Command Center :19:47 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Similar documents
Command Center :20:00 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

SDX :30:09 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues.

KYOCERA Net Admin Installation Guide

NGFW Security Management Center

Network Management Utility

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Dell Storage Manager 2016 R3 Installation Guide

Storage Manager 2018 R1. Installation Guide

McAfee Network Security Platform 8.1

IMC VAN Fabric Manager v7.0 (E0201) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

NGFW Security Management Center

CloudShell 7.1 GA. Installation Guide. Release Date: September Document Version: 2.0

Network Security Platform 8.1

Integrate Citrix NetScaler

VMware vfabric Data Director Installation Guide

NGFW Security Management Center

Installation Guide. CloudShell Version: Release Date: June Document Version: 1.0

Network Security Platform 8.1

Perceptive TransForm E-Forms Manager

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Network Security Platform 8.1

UDP Director Virtual Edition Installation and Configuration Guide (for Stealthwatch System v6.9.0)

NGFW Security Management Center

McAfee Network Security Platform 8.3

LifeSize Control Installation Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

Installing and Configuring vcloud Connector

NGFW Security Management Center

NeuralStar Installation Guide

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

NGFW Security Management Center

IMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP

VMware vfabric Data Director Installation Guide

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Web Self Service Administrator Guide. Version 1.1.2

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Metasploit. Installation Guide Release 4.4

Troubleshooting Cisco DCNM

WhatsConfigured v3.1 User Guide

NGFW Security Management Center

NBC-IG Installation Guide. Version 7.2

Online Help StruxureWare Data Center Expert

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

Installing or Upgrading ANM Virtual Appliance

BIG-IP Access Policy Manager : Portal Access. Version 12.1

McAfee Network Security Platform 8.3

Bomgar Vault Server Installation Guide

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Installation Guide On-Premises release


App Orchestration 2.0

AppController :28:18 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Merchandising Server 2.2

IMC Network Traffic Analyzer 7.1 (E0301P04) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. All Rights Reserved.

vrealize Infrastructure Navigator Installation and Configuration Guide

StreamSets Control Hub Installation Guide

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

FieldView. Management Suite

VMware vrealize Log Insight Getting Started Guide

Perceptive TransForm E-Forms Manager 8.x. Installation and Configuration Guide March 1, 2012


Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Network Security Platform 8.1

Kaseya 2. Installation guide. Version R8. English

KYOCERA Net Admin User Guide

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

vcenter CapacityIQ Installation Guide

ElasterStack 3.2 User Administration Guide - Advanced Zone

Extended Search Administration

McAfee Network Security Platform 8.3

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

SonicWALL Security Software

NMS300 Network Management System Application

Read the following information carefully, before you begin an upgrade.

McAfee Network Security Platform 9.1

OnCommand Workflow Automation 4.2 Installation and Setup Guide for Windows

Installing and Configuring VMware vcenter Orchestrator

McAfee Network Security Platform

Aventail README ASAP Platform version 8.0

NGFW Security Management Center

Quick Installation Guide

VII. Corente Services SSL Client

McAfee Network Security Platform 8.3

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

McAfee Network Security Platform 9.1

NetApp Element Plug-in for vcenter Server User Guide

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led

IMC Network Traffic Analyzer 7.3 (E0504) Copyright 2015, 2017 Hewlett Packard Enterprise Development LP

Network Security Platform 8.1

McAfee Network Security Platform 9.1

F-Secure Policy Manager Administrator's Guide

Network Security Platform 8.1

Cisco Unified Serviceability

McAfee Network Security Platform

Transcription:

Command Center 4.1 2015-04-19 05:19:47 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Contents Command Center 4.1... 10 Command Center 4.1... 11 Command Center 4.1 Release Notes... 12 Command Center 4.1 Release Notes... 13 New in This Release... 17 Bug Fixes in Release 4.1... 21 Limitations... 22 Known Issues and Workarounds... 23 Installing Command Center Software... 26 Citrix Products Supported... 28 Before You Begin... 29 Hardware Requirements... 30 Disk Space for Performance Management... 31 Operating System Requirements... 32 Database Requirements... 33 Additional Linux Requirements... 34 Client Requirements... 35 Port Settings... 36 Database Settings... 38 Installing the Command Center Server on Windows... 41 Installing Command Center Agents on Windows... 43 Starting the Command Center Server on Windows... 45 Shutting Down the Command Center Server on Windows... 46 Uninstalling the Command Center Server from Windows... 47 Installing the Command Center Server as a Windows Service... 48 Installing the Service... 49 Running the Command Center Server as a Windows Service... 50 Stopping the Command Center Server Running as a Service... 51 Uninstalling the Service... 52 2

Installing the Command Center Server on Linux... 53 Installing Command Center Agents on Linux... 57 Starting the Command Center Server on Linux... 59 Shutting Down the Command Center Server... 60 Uninstalling the Command Center Server from Linux... 61 Installing the Command Center Server as a Linux Startup Service... 62 Installing the Service... 63 Running the Command Center Server as a Linux Service... 64 Stopping the Command Center Server from Running as a Service 65 Uninstalling the Service... 66 Setting the Command Center Communication Mode... 67 Installing the Command Center Server in High Availability Mode... 68 Installing Certificates for Secure Communication... 69 Upgrading Command Center... 70 Migrating MySQL Database... 72 Installing the Service Pack... 74 Getting Started with Command Center... 76 Logging on to Command Center... 78 Adding Devices... 79 Understanding the Discovery Process... 80 Provisioning NetScaler VPX Devices on XenServers... 82 Viewing the Discovery Status of Devices... 84 Viewing Inaccessible Devices... 85 Monitoring the Citrix Network... 86 Configuring Maps... 87 Adding Maps... 88 Adding Submaps... 89 Modifying Maps... 90 Deleting Maps... 91 Performing Operations on Maps... 92 Configuring NetScaler Pool... 93 Viewing the NetScaler Pool Dashboard... 94 Performing Operations on NetScaler Pool... 95 Monitoring Two-Tier Application View... 96 Monitoring Datacenter View... 97 Monitoring Devices... 98 Viewing Device Properties... 100 3

