White or red with VDI?

7:38 PM Add Comment
White or red with VDI? -

We have not crushed all the grapes, but you are welcome to join us at Synergy Barcelona, ​​where we are " drink our own Rioja ".

Desktop Transformation is not a myth and Synergy Barcelona is the Citrix platform to share her reality with the world. We do this in the most direct way possible - by running Synergy Citrix virtualization technologies to demonstrate its power and reliability, and giving participants practical training and real experience with virtual desktops through the conference . This initiative is based on the Desktop Transformation Model, a proven methodology for desktop virtualization.

IT services are changing permanently their desktop infrastructure for efficient functionality, cost savings and overall quality improvement. As manager of the technical infrastructure of Synergy, I am faced with similar challenges. Synergy Barcelona, ​​I was responsible for modernizing our approach to deliver Windows applications to our participants while minimizing hardware costs and shipping. Using the Desktop Transformation Model to present the synergy of functions to our participants has been extremely beneficial.

combined Summit and Synergy is a marathon 5 days with minimal error hall. Once the event begins, it is dynamic non-stop, without downtime. Our deployments Synergy are directly and offer hands-on access to our products. learning labs of the Citrix Solutions Booth and service, these teams must be able to respond effectively to unexpected hardware or software failures.

Historically, working on individual built for Internet Access Centre, Bring your own mobility experience, scanning and recording of the session was like working in a vacuum. Now my son working together on a collaborative design where they can support and manage enterprise applications that are truly delivered as a service. We once had a semi-automatic configuration fault tolerance, but now with the DTM, we have a high-availability configuration.

Overall, the DTM has made us much more efficient. A major effort was once necessary to ensure the equipment appropriate way business class and software for independent solutions. Now we do not work so hard because we use a single enterprise-class infrastructure from integrated solutions providers

points the way The Synergy virtualization infrastructure for customers to achieve the same IT benefits for themselves -. One solution, high availability, scalability, Internet access and Bring Your Own Mobility Showcase, for example, are accurate representations of how an organization would provide virtual applications and desktops to task mobile workers -. infrastructure

See you in Barcelona ... and I prefer tinto with my vegetarian paella.

It's time to vote for the Prix de Barcelona Innovation Citrix Synergy!

6:37 PM Add Comment
It's time to vote for the Prix de Barcelona Innovation Citrix Synergy! -

We are on the final countdown to the start of Synergy in Barcelona, ​​and I wanted to take a moment to discuss a crucial Citrix value: innovation. Citrix Synergy is not just a question of inspiration, it is also about the actual recognition innovation in our industry. And what better way to recognize that with a price of Citrix innovation?

Again, the price of the Citrix Innovation will focus on the really innovative use of an organization of Citrix technology to achieve significant business transformation. The standard of entries we received this time has been incredible, with particularly strong inflows from Europe and Asia.

With the full application process, and three finalists, let me tell you a little about the shortlisted organizations for recognition at Synergy:

Deutsche Bank as one of the largest financial services and successful organizations in the world, Deutsche Bank has improved the way its 100,000 employees in 73 countries work by allowing operators and other employees to access their Citrix virtual desktop any device anywhere in the world offices of the bank. Employees can now instantly connect with high-speed specialized systems, access to their office tools and virtual collaboration such as high definition video conferencing. The solution supports the sustainable development strategy of the Bank, as well as improving business continuity and enabling new flexible work arrangements for employees worldwide

KT Corporation (formerly Korea Telecom) :. A South Korean leading telecommunications provider, KT provides virtual desktops Citrix and Apple iPads to all 50,000 of its employees to create anytime, anywhere collaboration. This allows employees to "smart-work 'and make the most of their two hours of work and personal time, reducing travel time in a country with some of the worst global traffic. KT offers this infrastructure as a service to its customers of Korean SMEs, allowing them to obtain an enterprise-quality infrastructure without having to purchase their own technology. Several hundred customers signed within six months since the service was launched. The company also provides a computers desktop-as-a-service cloud solution to customers in Japan, offering a strong IT platform while significantly reducing the energy consumption of data centers and meet with Japanese government mandates in the wake of the tragedy Mars.

Royal Bank of Scotland: The British banking group used the Citrix virtual computing to power a transformation of "self-service IT. The group has virtualized more than 55,000 workstations and 1,800 requests for delivery to 65,000 employees across the UK, Ireland and the United States. Tens of thousands of workers can use any device, anywhere, including their own personal laptops, smartphones and tablets to access complete IT resources on demand in a highly secure environment. RBS employees can now choose how they work and collaborate, the organization has removed the shackles of office, and turned the work into something of their employees are doing, rather than a place where they go.

Now it's up to you to tell us what organization you think deserves to win! You can watch videos of each of these finalists discussing their technological innovation here, and more importantly, you can also vote.

Voting is open now and closes on Tuesday, October 25. The winner will be announced during the keynote by Mark Templeton, Wednesday, October 26 e , from 10:30 CET.

If you want to know more about what virtualization and cloud can help customers worldwide achieve, please visit our central customer success. In the meantime, I look forward to seeing you soon in Barcelona

Fins després

Kim

PS - It is not too late to register to attend Synergy! Click here for more details.

Do not forget to check mobile sites Citrix Summit & Synergy

5:36 PM Add Comment
Do not forget to check mobile sites Citrix Summit & Synergy -

This year Citrix Synergy introduces mobile, a mobile site just for use by Summit & Synergy participants.

mobile Synergy runs on HTML5 to work with tablets, smartphones and other mobile devices like the iPad, iPhone, BlackBerry and Android. Download to your mobile device from http://www.citrixsynergy.com/barcelona/learning/synergy-mobile.html to learn more about Summit & Synergy activities, sessions, shuttle schedules, the wi-fi cards, local maps and more

links specific events are - and http://m.CitrixSynergy.com http :. //m.CitrixSummit .com

Synergy Mobile also allows you to receive updates of Synergy Buzz page, which is a live stream of the blogging community, #citrixsynergy discussions Twitter and Flickr photos.

Enjoy!

Not to Barcelona to Synergy? Discover Synergy Live!

4:35 PM Add Comment
Not to Barcelona to Synergy? Discover Synergy Live! -

For those of you who are not able to attend Synergy, Synergy tune Live! for introductory presentations streamed by Citrix CEO Mark Templeton, Citrix CTOs and select the eruptions. Synergy Live! will feature request interviews with Citrix TV Solutions Expo exhibitors, customers and partners and will feature daily wraps of the event.

