Hands-on Lab Exercise Guide
|
|
- Sheena Williams
- 6 years ago
- Views:
Transcription
1 606: Improving Microsoft Exchange 2013 Performance with NetScaler Hands-on Lab Exercise Guide Johnathan Campos and Daniel Kuenzli May 2015
2 Table of Contents Table of Contents... 1 Overview... 2 Scenario... 6 Exercise 1: Initial Configuration... 7 Exercise 2: Configuring Custom Monitors for Exchange Exercise 3: Configuring Service Groups for Exchange Exercise 4: Configuring Virtual Servers for Exchange Exercise 5: Configuring the Content Switching Virtual Server for Exchange Exercise 6: Configuring Custom Responder Policies for Exchange Exercise 7: Configuring Single Sign-On for Exchange
3 Overview Hands-on Training Module Objective Companies today conduct much of their business online. Whether for corporate communications, websites for product and service information or sales, or server-hosted apps that run across a variety of end-user devices, companies rely on secure, reliable network connectivity in order to function and prosper. As the volume of a company s network traffic increases, so does the need for robust, resilient, and reliable network infrastructure that can not only sustain the network traffic, but optimize it. Gaining optimum efficiency in network connections, whether between private company assets across semi-private telecommunications channels, or between companies and their customers across the public internet, is a key asset to any company s operations. Citrix NetScaler, leveraging Load Balancing, optimizes and enhances the reliability of network infrastructures to allow better, more secure network communications, regardless of device or protocol. In this hands-on lab, we will configure Citrix NetScaler s Load Balancing, Custom Monitors, and Responder features in tandem with Microsoft Exchange The exercises shown in this hands-on lab guide will allow administrators to work with the features focused on the replacement of Microsoft Threat Management Gateway with Citrix NetScaler. Challenges: Providing increased reliability of services, even in the face of individual server downtime Ensuring that communications facilitate business operations while not introducing potential security threats Optimizing the user experience when access services Provide a replacement for the existing web proxy (Microsoft Threat Management Gateway) Prerequisites Basic understanding of deployment scenarios of the Citrix NetScaler. Basic understanding of deployment scenarios of Microsoft Exchange Basic understanding of the Microsoft Exchange 2013 management console. Audience Citrix Partners Customers Sales Engineers 2
4 Consultants Technical Support Lab Environment Details The system diagram of the lab is shown below: The Student Desktop is accessed remotely using Citrix Receiver running on your laptop. All windows applications such as XenCenter, (the XenServer GUI management tool), are accessed from the Student Desktop. Lab Guide Conventions This symbol indicates particular attention must be paid to this step Special note to offer advice or background information reboot VMDemo Start Text the student enters or an item they select is printed like this Filename mentioned in text or lines added to files during editing Bold text indicates reference to a button or object Focuses attention on a particular part of the screen (R:255 G:20 B:147) Shows where to click or select an item on a screen shot (R:255 G:102 B:0) 3
5 List of Virtual Machines Used VM Name IP Address Description / OS Site1-NS Citrix NetScaler Build Site1-AD Windows Server 2012R2 LDAP Server Site1-Client Windows 8.1 Client Site1-Exchange Windows Server 2012R2 Exchange CAS/MB Site2-Exchange Windows Server 2012R2 Exchange CAS/MB Site2-AD Windows Server 2012R2 LDAP Server Required Lab Credentials The credentials required to connect to the environment and complete the lab exercises. VM Name IP Address Username Password Site1-NS nsroot nsroot Site1-AD Training\Administrator Citrix123 Site1-Client Training\Administrator Citrix123 Site1-Exchange Training\Administrator Citrix123 Site2-Exchange Training\Administrator Citrix123 Site2-AD Training\Administrator Citrix123 4
6 Important Lab Environment Note When connecting to the lab environment, you may be prompted to restart the Windows on the Student Desktop If prompted, please select Restart Later. Selecting Restart Now will disconnect you from the Student Desktop. Additionally, you may receive intermittent User Access Control prompts on the Student Desktop regarding jucheck.exe: When prompted, please select No and continue with your lab. 5
7 Scenario AnyCo, Inc. has requested that a Sales Engineer demonstrate to their executive IT staff a solution that can improve the reliability and operational continuity of their infrastructure while also enhancing their network security as they increase the amount of traffic that must flow between their internal network and the public internet. Likewise, they also want to ensure that these additional security and functionality enhancements do not impede their available throughput or negatively impact their employees day-to-day productivity. Citrix NetScaler, through its Load Balancing feature, can provide all of these abilities and more. In order to improve availability system-wide and provide service redundancy, your goal is to assist AnyCo, Inc. with their challenges outlined below, and ensure that these solutions fit their business needs. Challenges: The customer wants to make sure that their services continue despite server maintenance or unexpected downtime in any one site s sent outside the company should reveal as little network information as possible about the sender s environment Fluctuating volumes of and other network traffic should not affect users experience working within the company s network Users experience should be considered when accessing web services Replacement of the current web services proxy, current web services proxy is end of support December
8 Exercise 1 Initial Configuration Overview This exercise will guide you through the initial configuration of the NetScaler appliance in this lab environment, which are identified as: Site1-NS1 The following settings will be configured for each NetScaler: NSIP (NetScaler Management IP) SNIP (Subnet IP) Verify Licenses Enable Global Features Step by step guidance Estimated time to complete this lab: 20 minutes. Step Action 1. Begin by logging on to the assigned Citrix XenServer by double-clicking on the Citrix XenCenter icon. XenCenter may open automatically if XenCenter does not open, proceed with Step Connect to the assigned XenServer by right clicking on your attached XenServer and clicking Connect. 7
9 3. Enter the XenServer credentials shown on the login screen of the lab execution page and click Connect. Below is an example of assigned XenServer credentials. 8
10 4. Select the following VM and click on the console tab to begin the configuration of the Citrix NetScaler. VM: Site1-NS1 5. Enter the following IP Address, Subnet Mask and Default Gateway for the Site1-NS1, pressing Enter after each line entry. IP Address: Subnet Mask: Default Gateway:
11 6. Select the following option and press Enter to Save and Quit to commit the following settings previously entered. Option: 4 7. Once the reboot is completed proceed to login to the Site1-NS1 NetScaler ADC with the following credentials. Login: nsroot Password: nsroot When entering the password text will not display for security reasons. 10
12 8. Enter the following command once logged onto the Site1-NS1 and confirm that is set as the NetScaler IP. Command: show ns ip Once verified type exit on the Site1-NS1 console, press Enter, and minimize the XenCenter application. 11
13 9. Using Internet Explorer, proceed to type the below URL and credentials to logon to the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 10. Select the Subnet IP Address box on the initial NetScaler configuration wizard to enter the SNIP (Subnet IP Address) for the Site1-NS1 NetScaler ADC. 12
14 11. Enter the following Subnet IP Address and click Done. Subnet IP Address: A subnet IP address is used by the NetScaler to communicate with the backend servers. NetScaler uses this subnet IP address as a source IP address to proxy the client connections as well as to send monitor probes to check the health of the backend servers. 12. Proceed to click the Host Name, DNS IP Address, and Time Zone boxes on the initial NetScaler configuration wizard to enter the Host Name, DNS IP Address, and Time Zone for the Site1-NS1 NetScaler ADC. 13
15 13. Enter the following Host Name, DNS IP Address, and Time Zone and click Done. Host Name: NS1 DNS IP Address: Time Zone: GMT-4:00-EDT-America/New_York 14. Proceed to click the Licenses box on the initial NetScaler configuration wizard to confirm the license for the Site1-NS1 NetScaler ADC. 14
16 15. Confirm that the four pre-configured licenses have been uploaded to the Site1-NS1 NetScaler ADC and click Back. 16. Click Continue on the initial NetScaler configuration wizard to proceed to the Site1-NS1 NetScaler dashboard. 15
17 17. From the NetScaler dashboard proceed to System > Settings > and click Configure Basic Features. 18. Select the following basic features and click OK to return to the NetScaler dashboard. Features: SSL Offloading Load Balancing Rewrite Authentication, Authorization, and Auditing HTTP Compression Content Switching 16