Running Reports... 101 Viewing Events and Alarms... 102 Executing Tasks... 103 Running Configuration Audits... 104 Invoking the CLI of NetScaler Devices... 105 Invoking the User Interface of NetScaler Devices... 106 Invoking the CLI and User Interface of Repeater Devices... 107 Generating the Tar Archive of Configuration Data of NetScaler Devices 108 Replicating a Repeater Device's Configuration to Other Repeater Devices 109 Viewing the Replication Status of Repeater Devices... 110 Viewing the Device Configuration of Repeater Devices... 111 Searching Devices from Device Inventory... 112 Configuring the Location... 113 Restarting Devices... 114 Pinging Devices... 115 Tracing the Route of Devices... 116 Viewing the Discovery Status... 117 Rediscovering Devices... 118 Moving Devices to Another Map... 119 Deleting Devices... 120 Unmanaging Devices... 121 Performing Operations Specific to HA Devices... 122 Doing a Force Failover... 123 Staying as Secondary on Secondary Devices... 124 Monitoring Your Network by Using the Home Page... 125 Understanding the Alarm Summary... 126 Monitoring Device Inventory... 127 Monitoring Active Alarms... 128 Monitoring Recent Alarms... 129 Finding Devices... 130 Monitoring and Managing Events Generated on Citrix Devices... 131 Monitoring SNMP Events and Alarms... 132 Viewing Events... 133 Viewing Alarms... 134 Configuring Views for Events and Alarms... 135 Adding Views for Events and Alarms... 136 Modifying Views... 138 4

Deleting Views... 139 Searching Events and Alarms... 140 Managing SNMP Events and Alarms... 141 Assigning Alarms to Users... 142 Viewing and Managing Alarms Assigned to a User... 143 Printing a List of Events and Alarms... 144 Setting the Auto Refresh Interval for Events and Alarms... 145 Saving List of Events and Alarms to a File... 146 Assigning Severity to Events... 147 Clearing and Deleting Alarms... 148 Monitoring Syslog Events... 149 Configuring Command Center as the Syslog Server... 150 Viewing Syslog Messages... 151 Configuring Syslog Views... 152 Adding Syslog Views... 153 Modifying Syslog Views... 154 Deleting Syslog Views... 155 Configuring Event and Alarm Triggers... 156 Monitoring and Managing the Real-Time Status of Entities Configured on NetScaler Devices... Monitoring Virtual Servers, Services, and Service Groups... 160 Viewing the Status of Virtual Servers... 161 Viewing Services and Service Groups Bound to a Virtual Server 162 Viewing the Status of Services... 163 Viewing the Virtual Servers to which a Service is Bound... 164 Viewing the Status of Service Groups... 165 Viewing the Virtual Servers to which a Service Group is Bound 166 Configuring Views... 167 159 Adding Views for Virtual Servers... 168 Adding Views for Services... 169 Adding Views for Service Groups... 170 Modifying Views... 171 Deleting Views... 172 Managing the Real-Time Status of Entities... 173 Configuring the Polling Interval... 174 Enabling or Disabling Virtual Servers... 175 Enabling or Disabling Services... 176 Enabling or Disabling Service Groups... 177 5

Viewing the Audit Trail... 178 Searching Virtual Servers, Services, and Service Groups... 179 Polling the Status of Virtual Servers, Services, and Service Groups 180 Customizing Columns... 181 Using Tasks to Configure Managed Devices... 182 Managing Built-in Tasks... 183 Upgrading NetScaler with Built-in Tasks... 184 Configuring NetScaler with Built-in Tasks... 185 Upgrading Repeater with Built-in Tasks... 186 Configuring Repeater with Built-in Tasks... 187 Viewing Built-in Tasks... 188 Executing Built-in Tasks... 189 Viewing the Execution Log for Specific Built-in Tasks... 190 Scheduling Built-in Tasks... 191 Exporting Built-in Tasks... 192 Configuring Custom Tasks... 193 Adding Custom Tasks... 194 Adding New Custom Tasks... 196 Adding Custom Tasks from Command Files... 199 Adding Custom Tasks by Importing from Task Files... 200 Executing Custom Tasks... 201 Viewing the Execution Log for Specific Custom Tasks... 202 Scheduling Custom Tasks... 203 Exporting Custom Tasks... 204 Modifying Custom Tasks... 205 Deleting Custom Tasks... 206 Customizing Built-in and Custom Tasks... 207 Viewing the Execution Log for all Tasks... 210 Monitoring and Managing SSL Certificates Configured on NetScaler Devices... 211 Enabling or Disabling Certificate Management... 212 Viewing the Current Status of SSL Certificates... 213 Setting the Polling Interval for SSL Certificates... 214 Setting the Expiry Criteria of SSL Certificates... 215 Generating Certificate Signing Requests... 216 Updating SSL Certificates... 217 Viewing the Audit Trail for SSL Certificates... 218 Downloading SSL Certificates... 219 6

