CloudBridge :31:07 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Similar documents
Virtual Tunnel Interface

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Virtual Private Network. Network User Guide. Issue 05 Date

VPN Ports and LAN-to-LAN Tunnels

IPSec. Overview. Overview. Levente Buttyán

Configuring LAN-to-LAN IPsec VPNs

Configuration of an IPSec VPN Server on RV130 and RV130W

LAN-to-LAN IPsec VPNs

VPN Auto Provisioning

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

The IPsec protocols. Overview

Sharing IPsec with Tunnel Protection

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

CSC 6575: Internet Security Fall 2017

Manual Key Configuration for Two SonicWALLs

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

Configuring WAN Backhaul Redundancy

Virtual Private Networks (VPN)

IP Security. Have a range of application specific security mechanisms

Virtual Private Cloud. User Guide. Issue 03 Date

Sample excerpt. Virtual Private Networks. Contents

Lecture 13 Page 1. Lecture 13 Page 3

CSCE 715: Network Systems Security

Service Managed Gateway TM. Configuring IPSec VPN

Configuring Security for VPNs with IPsec

Defining IPsec Networks and Customers

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Configuring a Hub & Spoke VPN in AOS

Network Encryption 3 4/20/17

Lecture 12 Page 1. Lecture 12 Page 3

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Firewalls, Tunnels, and Network Intrusion Detection

Table of Contents 1 IKE 1-1

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

Virtual Private Networks

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

Internet security and privacy

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

IP Security IK2218/EP2120

Firepower Threat Defense Site-to-site VPNs

IKE and Load Balancing

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

IBM i Version 7.2. Security Virtual Private Networking IBM

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Operating and Monitoring the Network

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Virtual Private Network

Cryptography and Network Security. Sixth Edition by William Stallings

Chapter 5 Virtual Private Networking

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Integration Guide. Oracle Bare Metal BOVPN

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Cryptography and Network Security

Configuring VPN Policies

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Virtual Tunnel Interface

CSE509: (Intro to) Systems Security

Case 1: VPN direction from Vigor2130 to Vigor2820

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

The EN-4000 in Virtual Private Networks

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

PPTP Server: This guide will show how an IT administrator can configure the VPN-PPTP server settings.

Virtual Private Networks

Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

VPN Overview. VPN Types

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

IPsec NAT Transparency

VPN Option Guide for Site-to-Site VPNs

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Configuring IPsec and ISAKMP

BCRAN. Section 9. Cable and DSL Technologies

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

COSC4377. Chapter 8 roadmap

IKE. Certificate Group Matching. Policy CHAPTER

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

CLEARPASS CONFIGURING IPsec TUNNELS

Wireless LAN Security. Gabriel Clothier

VPN Configuration Guide. NETGEAR FVS318v3

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

Time Synchronization Security using IPsec and MACsec

VPNs and VPN Technologies

Transcription:

CloudBridge 1.1 2013-06-30 04:31:07 UTC 2013 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Contents CloudBridge 1.1... 3 CloudBridge... 4 About the CloudBridge... 7 Setting Up a CloudBridge - Method 1... 10 Configuring the CloudBridge Method 2... 18 Setting Up CloudBridge to SoftLayer Enterprise Cloud... 21 2

CloudBridge 1.1 As a tool for building a cloud-extended data center, the Citrix NetScaler CloudBridge feature is a fundamental part of the Citrix Cloud framework. This feature can reduce the cost of moving your applications to the cloud, reduce the risk of application failure, and increase network efficiency in your cloud environment. With the CloudBridge feature, you can create a network bridge (or more than one) connecting one or more cloud computing instances virtual servers in the cloud to your network without reconfiguring your network. Cloud-hosted applications appear as though they are running on one contiguous enterprise network. Setting up a network bridge involves configuring two NetScaler appliances or virtual appliances, one on each side of the bridge. On each appliance, you configure one or more GRE tunnels and configure IPSec on the tunnel or tunnels. You then assign a name to the network bridge and bind the GRE tunnel(s) to it. Optionally, you can bind VLANs and IP addresses to the network bridge. If you need only one GRE tunnel, you can use an alternative configuration method in which you configure all of the network bridge elements in one dialog box in the configuration utility. You can add more tunnels later. 3