18 Click Configure Advanced Features to now enable several advanced features.
19 20. Select the following advanced features and click OK to return to the NetScaler dashboard. Features: Responder Surge Protection and Web Logging are selected by default. DO NOT un-select. Surge Protection: This feature ensures that connections to the server occur at a rate which the server can handle. The response rate depends on how surge protection is configured. The NetScaler appliance also tracks the number of connections to the server, and uses that information to adjust the rate at which it opens new server connections. Web Logging: This feature send logs of HTTP and HTTPS requests to a client system for storage and retrieval. This feature has two components: The Web log server, which runs on the NetScaler. The NetScaler Web Logging (NSWL) client, which runs on the client system. When you run the NetScaler Web Logging (NSWL) client: 1. It connects to the NetScaler. 2. The NetScaler buffers the HTTP and HTTPS request log entries before sending them to the client. 3. The client can filter the entries before storing them. 18
20 21. From the NetScaler dashboard proceed to Traffic Management > SSL > Certificates and click Install to begin the installation of the SSL certificates utilized in this lab and exercise. 22. Add the following Certificate-Key Pair Name and browse for the Certificate File on the local C:\Certificates folder of the student desktop for the MCTIntermediate.cer certificate file. Click Install to complete the installation. Certificate-Key Pair Name: MCT Intermediate Intermediate certificates sit between an end entity certificate and a root certificate. They help complete a Chain of Trust from your certificate back to your certification authorities root certificate. 19
21 23. Confirm that the MCT Intermediate certificate has been installed and click Install to continue installation of the second certificate utilized in this lab and exercise. 24. Add the following Certificate-Key Pair Name and browse for the Certificate File on the local C:\Certificates folder of the student desktop for the MCTWildcard.cer certificate file and MyCitrixTraining.key key file. Click Install to complete the installation. Certificate-Key Pair Name: MCT Key Pair 20
22 25. Confirm that the MCT Key Pair certificate has been installed. 26. Link the MCT Key Pair SSL Certificate and MCT Intermediate SSL Certificate by right clicking on the MCT- Key Pair and selecting Link. 27. Select the following CA Certificate Name and click OK to complete the link between both SSL certificates. CA Certificate Name: MCT Intermediate 21
23 28. Click the small blue disk to save the NetScaler configuration. Click Yes to confirm. Exercise Summary In this exercise, you configured the basic features of Citrix NetScaler, including its IP addresses, licensing, and advanced feature enablement. 22
24 Exercise 2 Configuring Custom Monitors for Exchange 2013 Overview This exercise explains how to create custom Microsoft Exchange monitors to thoroughly inspect all existing Microsoft Exchange virtual directories. These monitors will specifically probe the below Exchange virtual directories. The monitor will be specifically probing the HTTP header of each virtual directory for a 200 OK response code. 1. /owa (Outlook Web Access) 2. /ecp (Exchange Control Panel) 3. /ews (Exchange Web Service) 4. /Microsoft-Server-ActiveSync (ActiveSync Service for Mobile Mail clients) 5. /oab (Offline Address Book) 6. /rpc (Outlook Anywhere or RPC over HTTPS) 7. /Autodiscover (Autodiscover Service) 23
25 Step by step guidance Estimated time to complete this lab: 45 minutes. Step Action 1. Using Internet Explorer, type the following URL and credentials to logon to the Site1-NS1 NetScaler. Skip this step if already logged into the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 24
26 2. From the NetScaler dashboard navigate to Configuration > Traffic Management > Load Balancing > Monitors and click Add to create the first Monitor utilized in this exercise. 3. Enter the following Name and Type. Scroll down to click the Secure check box to convert the HTTP monitor to HTTPS. Name: OWA-Mon Type: HTTP Do not Click Create. Proceed to the next step. 25
27 4. Click on the Special Parameters tab, add the following HTTP Request (HTTP Header Request), click the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /owa/healthcheck.htm The monitor created is a dedicated monitor for the Outlook Web Access virtual directory. 5. Select the OWA-Mon and click Add to create a new pre-populated monitor. 26
28 6. Change the OWA-Mon name to ECP-Mon and ensure that the Secure check box is checked. 7. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), and click the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /ecp/healthcheck.htm The monitor created is a dedicated monitor for the Exchange Control Panel virtual directory. 27
29 8. Select the OWA-Mon and click Add to create a new pre-populated monitor. 9. Change the OWA-Mon name to EWS-Mon and ensure that the Secure check box is checked. 28
30 10. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), check the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /ews/healthcheck.htm The monitor created is a dedicated monitor for the Exchange Web Services virtual directory. 11. Select the OWA-Mon and click Add to create a new pre-populated monitor. 29
31 12. Change the OWA-Mon name to Activesync-Mon and ensure that the Secure check box is checked. 13. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), check the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /Microsoft-Server-ActiveSync/healthcheck.htm The monitor created is a dedicated monitor for Exchange ActiveSync virtual directory used with mobile devices. 30
32 14. Select the OWA-Mon and click Add to create a new pre-populated monitor. 15. Change the OWA-Mon name to OAB-Mon and ensure that the Secure check box is checked. 31
33 16. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), check the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /oab/healthcheck.htm The monitor created is a dedicated monitor for Exchange Offline Address Book virtual directory. 17. Select the OWA-Mon and click Add to create a new pre-populated monitor. 32
34 18. Change the OWA-Mon name to RPC-Mon and ensure that the Secure check box is checked. 19. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), check the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /rpc/healthcheck.htm The monitor created is a dedicated monitor for the RPC virtual directory used for Basic Authentication. 33
35 20. Select the OWA-Mon and click Add to create a new pre-populated monitor. 21. Change the OWA-Mon name to AutoDiscover-Mon and ensure that the Secure check box is checked. 34
36 22. Click on the Special Parameters tab, modify the following HTTP Request (HTTP Header Request), check the Treat Backslash as Escape Character check box and click Create. HTTP Request: GET /Autodiscover/healthcheck.htm The monitor created is a dedicated monitor for AutoDiscover virtual directory used with the Auto Discover service. 35
37 23. Click the small blue disk to save the NetScaler configuration. Click Yes to confirm. Exercise Summary In this exercise, you configured Service Monitors, which allow the Citrix NetScaler to continually communicate with and verify the availability of the associated servers. By monitoring the status and availability of the servers, Citrix NetScaler can ensure that it is always passing network traffic to backend servers and resources that are online and available to serve the content that incoming client connections are requesting. Likewise, monitoring the backend servers allows the Citrix NetScaler to redirect traffic when necessary in order to ensure continuity of service availability. 36
38 Exercise 3 Configuring Service Groups for Exchange 2013 Overview In this exercise, service groups are used to bind together both the previously created custom monitors and the two existing Microsoft Exchange backend servers (Site1-Exchange and Site2- Exchange). Each service group will contain the same backend servers, but use unique monitors for each virtual directory used with Microsoft Exchange. Administrators are typically accustomed to using traditional services with Citrix NetScaler for this type of implementation, however with traditional services the same backend server cannot be used repeatedly. This exercise covers 4 of the 7 Service Groups that can be created when Load balancing Microsoft Exchange with Citrix NetScaler. Each of the service groups will use the same backend servers but are unique in their respective monitor. The monitors used to this exercise will be the following. OWA-Mon (Outlook Web Access) ECP-Mon (Exchange Control Panel) Autodiscover-Mon (Autodiscover Monitor) ActiveSync-Mon (ActiveSync Monitor) Step by step guidance Estimated time to complete this lab: 30 minutes. 37