Auditing Configuration Changes Across NetScaler Devices... 220 Configuring Audit Templates... 221 Adding Audit Templates... 222 Modifying Audit Templates... 223 Deleting Audit Templates... 224 Configuring Audit Policies... 225 Adding User-Defined Audit Policies... 226 Executing Built-in and User-Defined Audit Policies... 227 Scheduling Built-in and User-Defined Audit Policies... 228 Modifying User-Defined Audit Policies... 229 Deleting User-Defined Audit Policies... 230 Generating Audit Reports... 231 Viewing Audit Reports... 232 Exporting Audit Reports... 233 Setting Auto Refresh Interval for Audit Reports... 234 Deleting Audit Reports... 235 Using Performance Reports and Thresholds to Monitor Device Performance... 236 Configuring Polled Counters... 237 Running Quick Reports... 239 Configuring Custom Reports... 241 Using Built-in Custom Reports... 242 Adding Custom Reports... 243 Viewing Custom Reports... 244 Scheduling Custom Reports... 245 Modifying Custom Reports... 246 Deleting Custom Reports... 247 Configuring Thresholds to Monitor Devices... 248 Adding Threshold Limits... 249 Modifying Thresholds... 252 Deleting Thresholds... 253 Monitoring AppFirewall Syslog Events... 254 Using the Dashboard... 255 Using Reports... 256 Viewing Recent Log Messages... 257 Configuring Views... 258 Adding Views... 259 Modifying Views... 260 7

Searching Recent AppFirewall Log Messages... 261 Administering Command Center... 263 Configuring Discovery Settings... 265 Configuring Device Profiles... 266 Adding Device Profiles... 267 Viewing Device Profiles... 271 Modifying Device Profiles... 272 Deleting Device Profiles... 273 Configuring Server Settings... 274 Configuring Inventory Settings... 277 Configuring High Availability Settings... 278 Configuring Mail Server Settings... 279 Configuring Access Settings... 280 Setting Up Command Center Agents... 281 Installing Certificates for Secure Communication... 282 Configuring SNMP Trap Forwarding... 283 Configuring Security Settings... 284 Configuring Authentication Settings... 285 Configuring Groups... 286 Adding Groups... 287 Assigning Users to Groups... 288 Modifying Groups... 289 Deleting Groups... 290 Configuring Users... 291 Adding Users... 292 Assigning Groups to a User... 293 Viewing Permissions Assigned to Users... 294 Modifying User Profiles... 295 Changing the Root User Password... 296 Deleting Users... 297 Viewing Audit Logs for All Users... 298 Configuring Logs... 299 Generating Support Logs... 300 Viewing Server Logs... 301 Configuring Server Log Settings... 302 Viewing Server and Logged-in User Information... 303 Changing the Database Password... 304 8

Shutting Down the Command Center Server... 305 NetScaler SNMP Counters Polled from Command Center... 306 AAA Counters... 308 ACL Counters... 311 ACL Table Counters... 312 ACL6 Counters... 313 ACL6 Table Counters... 314 Application Firewall Counters... 315 Cache Redirection Policies Counters... 318 Compression Counters... 319 Content Filters Counters... 321 Content Switch Policies Counters... 322 CPU Usage Counters... 323 DNS Counters... 324 GSLB Counters... 326 HTTP Counters... 327 ICMP Counters... 329 Integrated Cache Counters... 331 IP Counters... 336 Interface Counters... 338 Policy Engine Counters... 340 Resources Counters... 341 Simple ACL Counters... 342 SSL Counters... 343 Service Groups Counters... 349 Services Counters... 351 Sure Connect Counters... 353 System Disk Counters... 355 TCP Counters... 356 UDP Counters... 360 VLAN Counters... 362 Virtual Servers Counters... 364 Virtual Services Counters... 366 VPN Counters... 367 9

cc-gen-command-center-41-wrapper-con Due to technical difficulties, we are unable to display this topic. Citrix is currently fixing this problem. In the meantime, you can view this topic online: http://support.citrix.com/proddocs/index.jsp?lang=en&topic=/netscaler/cc-gen-commandcenter-41-wrapper-con.html 10

Command Center 4.1 Release Notes The Citrix Command Center Release Notes describe the new features and enhancements, bug fixed, limitations, and know issues and workarounds in Citrix Command Center release 4.1. In this section: New in This Release Limitations Known Issues and Workarounds 11

Command Center 4.1 Release Notes The Citrix Command Center Release Notes describe the new features and enhancements, bug fixed, limitations, and know issues and workarounds in Citrix Command Center release 4.1. In this section: New in This Release Limitations Known Issues and Workarounds 12

New in This Release The Citrix Command Center release 4.1 includes the following new features and enhancements. Changes in Database Requirements With this release, the Microsoft SQL Server 2008 database is supported. Changes in Certificate Installation Process You can now install certificates from the Administration tab in the Command Center HTML client to validate the server identity and to ensure secure communication between the Command Center server and the clients. For more information, see the Citrix Command Center 4.1 Installation Guide or the Citrix Command Center 4.1 Administrator's Guide. New Options in the Login Page With this release, on the Login page, you can specify the tab you want to log on to in the Command Center HTML client. The available options are Home, Citrix Network, Fault, Monitoring, Configuration, and Reporting. For example, if you want Command Center to display the Configuration page when you log on, select Configuration in the Start in list. You can also specify the length of time (in minutes, hours, or days) for which you want the session to be active. For more information, see the Citrix Command Center 4.1 User's Guide. Monitoring Entities and Syslog Events Support for Command Center Agents The Command Center agent now additionally supports monitoring entities and syslog messages. For more information, see Installing Command Center.. 13