About the CloudBridge A network bridge extends layer 2 bridging to connect a NetScaler appliance or virtual appliance residing in a cloud to a NetScaler appliance or virtual appliance on your LAN. The connection is made through an IP tunnel that uses the Generic Routing Encapsulation (GRE) protocol. The GRE protocol provides a mechanism for encapsulating packets, from a wide variety of network protocols, to be forwarded over another protocol. GRE is used to: Connect networks running non-ip, nonroutable protocols, such as AppleTalk, Novell IPX, and NetBIOS. Bridge across a wide area network (WAN). Create a transport tunnel for any type of traffic that needs to be sent unchanged across a different network. The GRE protocol encapsulates packets by adding a GRE and a GRE IP header to the packets. CloudBridge supports the use of open-standard Internet Protocol security (IPSec) protocol suite to secure the communication between peers in the CloudBridge. In a CloudBridge, IPSec ensures: Data integrity Data origin authentication Data confidentiality (encryption) Protection against replay attacks IPSec uses the transport mode in which only the payload of the GRE encapsulates packet is encrypted. The encryption is done by the Encapsulating Security Payload (ESP) protocol. The ESP protocol ensures the integrity of the packet using a HMAC hash function and the confidentiality using a encryption algorithm. After encrypting the payload and calculating the HMAC, an ESP header is generated and is inserted after the GRE IP header and a ESP trailer is inserted at the end of the encrypted payload. An Authentication Header (AH) is also added before the ESP header for data origin authentication of the packet. CloudBridge also supports the NAT implementation defined in RFC 3947 and 3948 for the CloudBridge peers to communicate with peers behind a NAT device. To secure their communication, the two peers in the network bridge use the Internet Key Exchange (IKE) protocol in IPSec to: Mutually authenticate with each other, using one of the following authentication methods: 4

CloudBridge Pre-shared key authentication. A text string called a pre-shared key is manually configured on each peer. The pre-shared keys of the peers are matched against each other for authentication. Therefore, for the authentication to be successful, you must configure the same pre-shared key on each of the peers. Digital certificates authentication. The initiator (sender) peer signs message interchange data by using its private key, and the other receiver peer uses the sender s public key to verify the signature. Typically, the public key is exchanged in messages containing an X.509v3 certificate. This certificate provides a level of assurance that a peer's identity as represented in the certificate is associated with a particular public key. Negotiate to reach agreement on: A security protocol to use, so that each peer sends data in a format that the other recognizes. An encryption algorithm. Cryptographic keys for encrypting data in one peer and decrypting the data in the other. This agreement upon the security protocol, encryption algorithm and cryptographic keys is called a Security Association (SA). SAs are one way (simplex). For example, when two NetScaler appliances, NS1 and NS2, are communicating by means of IPSec over a CloudBridge, NS1 has two Security Associations. One SA is used for processing out-bound packets, and the other SA is used for processing inbound packets. SAs expire after a specified length of time, which is called the lifetime. The two peers usie the Internet Key Exchange (IKE) protocol (part of the IPSec protocol suite) to negotiate new cryptographic keys and establish new SAs. The purpose of the limited lifetime is to prevent attackers from cracking a key. 5

CloudBridge Figure 1. Conceptual Diagram: NetScaler CloudBridge 6

About the CloudBridge A network bridge extends layer 2 bridging to connect a NetScaler appliance or virtual appliance residing in a cloud to a NetScaler appliance or virtual appliance on your LAN. The connection is made through an IP tunnel that uses the Generic Routing Encapsulation (GRE) protocol. The GRE protocol provides a mechanism for encapsulating packets, from a wide variety of network protocols, to be forwarded over another protocol. GRE is used to: Connect networks running non-ip, nonroutable protocols, such as AppleTalk, Novell IPX, and NetBIOS. Bridge across a wide area network (WAN). Create a transport tunnel for any type of traffic that needs to be sent unchanged across a different network. The GRE protocol encapsulates packets by adding a GRE and a GRE IP header to the packets. CloudBridge supports the use of open-standard Internet Protocol security (IPSec) protocol suite to secure the communication between peers in the CloudBridge. In a CloudBridge, IPSec ensures: Data integrity Data origin authentication Data confidentiality (encryption) Protection against replay attacks IPSec uses the transport mode in which only the payload of the GRE encapsulates packet is encrypted. The encryption is done by the Encapsulating Security Payload (ESP) protocol. The ESP protocol ensures the integrity of the packet using a HMAC hash function and the confidentiality using a encryption algorithm. After encrypting the payload and calculating the HMAC, an ESP header is generated and is inserted after the GRE IP header and a ESP trailer is inserted at the end of the encrypted payload. An Authentication Header (AH) is also added before the ESP header for data origin authentication of the packet. CloudBridge also supports the NAT implementation defined in RFC 3947 and 3948 for the CloudBridge peers to communicate with peers behind a NAT device. To secure their communication, the two peers in the network bridge use the Internet Key Exchange (IKE) protocol in IPSec to: Mutually authenticate with each other, using one of the following authentication methods: 7