39 Step Action 1. Using Internet Explorer, type the following URL and credentials to logon to the Site1-NS1 NetScaler. Skip this step if already logged into the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 2. From the NetScaler dashboard navigate to Configuration > Traffic Management > Load Balancing > Service Groups and click Add to create the first Service Group associated to the Outlook Web Access virtual directory. 38
40 3. Enter the following Name, Protocol, and Click OK. Name: OWA-SG Protocol: SSL 4. Add the following Advanced features. Members Monitors 39
41 5. Select No Service Group Member to begin adding the first Microsoft Exchange backend server. 6. Select Server Based followed by the + symbol. 40
42 7. Add the following Server Name, IP Address, and click Create to add the first server associated to this Service Group. Server Name: Site1-Exchange IP Address: Add the following Port and select Create to complete the association of the Site1-Exchange back end server. Port:
43 9. Click 1 Service Group Member to begin adding the second Microsoft Exchange backend server to this service group. 10. Click Add to continue adding the server to this Service Group. 11. Select Server Based followed by the + symbol. 42
44 12. Add the following Server Name, IP Address, and click Create to add the second server associated to this Service Group. Server Name: Site2-Exchange IP Address: Add the following Port and select Create to complete the association of the Site2-Exchange back end server. Port:
45 14. Select Close to complete the Member Binding portion of the Service Group. 15. Click No Service Group to Monitor Binding to bind the previously created monitor for the Outlook Web Access virtual directory. 16. Click the > symbol to select the necessary monitor used for the Outlook Web Access virtual directory. 44
46 17. Scroll down and select the previously created monitor named OWA-Mon and click OK. This monitor will consistently monitor the Outlook Web Access virtual directory. 18. Click Bind to bind the monitor to the OWA-SG (Outlook Web Access) Service Group. 45
47 19. Click Done to complete the OWA-SG (Outlook Web Access) Service Group. 20. Click Add to create the second Service Group used for the Exchange Control Panel virtual directory. It may be required to refresh the NetScaler dashboard to view the current State and Effective state of the recently created Service Group. 46
48 21. Enter the following Name, Protocol, and Click OK. Name: ECP-SG Protocol: SSL 22. Add the following Advanced features. Members Monitors 47
49 23. Select No Service Group Member to add both Microsoft Exchange backend servers to the Service Group. 24. Select Server Based followed by the > symbol. 48
50 25. Select the following servers previously added when creating the OWA-SG Service Group and click OK. Site1-Exchange Site2-Exchange 26. Add the following Port and select Create to complete the association of both the Site1 and Site2 Microsoft Exchange backend servers to the Service Group. Port:
51 27. Click No Service Group to Monitor Binding to bind the previously created monitor for the Exchange Control Panel virtual directory. 28. Click the > symbol to select the necessary monitor used for the Exchange Control Panel virtual directory. 50
52 29. Scroll down and select the previously created monitor named ECP-Mon and click OK. This monitor will consistently monitor the Exchange Control Panel virtual directory. 30. Click Bind to bind the monitor to the Exchange Control Panel Service Group. 51
53 31. Click Done to complete the ECP-SG (Exchange Control Panel) Service Group. 32. Click Add to create the third Service Group used for the Autodiscover virtual directory. It may be required to refresh the NetScaler dashboard to view the current State and Effective state of the recently created Service Group. 52
54 33. Enter the following Name, Protocol, and Click OK. Name: Autodiscover-SG Protocol: SSL 34. Add the following Advanced features. Members Monitors 53
55 35. Select No Service Group Member to add both Microsoft Exchange backend servers to the Service Group. 36. Select Server Based followed by the > symbol. 54
56 37. Select the following servers previously added when creating the OWA-SG Service Group and click OK. Site1-Exchange Site2-Exchange 38. Add the following Port and select Create to complete the association of both the Site1 and Site2 Microsoft Exchange backend servers. Port:
57 39. Click No Service Group to Monitor Binding to bind the previously created monitor for Autodiscover virtual directory. 40. Click the > symbol to select the necessary monitor used for the Autodiscover virtual directory. 56
58 41. Scroll down the list of available monitors and change the view to 50 Per Page. 42. Scroll down and select the previously created monitor named Autodiscover-Mon and click OK. This monitor will consistently monitor the Autodiscover virtual directory. 57
59 43. Click Bind to bind the monitor to the Autodiscover Service Group. 44. Click Done to complete the Autodiscover-SG Service Group. 58
60 45. Click Add to create the fourth Service Group used for the ActiveSync virtual directory. It may be required to refresh the NetScaler dashboard to view the current State and Effective state of the recently created Service Group. 46. Enter the following Name, Protocol, and Click OK. Name: ActiveSync-SG Protocol: SSL 59
61 47. Add the following Advanced features. Members Monitors 48. Select No Service Group Member to add both Microsoft Exchange backend servers to the Service Group. 60
62 49. Select Server Based followed by the > symbol. 50. Select the following servers previously added when creating the OWA-SG Service Group and click OK. Site1-Exchange Site2-Exchange 61
63 51. Add the following Port and select Create to complete the association of both the Site1 and Site2 Microsoft Exchange backend servers. Port: Click No Service Group to Monitor Binding to bind the previously created monitor for the ActiveSync virtual directory. 62
64 53. Click the > symbol to select the necessary monitor used for the ActiveSync virtual directory. 54. Scroll down and select the previously created monitor named Activesync-Mon and click OK. This monitor will consistently monitor the ActiveSync virtual directory. 63
65 55. Click Bind to bind the monitor to the ActiveSync Service Group. 56. Click Done to complete the ActiveSync-SG Service Group. 64
66 57. Click the small blue disk to save the NetScaler configuration. Click Yes to confirm. It may be required to refresh the NetScaler dashboard to view the currently State and Effective state of the recently created Service Group. Exercise Summary This exercise covered the configuration of the service groups used to bind together previously created monitors for each Exchange 2013 virtual directory and backend servers found in this lab environment. Each service group reflects the same two backend servers, but uniquely works with a different custom Exchange monitor. 65
67 Exercise 4 Configuring Virtual Servers for Exchange 2013 Overview In this exercise non-addressable virtual servers are created for each one of the Exchange virtual directories for which a service group was created in the previous exercise. Creating these virtual servers will allow the ability for administrators to apply the needed policies to allow for a better user experience and more secure environment. Each one of the virtual servers will bind all of the service groups created in exercise 3 along with the certificate bound to each Exchange Server in the lab environment. Step by step guidance Estimated time to complete this lab: 30 minutes. Step Action 1. Using Internet Explorer, type the following URL and credentials to logon to the Site1-NS1 NetScaler. Skip this step if already logged into the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 66
68 2. From the NetScaler dashboard navigate to Configuration > Traffic Management > Load Balancing > Virtual Servers and click Add to create the first Virtual Server associated to the Outlook Web Access virtual directory. 3. Add the following basic settings and click OK. Name: Exchange-OWA Protocol: SSL IP Address Type: Non-Addressable 67
69 4. Click the No Load Balancing Virtual Server ServiceGroup Binding. 5. Click the > symbol to select the corresponding Service Group. 6. Select the OWA-SG Service Group and click OK. This will attach all servers hosting the Outlook Web Access virtual directory and monitors to the Exchange-OWA Virtual Server. 7. Select Bind to complete the attachment of the OWA-SG Service Group. 68