Synergy Live! begins later today at 16:30 with Geek Speak Tonight!

Enjoy!

Your logo here ... allowing businesses to use your cloud

3:34 PM Add Comment
Your logo here ... allowing businesses to use your cloud -

I heard time and again: "Many companies want to take advantage of cloud computing, but do not want not give up their own data centers. "I have also heard the term" hybrid cloud "more crudely defined and used over and over again. I would make a bet that if you were in a computer room people and asked everyone to define "What is the hybrid cloud?" You get a different answer and perspective with every person you talk. Let the logic of single cloud ...

Enterprise administrators want to take advantage of low-cost computing in the cloud, while keeping things as databases, data storage and services directory in a safe place, on site. the quicker we can come to grips with the realization that each application workload is cloud dignified, more CloudBridge be logical

Here is a scenario of my world. I want to migrate the Web application level to the cloud, but leave the database safely in my data center. How do you do I do that? Or I want to run Windows 7 desktops in a supplier cloud, but leave Microsoft Active Directory and storage in my data center. Feasible? Yes! Here's why ...

The fundamental objective CloudBridge core Citrix is ​​to make cloud hosted applications appear to administrators, tools and even the applications themselves, as if they are running on the network business. CloudBridge is an open foundation for building an extended cloud datacenter transparent. I mean, let's face it, networking is CORE to cloud computing

Citrix CloudBridge:

  • makes the cloud provider look network, as a natural extension of your network enterprise data center
  • help to significantly reduce the cost and complexity of migrating applications to the cloud
  • Reduces the risk of application failures, especially those from application migration
  • larger Active, a more advanced use of cloud computing

in Q4 2011, we will leave this up a notch and launch:

  1. IaaS "cloud catalog" within Citrix CloudBridge. cloud Leading vendors worldwide will be "pre-certified" to support Citrix CloudBridge This provides enterprises a validated list cloud computing datacenters worldwide that can be easily exploited for additional capacity.

What does this mean? Simply put ( NOTE: This is a model and NOT the final GUI):

We will feature our GUI any cloud provider that is ready to support Citrix CloudBridge like a piece of their cloud offering

  1. simple, "one-sided" setup: automation Wizard-driven between Citrix CloudBridge and major cloud providers, it is easier for companies to expand their networks from entirely within the NetScaler user interface.

What does this mean? We want to work with each cloud provider to provide "one-click" configuration and connection in the graphical interface of their data center to cloud YOU !!

  • CloudBridge Citrix Ready program: Citrix also launched a Citrix Ready certification program, enabling any cloud provider to certify its cloud as "CloudBridge Ready".

What does this mean? We will work with you to ensure that Citrix CloudBridge work with your cloud, your API and allow businesses to leverage your cloud in a way they did not realize they could!

So in the end ... we want companies to use your cloud so they do not realize! Citrix CloudBridge is the first step. Integrate your cloud in our GUI is the next step. Together these actions will cloud computing to a new level!

XenClient 2.1 - What does this mean for your business

2:33 PM Add Comment
XenClient 2.1 - What does this mean for your business -
Citrix XenClient 2.1 announced in the technical presentation of Peter Blum release. So now that you know what's in it, what it means for your business?
XenClient is FAST
With XenClient 2, we have received excellent feedback about to end user performance. In fact, one of our early adopters had this to say about the technology.
" Running 7 virtual desktops Windows XP and Windows separated with XenClient on my laptop showed no significant differences in the performance of operating system environments on the . laptop directly I am impressed by the performance and usability of XenClient and what it can do for any business. "- Erik Gilreath, IT Consultant & System Administrator Grand Rapids, Michigan
Also a great performance from the end user, XenClient 2.1 can speed up the process update for end users with its new dynamic feature of stratification. For more information on how this works, see the blog of Peter Blum.
XenClient is highly secure
XenClient XT is an edition of XenClient specifically designed to allow multilevel secure local virtual desktops. It was built to meet the isolation, security, and the most extreme performance requirements for local virtual desktops in environments of public sector clients. With XenClient 2.1, all these great benefits are now extended to laptops and we begin to see considerable interest from other highly regulated industries in this solution. What's the draw? Extreme Security! That's what interested Dr. Ryan Durante Air Force Research Labs of this technology. During his session at Citrix Synergy in Barcelona, ​​he stated.
" SecureView, the name of the government program that uses XenClient XT as a basis for a multi-level workstation, reached the highest level of approval NIST 800- . 53 security Controls Catalog available today These approvals are: Confidentiality: High, Integrity: High Availability: Medium "
XenClient supports GLOBAL BUSINESS
the 2.1 user interface XenClient is now available in English, French, Spanish, German, simplified Chinese and Japanese. Here's what Mitch Parker, vice president and general manager of Citrix Systems Virtualization Division, has to say about our international vision.
"We have seen a huge demand for XenClient worldwide . As a global company with over 10,000 partners in 100 countries, we are engaged in the global market. the location of XenClient not no longer allows users to adopt XenClient, it also helps companies meet the needs of their labor lumber increasingly global and mobile. "
system is eco XenClient GROW
Since we launched XenClient in 09, we multiple partners approve the technology. Now you can read this as Intel, Dell, HP, Lenovo and Microsoft have to say about XenClient here. at Citrix Synergy Barcelona, ​​Login Consultants has announced XenClient and Microsoft Systems Center Configuration Manager (SCCM) Integration Toolkit. You can learn more about the announcement from Citrix and Login Consultants. Another partner, we enhance Citrix Synergy Barcelona is a RES Software. You can see a demonstration of new Citrix XenClient and RES Workspace Manager here. Finally, we continue to develop our OEM relationships and expand our PC XenClient HCL. Stay tuned for more information in this regard.
Try XenClient TODAY!
XenClient 2.1 will be available by the end of the year. If you have not had the opportunity to try XenClient, there is no need to wait. You can download XenClient 2 here. Be sure to contact us online so you can keep abreast of latest developments in XenClient and be the first to know when XenClient 2.1 is available for download. You can follow us on Twitter and Facebook. You can also visit our product page XenClient for more product information. Visit our forum XenClient for technical discussions on the product.

VDI in a box "pizza"

1:32 PM Add Comment
VDI in a box "pizza" -

Reflections on VDI Write-Cache Storage Alternatives.

Pizza box It is quite common that the overall cost of implementing VDI-up is over 80% dependent on the shared storage cost, especially when dealing with instances of VDI one tenant. Const purchases of effectiveness based on the bulk storage acquisition, hindering the possibility of incremental growth. At the same time the scalability of short- and long-term system is largely related to the storage design that should be reviewed during implementation VDI lifecycle.