About the CloudBridge Pre-shared key authentication. A text string called a pre-shared key is manually configured on each peer. The pre-shared keys of the peers are matched against each other for authentication. Therefore, for the authentication to be successful, you must configure the same pre-shared key on each of the peers. Digital certificates authentication. The initiator (sender) peer signs message interchange data by using its private key, and the other receiver peer uses the sender s public key to verify the signature. Typically, the public key is exchanged in messages containing an X.509v3 certificate. This certificate provides a level of assurance that a peer's identity as represented in the certificate is associated with a particular public key. Negotiate to reach agreement on: A security protocol to use, so that each peer sends data in a format that the other recognizes. An encryption algorithm. Cryptographic keys for encrypting data in one peer and decrypting the data in the other. This agreement upon the security protocol, encryption algorithm and cryptographic keys is called a Security Association (SA). SAs are one way (simplex). For example, when two NetScaler appliances, NS1 and NS2, are communicating by means of IPSec over a CloudBridge, NS1 has two Security Associations. One SA is used for processing out-bound packets, and the other SA is used for processing inbound packets. SAs expire after a specified length of time, which is called the lifetime. The two peers usie the Internet Key Exchange (IKE) protocol (part of the IPSec protocol suite) to negotiate new cryptographic keys and establish new SAs. The purpose of the limited lifetime is to prevent attackers from cracking a key. 8

About the CloudBridge Figure 1. Conceptual Diagram: NetScaler CloudBridge 9

Setting Up a CloudBridge - Method 1 Before setting up a CloudBridge, you must configure the NetScaler appliance or VPX virtual appliance on the LAN and the appliance or virtual appliance on the Cloud. To configure a new NetScaler appliance, see Getting Started with Citrix NetScaler. To configure a new virtual appliance, see Getting Started with Citrix NetScaler VPX. You must then configure networking on both appliances. Each of the two configurations may include a VLAN that contains the servers or the cloud instances that will use the CloudBridge. To configure VLANs, see Configure a VLAN. To set up a CloudBridge, on the NetScaler appliance or virtual appliance that anchors the LAN side of the CloudBridge: 1. Configure IPSec on the GRE tunnel. 2. Configure a GRE tunnel. 3. Configure a CloudBridge: Create a logical representation of the CloudBridge by specifying a name. Bind one or more GRE tunnels to the CloudBridge. Bind VLANs and IP addresses to the CloudBridge (Optional.) You then repeat these steps on the NetScaler appliance or virtual appliance that anchors the cloud side of the CloudBridge. You can perform these tasks individually (Method 1), or you can configure everything in one dialog box in dialog box in the configuration utility (Method 2). For more information, see Setting Up a CloudBridge Method 2. Configuring IPSec on a GRE tunnel For configuring IPSec on a GRE tunnel: The IPSecprofile parameter should be enabled on the GRE tunnel. You need to specify the same local IP address and the remote IP address that you specified for the GRE tunnel. To configure IPSec on a GRE tunnel by using the NetScaler command line 10

