Over

155,000

Africa & Middle East

7Days 10.00 A.M - 10.00 P.M

Call us

Enquire Now

Citrix NetScaler 10 Essentials and Networking (CNS-205-1)

Course Objectives

This course is recommended for you if you are:

  • New to the NetScaler platform
  • Currently networking professionals
  • For administrators interested in integrating NetScaler as an access gateway, please refer CAG-200 Implementing Citrix Access Gateway 9.0 Enterprise Edition.

Upon successful completion of this course, you will be able to:

  • Identify the capabilities and functionality of the NetScaler
  • Explain basic NetScaler network architecture
  • Obtain, install, and manage NetScaler licenses
  • Explain how SSL is used to secure the NetScaler
  • Implement NetScaler TriScale Technology, including Clustering
  • Configure advanced load balancing and GSLB on the NetScaler system
  • Optimize the NetScaler system for traffic handling and management.
  • Customize the NetScaler system for traffic flow and content-specific requirements
  • Demonstrate monitoring and reporting through native NetScaler logging tools
  • Employ recommended tools and techniques to troubleshoot common NetScaler network and connectivity issues

Course Outline

  1. Getting Started
    1. Introduction to the NetScaler System
    2. NetScaler Functionality
    3. NetScaler Overview
    4. Product Features
    5. Hardware Platforms
    6. Hardware Components
    7. nCore Configuration Architecture
    8. Deployment Scenarios
    9. Logging on to the NetScaler System
    10. NetScaler Licenses
    11. Performing an Upgrade
  2. Basic Networking
    1. OSI Networking Model
    2. NetScaler Architecture Overview
    3. NetScaler-Owned IP Addresses
    4. Network Topology
    5. NetScaler Network Interfaces
    6. Virtual Local Area Networks (VLANs)
    7. IP Routing
    8. Determining the Source IP Address
    9. Packet Forwarding
    10. Use Source IP Mode
    11. Client-IP HTTP Header Insertion
    12. Path MTU Discovery
    13. Link Aggregation
    14. Network Address Translation (NAT)
  3. High Availability
    1. High Availability Functionality
    2. High Availability Node Configuration
    3. Propagation and Synchronization
    4. High Availability Management
  4. Securing NetScaler
    1. NetScaler System Communication
    2. Access Control Lists
    3. Access Control List Configuration
    4. Detailed Access Control List Configuration
    5. Users, Groups, and Command Policies
    6. External Authentication for System Users
    7. Authentication, Authorization, and Auditing (AAA) Issues
    8. Authentication Troubleshooting
  5. Basic Load Balancing
    1. Load Balancing Basics
    2. Entity Management
    3. Server Creation
    4. Services Configuration Overview
    5. Virtual Server Creation
    6. Binding Virtual Servers to Services or a Service Group
    7. Traffic Types
    8. Service Monitoring
    9. Persistence and Persistence Connections
    10. Load-Balancing Configuration Protection
    11. Advanced Services Options
    12. Maintaining of Client Connection for Multiple Client Requests
    13. Specified Source IP Addresses for Back-end Communication Using Network Profiles
    14. Disabling Services
    15. Graceful Shutdown of Services
    16. Removing Services
    17. Configuration Verification
    18. The Load-Balancing Visualizer
    19. Configuring Load Balancing for DataStream
    20. Link Load Balancing
    21. Configuration of Sessionless Load-Balancing Virtual Servers
    22. Load-Balancing Issues
    23. Use of Telnet or Monitors to Check Ports
  6. SSL Offload
    1. SSL
    2. SSL Session Process
    3. Feature and Benefits
    4. Offload Performance
    5. Digital Certificates
    6. SSL Administration
    7. SSL Offload Overview
    8. Deployment Scenarios
    9. Citrix Recommendations for SSL
    10. SSL Renegotiation Attack