It is also easy view that traditional VDI implementations favor server hosts in a blade form factor at the high densities of users targeting. the design of the blade revolves centered to the shared storage and little space for alternatives such as cheap local disk arrays available with 1U servers called "pizza boxes".

Consider the design pizza box where local storage can take the load carrier for writing requirements Cache While the search for alternatives to reduce dependence on shared storage and cutting the implementation in all, we will ensure that.

  • predictable scalability at a reasonable cost
  • provisions for incremental growth
  • universal design model is ready to scale
  • requirements solid time are met

as a starting point, let's look Provisioning picture "standard" via Citrix Provisioning Server. with write caching on the target VM only the data necessary for VM to run is transmitted, saving valuable storage space and time by not requiring the entire image to download on VM. This approach provides excellent resilience with minimal network load. Write-cache partition can also be used as a home for the system page file, store persistent data that can survive across reboots for newspapers such events, dumps and Citrix Personal vDisk, etc.

Some design deltas when comparing shared vs. local storage:

  • High Availability (HA) capabilities with combination VDI + Hypervisor + PVS are achieved both shared storage and internal
  • Although it is easier to reach FT (fault Tolerance) in a shared storage environment by simple opposition, HA, most VDI implementations do not offer the FT capacity due to the prohibitive cost
  • shared storage allows for live VM migration of individual virtual machines is useful for maintenance on the fly hardware and rebalancing resources. However, there are practical limits when migrating large numbers of virtual machines in a typical VDI implementation
  • Local storage design includes provisions for planned VM migrations can be accomplished by "bleeding" users to other physical hosts after disconnection and connection provided
  • conservation persistent data on the shared storage is an easier task, although the local storage can provide backup and options as well

as an example of popular look 1U Dell and HP servers offers - R610 and DL360 G7 respectively available for around $ 10k- $ 16k

  • 544 to 816GB of usable space ( 6 to 8x146GB, 15k drives, RAID 50 recommended)
  • RAID controller storage quality with 512 to 1.024 MB cache
  • 96-144 GB RAM
  • Support more 100 users VDI single tenant (8GB of write cache, from 0.9 to 1.4 GB RAM, 100 Mbps per user) and about 100 0 VDI multi-tenant users or more

Although individual mileage may vary VDI implementations since all have identical requirements, we can clearly see the dramatic reduction potential costs at $ 100 / $ 0 per user in the host material costs, including storage. This contrasts the $ 1,000 cost per user equipment or more with common VDI implementations based entirely on expensive shared storage

In conclusion :.

Write-Cache unloading inexpensive high performance local storage provides linear scalability with provisions for incremental growth, affordable and sustainable. Independent accommodation in individual computer units offer excellent availability with less reliance on shared storage that can be optimized for storing data percistant and not trivialized as a dedicated write cache.

PS. To facilitate the adoption of local write cache and simplify disk management VDI simple technique described in the management of Citrix PVS Sheet Write-cache can be used.

PS # 2. " How about the IOP " - A frequently asked question in my presentations on this topic please take a look at the job. Thomas Berger: / blogs / 2011/12/01 / pvs-write-cache-to-local-disks-% E2% 80% 93-a-real-world-experience /

XenApp News Synergy Barcelona 2011

12:31 PM Add Comment
XenApp News Synergy Barcelona 2011 -

Thank you to all who attended the "What's new with XenApp 6.5" session escape! Cris Lau and I had the pleasure of present some of the XenApp 6.5 highlights. the session was very popular. We had two of these sessions in Synergy and each had about 250 participants. We hit the highlights of the release, including instant App Access , multi-stream ICA, Flash redirection, Enhanced Experience office and more. We even discussed the new XenApp 6.5 Mobility Pack, announced at Synergy. in addition, since one of the sessions were broadcast live we have been able to answer some questions in the chat. If you do not do in Barcelona, ​​you can still view the recorded session to see some video demos showed us the public. Thanks to the lovely people Barcelona and our major partners and clients for such an impressive event!

CC 5.0 Enhancements: Extended Authentication Support Part 3 - Customized Active Directory group level control

10:29 PM Add Comment
CC 5.0 Enhancements: Extended Authentication Support Part 3 - Customized Active Directory group level control -

In the previous blog (/ blogs / 2011/11/04 / NetScaler -Commande- center-5-0-extended-authentication-support-part-2-dual-mode-smooth authentication configuration /) we discussed the importance of smooth double authentication medium mode. Now let's move to the second part of the authentication extension in Command Center 5.0, which is adapted from Active Directory group level control.

level control of Active Directory custom group

Creating Groups AD:

  • Step 1: Go authentication Settings under administrations
  • Step2: Enter any AD server credentials and allow the extraction of group
  • Step 3: Go to the groups under administration
  • Step4: Click Add groups
  • Step5 Select Browse and enter the credentials
  • Step6: Select the groups you want to authenticate access to the CC functions and click OK
  • Step7: Select the write-read run levels for the features you want CC for groups and click OK
  • Step8: now you AD have created groups that are allowed to perform some level of CC appliance functions on

AD once these groups are created on the CC unit, the authentication and authorization process simplified.

Now, let's dig into the details on the impacts of the extraction of the AD Group the command center:

first, everything from the time a user enters user credentials to access the command center, until the time he has access to the command center, this is distinct for authentication and authorization

Reason1 :. Simplifies the work of the directors

It eradicates the manual process of assigning a specific group to a particular user from the active directory, every time a user accesses the external AD Command Center .

the flow of execution in NetScaler Command Center 4.1:

for more access to the user level on the functionality of the command center, admin had to manually assign users to all the different groups to the specific access level !!

now is a tedious job !!

The flow of execution in NetScaler Command Center 5.0 beta:

With this process, the administrator has not to specifically authorize each single external AD user who logs. authorization is done automatically when the user belongs to a particular AD group! J

Note that the AD server is just responsible for authentication. The authorization functions Command Centers is done by the control center only

REASON2 :. Restricted users without level permissions of read-write-execute

in CC 4.1, the default 'users' group for each AD user who logs in, used to finish by reading the operations command center. It was the same when the "User" group definition has no read-write performance of any level functions.

CC With 5.0, we can not absolutely deny the user access to all types of resources and operations until and unless it belongs to a group configured on the AD Command Center. means absolutely no read operation as well! If a user attempts to connect that exists in the current directory, but not on any of the AD groups Command Center, the user will be denied access, then.