Setting Up a CloudBridge - Method 1 At the NetScaler command prompt, type: add ipsec profile <name> [-encalgo ( AES 3DES )...] [-hashalgo <hashalgo>...] [-lifetime <positive_integer>] (-psk (-publickey <string> -privatekey <string> -peerpublickey <string>)) To remove an IPSec config by using the NetScaler command line To remove an IPSec config, type the rm ipsec profile command and the name of the IPSec config. Parameters for configuring IPSec on a GRE tunnel name Name for an IPSec configuration. The name can begin with a letter, number, or the underscore symbol, and can consist of from one to 127 letters, numbers, and the hyphen (-), period (.) pound (#), space ( ), at (@), equals (=), colon (:), and underscore (_) symbols. encalgo The encryption algorithm to be used in IPSec configuration for a CloudBridge. Possible values: AES, 3DES. hashalgo The encryption algorithm to be used in IPSec configuration for a CloudBridge. Possible values: HMAC_SHA1, HMAC_SHA256, HMAC_MD5. Default: HMAC_SHA1. lifetime psk Time, in seconds, after which the security association expires. After expiration, new SAs are established, and new cryptographic keys are negotiated between the peers connected by the CloudBridge. Maximum value: 31536000. Default: 28800. A text string, called the pre-shared key, to be manually configured on each peer. The pre-shared keys of the peers are matched against each other for authentication before security associations are established. Therefore, for the authentication to be successful, you must configure the same pre-shared key on both of the peers of the CloudBridge. Maximum Length: 63 characters. livenesscheckinterval Time, in seconds, after which a notify payload is sent to check the status of the peer (UP or DOWN). Additional payloads are sent as per the retransmit interval setting. Zero value disables liveliness checks. retransmissiontime 11

Setting Up a CloudBridge - Method 1 Time, in seconds, after which IKE retry message is sent to a peer. The retry message is sent three times, each time doubling the time interval for every failure. publickey A local digital certificate to be used to authenticate the local NetScaler appliance to the remote peer before establishing IPSec security associations. The same certificate should be present and set for the Peer Public Key parameter in the remote peer. privatekey The private key of the local digital certificate. peerpublickey A digital certificate of the remote peer. This certificate is used to authenticate the remote peer to the local peer before establishing IPSec security associations. The same certificate should be present and set for the Public key parameter in the remote peer. To configure IPSec on a GRE tunnel by using the configuration utility 1. In the navigation pane, expand CloudBridge, expand Advanced, and then click IPSec Profile. 2. In the details pane, click Add. 3. In the Create IPSec Profile dialog box, type or select values for the following parameters, which correspond to parameters described in "Parameters for configuring IPSec" as shown: Name* name Encryption Algorithm encalgo Hash Algorithm hashalgo Lifetime lifetime Liveness Check Interval livenesscheckinterval Retransmit Interval retransmissiontime Pre-Shared key Exists psk Public Key publickey Private Key privatekey Peer Public Key peerpublickey * A required parameter. 4. Click Create, and then click Close. 12

Setting Up a CloudBridge - Method 1 Creating IP Tunnels To create an IP tunnel by using the NetScaler command line At the NetScaler command prompt type: add iptunnel <name> <remoteip> <remotesubnetmask> <localip> -type -protocol (ipoverip GRE) -ipsecprofile <name> show iptunnel To remove an IP tunnel by using the NetScaler command line To remove an IP tunnel, type the rm iptunnel command and the name of the tunnel. Parameters for creating an IP tunnel name Name of the IP Tunnel. This alphanumeric string is required and cannot be changed after the service group is created. The name must not exceed 127 characters, and the leading character must be a number or letter. The following characters are also allowed: @ _ -. (period) : (colon) # and space ( ). remoteip A public IPv4 address of the remote NetScaler appliance used to set up the tunnel. remotesubnetmask Subnet mask of the remote IP address of the tunnel. localip A public IPv4 address of the local NetScaler appliance used to set up the tunnel. Possible values: Auto, MIP, SNIP, and VIP. Default: Auto. protocol The protocol to be used in setting up the IP tunnel. Select GRE for using the Generic Routing Encapsulation (GRE) protocol to set up a GRE tunnel. ipsecprofilename Name of the IPSec profile that is used for securing communication in the GRE tunnel. 13

Setting Up a CloudBridge - Method 1 To create an IP Tunnel by using the configuration utility 1. In the navigation pane, expand Network, and click IP Tunnels. 2. In the details pane, click Add. 3. In the Add IP Tunnel dialog box, specify values for the following parameters: Name* name Remote IP* remoteip Remote Mask* remotesubnetmask Local IP Type* localip (in the local IP Type drop down list, select one of the IP type (Mapped IP, Subnet IP, and Virtual). All the configured IPs of the selected IP type will be populated in the Local IP drop down list. Select the desired IP from the list.) Protocol protocol and ipsecprofilename from the corresponding field when you select protocol as GRE. *A required parameter. 4. Click Create, and then click Close. To create an IPv6 tunnel by using the NetScaler command line At the NetScaler command prompt type: add ip6tunnel <name> <remoteip> <local> show ip6tunnel To remove an IPv6 tunnel by using the NetScaler command line To remove an IPv6 tunnel, type the rm ip6tunnel command and the name of the tunnel. Parameters for creating an IPv6 tunnel name (Name) A name for the IPv6 Tunnel. This alphanumeric string is required and cannot be changed after the service group is created. The name must not exceed 127 characters, and the leading character must be a number or letter. The following characters are also allowed: @ _ -. (period) : (colon) # and space ( ). remoteip (Remote IP) 14