Command Center 4.1 Release Notes Configure Alarm Age With this release, you can configure alarm triggers to send notifications for an event after a specified time length. For example, an alarm action, such as sending an email notification, is performed only after an entity has been continuously down for the specified length of time. Configure Session Timeout With this release, you can configure session timeout period (in minutes) by using the Access Settings option on the Administration tab. This session timeout period specifies the length of time for which a session can be active. This is applicable to all users. You can also specify a specific timeout period for the Command Center HTML client by using the Timeout parameter on the Login page. Configure SNMP Trap Port With this release, you can configure the Command Center to receive SNMP traps on ports other than the default port 162. However, you must configure the SNMP agent of the managed device to send the trap on the new port. Configure SNMP Agent Port With this release, the default port on which the Command Center listens is changed from 161 to 8161. Forward SNMP Traps With this release, you can set the default values for the destination that receives the trap, the port number of the destination device, and the community to which the device belongs on the Administration tab. For more information, see the Citrix Command Center 4.1 Administrator's Guide. Support SNMP Traps for AppFirewall Violations With this release, an SNMP alarm or trap is generated for any violations encountered on the NetScaler by the Application Firewall module. 14

Command Center 4.1 Release Notes Enhancement in Maps With this release, you can assign the same name to multiple maps while grouping devices. Enhancement in Monitoring SNMP Events With this release, the SNMP authentication failure message displays the IP address of the device that failed authentication. New Built-in Task With this release, the RestartRepeater built-in task for Branch Repeater devices has been introduced. Use this task to restart the Branch Repeater devices. Signature Violations by Category With this release, you can view the number of violations encountered by types of application firewall signatures, such as web-cgi and web-client. The application firewall signatures function provides specific rules (or signatures), and specific SQL injection and cross-site scripting patterns, that protect your Web sites against known attacks. For more information about signatures, see the "Signatures" chapter in the Citrix Application Firewall Guide. Scheduling Dashboard Reports With this release, you can schedule the Application Firewall Dashboard reports to run at a specified time. You can also send the report as an email notification. Device Lists With this release, you can create a device list from the Administration tab in Command Center. You can use the device list to execute or schedule tasks for all the devices in the list. You can also modify or delete the device list. 15

Command Center 4.1 Release Notes Software Development Kits for NITRO API With this release, NITRO API Software Development Kits (SDKs) for Java and C# have been introduced. Based on the REST architecture, these can be used to develop applications to configure and monitor Citrix Command Center servers. Support for the Period Character in User Name You can now use the "period" character (.) while configuring a user name, for example, firstname.surname.role. Enhanced Context-Sensitive Online Help The context-sensitive online help has been enhanced to display links to blogs, videos, articles, and documentation pertaining to the dialog box or pane from which the online help is invoked. This is made possible by an intelligent content aggregator that fetches results from key Citrix sites such as Knowledge Center, Citrix TV, and edocs. The new help system is compatible with most popular Web browsers, such as Internet Explorer, Chrome, Safari, and Firefox. 16

New in This Release The Citrix Command Center release 4.1 includes the following new features and enhancements. Changes in Database Requirements With this release, the Microsoft SQL Server 2008 database is supported. Changes in Certificate Installation Process You can now install certificates from the Administration tab in the Command Center HTML client to validate the server identity and to ensure secure communication between the Command Center server and the clients. For more information, see the Citrix Command Center 4.1 Installation Guide or the Citrix Command Center 4.1 Administrator's Guide. New Options in the Login Page With this release, on the Login page, you can specify the tab you want to log on to in the Command Center HTML client. The available options are Home, Citrix Network, Fault, Monitoring, Configuration, and Reporting. For example, if you want Command Center to display the Configuration page when you log on, select Configuration in the Start in list. You can also specify the length of time (in minutes, hours, or days) for which you want the session to be active. For more information, see the Citrix Command Center 4.1 User's Guide. Monitoring Entities and Syslog Events Support for Command Center Agents The Command Center agent now additionally supports monitoring entities and syslog messages. For more information, see Installing Command Center.. 17

New in This Release Configure Alarm Age With this release, you can configure alarm triggers to send notifications for an event after a specified time length. For example, an alarm action, such as sending an email notification, is performed only after an entity has been continuously down for the specified length of time. Configure Session Timeout With this release, you can configure session timeout period (in minutes) by using the Access Settings option on the Administration tab. This session timeout period specifies the length of time for which a session can be active. This is applicable to all users. You can also specify a specific timeout period for the Command Center HTML client by using the Timeout parameter on the Login page. Configure SNMP Trap Port With this release, you can configure the Command Center to receive SNMP traps on ports other than the default port 162. However, you must configure the SNMP agent of the managed device to send the trap on the new port. Configure SNMP Agent Port With this release, the default port on which the Command Center listens is changed from 161 to 8161. Forward SNMP Traps With this release, you can set the default values for the destination that receives the trap, the port number of the destination device, and the community to which the device belongs on the Administration tab. For more information, see the Citrix Command Center 4.1 Administrator's Guide. Support SNMP Traps for AppFirewall Violations With this release, an SNMP alarm or trap is generated for any violations encountered on the NetScaler by the Application Firewall module. 18

New in This Release Enhancement in Maps With this release, you can assign the same name to multiple maps while grouping devices. Enhancement in Monitoring SNMP Events With this release, the SNMP authentication failure message displays the IP address of the device that failed authentication. New Built-in Task With this release, the RestartRepeater built-in task for Branch Repeater devices has been introduced. Use this task to restart the Branch Repeater devices. Signature Violations by Category With this release, you can view the number of violations encountered by types of application firewall signatures, such as web-cgi and web-client. The application firewall signatures function provides specific rules (or signatures), and specific SQL injection and cross-site scripting patterns, that protect your Web sites against known attacks. For more information about signatures, see the "Signatures" chapter in the Citrix Application Firewall Guide. Scheduling Dashboard Reports With this release, you can schedule the Application Firewall Dashboard reports to run at a specified time. You can also send the report as an email notification. Device Lists With this release, you can create a device list from the Administration tab in Command Center. You can use the device list to execute or schedule tasks for all the devices in the list. You can also modify or delete the device list. 19