REASON3 :. user convenience

With the AD Group extraction, users will be able to view details of the AD group on the CC unit

with this, we end part of the extended authentication support 3 blog and continue to blog with NetScaler Command Center 5.0 other key improvements next week.

Troubleshooting Tips & Tricks - TechEdge Barcelona 2011 Videos and Presentations

11:30 AM Add Comment
Troubleshooting Tips & Tricks - TechEdge Barcelona 2011 Videos and Presentations -

Have you had the opportunity to attend the event TechEdge San Francisco Synergy recently? If not, you will not want to miss the presentations and videos Techedge now available. These sessions can provide troubleshooting tips and tricks support experts.

See presentations and videos

Citrix TechEdge is free event organized by the Support high Citrix Techedge engineers Summit Citrix and Synergy, where you gain knowledge depth on the latest troubleshooting tools, methodologies and fixes for your Citrix application delivery infrastructure.

David

Citrix on:

Twitter - @citrixsupport & @citrixreadiness
Facebook
LinkedIn

Win an iPad2 contest for November and December!

9:28 PM Add Comment
Win an iPad2 contest for November and December! -

Back by popular demand. Partners appreciated the "competition" for iPad, and learn how to blast emails Citrix Concierge marketing. So we extended the contest for the months of November and December
Have you ever considered holding an iPad 2? Yes? Well, this may simply perform blasting your email campaigns through the Citrix janitor marketing platform and be automatically entered to win. Two winners in November and two different winners in December.
What do you expect? Do it today! To see all details to access the site Concierge Marketing.

Project Phaser (Print Server Universal) Tech Preview released

8:27 PM Add Comment
Project Phaser (Print Server Universal) Tech Preview released -

For those of you who have been anxiously awaiting the Citrix Universal Print Server, it is finally here!

As promised during my session Summit in Barcelona last few weeks the technical overview of the Phaser project was assigned to MyCitrix.com November 8, 2011. All Citrix client that is ongoing with Subscription Advantage can download and evaluate the new feature of XenDesktop and XenApp.

This also means that you stop guys can stop filling my request packets inbox UPS beta and start sending me real feedback on your experiences with the preview code release :-)

what Phaser project?
Phaser project represents the second phase of the laser, a multi-year initiative to improve printing. The first Laser fruits were delivered last year in XenApp 6 Printing Optimization Pack which focused on optimizing the print content and improve the printing speed. The characteristics of the laser are now included in XenDesktop 5.0 and XenApp 5.5 and 6.5.

Building on these initial deliverables Laser, Phaser project now extends Citrix Universal Print solutions to cover network printing scenarios. Here, we talk about the situation in which the host application directly accesses the shared printers on a network print server. Since access occurs directly from the session on the print server, sessions initiated from any type of customer will now have access to a full establishment of universal printing.

A Universal universal printing solution
When I say any type of customer, I really mean tOUT client. The solution in no way not depend on the capabilities customers because customers are simply not involved in the printing functions

For users, the solution looks and behaves exactly like sharing solution native Windows printing with two notable exceptions :.

  1. The Citrix universal drivers can be used for these network printer connections. This means that there is no need for all the world's printer drivers to be available on your XenDesktop or XenApp host.
  2. When the host application and print server are separated by a wide area network, the user experience to interact with the remote printer will be greatly improved because the protocols used are optimized for networks extended.

Here is a link to a short video made by Nicholas Carpenter (Phaser project test) provides a brief introduction to prop value Phaser Project.

How does the Phaser?
As you may know, the current universal printing solution provided in XenDesktop and XenApp works only with Windows endpoints equipped with the native Win32 client software. Indeed, the solution is based on a thin pilot being universal implementation in the host that acts as a proxy for running printer driver on the Windows client computer. The universal driver communicates with the running print engine on the client through a virtual channel ICA designed.

So that the engineering team has done is to adapt the UPD print engine to operate as a network service to a printer based on Windows server instead of a Windows client. Sounds easy, right?
Conceptually yes ... but in practice, this meant building a complete solution from one end to the network print server with the client, server and protocols that operate as Windows waits PLUS do all the things unique that are required to support Citrix universal printing needs.

Furthermore, protocols used must be carefully designed to perform well over WANs. In the end, we opted for a SOAP Web service-based protocol for communication of procedural elements of the print server universal driver. However this would not be the best choice to provide print workflow. So the delivery of compressed print data is carried out via a secondary TCP connection to a connection used by active print streams.

The diagram below illustrates the key elements of the solution.

Tech preview Packages
The Phaser Tech prerelease project works with XenDesktop or XenApp 5.5 or 6.5. However, to use the solution, you will also need one or more print servers running Windows Server 08 x86 (eg original 32 bit WS 08). Print servers running on 64-bit Windows Server 08 R2 are not quite ready.

After downloading the technology preview, you will see two exes self-extracting (UPClient and UPServer) plus several scripts to patch the necessary components.

The UPClient package must be deployed to XenApp 6.5 server or XenDesktop VDA 5.5 machine. In future versions XenApp and XenDesktop, this component will be delivered and installed automatically. The UPClient package can be installed on any platform supported by XenDesktop VDA 5.5 (WinXP, Vista or Windows 7, 64 or 32 bits) or XenApp 6.5 (Windows Server 08 R2).

The UPServer package adds the necessary services for an existing Windows print server. For preview technology, this must be an x86 server from Windows Server 08, but we will add support for Windows Server 08 R2 in the GA release.

The batch files are needed to update a couple of components with UPS knowledge. In particular, the Citrix Print Manager service must be aware of the UPS network printer connections to properly apply the driver policies. Furthermore, in order to configure the use of the inverter (it is disabled by default), a policy console update is needed. Indications for application of these updates are provided in the release notes with the technical package preview.

GA is scheduled for the first half of 2012, but the actual release date will depend on your comments and our beta test full capacity on all supported platforms. So please download the technology preview bits and lets us know what you think.