70 8. Click OK to proceed with the Virtual Server configuration. 9. Click the NO Server Certificate to bind a certificate to the Exchange-OWA Virtual Server. 10. Click the > symbol to select the certificate. 11. Select the MCT Key Pair certificate and select OK. 69
71 12. Select Bind to complete the attachment of the MCT Key Pair certificate to the Exchange- OWA Virtual Server. 13. Click OK to complete the Virtual Server configuration. 14. Click Done to navigate back to the NetScaler dashboard. 70
72 15. Click refresh to confirm that the Exchange-OWA Virtual Servers State and Effective State are UP. 16. Click Add to create the second Virtual Server for Exchange 2013 associated to the ActiveSync virtual directory. 71
73 17. Add the following basic settings and click OK. Name: Exchange-ActSync Protocol: SSL IP Address Type: Non-Addressable 18. Click the No Load Balancing Virtual Server ServiceGroup Binding. 19. Click the > symbol to select the corresponding Service Group. 72
74 20. Select the ActiveSync-SG Service Group and click OK. This will attach all servers hosting the ActiveSync virtual directory and monitors to the Exchange-ActSync Virtual Server. 21. Select Bind to complete the attachment of the ActiveSync-SG Service Group. 22. Click OK to proceed with the Virtual Server configuration. 23. Click the NO Server Certificate to bind a certificate to the Exchange-ActSync Virtual Server. 73
75 24. Click the > symbol to select the certificate. 25. Select the MCT Key Pair certificate and select OK. 26. Select Bind to complete the attachment of the MCT Key Pair certificate to the Exchange- ActSync Virtual Server. 27. Click OK to complete the Virtual Server configuration. 74
76 28. Click Done to navigate back to the NetScaler dashboard. 29. Click refresh to confirm that the Exchange-ActSync Virtual Servers State and Effective State are UP. 30. Click Add to create the third Virtual Server for Exchange 2013 associated to the Auto Discover virtual directory. 75
77 31. Add the following basic settings and click OK. Name: Exchange-AutoDis Protocol: SSL IP Address Type: Non-Addressable 32. Click the No Load Balancing Virtual Server ServiceGroup Binding. 33. Click the > symbol to select the corresponding Service Group. 76
78 34. Select the AutoDiscover-SG Service Group and click OK. This will attach all servers hosting the Auto Discover virtual directory and monitors to the Exchange-AutoDis Virtual Server. 35. Select Bind to complete the attachment of the Autodiscover-SG Service Group. 36. Click OK to proceed with the Virtual Server configuration. 77
79 37. Click the NO Server Certificate to bind a certificate to the Exchange-ActSync Virtual Server. 38. Click the > symbol to select the certificate. 39. Select the MCT Key Pair certificate and select OK. 40. Select Bind to complete the attachment of the MCT Key Pair certificate to the Exchange- AutoDis Virtual Server. 78
80 41. Click OK to complete the Virtual Server configuration. 42. Click Done to navigate back to the NetScaler dashboard. 43. Click refresh to confirm that the Exchange-AutoDis Virtual Servers State and Effective State are UP. 79
81 44. Click Add to create the fourth Virtual Server for Exchange 2013 associated to the Exchange Control Panel virtual directory. 45. Add the following basic settings and click OK. Name: Exchange-ECP Protocol: SSL IP Address Type: Non-Addressable 80
82 46. Click the No Load Balancing Virtual Server ServiceGroup Binding. 47. Click the > symbol to select the corresponding Service Group. 48. Select the ECP-SG Service Group and click OK. This will attach all servers hosting the Exchange Control Panel virtual directory and monitors to the Exchange-ECP Virtual Server. 49. Select Bind to complete the attachment of the ECP-SG Service Group. 81
83 50. Click OK to proceed with the Virtual Server configuration. 51. Click the NO Server Certificate to bind a certificate to the Exchange-ECP Virtual Server. 52. Click the > symbol to select the certificate. 53. Select the MCT Key Pair certificate and select OK. 82
84 54. Select Bind to complete the attachment of the MCT Key Pair certificate to the Exchange- ECP Virtual Server. 55. Click OK to complete the Virtual Server configuration. 56. Click Done to navigate back to the NetScaler dashboard. 83
85 57. Click refresh to confirm that the Exchange-ECP Virtual Servers State and Effective State are UP. 58. Click the small blue disk to save the NetScaler configuration. Click Yes to confirm. Exercise Summary This exercise explained how to create non-addressable virtual servers for each one of the Exchange virtual directories for which a service group was created in the previous exercise. These virtual servers bound all of the service groups created in Exercise 3 along with the certificate bound to each Exchange Server in the lab environment. 84
86 Exercise 5 Configuring the Content Switching Virtual Server for Exchange 2013 Overview In this exercise one addressable content switching virtual server is created to reflect each virtual server created. The content switching virtual server will allow administrators the ability to create policies for each type of device or URL by inspecting the HTTP header sent to the IP address applied to the content switching virtual server. The content switching policy then identifies the type of device or URL and directs it to the corresponding virtual server. Step by step guidance Estimated time to complete this lab: 30 minutes. Step Action 1. Using Internet Explorer, type the following URL and credentials to logon to the Site1-NS1 NetScaler Skip this step if already logged into the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 85
87 2. From the NetScaler dashboard navigate to Configuration > Traffic Management > Content Switching > Virtual Servers and click Add to begin the creating the content switching virtual server. 3. Add the following basic settings for the Content Switching Virtual Server and click OK. Name: Exchange-CSvServer Protocol: SSL IP Address Type: IP Address IP Address: Port:
88 4. Click the No Content Switching Policy Bound to begin adding a CS Policy. The CS policy expression will help identify the type of data and the action to take once identified. 5. Click the + symbol to add the first policy for the Content Switching vserver. This first Content Switching Policy will forward requests to the ActiveSync virtual server (Exchange- ActSync). 87
89 6. Add the following settings to the Content Switch Policy and click create. Name: CS-POL-ACTSYNC Expression: HTTP.REQ.URL.SET_TEXT_MODE(IGNORECASE).CONTAINS("/Microsoft-Server- ActiveSync") Do not copy and paste the expression. 88
90 7. Click the > symbol to attach a target virtual server. 8. Select the following Virtual Server and click OK. Virtual Server: Exchange-ActSync 89
91 9. Click Bind to complete the first Content Switching Policy. 10. Click the 1 Content Switching Policy link to add a second CS Policy. 11. Click Add Binding. 90
92 Click the + symbol to add the second policy for the Content Switching vserver. This second Content Switching Policy will forward requests to the Auto Discover virtual server (Exchange-AutoDis).
93 13. Add the following settings to the Content Switch Policy and click create. Name: CS-POL-AUTODIS Expression: HTTP.REQ.URL.SET_TEXT_MODE(IGNORECASE).CONTAINS("/Autodiscover") Do not copy and paste the expression. 14. Click the > symbol to attach a target virtual server. 92
94 15. Select the following Virtual Server and click OK. Virtual Server: Exchange-AutoDis 16. Click Bind to complete the second Content Switching Policy. 17. Click Add Binding. 93
95 Click the + symbol to add the third policy for the Content Switching vserver. This third Content Switching Policy will forward requests to the Exchange Control Panel virtual server (Exchange-ECP).
96 19. Add the following settings to the Content Switch Policy and click create. Name: CS-POL-ECP Expression: HTTP.REQ.URL.SET_TEXT_MODE(IGNORECASE).CONTAINS("/ecp") Do not copy and paste the expression. 20. Click the > symbol to attach a target virtual server. 95
97 21. Select the following Virtual Server and click OK. Virtual Server: Exchange-ECP 22. Click Bind to complete the third Content Switching Policy. 23. Click Add Binding. This fourth Content Switching Policy will forward requests to the OWA virtual server (Exchange-OWA). 96
98 Click the + symbol to add the fourth policy for the Content Switching vserver. This fourth Content Switching Policy will forward requests to the OWA virtual server (Exchange-OWA).