New in This Release Software Development Kits for NITRO API With this release, NITRO API Software Development Kits (SDKs) for Java and C# have been introduced. Based on the REST architecture, these can be used to develop applications to configure and monitor Citrix Command Center servers. Support for the Period Character in User Name You can now use the "period" character (.) while configuring a user name, for example, firstname.surname.role. Enhanced Context-Sensitive Online Help The context-sensitive online help has been enhanced to display links to blogs, videos, articles, and documentation pertaining to the dialog box or pane from which the online help is invoked. This is made possible by an intelligent content aggregator that fetches results from key Citrix sites such as Knowledge Center, Citrix TV, and edocs. The new help system is compatible with most popular Web browsers, such as Internet Explorer, Chrome, Safari, and Firefox. 20

Bug Fixes in Release 4.1 The following tables list the bugs fixed in Command Center release 4.1. Bug Fixes in Release 4.1 Build 40.4 Issue ID Issue Description 90867 The Command Center does not allow you to add user names that starts with a number. For example, '123root'. 87672 The Command Center does not allow you to specify any email address that contains four characters in the top level domain. For example, 'myname@abc.asia'. 88730 With database as Oracle 10g, the Command Center stops polling for some of the counters. 21

Limitations Issue ID Issue Description The following table describes the limitations and known issues in Command Center 4.1. 86578 Command Center does not support MySQL database version 5.5 and later. 77061 If you open the options under Security, Operations, or Settings on the Administration page in multiple tabs, the navigation path displayed for the current option includes the previously displayed options. For example, if, under Security, you open Authentication Settings in a new tab, and then open Users in another tab, the navigation path on the Users page incorrectly displays Administration > Authentication Settings > Users instead of just Administration Users. 66810 If you want to use the pre-packaged Postgre SQL database with Command Center 4.1, you must have the.net framew 3.5 installed on your system. 74426 If you are upgrading from Command Center release 3.x, and if you are using user-defined SSL certificates for HTTPS communication between the Command Center server and the client, your SSL certificates will no longer be applicable Command Center release 4.1. Please create new SSL certificates as described in Installing Certificates for Secure Communication. 71885 You cannot modify or delete NetScaler Pool maps. 71489 The built-in task SoftwareUpgrade fails on Branch Repeater devices running on Windows platform. 73256 If you have created custom view scopes in Command Center release 3.3 and have now upgraded to release 4.1, the custom view scopes will no longer be available. This is because of the enhancements in the authorization mode. See "Enhancements in Authorization Interface" in New in This Release. 73004 If you are running Command Center as a virtual machine (VM), when Live Update process of Symantec Endpoint Protection runs, the Command Center server may lose connection to the database or may shut down. 29388 Event Severity configuration changes roll back to their default configurations after a service pack installation. 67415 On a Windows system, if you have upgraded to Command Center release 3.3 from an earlier version using the service pack, you may not be able to uninstall Command Center using the Add/Remove option of Windows. 70863 If you are using Internet Explorer version 8, when you try to execute the built-in task InstallSSLCert, in the Preview pa the actual file path is replaced with a fakepath, for example, c:\fakepath\filename. This is due to a security feature o Internet Explorer version 8. For more information, see http://www.telerik.com/community/forums/aspnet-ajax/upload/ie8-upload-control-shows-quot-c-fakepath-quot.asp 28737 On the Linux platform, if you install Command Center from the GUI, after accepting the license agreement, the installation wizard changes to the console mode and prompts for the license file. 69558 The built-in task SoftwareUpgrade-Within9.x fails on NetScaler high availability (HA) devices running release 9.2. 61545 If the hostname of the Command Center server contains an underscore ('_'), you may encounter a java exception. 56200 For Repeater devices running 5.0 release, Command Center discovers an high availability (HA) pair only if you provide IP address of the primary device. 29323 Command Center displays only the latest 1000 events in the client. - - If an alarm is in the Clear state and a new event correlating to this alarm is not generated within 24 hours, the alarm removed from display. 36908 The wildcard/regex support in the Change Management feature does not function properly. 22

Known Issues and Workarounds The following table describes the known issues with their workarounds in Command Center Release 4.1. Issue ID Issue Description Workaround 78379 Command Center takes few minutes to display the Events page when you click the Fault tab. 64455 Show Running Configuration and Difference between Running and Saved Configuration fails if the SSH password contains single quote (') or double quote (") characters. 56303 If you have McAfee On-Demand scan running, and if you are using external MySQL database, a few device operations, such as Invoke NS CLI and Rediscover may not work, and you may encounter an error message, such as java.sql.sqlexception: General error message from server: Can't create/write to file 'c:\windows\temp\#sql_5ac_0.myi' (Errcode: 13) 73004 If you are running Command Center as a virtual machine (VM), while taking the snapshot of the VM, the Command Center server may lose connection to the database or may shut down. Rebuild the indexes for the fault tables. For more information, see http://technet.microsoft.com/en-us/library/ms189858.aspx. Do not use single quote (') or double quote (") characters in your password. Configure the McAfee On-Demand scan such that it does not protect write operations on the following directory: c:\windows\temp For more information, see http://forums.mysql.com/read.php?34,33544,233949#msg-233949 Shut down Command Center before taking the VM snapshot. 23

Known Issues and Workarounds 27411 The restore facility does not restore thresholds and event/alarm filters. Copy the following files located in the /cc_home/conf/ directory on the backup system to the same location in the restored system: Threshold.conf event.filters alert.filters NonPolledVariables.properties Authentication.xml monitoringcertseverity.xml logging_parameters.conf DistributedPoller.xml FailOver.xml Polling.conf securitydbdata.xml SMTPSettings.properties 27411 The restore facility does not restore thresholds and event/alarm filters. Copy the following files located in the /cc_home/conf/ directory on the backup system to the same location in the restored system: Threshold.conf event.filters alert.filters NonPolledVariables.properties Authentication.xml monitoringcertseverity.xml logging_parameters.conf DistributedPoller.xml FailOver.xml Polling.conf securitydbdata.xml SMTPSettings.properties 24