Links

  • MyCitrix download page for UPS Tech Preview
  • UPS Tech Preview release notes
  • UPS Tech Preview support forum

- Gary Barton
Architect, Citrix HDX team
gary.barton@citrix.com

Citrix NetScaler provides the consolidation of large-scale network for public and private clouds

7:26 PM Add Comment
Citrix NetScaler provides the consolidation of large-scale network for public and private clouds -

Citrix NetScaler is now available a new service delivery platform consists of four ultra high performance NetScaler SDX ™ models that employ virtualization technology Citrix XenServer ™. Virtualization is driving the strategic consolidation of the basic elements of data centers, allowing the workload to be decoupled from the dedicated physical environment. First embraced throughout the server-based computing and the delivery of services to storage area networks, core networks and application are now being consolidated. This new paradigm allows companies to build efficient cloud infrastructures for greater flexibility in the provision of applications and better lead the economy of information. These new SDX models offer a platform:

  • Enables new services provisioned on demand without adding hardware
  • Provides large multi-location level with full traffic and isolation of resources to consolidate many workloads that cover global data centers
  • offers flexible Pay-As-You-grow performance enhancements for scalability

the NetScaler new design is built and optimized with XenServer to consolidate load balancing and application delivery controller (ADC) services HTTP rates up to 50 Gbps. A single device can support up to 40 completely independent NetScaler instances for large scale multi-tenancy - 2.5x more than competing solutions. Each instance is a complete isolation of system resources, including processing, memory, network I / O, SSL and compression. This total body segregation is necessary to ensure the SLA of each application, ensuring a tenant can not die of hunger adjacent tenants of resources and ensure security by isolating traffic flows. The new platform also sets a new performance standard SSL

These new models include both MPX and SDX versions of the 17550, 19550, 20550 and 21550. These models also offer :.

  • ADC 100 percent functionality - NetScaler only ensures that each combination of characteristics can be used simultaneously with no loss of functionality
  • common hardware Platform- the NetScaler SDX models are based on the same platform as the design .. MPX MPX models can be upgraded in the field to the SDX release.

Torne-se para vender o certificado VDI-in-a-Box - treinamento gratuito agora

6:25 PM Add Comment
Torne-se para vender o certificado VDI-in-a-Box - treinamento gratuito agora -
Citrix VDI - a-Box é a desktop virtualização of solução, fácil, acessível e completa, That coloca bone Benefícios da office virtualização disponível para qualquer empresa. Rodando em SERVIDORES off-the-shelf, a solução POSSIBILITA an IT entregar desktops Virtuais gerenciados centralizadamente para qualquer usuário, usando qualquer dispositivo - um por menor custo do Qué novos PC. Esta é a desktop solução What pequenas as e Medias Empresas estão pedindo. Agora você Pode oferecê-the para seus Clientes.
Mas, primeiro você precisa fazer o curso de treinamento of Venda, CVB-001-1W sale VDI SMEs para, para ser certificado para vender VDI-in-a-Box. Este é um curso gratuito online duração com uma hora. Não há limit alunos, quantum quiserem pessoas na sua empresa podem fazer o curso.
From 2012, um curso técnico online gratuito será oferecido, para mas Faze lo-ser você precisará certificado para vender o VDI-in-a-Box. Você será notificado em breve.
então, o que está esperando você? Faça o treinamento gratuito e COMECE a vender agora.
Faça o curso de treinamento of Venda do VDI-in-a-Box hoje mesmo.

European services provider Swisscom announces XenClient-based Desktop Solution-As-A-Service For companies

5:24 PM Add Comment
European services provider Swisscom announces XenClient-based Desktop Solution-As-A-Service For companies -

Swisscom IT Services, a division of Swisscom, the leading telecommunications operator in Switzerland and Intel recently announced SmarTop® - Smart Desktop. Smartop is an innovative workplace service that operates Citrix XenClient and Intel® vPro ™ laptops and technology-based desktop PCs offer a smart solution for desktop virtualization for enterprise customers. The Smartop service enables a range of usage scenarios, such as a centralized enterprise IT environment managed but executed locally, plus the ability to use multiple virtual desktop environments on a client PC, like partitioning and personal content professional on the same device. Smartop also include improved backup and restore options supplied by the Synchronizer for XenClient.

Smartop services Swisscom offer business customers with key benefits, including providing IT services with desktop environments centrally managed with optimum security while providing ease of -use, performance and mobility to employees. The Smartop services enable businesses users a whole new approach to mobility, both in the office and on the go.

Swisscom is an excellent example of an innovative service provider using Citrix XenClient with Synchronzier to deliver virtual desktop services to local businesses that want to quickly and cost effectively deliver applications and desktop tools to their employees to improve their overall productivity and get products and services to market faster.

Read more about the offer Smartop of Swisscom IT Services.

Leverage Citrix Partner DEMO Appliances for sale

4:23 PM Add Comment
Leverage Citrix Partner DEMO Appliances for sale -

Our most successful partners know that the demo Citrix solutions is the best way to sell and they leverage partners DEMO devices.

A demonstration device partner is available in all series of Citrix Networking products.

  • View Partner Program Allotments oF Licensing for details on the number of licenses DEMO partners and appliances are available to you.
  • See Citrix Partner licenses .. Product FAQ for more information
  • see How to Order a DEMO device for information on ordering a DEMO device

Note: Your My Citrix account is required to access these resources.

How to create a welcome window Caption SSO: Utility SSOHelper

3:22 PM Add Comment
How to create a welcome window Caption SSO: Utility SSOHelper -

simple solutions Sign-On (SSO) are very popular, including Citrix XenApp own SSO offered and XenDesktop. As such it is not surprising that sometimes implemented SSO run into unforeseen challenges when it is quite difficult to use a simple "canned" recipe for SSO to work.

This paper presents the application SSOHelper successfully. used to leading SSO solutions sides to facilitate SSO appropriate action when the legend window is used as SSO trigger

Questions:

  • application (let's call him "AppX") creates windows with default legend that is replaced at runtime with specific descriptions provided in the AppX code. Although a common period of 30 to 0 ms in replacing the legend SSO creates challenges, most of SSO solutions have the ability to delay the acquisition of window title mitigating the problem.
  • A more serious problem arises when developers APPX are not intentionally or unintentionally replace the legend targeted authentication screens by default window SSO. The results of the circumstance in false identification of positive window producing "ghost typing" in unwanted areas of the program screen

The solution :.

Court to ask AppX the fixed code (which is not always possible), the solution is based on a custom application SSOHelper , which is designed to create friendly SSO legend of login screen to the application load.

SSOHelper.exe is very compact (less than 50 Kb), requires no installation and no intrusive to applications, he worked with

Step # 1 - deployment and configuration :.

SSOHelper.exe copy on the target machine that is used to load AppX. For example, the directory using

 C :.  SSOHelper  AppX 

where AppX reflects AppX reference because there could be other applications that need SSOHelper

Configuration is in SSOHelper.INI file as follows:

in one line - command line required to run AppX including the full path and switches. For example:

 "C:  program files  AppX  AppX.exe" / u: BLA / h: BLA 

In the second line - set separate Legend window for the desired first connection AppX screen, for example

 AppX login screen 

a line of three to the delay in milliseconds to wait before the change of subtitles (default is 10).