99 25. Add the following settings to the Content Switch Policy and click create. Name: CS-POL-OWA Expression: HTTP.REQ.HEADER("User- Agent").SET_TEXT_MODE(IGNORECASE).CONTAINS("Mozilla") Do not copy and paste the expression. Also, note that expressions do not contain any spaces. 98
100 26. Click the > symbol to attach a target virtual server. 27. Select the following Virtual Server and click OK. Virtual Server: Exchange-OWA 99
101 28. Click Bind to complete the fourth Content Switching Policy. 29. Click Close to continue with the Content Switching Virtual Server. 30. Click OK. 100
102 31. Add the following advanced setting to add a certificate to the Content Switching virtual server. Advanced Settings: Certificates 32. Click the No Server Certificate link. 33. Click the > symbol. 101
103 34. Select the following SSL certificate and click OK. SSL certificate: MCT- Key Pair 35. Click Bind to attach the certificate to the Content Switching Virtual Server. 36. Click Close to close the certificate box. 37. Click Done to complete the Content Switching Virtual Directory. 102
104 38. Click refresh to confirm that the State of the Exchange-CSvServer is Up. 39. Navigate back to Traffic Management > Load Balancing > Virtual Servers, select the Exchange-OWA virtual server, and click Edit. 40. Add the following Advanced setting to the virtual server. Advanced Settings: Policies 103
105 41. Click the + symbol to add a responder policy to the Exchange-OWA virtual server Adding the responder policy to this virtual server will add /owa to all requests sent to the Exchange-CSvServer without a virtual directory. Example: forwards to Choose the following Policy and Type. 104
106 Click the + symbol to set the responder properties.
107 44. Add the following Name and Expression. Continue by clicking the + symbol to add an Action for the matching expression. Name: OWA-Redirect Expression: HTTP.REQ.URL.STARTSWITH("/owa").NOT 106
108 45. Add the following Name, Type, Expression, and click Create to add the action to the policy just created. Name: OWA-RedirectAction Type: Redirect Expression: /owa 46. Click Create to create the Responder Policy associated with the OWA-RedirectAction. 107
109 47. Click Bind to bind the Responder Policy to the Exchange-OWA Virtual Server. 48. Click Done to proceed back to the NetScaler dashboard. 108
110 49. Click the blue disk and select Yes to save the NetScaler configuration. 50. Using Internet Explorer, open a new browser window and type the below URL to test the Exchange-CSvServer with the Exchange-OWA Virtual Server Confirm that the Exchange-CSvServer has sent the connection to the correct virtual server (Exchange-OWA). 52. Using Internet Explorer, open a new tab and type the below URL to test the Exchange- CSvServer with the Exchange-ECP Virtual Server
111 53. Confirm that the Exchange-CSvServer has sent the connection to the correct virtual server (Exchange-ECP). Exercise Summary This exercise explained how to create a content switching virtual server to reflect each virtual server created in the previous exercise. Creating the content switching virtual server custom policies allowed the inspection of the HTTP header to correctly forward traffic to its respective virtual server. The policies were tested to reflect two virtual servers: Exchange-OWA and Exchange-ECP. 110
112 Exercise 6 Configuring Custom Responder Policies for Exchange 2013 Overview The goal of this exercise is to assist with the user experience. By default, virtual directories such as Outlook Web Access and the Exchange Control Panel require users and administrators to type long and sometimes confusing URLs, such as In this exercise, custom responder policies are created allowing users and administrators to type simple URLs. These simple URLs such as mail.company.com, when entered in a browser, will forward users and administrators to the more complex correct URL such as Step by step guidance Estimated time to complete this lab: 30 minutes. Step Action 1. Using Internet Explorer, proceed to type the below URL and credentials to logon to the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 111
113 2. Navigate to AppExpert > Responder > Actions and click Add to create the responder action used for our responder policy. 3. Enter the following Name, Type, Expression, check the Bypass Safety Check checkbox and click Create to complete the responder action. Name: OWA-RESP-ACTION Type: Redirect Expression: " The responder action create will be used for HTTP to HTTPS redirection for Outlook Web Access. 112
114 4. Click Add to add a second responder action. 5. Enter the following Name, Type, Expression, check the Bypass Safety Check checkbox, and click Create to complete the responder action. Name: EAC-RESP-ACTION Type: Redirect Expression: " It is recommended to COPY and PASTE the expression to ensure no mistakes occur. The responder action created will be used for HTTP to HTTPS redirection for Outlook Web Access. 113
115 6. Navigate to AppExpert > Responder > Policies and click Add to create the responder policy that will bind to the newly created actions. 7. Enter the following Name, Action, Expression, and click Create to complete the responder policy. Name: OWA-RESP-POLICY Action: OWA-RESP-ACTION Expression: CLIENT.TCP.DSTPORT.EQ(80) && HTTP.REQ.HOSTNAME.CONTAINS("mail.mycitrixtraining.net") The responder policy created here will be used for HTTP to HTTPS redirection for Outlook Web Access. 114
116 8. Click Add to add a second responder policy. 9. Enter the following Name, Action, Expression, and click Create to complete the responder policy. Name: EAC-RESP-POLICY Action: EAC-RESP-ACTION Expression: CLIENT.TCP.DSTPORT.EQ(80) && HTTP.REQ.HOSTNAME.CONTAINS("eac.mycitrixtraining.net") The responder policy created here will be used for HTTP to HTTPS redirection for Outlook Web Access. 115
117 10. Navigate to Configuration > Traffic Management > Load Balancing > Servers and click Add to add a fictitious server utilized by the responder policies. 11. Enter the following Server Name, IP Address, and click Create to complete the addition of fictitious server. Server Name: HTTP-RESP-Server IP Address: The IP Address is used as a fictitious address as this virtual server sole purpose is for the responder policies. 116
118 12. Confirm that the HTTP-RESP-Server State is Enabled. 13. Navigate to Configuration > Traffic Management > Load Balancing > Monitors to bind fictitious PING monitor to utilize for the future responder Virtual Server. 14. Click ping followed by Add to complete the ping monitor. 117
119 15. Enter the following Name and Desitination IP and click Create to complete the customer ping monitor. Name: Self-NS-PING Destination IP: Modify the monitors page to display 50 or more items. 118
120 17. Confirm that the Self-NS-PING is now Enabled. 18. Navigate to Configuration > Traffic Management > Load Balancing > Services, click Add to bind the recently added HTTP-RESP-Server and Self-NS-PING monitor. 119
121 19. Enter the following Service Name, Existing Server, Protocol, Port, and click Continue. Service Name: HTTP-RESP-Service Existing Server: HTTP-RESP-Server Protocol: HTTP Port: Click on 1 Service to LB Monitor Binding to bind the Self-NS-PING monitor to the HTTP- RESP-Service. 21. Select Add Binding. 120
122 22. Click the > symbol to select the Self-NS-PING monitor. 23. Scroll to the bottom of the page and change the Per Page item amount to
123 24. Select the following Monitor and click Insert. Monitor: Self-NS-PING 25. Click Bind to bind the monitor. 26. Click Close to save the selected monitor to the service. 122
124 27. Click Done to complete the Load Balancing Service. 28. Confirm that the HTTP-RESP-Service State is Up. It is recommended to click refresh to ensure the most accurate State of all Services. 29. Navigate to Configuration > Traffic Management > Load Balancing > Virtual Servers, click Add to bind the recently added HTTP-RESP-Service to a virtual server. 123
125 30. Enter the following Name, Protocol, IP Address, Port, and click Continue. Name: HTTP-RESP-vServer IP Address: Protocol: HTTP Port: Click on the No Load Balancing Virtual Server Service Binding to bind the HTTP-RESP- Service to the newly create Virtual Server. 124
126 32. Click the > symbol to select the service. 33. Select the HTTP-RESP-Service and click OK. 34. Click Bind to bind the selected service. 125
127 35. Click OK to proceed with the addition of policies to the Load Balancing Virtual Server. 36. Select the following Advanced Setting to apply the responder policy to the load balancing virtual server. Policies 37. Click on the + symbol to add the policy. 126
128 38. Choose the following Policy, Type, and click Continue. Policy: Responder Type: Request 39. Click the > to select the policies recently created. 40. Choose the following Responder Policies and click OK. Responder Policies: OWA-RESP-POLICY 127
129 41. Click Bind to bind the OWA-RESP-POLICY. 42. Click on the + symbol to add the policy. 128
130 43. Choose the following Policy, Type, and click Continue. Policy: Responder Type: Request 44. Click Add Binding to add the EAC-RESP-POLICY. 45. Click the > symbol to select the policy. 129
131 46. Select the EAC-RESP-POLICY and click OK. 47. Click Bind to bind the policy to the Virtual Server. 48. Click Close. 130
132 49. Click Done to complete the HTTP-RESP-vServer. 50. Confirm the State of the HTTP-RESP-vServer State and Effective State is Up. It is recommended to click refresh to ensure the most accurate State of all Services. 131