Known Issues and Workarounds 26223 Command Center does not start on Windows XP Service Pack 2. 27636 A storage exception occurs during change management tasks. 19867 Traps from the discovered devices do not reach the Command Center server if it is behind a Network Address Translation (NAT) device. This is because the Command Center server configures its internal IP address as the trap destination on the discovered devices. 25125 Command Center does not enforce authorization rules at runtime. If a user is logged on to Command Center and the administrator changes operation permissions (add or remove maps, devices, and tasks) for that user, the changes do not get updated dynamically. 49107 In a Command Center HA setup, you cannot shut down the secondary server running the shutdown.bat or shutdown.sh script. If you have any firewall or antivirus software running on the system, either configure the software such that Citrix Command Center can run on localhost or disable the firewall or antivirus software while using Citrix Command Center. Packet size restrictions in MySQL cause this issue. Increase the value of the max_allowed_packet variable in the my.ini file to a higher number, such as 30 MB. For more information, see: http://dev.mysql.com/doc/refman/5.0/en/packet-too-large.html In the HTML client, on the Admin tab, click Server Configuration. Use the Trap Destination option to configure the trap destination. Log out and log on to Command Center. Use the Ctrl + C option to shut down the secondary server. 25

Installing Command Center Software Command Center 4.1 offers new features and improved functionality of existing features. For more information, see New in This Release. You can install the Command Center server on either the Windows or Linux platform. You can download the installation package for both Windows and Linux from the Citrix portal Web site:http://mycitrix.com. There are two types of server installation: Evaluation and Typical. The installation type is specified at the start of the installation process. Evaluation installation type enables you to quickly install the Command Center server by installing the pre-packaged PostgreSQL database and by using predefined options. Typical installation type provides more flexibility and enables you to connect to an external database; this is recommended for use in production environment. For more information on the installation types and installation steps, see Installing the Command Center Server on Windows Installing the Command Center Server on Linux You can also configure Command Center in a distributed multi-tier architecture by installing Command Center agents that manage and monitor the Citrix devices. This architecture provides scalability and reduces the load on the server. For more information, see Installing Command Center Agents on Windows Installing Command Center Agents on Linux Licensing The following Citrix products and editions are supported by Command Center. A Citrix license is required for each edition you want to use on Command Center. NetScaler Enterprise and Platinum editions Access Gateway Enterprise edition Repeater and Branch Repeater, all editions In this section: Before You Begin Installing the Command Center Server on Windows 26

Installing Command Center Software Installing the Command Center Server as a Windows Service Installing the Command Center Server on Linux Installing the Command Center Server as a Linux Startup Service Setting the Command Center Communication Mode Installing the Command Center Server in High Availability Mode Installing Certificates for Secure Communication 27

Citrix Products Supported The following versions of Citrix Products are supported by Command Center. NetScaler: 7.0 and later Note: The Entity Monitoring feature is supported on NetScaler versions 8.0 and later. Repeater and Branch Repeater: 4.5.0 and later Branch Repeater with Windows Server (2003 and 2008): 2.0.0 or later Branch Repeater VPX: 5.6.0 or later 28

Before You Begin Before you install your Command Center server, make sure that you have the minimum system requirements, such as hardware requirements, operating system requirements, and database requirements. You also need to ensure that the database settings are specified according to Command Center requirements. In this section: Hardware Requirements Disk Space for Performance Management Operating System Requirements Database Requirements Additional Linux Requirements Client Requirements Port Settings Database Settings 29

Hardware Requirements The following table summarizes the minimum hardware requirements for the Command Center servers. Component Requirement Processor type Pentium 4 Processor speed 1.2 gigahertz (GHz) Memory 1 gigabyte (GB) RAM Hard disk space 20 GB 30

Disk Space for Performance Management The performance management module plots graphs across three tables. By Default, the first table maintains data for 14 days, with a polling interval of 5 minutes. The second table maintains data from one poll per hour, for 30 days. The third table maintains data from one poll per 24 hours, for 365 days. At the beginning of the 15 th day, the data in the first table is overwritten with new data. The data in the other two tables is overwritten on the 31 st day and the 366 th day, respectively. The following table lists the disk space requirements for using the performance management module in a few sample configurations. No. of Counters Polling Interval No. of Devices Disk Space Required 100 5 minutes 10 488 MB 300 5 minutes 10 1.4 GB 500 5 minutes 10 2.4 GB 1000 5 minutes 25 11.9 GB 5000 5 minutes 50 119.1 GB 10000 2.5 minutes 50 426 GB Unit 31

Operating System Requirements The following table lists the operating system requirements for installing Command Center. Operating System Windows Version Windows 2008 Windows 2003 Service Pack 2 Windows 2003 Server R2 Standard x64 Edition Linux Red Hat Enterprise Linux AS 4.0 Red Hat Enterprise Linux ES 4.0 and 5.1 32

Database Requirements Command Center supports the following databases and their versions. Database Type MySQL Oracle Version 5.1.x with InnoDB storage engine 10g Microsoft SQL Server 2005 and 2008 Note: Before installing Command Center to work with an MS SQL Server database, ensure that you select the SQL Server Authentication mode when installing the database. The Windows Authentication mode is not supported in Command Center. 33

Additional Linux Requirements The following are the prerequisites for installing Command Center on Linux. You must ensure that the hostname -i command on the system on which Command Center is installed resolves the actual IP address and not the loopback IP address (127.0.0.1). If the hostname -i command does not resolve the actual IP address, do the following: 1. Log on as root, and change to /etc directory. 2. Open the host file using a vi editor. 3. Update the line 127.0.0.1 localhost with the actual IP address, for example 10.102.41.10: 10.102.41.10 HostName 4. For Linux ES 5.1, add the following line: 10.102.41.10 localhost 34