Save the file SSOHelper.INI beside SSOHelper.exe

Step # 2 - If the XenApp is required to publish by AppX SSOHelper. exe

command line:

 C:  SSOHelper  AppX  SSOHelper.exe 

Use standard AppX working directory. For example:

 C:  program files  AppX  

Choose appropriate icon, the description of the application, etc.

Step # 3 - Implement associated SSO models

Use day SSO models ensuring that the legend of the login window is the legend on the line 2 in the SSOHelper.INI file.

Download link: SSOHelper_1.0.0.1

Why should I trade up to XenDesktop?

2:21 PM Add Comment
Why should I trade up to XenDesktop? -

Your customers considering trading their XenApp licenses for XenDesktop? Discover the new Trade-up campaign Citrix Concierge marketing and give them the key to successful implementation of XenDesktop. Offer your XenApp / XenDesktop customers to watch this excellent Webinar on request . The campaign includes several email templates, webinar registration page, upon request, copy blocks, FAQs and much more! All FREE!

breath this campaign to your marketing Concierge customer and you could win an iPad 2! To hurry up! For more information access the site's home page here.

Follow me on twitter @ GabriellaPinto4 and get the latest news on the site.

Adding parameters of the interface of the mobile Web Citrix Receiver configuration URL Generator

1:20 PM Add Comment
Adding parameters of the interface of the mobile Web Citrix Receiver configuration URL Generator -

Since the time this article was produced the receiver configuration URL generator been updated with the neccessary changes - please return to the original tool to the new improved solution: the installer URL Generator receiver

Sincerely,

JRF ~ ~

=============

Citrix Community published a great way to automatically generate the Mobile Citrix Receiver configuration under: mobile receiver generator configuration URL. One limitation of this tool is the configuration of the configuration of the Web Interface Manual. As you may or may not be aware, the mobile receiver has the ability to launch a website integrated Web interface within the graphical interface of the receiver. This is usually configured in the "manual" configuration

Follow these steps to update the rover configuration URL to send a site integrated Web interface instead of configuring services Site :.

Step 1 :. Use the rover configuration URL generator to generate the URL necessary
Step 2 : Change the last variable "gw = 0" "wi = 1"

Your URL should look like:
citrixreceiver: // createProfile s = http% 3A% 2F% 2Faccess.furtaklab.net & pname = 20web Sample%%% 20Interface 20site & d = Furtaklab .net & wi = 1

the following is the result:

See the following blogs for more information on the mobile receiver configuration generator:

mobile receiver setup URL Generator
One Click Provisioning

Customers applaud Citrix VDI-in-a-Box saying it is simple and affordable

12:19 PM Add Comment
Customers applaud Citrix VDI-in-a-Box saying it is simple and affordable -

Citrix Partners -. The time has come to enrich the virtual desktop experience for your client Citrix VDI-in-Box, a newly added solution to the following Citrix virtualization, cloud computing and networking technologies.

Specially designed for SMEs, VDI-in-a-Box extends the benefits of virtual desktops to customers, even within the budget and financial constraints because a software all-in-one that works on cheap servers off-the-shelf direct storage, it allows Windows administrators to rapidly deliver desktops centrally managed for less than the cost of new PCs. Customers can start with a small deployment, fitting their budget refresh and develop in the refresh schedule.

This is what customers say about VDI-in-a-Box.

"VDI-in-a-Box is unmatched ease of use - just turn it on and go " Guthrie County Hospital

. "We are impressed with the speed, ease -of-use and affordability. The cost savings with VDI-in-a-Box are phenomenal - it was 1/6 e the alternative cost "Parker SSD Drives division of Parker Hannifin

[ "VDI-in-a-Box has given us the ability to stop the fight against the fire and our PC instead focus on moving forward school. It is simple to install and in line with our budget PC refresh "Fitzharrys School, Oxford

Citrix Partners - .. Visit My Citrix for more information to accelerate your sales opportunities and customer engagement

~ Global Partner News ~ よ り 新 し い My Citrix ラ イ セ ン ス ポ ー タ ル で ラ イ セ ン ス の 管理 が 容易 に

10:17 PM Add Comment
~ Global Partner News ~ よ り 新 し い My Citrix ラ イ セ ン ス ポ ー タ ル で ラ イ セ ン ス の 管理 が 容易 に -

2011 年 11 月 6日, Citrix は, My Citrix 経 由 で ア ク セ ス す る ラ イ セ ン ス ポ ー タ ル の 機能 を 改善 し た こ と を 発 表 し ま し た.新 し い ポ ー タ ル に は, 次 の よ う な 特長 が あ り, ユ ー ザ ー の ラ イ セ ン ス 管理 に 関 す る 全 般 的 な エ ク ス ペ リ エ ン ス が 向上 して い ま す.

Read more

Neue Citrix Receiver for Android, Windows, Blackberry PlayBook und Google Chromebook

11:18 AM Add Comment
Neue Citrix Receiver for Android, Windows, Blackberry PlayBook und Google Chromebook -

Vor einigen Wochen mit gab Citrix Receiver für eine neue Android 3.0 für den Startschuss Generation von Citrix receivern.

Nun wurden kurz vor Silvester 2011 Receiver für Windows 3.1 sowie die finalen 1.0 Versionen der für Chromebook Receiver Receiver und für Blackberry PlayBook zum Download bereitgestellt. In den nächsten Wochen wird auch für iOS Receiver aktualisiert werden . Receiver für Windows kann über kostenfrei download.citrix.com heruntergeladen werden, und finden Chromebook Receiver für Sie in den entsprechenden Playbook App Stores jeweiligen der Anbieter.

ebenfalls Ende Dezember kam Citrix CloudGateway 1.0 auf den Markt! CloudGateway kommt in zwei Varianten:

  • als kostenfreie Express Version mit den für die Bereitstellung services Storefront Windows von Anwendungen und über Desktops Citrix XenDesktop XenApp und
  • als Enterprise-Version mit zusätzlichen Applikations- Controllern zur Integration von und SaaS Web Apps über Citrix Receiver.