133 Select the small blue disk to save the NetScaler configuration.
134 52. Using Internet Explorer, navigate to the following sites to begin testing. URL to test OWA-RESP-POLICY: URL to test EAC-RESP-POLICY: DNS A records for both mail.mycitrixtraining.net and eac.mycitrixtraining.net have been pre-set for this lab to point to OWA-RESP-Policy will forward any requests to to a secure SSL connection URL (Outlook Web Access) EAC-RESP-Policy will forward any requests to to a secure SSL connection URL Exchange Admin Center 133
135 Exercise Summary This exercise explained how to create a better user experience by the use of NetScaler responder policies. Policies for both Outlook Web Access and the Exchange Control Panel were created to allow users and administrators to type simple URLs to seamlessly forward them to the correct, more complex URL. 134
136 Exercise 7 Configuring Single Sign On for Exchange 2013 Overview The goal of this exercise is to solve two major challenges. The first challenge is to improve user experience by leveraging the NetScaler s ability to provide single sign on services. The second is to provide added security. Upon completing these exercises the administrator will have created a custom form allowing users to directly authenticate on the Citrix NetScaler. The NetScaler will then forward these credentials to any available Exchange Server and securely authenticate the user allowing for one simple sign on. This will then enable administrators to place the Citrix NetScaler in the DMZ resulting in no publicly accessible Exchange Servers. Step by step guidance Estimated time to complete this lab: 30 minutes. Step Action 1. Using Internet Explorer, proceed to type the below URL and credentials to logon to the Site1-NS1 NetScaler. Username: nsroot Password: nsroot 135
137 Navigate to Security > AAA Application Traffic > Virtual Servers and click Add to begin creating the AAA Virtual Server that will be used for single sign on.
138 3. Add the following Name, IP Address, and Authentication Domain. Then click OK. Name: AAA-ExchangevServer IP Address: Authentication Domain: mycitrixtraining.net 4. Click the No Server Certificate link to attach a certificate to the AAA Virtual Server. 137
139 5. Click the > symbol to select the server certificate. 6. Select the MCT Key Pair certificate and click OK. 7. Click Bind to bind the certificate. 8. Confirm that the certificate has been bound to the Virtual Server and Continue. 138
140 9. Click Continue. Advanced Authentication Policies will not be used. 10. Click the + symbol to add a basic authentication policy. The policy will be used to incorporate the existing LDAP server pre-installed in this lab environment. 11. Choose the following Policy and Type. Policy: LDAP Type: Primary 139
141 12. Click the + to add the policy 13. Add the following Name and Expression. Click the + symbol to add the LDAP server information. Name: LDAP-POL-TRAINING Expression: ns_true 140
142 14. Enter the following settings to create the LDAP server. Scroll down and click Create when completed. Name: LDAP-SRV-TRAINING Server Name / Server IP: Server IP IP Address: Connection Settings Base DN: CN=Users,DC=training,DC=lab Administrator Bind DN: CN=Administrator,CN=Users,DC=training,DC=lab Bind DN Password: Select Administrator Password: Citrix123 Confirm Administrator Password: Citrix123 Other Settings Server Logon Name Attribute: samaccountname 141
143 15. Click Create to create the policy which is bound to the newly added LDAP server. 16. Click Bind to bind the policy to the AAA Virtual Server. 142
144 17. Click Continue. 18. Click the following advanced setting. Advanced Settings: Policies 19. Click the + symbol to add the session policy. 143
145 20. Select the type of Policy. Then click Continue. Policy: Session 21. Click the + symbol to add the Session Policy. 22. Enter the following Name and Expression. Name: SES-POL-AUTH Expression: ns_true 144
146 Click the + symbol to add the request profile for this Session Policy.
147 24. Select the following properties for the request profile. Once completed click Create. Name: SES-REQ-PRO Default Authorization Action: ALLOW Single Sign-on to Web Applications: ON Credential Index: PRIMARY Single Sign-on Domain: training.lab HTTPOnly Cookie: NO Enable Persistent Cookie: ON Persistent Cookie Validity:
148 25. Click Create to create the session policy. 26. Click Bind to bind the policy to the AAA Virtual Server. 147
149 27. Click Done to complete the AAA - Virtual Server. 28. Click Refresh to and confirm that the AAA-ExchangevServer state is Up. 29. Click the Blue Disk from the NetScaler dashboard to save the NetScaler configuration and click Yes to confirm. 30. From the NetScaler dashboard navigate back to Traffic Management > Load Balancing > Virtual Servers. Click the Exchange-OWA virtual server and click Edit. 148
150 31. Add the following advanced setting. Advanced Setting: Authentication. 32. Choose Form Based Authentication and add the following settings. Once completed click OK. Authentication FQDN: auth.mycitrixtraining.net Authentication Virtual Server: AAA-ExchangevServer Authentication Profile: BLANK A DNS A record for auth.mycitrixtraining.net has been pre-set in this lab environment. 149
151 33. Proceed to the policies section of the Exchange-OWA virtual server and click the + symbol to add first traffic policy that will identify to the NetScaler the logon and logoff parameters of outlook web access. 34. Choose the following Policy and Type. Click Continue to create the policy. Policy: Traffic Choose Type: Request 150
152 35. Click the + to create the traffic policy. 36. Enter the following Name and Expression. Name: EXCH-LOGON-OWA Expression: HTTP.REQ.URL.CONTAINS("owa/auth/logon.aspx") 37. Click the + symbol to add Traffic Profile. 151
153 38. Enter the following settings. Name: EXCH-LOGON-PRO AppTimeout: 1 All other settings should be left blank. Single Sign-On: On 39. Click the + symbol to add a Form SSO Profile. 152
154 40. Add the following settings for the Form SSO Profile. Once completed click Create. Name: EXCH-LOGON-FORMS Action URL: /owa/auth.owa User Name Field: username Password Field: password Expression: HTTP.RES.SET_COOKIE.COOKIE("cadata").VALUE("cadata").LENGTH.GT(70) Name Value Pair: flags=0&trusted=0 Response Size: Extraction: DYNAMIC Submit Method: POST 153
155 41. Click Create to create the Traffic Profile. 42. Click Create to create the Traffic Policy. 154
156 43. Click Bind to bind the policy to the Exchange-OWA Virtual Server. 44. Proceed back to the policies section of the Exchange-OWA virtual server and click the + symbol to add second traffic policy that will identify to the NetScaler the logon and logoff parameters of outlook web access. 155
157 45. Choose the following Policy and Type. Click Continue to create the policy. Policy: Traffic Choose Type: Request 46. Click Add Binding. 47. Change the Priority to the following number and click the + to begin adding the second policy. Priority:
158 48. Enter the following Name and Expression. Name: EXCH-LOGOFF-OWA Expression: HTTP.REQ.URL.CONTAINS("/owa/logoff.owa") 49. Click the + symbol to add Traffic Profile. 157
159 50. Enter the following settings. Scroll down and click Create when completed. Name: EXCH-LOGOFF-PRO AppTimeout: 1 All other settings should be left blank. Single Sign-On: On Initiate Logout: Click check box. 158