Setting Up a CloudBridge - Method 1 An IPv6 address of the remote NetScaler appliance used to set up the tunnel. localip (Local IP Type) An IPv6 address of the local NetScaler appliance used to set up the tunnel. Possible values: SNIP6 and VIP6. Default: Auto. To create an IPv6 Tunnel by using the configuration utility 1. In the navigation pane, expand Network, and click IP Tunnels. 2. On the IPv6 Tunnels tab, click Add. 3. In the Create IPv6 Tunnel dialog box, set the following parameters: Name* Remote IP* Local IP Type* (In the local IP Type drop down list, select one of the IP type (SNIP6 or VIP6). All the configured IPv6 addresses of the selected IPv6 type are be populated in the Local IP drop down list. Select the desired IP from the list.) *A required parameter. 4. Click Create, and then click Close. Configuring a CloudBridge You can think of the CloudBridge as a group that holds a set of secure GRE tunnels. After configuring GRE tunnels secured with IPSec, you need to create a logical representation of the CloudBridge by assigning a name to a CloudBridge and binding one or more configured GRE tunnels to the CloudBridge. You can then bind VLANs and IP subnets to the new CloudBridge. The VLAN and IP subnet settings are common to all the GRE tunnels bound to the CloudBridge. To create a CloudBridge by using the NetScaler command line At the NetScaler command prompt, type: add netbridge <name> To bind GRE tunnels, VLANs, and IP Subnets to a CloudBridge by using the NetScaler command line At the NetScaler command prompt, type: 15

Setting Up a CloudBridge - Method 1 bind netbridge <name> [-tunnel <name>] [-vlan <id>] [-IPAddress <ip_addr ipv6_addr>] To modify or remove an CloudBridge by using the NetScaler command line To modify a CloudBridge, type the set netbridge command, the name of the CloudBridge, and the parameters to be changed, with their new values. To remove a CloudBridge, type the rm netbridge command and the name of the CloudBridge. Parameters for configuring a CloudBridge name The name of the CloudBridge that you are configuring. The name can begin with a letter, number, or the underscore symbol, and can consist of from one to 127 letters, numbers, and the hyphen (-), period (.) pound (#), space ( ), at (@), equals (=), colon (:), and underscore (_) symbols. You should choose a name that will make it easy for others to tell which NetScaler appliances the CloudBridge connects. tunnel The name of the GRE tunnel to be associated with the CloudBridge. VLAN The ID of the local VLAN that needs to be extended to the cloud. IPAddress The IPV4 subnet that needs to be extended to the cloud. 16

Setting Up a CloudBridge - Method 1 To configure a CloudBridge by using the configuration utility 1. In the navigation pane, expand CloudBridge, and then click Network Bridge. 2. In the details pane, do one of the following: To create a new CloudBridge, click Add. To modify an existing CloudBridge, select the CloudBridge, and then click Open. 3. In the Create Network Bridge dialog box, type a name for your new CloudBridge. 4. In the Create Network Bridge or Configure Network Bridge dialog box, on the Tunnels tab (selected by default), do one of the following to bind GRE tunnels to the CloudBridge: If the GRE tunnels that you want are listed, select the corresponding check boxes. If you want bind all the GRE tunnels listed, click Activate All. If you want to create a new GRE tunnel, click Add. 5. In the Create Network Bridge or Configure Network Bridge dialog box, on the VLANs tab (selected by default), do one of the following to bind GRE tunnels to the CloudBridge: If the VLANS that you want are listed, select the corresponding check boxes. If you want bind all the VLANs listed, click Activate All. If you want to create a new VLAN, click Add. 6. On the IP Subnets tab, do the following to bind IP subnets to the CloudBridge: If you want to bind a new IP subnet, click Add. If you want to modify an existing IP subnet, click Open. 7. Click Create, and then click Close. 17