Sie finden hier im deutschsprachigen Blog weitere Informationen zu Citrix CloudGateway

Die neuen Updates für Receiver für Windows, Android, Chromebook, playbook und in Kürze für iOS unterstützen neue diese CloudGateway-Infrastruktur , mit der Web-Anwendungen und SaaS-bereitgestellt of werden können Virtual Desktops und wie Windows Applications. Zukünftig zudem wird die von Bereitstellung mobilen Smartphone / Tablet-Anwendungen und über die "Follow Me Data" -Funktionalität auch die zentrale Ablage von Dateien integriert werden.

Die neuen Versionen von Citrix Receiver bieten aber noch mehr als nur single die, Unterstützung für CloudGateway:

  • Wir haben - in einigen Fallén dramatisch - die Gesamt-Performance verbessert
  • darüber hinaus haben wir viel Zeit für die Feinabstimmung der Benutzeroberfläche verwendet
  • Das XenApp 6.5 Mobility pack erlaubt die optimierte Darstellung von virtualisierten Windows Anwendungen, die nun sich mehr mobile wie Anwendungen verhalten, wenn sie von Smartphones oder Tablets mit Touchscreen aus genutzt werden
  • Wir haben mit dem mobile native SDK application API zur Verfügung, um von Windows Anwendungen aus native spezielle Gerätefunktionen von Smartphones und Tablets wie beispielsweise Kamera, GPS und Beschleunigungssensoren abzufragen

in den kommenden Monaten werden Sie mehr über hinaus darüber Tablet optimierte Windows Desktops hören. Wir haben das von vielen Kunden Feedback erhalten, dass ein kompletter Windows Desktop - es sei ein XenDesktop VDI-office-gehosteter oder über ein XenApp gehosteter Bureau shared - optimal für nicht auf einem Endanwender iPad Android Tablet nutzbar oder ist. Die Windows Benutzeroberfläche wurde Entwickelt und einen großen optimiert Bildschirm für und Maus-Steuerung. So werden wir eine Benutzeroberfläche anbieten, die die herkömmliche Windows Benutzeroberfläche überlagert und die Nutzung über größere Tasten für ein und bessere Fingerbedienung einfacher aufrufbares "Start" -MENU bieten wird

Vielen Dank für Ihr Interesse an unseren Lösungen. - Wir nach vorne auf blicken 2012 ein Jahr, in dem Revolutionäre Erweiterungen Desktop- und für Anwendungs-Virtualisierung kommen werden.

~ Global Partner News ~ よ り 新 製品 - Citrix NetScaler SDX プ ラ ッ ト フ ォ ー ム に WAN Optimization を 追加

9:16 PM Add Comment
~ Global Partner News ~ よ り 新 製品 - Citrix NetScaler SDX プ ラ ッ ト フ ォ ー ム に WAN Optimization を 追加 -

は Citrix NetScaler SDX ア プ ラ イ ア ンス を ベ ー ス と す る, 拡 張 性 の 高 い 新 し い Repeater WAN optimization プ ラ ッ ト フ ォ ー ム を 発 表 し ま す.
Read more

Want To Melt Away Security Issues?

8:15 PM Add Comment
Want To Melt Away Security Issues? -

Today is not working? Learn why desktop virtualization should be the foundation of an IT security strategy. Check out this cool new campaign on the Concierge Marketing and tell your customers how to thaw their business by securing information and data, while keeping their business and the flexible and mobile workers. You'll find a variety of materials such as email templates with new impressive graphics, videos, white papers, copy blocks and more. Use your creative skills, jump your email and follow it. All for free! Try it today!

Follow me on twitter @ GabriellaPinto4 and learn more about the Citrix janitor marketing campaigns.

Recording the discussion on cancer research why they chose to virtualize their desktops is now available

7:14 PM Add Comment
Recording the discussion on cancer research why they chose to virtualize their desktops is now available -

In a slight change from the usual TechTalk format, we have been Jane Swindle Cancer Reseach come chat with us and answer your live questions about why they chose to virtualize their desktops. About 60% of the webinar covers the questions and answers from the audience! We hope you find useful. Here is the link to the recording.

Excellent Diagnostic / Troubleshooting "Utilities" on NetScaler

6:13 PM Add Comment
Excellent Diagnostic / Troubleshooting "Utilities" on NetScaler -

Continuing on the post last week when we discussed the NetScaler user interface that provides an excellent way to troubleshoot and diagnose the NetScaler system (/ blogs / 2012 / 01/19 / how easy it-is-diagnosetroubleshoot NetScaler /). This week we will focus on the "Utilities" section of the diagnostic page

batch configuration :. This utility provides a way to execute batch configuration on NetScaler. You can specify the command file from your client system or from the NetScaler appliance. The generated output can be pushed to a different file on the given path. You also get to see the output in the same window and you can record the output on your desktop

Ping / ping6 :. are the utilities to run Ping tool for IPv4 and IPv6, respectively. When you use this command-line tool, you realize how useful options are there. The simple " Count " option may limit the number of times of numbers you want to run ping. The " Timeout " provides data to ping the time to get out in case of failure. the " interval " option is the waiting time in seconds before sending the next request. " Interface " would you allow to choose the interface to use for the ping. " pattern " is where you fill in the hexadecimal model that goes into the data part. " Size " limit the amount of data sent with ping packet. " source IP address " allows you to spoof the source IP address for the ping packet to be sent. you can see out there or save it in the file and

TraceRoute / traceroute6 :. are the utilities to run the TraceRoute tool in IPv4 and IPv6 mode respectively. Even as ping, with TraceRoute you can see several important options in the feed section. " Packet Length " controls the packet length and default to 44 bytes and can go max 32768 bytes of data. " Minimum TTL " and " maximum TTL " are the minimum and maximum values ​​used for outgoing probe packets. " Protocol " allows you to specify the UDP or ICMP protocol name. " Port Number " is the basic port number used in probes. " Number of requests " is the number of times it will query by jumping. " Source IP address " you can specify and the possible use spoofed addresses as source for outbound requests. " Type of Service " option to specify the type of service in outbound requests. " Waiting time " is the waiting time in seconds for a response to a query. Then there are several boolean options you can choose to work with. You can also choose to save the output to a local file

Command Line Interface :. This is pretty interesting one that provides the CLI you can work on as a regular CLI. This is the context of the user interface and you have all the RBAC policies in this CLI access mode based on the user who is logged into the GUI. You can take all actions and execute all the commands you would on the regular CLI

Unzip File :. this tool will allow you to unzip a file on NetScaler

Start DST file synchronization :. This is very useful utility that allows you to synchronize files between primary and secondary. It provides you multiple file synchronization modes:

  • Everything But licenses and rc.conf
    • Does any sync between leaving the license directory and rc.conf file
  • Bookmarks
    • only synchronizes bookmarks saved SSLVPN fashion
  • SSL certificate and key
    • syncs all in / nsconfig / ssl / directory
  • EdgeSight scripts monitoring
    • syncs the ES4NS scripts
  • imported Objects XML
    • syncs items imported as schema and WSDL
  • Licenses and rc.conf
    • synchronization license files and rc.conf
  • everything including licenses and rc.conf
    • syncs everything through in HA pair

These are the tools you want to use from day to day functioning. More to come in the next blog ...

