GSLB DBS Service integration requires NetScaler version 12.0.57 for Amazon AWS ELB and Microsoft Azure ALB load balancer
instances.

Netscaler GSLB Service Group Feature Enhancements


GSLB Service Group entity: NetScaler version 12.0.57
GSLB Service Group is introduced which supports autoscale using BDS dynamic discovery.
DBS Feature Components (domain based service) shall be bound to the GSLB service group

example:
> add server sydney_server LB-Sydney-xxxxxxxxxx.ap-southeast-2.elb.amazonaws.com
> add gslb serviceGroup sydney_sg HTTP -autoScale DNS -siteName sydney
> bind gslb serviceGroup sydney_sg sydney_server 80

Domain-Name Based Services – AWS ELB


GLSB DBS utilizes the FQDN of your Elastic Load Balancer to dynamically update the GSLB Service Groups to include the
back-end servers that are being created and deleted within AWS. The back-end servers or instances in AWS can be config-
ured to scale based on network demand or CPU utilization. To configure this feature, we point the NetScaler to our Elastic
Load Balancer to dynamically route to different servers in AWS without having to manually update the NetScaler every time
an instance is created and deleted within AWS. The NetScaler DBS feature for GSLB Service Groups uses DNS aware service
discovery to determine the member service resources of the DBS namespace identified in the AutoScaler group.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 19
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Diagram:
NetScaler GSLB DBA AutoScale components with Cloud Load Balancers

Section 6 – Configuring AWS Components


Security Groups
Note:
Recommendation should be to create different security groups for ELB, Netscaler GSLB Instance and Linux instance, as the
set of rules required for each of these entities will be different.
This example has a consolidated Security Group configuration for brevity.

Please refer to the AWS Security Group documentation to ensure the proper configuration of the virtual firewall:

https://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_SecurityGroups.html#VPCSecurityGroups

Step1:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to NETWORK & SECURITY -> Security Groups

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 20
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 2:
Click [Create Security Group] and provide a name and description. This security group will encompass the NetScaler and Linux backend web
servers.

Step 3:
Add the inbound port rules from the screenshot below.
Note: Limiting Source IP access is recommended for granular hardening.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html#sg-rules-web-server

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 21
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Amazon Linux Backend Web Services

Step 4:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to Instances

Step 5:
Click [Launch Instance] using the details below configure the Amazon Linux instance.
Fill in details about setting up a Web Server or backend service on this instance.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 22
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

NetScaler Configuration

Step 6:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to Instances

Step 7:
Click [Launch Instance] using the details below configure the Amazon AMI instance.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 23
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Elastic IP Configuration

Note:
Netscaler can also be made to run with single elastic IP if required to reduce cost, by not having public IP for the NSIP. Instead attach elastic IP
to SNIP which can cover for management access to the box, as well as GSLB site IP and ADNS IP.

Step 7:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to NETWORK & SECURITY and then configure Elastic IPs.
Click [Allocate new address] to create a new Elastic IP address.
Configure the Elastic IP to point to your running NetScaler instance within AWS.
Configure a second Elastic IP and again point it to your running NetScaler instance.

Elastic Load Balancer

Step 8:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to LOAD BALANCING and then Load Balancers.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 24
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 9:
Click [Create Load Balancer] to configure a classic load balancer

Your Elastic Load Balancers will allow you to load balance your back end Amazon Linux instances while also being able to
Load Balance additional instances that are spun up based on demand.

Configuring Global Server Load Balancing Domain-Name Based


Services
Traffic Management configurations
Note:
It is required to configure the NetScaler with either a nameserver or a dns vserver through which the ELB /ALB Domains will be
resolved for the DBS Service Groups.

https://developer-docs.citrix.com/projects/netscaler-command-reference/en/12.0/dns/dns-nameserver/dns-nameserver/

Step 1:
Navigate to Traffic Management -> Load Balancing -> Servers

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 25
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 2:
Click [Add] to create a server, provide a name and FQDN corresponding to the A record (domain name) in AWS for the Elastic Load Balancer
(ELB)
Repeat step 2 to in order to add the second ELB from the second resource location in AWS.