160 51. Click Create to create the Traffic Policy. 52. Click Bind to bind the policy to the Exchange-OWA Virtual Server. 53. Click Close to close the traffic polices section. 159
161 54. Click Done to proceed back to the NetScaler dashboard. 55. Click the Blue Disk to save NetScaler configuration. Click Yes to confirm. 160
162 56. Using Internet Explorer, open a new window and type the below URL, credentials, and click Log On to test Single Sign-On with NetScaler and Outlook Web Access. Username: Administrator Password: Citrix After the credentials are entered the user account should be automatically signed into Outlook Web Access. Exercise Summary This exercise explains how administrators can create a AAA authentication virtual server associated to the Outlook Web Access virtual directory (Exchange-OWA virtual server). The AAA virtual server will allow for a more secure deployment and better user experience of Exchange 2013 within the datacenter allowing users to have a simple and secure sign on experience. 161
Hands-on Lab Exercise Guide
611: NetScaler is the Gatekeeper. Become the Keymaster. Hands-on Lab Exercise Guide Christopher Rudolph May 2015 1 Table of Contents Table of Contents... 2 Overview... 3 Lab Preparation... 6 Exercise 1:
More informationSophos UTM Web Application Firewall For: Microsoft Exchange Services
How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services
More informationDeploying NetScaler with Microsoft Exchange 2016
Deployment Guide Deploying NetScaler with Microsoft Exchange 2016 Deployment Guide Load balancing Microsoft Exchange 2016 with NetScaler Table of Contents Introduction 3 Configuration 5 NetScaler features
More informationSetting up Microsoft Exchange Server 2016 with Avi
Page 1 of 14 Setting up Microsoft Exchange Server 2016 with Avi Networks view online What is Exchange Server 2016 Microsoft Exchange Server 2016 is an e-mail server solution, with calendar and contact
More informationCNS 207 3i - Implementing Citrix NetScaler 11.0 for Application and Desktop Solutions
CNS 207 3i - Implementing Citrix NetScaler 11.0 for Application and Desktop Solutions 2 Copyright 2016 Citrix Systems, Inc. CNS 207 3i - Implementing Citrix NetScaler 11.0 for Application and Desktop Solutions
More informationAzure MFA Integration with NetScaler
Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationNetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi
NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for
More informationCitrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ]
s@lm@n Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] Question No : 1 Scenario: An administrator needs to deliver production
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationDeploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers
Deployment Guide Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide.
More informationApp Orchestration 2.6
Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To
More informationDeploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers
Deployment Guide Document version: 4.9.1 iapp version: microsoft_exchange_2010_cas.2012_06_08 What's inside: 2 What is F5 iapp? 2 Prerequisites 6 Deployment Scenarios 8 Preparation worksheets 10 Downloading
More informationUser guide NotifySCM Installer
User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server
More informationXenMobile 10 Cluster installation. Here is the task that would be completed in order to implement a XenMobile 10 Cluster.
XenMobile 10 Cluster installation Here is the task that would be completed in order to implement a XenMobile 10 Cluster. For this example, running on my lab, I am using XenServer 6.5 SP1 as hypervisor
More informationChapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM
Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights
More informationAppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
AppController 2.6 2014-03-18 13:21:56 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents AppController 2.6... 6 About This Release... 8 Getting Started...
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0
RSA SECURID ACCESS Implementation Guide Citrix 12.0 Peter Waranowski, RSA Partner Engineering Last Modified: February 20 th, 2018 Table of Contents Table of Contents...
More informationLoad Balancing Microsoft Exchange Deployment Guide v Copyright Loadbalancer.org
Load Balancing Microsoft Exchange 2016 Deployment Guide v2 Copyright Loadbalancer.org Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions
More informationExtend your networking skill set by learning NetScaler fundamentals. Self-paced exercise guide
Extend your networking skill set by learning NetScaler fundamentals Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Initial Configuration... 5 Exercise 2: Load
More informationCNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler
More informationWhat to Know About Exchange 2013 and Load Balancing
What to Know About Exchange 2013 and Load Balancing What are the major differences between Exchange 2010 and Exchange 2013? To answer that let s discuss the main architectural differences between Exchange
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Citrix NetScaler 10.5 Essentials and Networking. Question Question 160
Vendor: Citrix Exam Code: 1Y0-351 Exam Name: Citrix NetScaler 10.5 Essentials and Networking Question 121 -- Question 160 Visit PassLeader and Download Full Version 1Y0-351 Exam Dumps QUESTION 121 Scenario:
More informationGetting Started with Outlook Web App (OWA)
Getting Started with Outlook Web App (OWA) Office 365 User Guide When first accessing your new Office 365 account, or if you are having any issues with your regular email client, use the below directions
More informationFortiADC with MS Exchange 2016 Deployment Guide
FortiADC with MS Exchange 2016 Deployment Guide Copyright Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
More information604: Automating NetScaler Deployments and Monitoring using the NetScaler 10.5 NITRO API Hands-on Lab Exercise Guide
604: Automating NetScaler Deployments and Monitoring using the NetScaler 10.5 NITRO API Hands-on Lab Exercise Guide Brian Tannous May 2015 1 Table of Contents Table of Contents... 2 Overview... 3 Lab Preparation:...
More informationVMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.
VMware Enterprise Systems Connector Installation and Configuration JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.3 You can find the most up-to-date technical documentation
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationInstallation Guide. McAfee Web Gateway. for Riverbed Services Platform
Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-250 Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions Version: Demo QUESTION NO: 1 Citrix 1Y0-250 Exam A company uses various pre-approved user devices
More informationAgility 2018 Hands-on Lab Guide. VDI the F5 Way. F5 Networks, Inc.
Agility 2018 Hands-on Lab Guide VDI the F5 Way F5 Networks, Inc. 2 Contents 1 Lab1 - Getting Started 5 1.1 Jump Host.............................................. 5 1.2 Lab Network Setup.........................................
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1
More information1Y Citrix NetScaler 12 Essentials and Traffic Management. vmexam.com Exam Summary Syllabus Questions
1Y0-240 Citrix NetScaler 12 Essentials and Traffic Management vmexam.com Exam Summary Syllabus Questions Table of Contents Introduction to 1Y0-240 Exam on Citrix NetScaler 12 Essentials and Traffic Management...