Client Requirements The following table provides the minimum software recommendations for running the Command Center clients. Client type HTML Platform Windows Software Microsoft Internet Explorer 5.0 or later Mozilla Firefox 1.0 or later Linux Netscape 7.1 or later Mozilla Firefox 1.0 or later 35

Port Settings This section covers the various ports that Command Center uses. The Command Center client and server use either HTTP or HTTPS to communicate. The HTTPS communication mode is enabled by default when you install the Command Center server. The following table lists the ports used by the Command Center client and server to communicate with each other. Purpose HTTPS communication between Command Center client and server. HTTP communication between Command Center client and server. Communication between Command Center High Availability (HA) servers. Communication between Command Center High Availability (HA) servers when there is a firewall between the primary and secondary servers. TCP Ports 8443 9090 2014, 1099 6011 The following table lists the ports used by the Citrix Command Center server to communicate with the Citrix NetScaler, NetScaler SDX, and Citrix Branch Repeater. Purpose SNMP communication between the Citrix Command Center server and the Citrix NetScaler system and Citrix Branch Repeater. Configuration of SNMP traps between the Command Center server and the Citrix NetScaler system. SSH and SFTP communication between the Command Center server and the Citrix NetScaler system. HTTPS and HTTP communication between the Command Center server and Citrix Branch Repeater. Port 161 (UDP port) 162 (UDP port) 22 (TCP port) 443 and 80 (TCP ports) Note: In the Command Center client, by using the Invoke Configuration Utility option, you can access the Citrix NetScaler utilities, such as the configuration utility and dashboard. To access the configuration utility and dashboard from Command Center, you 36

Port Settings must ensure that these are independently accessible from the client machine. The following table lists the ports used for communication between the Command Center server and the Command Center agents. Purpose Communication between the Citrix Command Center server and the Citrix Command Center agents. Port 1099 Note: This port should be opened on the server as well as on the agents. Remote Method Invocation (RMI) lookup. 6011 Note: This port should be opened on the server as well as on the agents. HTTPS communication between the Command Center server and the agents. HTTP communication between the Command Center server and the agents. 8443 9090 37

Database Settings Command Center supports the following databases: MySQL 5.1.x with InnoDB storage engine. For instructions on installation, see http://dev.mysql.com/doc/ MS SQL Server 2005 and 2008. For instructions on installation, see http://msdn.microsoft.com/en-us/library/ms143516(sql.90).aspx Note: Before installing Command Center to work with an MS SQL Server database, ensure that you select the SQL Server Authentication mode when installing the database. The Windows Authentication mode is not supported in Command Center. Oracle 10g. For instructions on installation, see http://www.oracle.com/technology/documentation/database10gr2.html After installing the database, you must configure the database user permissions and database parameters. Database Parameters The following table lists the parameters that you need to specify for the database settings. Parameter Database Host Name Port Database Name SID Description MySQL, Oracle, or MS SQL Server. IP address of the server or the server name where the database is hosted. Port number of the server where the database is hosted. The default port for MySQL is 3306, for Oracle is 1521, and for MS SQL Server is 1433. Name of the database. Name of the Oracle database. 38

Database Settings User Name Password Database logon user name. The default user for MySQL is root, for Oracle it is system, and for SQL Server it is sa. However, the administrator can create users and define the required permissions. For information on the user permissions, see the section "Database User Permissions." Password assigned by the database administrator. Note: Before performing a complete installation of a new version of Command Center, you must check for and uninstall earlier versions of Command Center. Database User Permissions After you have created the Command Center database and the database user, you need to grant the required permissions as described in the following table. Database Oracle User Permissions GRANT CREATE SESSION to DatabaseUserName; GRANT CREATE TABLE to DatabaseUserName; GRANT ALTER DATABASE to DatabaseUserName; GRANT UNLIMITED TABLESPACE to DatabaseUserName; GRANT CREATE TRIGGER to DatabaseUserName; MS SQL GRANT CREATE SEQUENCE to DatabaseUserName; In the MS SQL Server Management tool, you need to set the following permissions: 1. Click Security > Logins, and then double-click DatabaseUserName. 2. In General, set Default database as the Command Center database. 3. In User Mapping, under Users mapped to this login, select the default database, and under Database role membership for, select the db_owner role membership. Note that the public role is selected by default. 39

Database Settings MySQL GRANT ALL ON DatabaseName.* TO DatabaseUserName@ CommandCenterIPAddress identified by 'DatabaseUserPassword'; GRANT FILE ON *.* TO DatabaseUserName@ CommandCenterIPAddress identified by 'DatabaseUserPassword'; GRANT SELECT, UPDATE on 'mysql'.'user' TO 'DatabaseUserName'@'CommandCenterIPAddress'; GRANT RELOAD, PROCESS ON *.* TO DatabaseUserName@CommandCenterIPAddress; 40

Installing the Command Center Server on Windows To install the Command Center server, download the installation package from the Citrix portal: http://mycitrix.com. The installation package is an executable file with the following naming convention: CC_Setup_ReleaseNumber_BuildNumber.exe Example: CC_Setup_4.1_33_0.exe There are two types of server installation: Evaluation and Typical. The installation type is specified at the start of the installation process. Evaluation installation type enables you to quickly install the Command Center server by installing the pre-packaged PostgreSQL database and by using predefined defaults, such as the HTTPS security mode. Although this installation type provides all functionality of Command Center, it is not supported in production environment. Citrix recommends you use the Evaluation installation type only for evaluation purposes. Typical installation type provides more flexibility and enables you to connect to an external database and specify the security mode you want to use. This installation type provides all Command Center functionality and Citrix recommends you use this in production environment. Note: You can also configure Command Center in a distributed multi-tier architecture by installing Command Center agents that manage and monitor the Citrix devices. For more information, see Installing Command Center Agents on Windows. 41