    11. SSL Troubleshooting
    12. Intermediate Certificate Not Linked
  7. Global Server Load Balancing
    1. GSLB Deployment Methods
    2. GSLB Concepts
    3. GSLB Entities
    4. GSLB DNS Methods
    5. Metric Exchange Protocol
    6. Implementing GSLB
    7. Viewing and Configuring GSLB with the Visualizer
    8. Configuring Site-to-Site Communication
    9. RPC Node Password
    10. Encryption of Site Metrics Exchange
    11. Source IP Address for an RPC Node
    12. GSLB Site Communication Example
    13. Customizing the GSLB Configuration
    14. Changing the GSLB Method
    15. GSLB Persistence
    16. Using Dynamic Weights for Services
    17. Monitoring GSLB Services
    18. Binding Monitors to a GSLB Service
    19. Monitoring GSLB Sites
    20. Protecting the GSLB Setup Against Failure
    21. Responding with an Empty Address Record When DOWN
    22. Backup IP Address Configuration for a GSLB Domain
    23. Implementing GSLB Failover for Disaster Recovery
  8. AppExpert Classic Policy Engine
    1. Policies Overview
    2. Expression Structures
    3. Content Filtering
    4. Content Filtering Actions
    5. Content Filtering Rules
    6. AppExpert Default Policy Engine
    7. Understanding Packet-Processing Flow
    8. Understanding Policies
    9. Policy Process Evaluation Flow
    10. Identifying Default Policy Expressions
    11. Actions
    12. Understanding Bind Points
    13. Understanding Policy Labels
    14. Pattern Sets
    15. Typecasting
  9. Rewrite, Responder, and URL Transformation
    1. Rewrite, Responder, and URL Transform
    2. Configuring Rewrite Policies and Actions
    3. Responder Actions
    4. Respondwith
    5. Responder Action for Timeouts
    6. Responder Policies
    7. Responder HTML Page Imports
    8. Binding Policies
    9. URL Transformation
    10. URL Transformation Actions
    11. Binding of URL Transformations
  10. Content Switching
    1. Introduction to Content Switching
    2. Understanding Content Switching
    3. Content Switching Based on Network Characteristics
    4. Content-Switching Virtual Servers and Load-Balancing Virtual Servers
    5. Configuring Content-Switching Virtual Servers
    6. Configure a Load-Balancing Setup for Content Switching
    7. Content-Switching Policies
    8. Binding Content-Switching Policies
    9. Content-Switching Rule Precedence Without Priority Specified
    10. Content-Switching Rule Precedence With Priority Specified
    11. Configuring Content Switching for DataStream
  11. Optimizing Traffic
    1. Introduction to Compression
    2. Action Analytics
    3. AppExpert Templates
    4. Terminiology
    5. Deploying NetScaler for an Application
    6. Application Example
    7. AppExpert Template Deployment
  12. Clustering
    1. How Clustering Works
    2. Cluster Synchronization
    3. Cluster Connections
    4. Cluster Communication Interfaces
    5. Striped and Spotted IP Addresses
    6. Traffic Distribution
    7. Cluster and Node States
    8. NetScaler Cluster Set up
    9. NetScaler Cluster Traffic Distribution Mechanisms
    10. To Configure a Cluster Link Aggregation Group Statically
    11. Dynamic Configuration for a Cluster Link Aggregation Group
    12. NetScaler Cluster Management
    13. NetScaler Cluster Troubleshooting
  13. Monitoring and Management
    1. Monitoring Needs
    2. NetScaler Log Management
    3. Simple Network Management Protocol
    4. To Configure SMNPv1 and SMNPv2
    5. AppFlow on the NetScaler System
    6. AppFlow Collectors and EdgeSight Monitoring
    7. AppFlow Actions and EdgeSight Monitoring Responder Policies
    8. Third-Party Collectors
    9. Network Traffic Capture using NSTRACE
    10. Troubleshooting with Filter Expressions
    11. Decoding SSL Traffic with Wireshark
    12. Display NetScaler System Information

APPLY TO COURSE

Sum the simple Operation :
7 + 13 =