GSLB Configurations

Step 1:
Navigate to Traffic Management -> GSLB -> Sites

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 26
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 3:
Click the [Add] button to configure a GSLB Site

Name the Site, the Type is configured as Remote or Local based on which NetScaler you are configuring the site on. The Site IP Address is the
IP address for the GSLB site. The GSLB site uses this IP address to communicate with the other GSLB sites. The Public IP address is required
when using a cloud service where a particular IP is hosted on an external firewall or NAT device. The site should be configured as a Parent Site.
Ensure the Trigger Monitors are set to ALWAYS and be sure to check off the three boxes at the bottom for Metric Exchange, Network Metric
Exchange, and Persistence Session Entry Exchange.

Recommendation is to set Trigger monitor setting to MEPDOWN, please refer link:


https://docs.citrix.com/en-us/netscaler/12/global-server-load-balancing/configure/configuring-a-gslb-service-group.html
for more details on this.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 27
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 4:
Below is a screenshot from our AWS configurations, showing where you can find the Site IP Address and Public IP Address. They are found
under Network & Security -> Elastic IPs
Click [Create], repeat steps 3 & 4 to configure the GSLB site for the other resource location in Azure (this can be configured on the same
NetScaler)

Step 5:
Navigate to Traffic Management -> GSLB -> Service Groups

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 28
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 6:

Click [Add] to add a new service group. Name the Service Group, use HTTP protocol, and then under Site Name choose the respective site
that was created in the previous steps. Be sure to configure AutoScale Mode as DNS and check off the boxes for State and Health Monitoring.
Click OK to create the Service Group.

Step 7:

Click Service Group Members and select Server Based. Select the respective Elastic Load Balancing Serve that was configured in the start of
the runguide. Configure the traffic to go over port 80. Click Create.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 29
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 8:

The Servicegroup Member Binding should populate with 2 instances that it is receiving from the Elastic Load Balancer.

Repeat steps to configure the Service Group for the second resource location in AWS. (this can be done from the same

Step 9:

Navigate to Traffic Management -> GSLB -> Virtual Servers.

Click [Add] to create the virtual server. Name the server, DNS Record Type is set as A, Service Type is set as HTTP, and
check the boxes for Enable after Creating and AppFlow Logging. Click OK to create the GSLB Virtual Server. NetScaler GUI)

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 30
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 10:

Once the GSLB Virtual Server is created, click No GSLB Virtual Server ServiceGroup Binding.

Click [Add] to create the virtual server. Name the server, DNS Record Type is set as A, Service Type is set as HTTP, and
check the boxes for Enable after Creating and AppFlow Logging. Click OK to create the GSLB Virtual Server. NetScaler GUI)

Step 11:

Under ServiceGroup Binding use Select Service Group Name to select and add the Service Groups that were created in the previous steps.

Step 12:

Next configure the GSLB Virtual Server Domain Binding by clicking on No GSLB Virtual Server Domain Binding. Configure the FQDN and Bind,
the rest of the settings can be left as the defaults.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 31
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 13:

Configure the ADNS Service by clicking on No Service. Add a Service Name, click New Server and enter the IP Address of the ADNS server.
Additionally if your ADNS is already configured you can select Existing Server and then choose your ADNS from the drop down menu. Make
sure the Protocol is ADNS and the traffic is over Port 53.

Configure the Method as LEASTCONNECTION and Backup Method as ROUNDROBIN

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 32
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

NetScaler integration with AWS Auto Scaling


AWS includes a feature called Auto Scaling that will spin up additional instances running in AWS based on rules
set by the administrator. These rules are defined by CPU utilization and revolve around creating and deleting instances on
demand. NetScaler directly integrates with the AWS Auto Scaling solution making the NetScaler aware of all available backend
servers that it can load balance. The limitation of this feature is that it currently only functions within one AZ in AWS.