More informationACE Live on RSP: Installation Instructions
ACE Live on RSP ACE Live on RSP: Installation Instructions These installation instructions apply to OPNET ACE Live on RSP Release 7.1.3. You can find the latest version of this document at the OPNET Support
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More information604: Administering and troubleshooting XenDesktop 7.x
604: Administering and troubleshooting XenDesktop 7.x Hands-on Lab Exercise Guide This session is offered as both an instructor led training and a self-paced online lab. Make money selling Field Services
More informationWatchGuard XCS and Outlook Web Access 2013
WatchGuard XCS and Outlook Web Access 2013 The Secure WebMail proxy provides a highly secure mechanism for accessing Microsoft OWA (Outlook Web Access). OWA uses a very similar interface to Outlook and
More informationModule 3 Remote Desktop Gateway Estimated Time: 90 minutes
Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to
More informationContent Switching Exchange and Lync. Technical Note
Content Switching Exchange and Lync Technical Note UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies
More informationLoad Balancing VMware Identity Manager
INTEGRATION GUIDE Load Balancing VMware Identity Manager 1 Version History Date Version Author Description Compatible Versions May 2017 2.0 Matt Mabis Update for Monitor in 2.x Editions and New VMWare
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationAD FS v3. Deployment Guide
Deployment Guide UPDATED: 15 November 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationWorkshop Netscaler VPX from Express(free) to Platinum
Workshop Netscaler VPX from Express(free) to Platinum All trademark names are property of their respective companies. Information contained in this publication has been obtained by Arrow ECS technical
More informationHow to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity
How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway
More informationCitrix 1Y Deploying Citrix XenDesktop 7.6 Solutions. Download Full Version :
Citrix 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Download Full Version : https://killexams.com/pass4sure/exam-detail/1y0-301 QUESTION: 90 Which two Windows components can be selected using the
More informationHands-on Lab Exercise Guide
Netscaler Gateway Hands-on Lab Exercise Guide Paul Walker 11/4/2014 Contents Contents... 1 Overview... 3 Scenario... 7 Module1-Exercise 1... 9 First time Configuration of Netscaler Gateway... 9 Module1-Exercise
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationMS Exchange 2016 Deployment Guide
Deployment Guide VERSION: 6.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationGuide to Deploying NetScaler as an Active Directory Federation Services Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationUpgrading from TrafficShield 3.2.X to Application Security Module 9.2.3
Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Introduction Preparing the 3.2.X system for the upgrade Installing the BIG-IP version 9.2.3 software Licensing the software using
More informationCitrix NetScaler Traffic Management
Citrix NetScaler Traffic Management CNS220; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who
More informationVMware Enterprise Systems Connector Installation and Configuration. Modified 29 SEP 2017 VMware AirWatch VMware Identity Manager 2.9.
VMware Enterprise Systems Connector Installation and Configuration Modified 29 SEP 2017 VMware AirWatch 9.1.1 VMware Identity Manager 2.9.1 You can find the most up-to-date technical documentation on the
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Enterprise Systems Connector Installation and Configuration
VMware Enterprise Systems Connector Installation and Configuration Modified APR 2018 VMware Identity Manager 3.1 VMware Identity Manager VMware AirWatch 9.2 You can find the most up-to-date technical documentation
More informationAndroid Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.
Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware
More informationConfiguring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)
Solution Guide ios Managed Configuration Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider) Solution Guide 1 Introduction
More informationCitrix NetScaler LLB Deployment Guide
Deployment Guide Citrix NetScaler Citrix NetScaler LLB Deployment Guide Deployment Guide for Using a NetScaler Appliance for Outbound Link Load Balancing www.citrix.com Contents Introduction... 3 Solution
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationCitrix Exam 1Y0-351 Citrix NetScaler 10.5 Essentials and Networking Version: 7.0 [ Total Questions: 178 ]
s@lm@n Citrix Exam 1Y0-351 Citrix NetScaler 10.5 Essentials and Networking Version: 7.0 [ Total Questions: 178 ] Question No : 1 A network engineer notes that a high availability pair (HA) is NOT synchronizing
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationMerchandising Server 2.2
Merchandising Server 2.2 2014-12-07 04:31:45 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Merchandising Server 2.2... 5 About... 6 System Requirements
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationAppController :20:49 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
AppController 2.0 2014-03-18 13:20:49 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents AppController 2.0... 5 About This Release... 7 Introduction...
More informationLab Guide. Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501
Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501 Lab Guide Official training material for Barracuda certified trainings and Authorized Training Centers. Edition 2018 Revision 1.0 campus.barracuda.com
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationVMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018
VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3
More informationDEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC
DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC OVERVIEW Microsoft SharePoint Server 2016 is a collaboration platform that organizations of all sizes can use to improve the
More informationIPMI Configuration Guide
IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers
More informationConfigure the Cisco DNA Center Appliance
Review Cisco DNA Center Configuration Wizard Parameters, page 1 Configure Cisco DNA Center Using the Wizard, page 5 Review Cisco DNA Center Configuration Wizard Parameters When Cisco DNA Center configuration
More informationLenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide
Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Version 1.0 Note Before using this information and the product it supports, read the information in Appendix A Notices on
More informationNetExtender for SSL-VPN
NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following
More informationDEPLOYMENT GUIDE. Load Balancing VMware Unified Access Gateway
DEPLOYMENT GUIDE Load Balancing VMware Unified Access Gateway Version History Date Version Author Description Compatible Versions Nov 2017 1.0 Matt Mabis Initial Document with How-To Configure F5 LTM with
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationBIG-IP Access Policy Manager : Portal Access. Version 12.1
BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7
More informationCNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT
ONE STEP AHEAD. CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who will be deploying or
More informationReference Card: How to connect Windows 7 to UniWireless
Reference Card: How to connect Windows 7 to UniWireless Important Information Windows 7 is not supported by ITS. These instructions provided are only a guide and do not provide any troubleshooting assistance.
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-253 Title : Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Vendor : Citrix Version : DEMO Get
More informationOkta Integration Guide for Web Access Management with F5 BIG-IP
Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...
More informationTable of Contents HOL-1757-MBL-6
Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...
More informationVMware AirWatch Content Gateway Guide for Linux For Linux
VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationMicrosoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction
Microsoft ISA 2006 Integration Contents 1 Microsoft Internet Security and Acceleration Server (ISA) Integration Notes 2 Introduction 3 Prerequisites 3.1 ISA 2006 Filter 3.2 TMG Filter 4 Baseline 5 Architecture
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationPrerequisites CNS-220 Citrix NetScaler Essentials and Traffic Management
CNS-221 Citrix NetScaler Unified Gateway Learn the skills required to configure and manage NetScaler Gateway and Unified Gateway features, including how to implement Gateway components including NetScaler
More informationDeploy and Secure an Internet Facing Application with the Barracuda Web Application Firewall in Amazon Web Services
Deploy and Secure an Internet Facing Application with the in Amazon Web In this lab, you will deploy an unsecure web application into Amazon Web (AWS), and then secure the application using the. To create
More informationOracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab
Oracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab Introduction to Enterprise Manager 11g Oracle Enterprise Manager 11g is the centerpiece of Oracle's integrated IT management strategy, which rejects
More informationConfiguring the SFB 2015 Reverse Proxy Server for Express for Lync 3.0
Configuring the SFB 2015 Reverse Proxy Server for Express for Lync 3.0 Overview A reverse proxy server is required by Express for SFB is a required component of Express for SFB if you plan on deploying
More informationApp Orchestration 2.0
App Orchestration 2.0 Getting Started with Citrix App Orchestration 2.0 Prepared by: Jenny Berger Commissioning Editor: Erin Smith Version: 1.0 Last Updated: April 4, 2014 Page 1 Contents Welcome to App
More informationAbout XenClient Synchronizer
About XenClient Synchronizer About XenClient Synchronizer About XenClient Synchronizer Synchronizer performs all the administrative tasks for the XenClient Enterprise solution. It keeps a database of all
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationAX Series with Microsoft Exchange Server 2010
Deployment Guide AX Series with Microsoft Exchange Server 2010 v.1.1 DEPLOYMENT GUIDE AX Series with Microsoft Exchange Server 2010 Table of Contents 1. Introduction... 4 1.1 Prerequisites and Assumptions...4
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationAutomaTech Application Note July 2015
Installing Active Directory Domain Services (AD DS), Remote Desktop Services (RDS), GE Advantage Licensing, and GE Proficy SCADA Thin Clients on Windows Server 2012 R2 SUMMARY This application note provides
More information