Nothing Special   »   [go: up one dir, main page]

m4 Cns205 Securing Netscaler

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

Securing NetScaler

CNS 205-5I: Citrix NetScaler 10.5 Essentials and Networking

Overview
After completing this module, you will be able to:
Identify items and entities that need to be secured in a NetScaler environment.
Implement secure authentication for users to the NetScaler system and resources.
Design and maintain access control lists to secure NetScaler communications.
Configure NetScaler system options to protect against unauthorized attacks.

2014 Citrix Systems

NetScaler System Communication


To secure NetScaler system communication, you must first trace the external and
the internal communication that occurs when the NetScaler system is deployed
NetScaler communication types and layers must be secured
The NetScaler system uses layer 2 for internal, external, and management
communication
Access control lists also communicate on layer 2, layer 3, and layer 4

2014 Citrix Systems

NetScaler System Communication

Port

Type

Use

Secure

22

TCP

SSH

Secure

80

TCP

GUI Web Front End,


XML-API

Non-secure

161

UDP

SNMP
Request/Response
Traffic

Non-secure

162

UDP

SNMP Traps

Non-secure

443

TCP

GUI Web Front End,


XML-API

Secure

3003

UDP

HA Heartbeat

Non-secure

3008

TCP

HA Communication

Secure

3009

TCP

HA Communication,
GSLB MEP

Secure

2014 Citrix Systems

Access Control Lists


The NetScaler system compares incoming packets against the access control
lists
If a packet matches an access control list rule, the action specified in the rule is
applied to the packet

Types of ACLs
1. Simple ACL
2. Extended ACL

2014 Citrix Systems

Access Control Lists


Simple ACLs filter packets on the basis of their source IP address and, optionally,
their destination port and/or their protocol. Any packet that has the characteristics
specified in the ACL is dropped.

Extended ACLs filter data packets on the basis of various parameters, such as
source IP address, source port, action, and protocol. An extended ACL defines
the conditions that a packet must satisfy for the NetScaler to process the packet,
bridge the packet, or drop the packet. These actions are known as "processing
modes."

2014 Citrix Systems

Access Control Lists Process

2014 Citrix Systems

Matching Access Control List Entries


The NetScaler system can implement IP address-based traffic control on data
that it handles using access control lists
The ways in which traffic can be handled once it is matched are:
Allowed
Bridged
Denied

2014 Citrix Systems

Access Control List Configuration

2014 Citrix Systems

Extended Access Control Lists

Extended access control lists filter data packets on the basis of various
parameters, such as:
Source IP address
Source port
Action
Protocol

10

2014 Citrix Systems

Access Control Lists Application


Each access control list has an active status and an applied status
The active status indicates whether an access control list is ENABLED or
DISABLED
The applied status indicates whether the access control list is APPLIED or
NOTAPPLIED

11

2014 Citrix Systems

Authentication, Authorization, and Auditing (AAA)


Authentication identifies which accounts are allowed to log on
Authorization identifies to which resources authenticated users are allowed or
denied access
Auditing tracks and logs authentication and authorization activity results

12

2014 Citrix Systems

System and AAA Users Groups

13

2014 Citrix Systems

Local Accounts
Each NetScaler system has two local system accounts that are always
maintained as local accounts:
nsroot
#nsinternal#

14

2014 Citrix Systems

External Authentication
The NetScaler system integrates with the following external authentication and
directory services systems:
LDAP
RADUIS
TACACS+

15

2014 Citrix Systems

Authentication Actions and Policies

16

2014 Citrix Systems

Policy

Action

localPolicy

No associated action

ldapPolicy

ldapAction

radiusPolicy

radiusAction

tacacsPolicy

tacacsAction

nt4Policy

nt4Action

Local Authentication Configuration


When configuring the default local authentication:
An administrator must create a system user account and group on the NetScaler system
One or more user accounts must be bound to each group. Permissions can then be managed at
the group level.
The appropriate command policies must be bound to either the system user accounts or the
system groups

17

2014 Citrix Systems

WORK BETTER. LIVE BETTER.

18

2014 Citrix Systems

You might also like