Section 7:
Configuring AWS Components

Step 1:

Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to AUTO SCALING -> Launch Configuration. Click [Create launch
configuration].

Step 2:

From this step, you can choose the server type of your choosing. This is where you configure what VMs you want to auto scale. For this
example, we will be choosing Amazon Linux AMI.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 33
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 3:

Choose which type of instance you need by selecting from potential variance for backend resources. Name your instance, for the remained of
the runguide the name of the instance will be known as Backend-Server. Configure storage for the instance and add it to a security group or
create a new security group which will encompass all AWS components created in this run guide.

Step 4:
An additional note for your security group. For this run guide, the following ports here opened:

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 34
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Section 8:
Auto Scaling Groups & Configuring Scaling Policies

Step 1:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to AUTO SCALING -> Auto Scaling Group

Click the radio button for Create an Auto Scaling group from an existing launch configuration. Be sure to select the Backend-
Server that we created in the previous step of the lab guide.

Under Create Auto Scaling Group add the group name, choose the initial group size, choose the Network and Subnet and
then click Next. **Note** the Subnet must be reachable from the subnet IP (SNIP) of the NetScaler

Step 2:
On the Create Auto Scaling Group configuration page, configure your scaling policies. This is done by clicking the radio button
for Use scaling policies to adjust the capacity of this group. Next., click Scale the Auto Scaling group using step or simple
scaling policies.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 35
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 3:
Select [Add new alarm]

Step 4:
While you are creating the alarm, configure to Send a notification to your NetScaler. Configure the alarm so that Average of
CPU Utilization is >= 70 for at least 1 consecutive period of 5 minutes. Apply the policy

Step 5:
Configure in your Auto Scaling Group to Add 1 instance when the policy is triggered.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 36
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 5:
Configure the same alarm and policy but this time to remove a Backend-Server when the CPU averages <=30 for a period of
5 minutes. Set the decrease group size to Remove 1 instance when the decrease policy is triggered. **Note** For deletion of
servers, we are just notifying NetScaler to not send any traffic to a Backend-Server marked for deletion.

Click through Configure Notifications & Configure Tags to Review and Create Auto Scaling Group.

**Additional Note** The Min and Max variables can be configured to set the fewest and highest number of instances that will
be created and running within the Auto Scaling Group. Currently AWS supports spinning up additional instances with only
one network interface.

Creating a NetScaler in AWS.


Step 1:
Login to your AWS resource group and Navigate to EC2. Within EC2 navigate to Instances -> Instances

Step 2:
Navigate to AWS Marketplace on the left and then search for NetScaler. Choose NetScaler VPX – Customer Licensed. Make sure
you version number is 12.0.51.x in order to use Auto Scaling. You can select previous versions to choose a version of NetScaler
that supports Auto Scaling.

Step 3:
Navigate to AWS Marketplace on the left and then search for NetScaler. Choose NetScaler VPX – Customer Licensed. Make sure
you version number is 12.0.51.x in order to use Auto Scaling. You can select previous versions to choose a version of NetScaler
that supports Auto Scaling.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 37
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Choose the Instance Type, for example General Purpose m4.xlarge 4vCPU and 16gb RAM. Click
[Next]

Step 4:
On the Configure Instance Details tab, select the Subnet (three subnets will eventually have to be configured for NSIP, SNIP,
and VIP/Gateway). Additionally you will have to add an IAM role. Click create new IAM Role. Add the IAM Roles that are found
in the following step. After this role is created you will also have to add this to your Cloud Profile on your NetScaler.