Installing the Command Center Server on Windows To install the Command Center server on Windows 1. Run the setup file and follow the instructions on the screen. 2. On the installation type screen, under Choose Installation Type, select either Evaluation or Typical. 3. If you have selected Evaluation, click Next, and then click Install. This installs the packaged Postgre SQL database, and installs Command Center in the HTTPS security mode. If you have selected Typical, perform the following steps: a. On the database settings screen, under Database Settings, enter the values for the database parameters, and then click Test Connection. After the connection to the database is successful, click Next Note: For information on the database parameters and their values, see the table in section Database Settings. b. Under Security Settings, select either HTTP or HTTPS. c. Click Next, and then click Install. Note: After Command Center successfully installs, the summary screen appears with a brief note about getting started with Command Center. 4. On the summary screen, click Finish, and then click Yes to start the Command Center server. Command Center starts and a command prompt windows appears displaying the status of the startup process. After the Command Center server starts successfully, the command prompt window displays the URL to access the Command Center server from a Web browser. In this section: Installing Command Center Agents on Windows Starting the Command Center Server on Windows Shutting Down the Command Center Server on Windows Uninstalling the Command Center Server from Windows 42

Installing Command Center Agents on Windows Consider a scenario where you use 300 NetScaler VPX devices in the development and testing stages in your production environment. To manage and monitor such large number of devices, you can now set up Command Center in a distributed multi-tier architecture by configuring Command Center agents to manage and monitor the Citrix devices. This architecture reduces the load on the Command Center server by distributing the load across the different agents. In a distributed multi-tier setup, the Command Center server performs operations, such as discovery, trap processing, monitoring entities and syslog messages, and configuration using tasks. The agents are used for monitoring entities and syslog messages, for polling and collecting data used for performance monitoring, such as CPU usage, resource utilization, and IP bytes transmitted, and for certificate management. The Command Center server and the agents are connected to the same database. You can also monitor the state of the agents from your Command Center client. For example, when an agent connects to the Command Center server, an event with severity as clear is raised. And, when an agent connected to the server is down, an event with severity as critical is raised. This allows the user to take appropriate action. To install the Command Center agents, use the Command Center installation package available at the Citrix portal: http://mycitrix.com. The installation package is an executable file with the following naming convention: CC_Setup_ReleaseNumber_BuildNumber.exe Example: CC_Setup_4.1_33_0.exe Note: You cannot install the Command Center server and the agent on the same system. Also, you cannot install more than one agent on a system. 43

Installing Command Center Agents on Windows To install Command Center agents on Windows 1. Install and start the Command Center server on a system. For information on installing the server on Windows, see Installing the Command Center server on Windows. 2. On the system where you want to install the agent, run the setup file and follow the instructions on the screen. 3. On the installation type screen, select Agent Setup, and then click Next. 4. Under Agent Setup, in Server IP address, type the IP address of your Command Center server, and then click Test Connection. 5. After the connection is successfully tested, click Next, and then click Install. 44

Starting the Command Center Server on Windows To start the server in the standalone mode, do the following: On the Windows desktop, click Start > Programs > Citrix Command Center > Start Citrix Command Center Server. A command prompt window appears displaying the processes that start the Command Center server. After the Command Center server starts successfully, this pane displays the URL to access Command Center from a Web browser. Note: To start the Command Center server as a service, see Installing the Command Center Server as a Windows Service. 45

Shutting Down the Command Center Server on Windows To shut down the Command Center server on Windows, click Start > Programs > Citrix Command Center > Shutdown Citrix Command Center. 46

Uninstalling the Command Center Server from Windows Uninstall the Command Center server by using the Add or Remove Programs option in Windows. If you need to perform a complete installation of a new release of Command Center server, you must uninstall the older version before carrying out the complete installation. Note: If you have a Command Center service pack installed, you must uninstall the service pack before you can uninstall the previous version of Command Center. You must also uninstall the Command Center service on Windows. To uninstall the Command Center server 1. Click Start > Settings > Control Panel. The Control Panel screen appears. 2. Double-click Add or Remove programs. The Add or Remove Programs screen appears. 3. Select the Citrix Command Center entry from the Currently installed programs: list and click Remove. Follow the steps in the wizard to uninstall the software. Note: Uninstalling Command Center removes only the user-created files and folders; you must manually delete the database. 47

Installing the Command Center Server as a Windows Service To use Command Center server as a Windows service, refer the related tasks: Installing the Service Running the Command Center Server as a Windows Service Stopping the Command Center Server from Running as a Service Uninstalling the Service 48

Installing the Service To enable Command Center to automatically start whenever the server on which Command Center is installed restarts, you must install the service. To install Command Center as a Windows service 1. At a command prompt, change the current working directory: cd CC_Home\bin 2. Run the batch file: InstallCCAsService.bat Note: This version of Command Center does not support the NSCCService -install and NSCCService -uninstall options. 49

Running the Command Center Server as a Windows Service The following procedure describes how to start the Command Center server as a Windows service. To run the Command Center server as a service 1. Click Start > Settings > Control Panel. The Control Panel screen appears. 2. Double-click Administrative Tools. The Administrative Tools screen appears. 3. Double-click Services. The Services screen of the Microsoft Management Console appears. 4. To run the server as a service, right-click Citrix Command Center and click Start. 5. To stop the server, right-click Citrix Command Center and click Stop. Note: Before you start the Command Center server as a service, you must start Command Center in the standalone mode to invoke the End User License Agreement (EULA) signatures. 50