Configuring the CloudBridge Method 2 For configuring a network bridge, you need to perform the following steps on each of the appliances that is to a be peer on the network bridge. 1. Configure a GRE tunnel. 2. Configure IPSec on the GRE tunnel. 3. Create a logical representation of the network bridge by specifying a name. 4. Bind one or more GRE Tunnels to the network bridge. 5. Bind VLANs and IP addresses to the network bridge (Optional.) The configuration utility provides a single dialog box in which you can perform all of these tasks to configure a CloudBridge. When you use this dialog box: A GRE tunnel, IPSec, and network bridge entities are created, all with the same name. The GRE tunnel created is configured with IPSec. By using this method, you can configure a network bridge with only one GRE tunnel. You can later modify the network bridge to bind more GRE tunnels to it. Parameters for configuring a network bridge name The name of the CloudBridge that you are configuring. The name can begin with a letter, number, or the underscore symbol, and can consist of from one to 127 letters, numbers, and the hyphen (-), period (.) pound (#), space ( ), at (@), equals (=), colon (:), and underscore (_) symbols. You should choose a name that will make it easy for others to know which NetScaler appliances the CloudBridge connects. Local IP A public IPv4 address of the local NetScaler appliance or VPX virtual appliance. This address is used to set up a GRE tunnel, with IPSec configuration, to a public IP IPv4 address of the remote peer NetScaler appliance or virtual appliance. Remote IP A public IPv4 address of the remote peer NetScaler appliance or virtual appliance. This is the address that is used to at the remote peer to set up the GRE tunnel, with IPSec configuration, with the local peer. 18

Configuring the CloudBridge Method 2 Pre-Shared key A text string, called the pre-shared key, to be manually configured on each peer. The pre-shared keys of the peers are matched against each other for authentication before security associations are established. Therefore, for the authentication to be successful, you must configure the same pre-shared key on both of the peers of the CloudBridge. Maximum Length: 63 characters. Public key A local digital certificate to be used to authenticate the local NetScaler appliance to the remote peer before establishing IPSec security associations. The same certificate should be present and set for the Peer Public Key parameter in the remote peer. Private Key The private key of the local digital certificate. Peer Public Key A digital certificate of the remote peer. This certificate is used to authenticate the remote peer to the local peer before establishing IPSec security associations. The same certificate should be present and set for the Public key parameter in the remote peer. 19

Configuring the CloudBridge Method 2 To configure a CloudBridge by using the configuration utility 1. In the navigation pane, click CloudBridge. 2. In the details pane, under Getting Started, click Configure CloudBridge. 3. In the Configure CloudBridge dialog box, specify values for the following parameters, which are described in "Parameters for configuring a CloudBridge": Name* Local IP* Remote IP* * A required parameter. 4. Do one of the following to select an IPSec authentication method between the peers for establishing IPSec security associations: For pre-shared key authentication method, select Pre-shared Key and specify values for the following parameters, which are described in "Parameters for configuring a CloudBridge": Pre-Shared key Confirm Key * A required parameter. For digital certificates authentication method, select Certificate and specify values for the following parameters, which are described in "Parameters for configuring a CloudBridge": Public Key Private Key Peer Public Key * A required parameter. 5. Click Create, and then click Close. 20

Setting Up CloudBridge to SoftLayer Enterprise Cloud The configuration utility includes a wizard that helps you to easily configure a CloudBridge between a NetScaler appliance on any network and NetScaler VPX instances on the SoftLayer enterprise cloud. Using the wizard, you can perform the following steps to configure a CloudBridge to a NetScaler VPX instance on the SoftLayer enterprise cloud. 1. Connect to the SoftLayer enterprise cloud by providing the user log on credentials. 2. Select the Citrix XenServer that is running the NetScaler VPX appliance. 3. Select the NetScaler VPX appliance. 4. Provide CloudBridge parameters to: Configure a GRE Tunnel. Configure IPSec on the GRE tunnel. Create a logical representation of the CloudBridge by specifying a name. Bind the GRE Tunnel to the CloudBridge. When you use this wizard, a GRE tunnel, IPSec, and CloudBridge entities are created on both of the peers. To configure a CloudBridge by using the configuration utility 1. In the navigation pane, click CloudBridge. 2. In the details pane, click SOFTLAYER. 3. In the Setup CloudBridge on SoftLayer wizard, click Next, and then follow the instructions in the wizard. 21