Step 5:
Configurations for the Cloud Profile are as follows:

By default the CloudFormation Template creates and attaches the below IAM Role
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeNetworkInterfaces",
"ec2:DetachNetworkInterface",
"ec2:AttachNetworkInterface",
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:RebootInstances",
"autoscaling:*",
"sns:*",
"sqs:*"
“iam: SimulatePrincipalPolicy”
“iam: GetRole”
],
"Resource": "*",
"Effect": "Allow"
}
]
}

Step 5:
Click through the Add Storage Option.

On the Add Tags tab, set the Key value as Name and the Value as Netscaler-Autoscale to tag these EC2 resources.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 38
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Step 6:
On the Configure Security Group tab, create a new security group with the following port requirements:
Review and launch the instance.

Step 7:
Navigate to NETWORK & SECURITY -> Network Interfaces and click [Create Network Interface].

Add a description and then select a subnet. This subnet will be utilized for your SNIP so it should be placed on a subnet in the
internal network. Additionally choose the security group crated in the previous step. Click [Yes, Create]

Add an additional Network Interface, this will be a Public facing subnet for your Gateway/LB
VIP. Create a description and choose the security group configured above.

Step 8:
Navigate back to Instances and select your NetScaler. In order to add the Network Interfaces to the NetScaler the Instance will
have to be Stopped. On the dropdown [Actions] select Instance State and then click Stop.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 39
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Again click the [Actions] button, navigate down to Networking and Attach Networking
Interface.

The NSIP interface is already attached to the VM, the next interface to be added should be the
LB-VIP, followed by adding the server/internal interface for the SNIP. Once the Network Interfaces
are attached, the instance can be Started.

Configure a new Elastic IP and associate it with your NSIP interface.

Section 9:
Configuring NetScaler to integrate with AWS Auto Scaling

Step 1:
Navigate to the Elastic IP you associated with the NSIP in the previous step of this lab guide in order to access the NetScaler
Management console.

The first step to configuring the NetScaler is to attach a Cloud Profile. Click on AWS and then Cloud Profile. Next click [Add] to
create a Cloud Profile.

Provide a name for the cloud profile. The Virtual Server IP Address should populate and correlate with an internal IP on your
NetScaler. The Auto Scale Group will be the one that you created in previous steps of this lab guide. Select Graceful, this allows
a time out for backend instances to be deleted, allowing any packet transfers to complete and sessions not to be terminated
within the grace period. The time delay for the grace period can be adjusted.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 40
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 41
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

Additional References:
Implementation Guide: Citrix XenDesktop in AWS
https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-xenapp-on-aws-imple-
mentation-guide.pdf?_ga=1.244214850.616030943.1431530766

How do I Configure Unified Gateway for Common Enterprise Applications


https://support.citrix.com/article/CTX205485

Accelerate your business by running Citrix solutions on Amazon Web Services (AWS)
https://www.citrix.com/global-partners/amazon-web-services/

Cloud Networking and Desktop Virtualization Solutions for Amazon Web Services
https://aws.amazon.com/solutions/global-solution-providers/citrix/

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 42
Validated Reference Design Guide for NetScaler and Amazon AWS Solution Guide

About Citrix

Citrix (NASDAQ:CTXS) is a leader in mobile workspaces, providing virtualization, mobility management, net-
working and cloud services to enable new ways to work better. Citrix solutions power business mobility through
secure, personal workspaces that provide people with instant access to apps, desktops, data and communica-
tions on any device, over any network and cloud. This year Citrix is celebrating 25 years of innovation, making
IT simpler and people more productive. With annual revenue in 2013 of $2.9 billion, Citrix solutions are in use at
more than 330,000 organizations and by over 100 million users globally. Learn more at www.citrix.com.

Copyright © 2014 Citrix Systems, Inc. All rights reserved. Citrix, NetScaler MPX, NetScaler SDX, NetScaler, Cloud-
Bridge and AppFlow are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered
in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of
their respective companies.

Citrix.com | Solution Guide | Validated Reference Guide for NetScaler and Amazon AWS 43

You might also like