Preventing Brute Force Attacks Connecting to Citrix NetScaler Gateway / AAA-Login Pages TM - Part 1

5:12 PM Add Comment
Preventing Brute Force Attacks Connecting to Citrix NetScaler Gateway / AAA-Login Pages TM - Part 1 -

One of the most common requests I get is how to prevent brute force login attacks Citrix Access Gateway or NetScaler AAA for traffic management Login pages. Like many other Web applications that have a form of public HTML face used for the connection, this is a risk assumed.

Part 1 This article discusses how you can use the NetScaler HTTP rate limiting function in combination with Module Responder to detect and respond to a potential attack brute force. Part 2 , we'll see how you can take advantage of the CAPTCHA NetScaler to increase this method to provide an extra layer of protection.

A little history on the problem to solve

it is quite simple now-a-days in the age of YouTube how-to videos and myriad other do-it -yourself tools black art (Brutus, THC Hydra, John the Ripper, Cain & Abel, etc ...) to learn how to build and orchestrate a brute force dictionary attack style that attempts to find a set of name user and password securities pairings skills that authenticates a malicious attacker successfully. For sites that use HTTP authentication methods, such as an HTML form that implies, at a very basic level, a specially designed HTTP Post that user / pass form field names with variables that change with every application in loop that iterates N! until the library dictionary of usernames and passwords has been exhausted. In statistics, this is simply called the theory of combination where you have a combination of n things taken k at a time, with or without repetition. This is a very simple calculation for a single computer to make and even easier when you deal with something distributed. Everything might need to do is to buy or build a decent list of URL, user and reference for passwords names. The implementation of protection against brute force attacks is important for any organization to present an application to the Internet and is also one of the Open Web Application Security Project (OWASP) recommended test procedures.

How NetScaler Rate Limiting HTTP can help functionality?

For two AGED NetScaler and use HTTP authentication form, they are also vulnerable to this problem. The NetScaler Rate Limiting HTTP feature can be used in conjunction with the answering machine function as a valid deterrent to help address this vulnerability.

This is a graphical representation of the flow of a log with the configured Rate limiting method.

1

end user or malicious application / user is presented with a login form with credentials "POST" to.
q

2

Invalid credentials result in an error message displayed to the end user and a specific HTTP response
q

3

what we want to do after a certain number of login attempts are exceeded in a certain time, the user is presented with an alternative response that prevents other jobs and potentially also prevents lockout account if we the threshold below the account security policy

implementation of Citrix NetScaler

Follow these 6 steps to limit the number of requests to AGEE or AAATM login page. Steps for both GUI and CLI are provided.

1

Set a limit switch
this tells us what to follow or "select". You want to select IP and URL because we want to follow moves to the same URL from the same IP address
GUI:
Define a limit selector
CLI
add ns limitSelector aaa_err_login_selector CLIENT.IP.SRC HTTP.REQ.URL

2

Set the limit of an identifier
the identifier indicates the model in the time slot that will trigger a stroke. We choose the selector we defined above, and a way of "REQUEST_RATE" we want to know how often the specific URL will be requested in the Time Slice. As applications can not occur at a specific interval in the time slot, a type of Bursty limit is preferred that a SMOOTH. We are not concerned about the reduction of bandwidth here because we want to block so that can be left to default of 0.
GUI:
Define a Limit Identifier
CLI
add ns limitIdentifier aaa_err_login_identifier Nveau 3 -timeSlice 300000 -selectorName aaa_err_login_selector -trapsInTimeSlice 3

3

Set an action post newspaper
This step is optional, but provides a mechanism to inform you with a specific audit message that can be transmitted to a SIEM solution off-box. In the message, you can insert dynamic tokens for IP and URL that you are tracking to identify the application
GUI :.
Define a Custom Log Message
CLI
add audit messageaction aaa_login_err_alert ALERT "" login attempts Max detected from of "+ CLIENT.IP.SRC + " to "+ HTTP.REQ.URL + " within 5 seconds. Possible connection brute force attack "" -logtoNewnslog -bypassSafetyCheck YES YES

4

Define Responder action
what is a malicious end-user or "bot" would see if they met the threshold in identifier limit. notes - Responder this action could be simpler, but it is designed to integrate with the theme NetScaler Symphony. If you use a different type of HTTP Auth, or you do not want to engage the attackers with any response at all, you can also set up an answering strategy simply DROP or reset the connection.
GUI:
Define a Responder Action
CLI:
add responder action aaa_err_login_blockip_5min_act RespondWith "" Citrix NetScaler "+ " "+ "
"+ "
"+ " "+ "
NetScaler Access Gateway TM
"+ " You have reached the maximum allowed your device attempts to connect to: "+ CLIENT.IP.SRC + " .

You will not be allowed to connect again for 5 minutes. Please contact your system administrator "+ ".

"+ " ""

5

Define responder policy for AAATM or ELDERLY
the voice mail policy references the frequency limit selector and is the AAATM or VPN URLs, and also detects the presence of invalid login session cookie and log triggers the answering machine and the actions defined above. notes - If you want to trap or AAATM AGED VPN you can delete the relevant condition in the defined term. This method also works for other Web applications specifying a different URL byt
GUI :.
Define a Responder Policy
CLI
add responder aaa_err_login_blockip_5min_policy policy "(HTTP.REQ.URL.EQ ( "/ vpn / tmindex.html ") || HTTP.REQ .URL.EQ ( "/ vpn / index.html ")) && HTTP.REQ.COOKIE.VALUE ( "NSC_VPNERR "). EQ ( "4001 ") && SYS.CHECK_LIMIT ( "aaa_err_login_identifier ") "aaa_err_login_blockip_5min_act -logAction aaa_login_err_alert

6

generally bind the responder policy
We must generally bind to address both VPN and AAATM but it would be equally easy to link answering a specific policy or VPN AAATM VServer.
GUI:
Globally Bind the Responder Policy
CLI:
bind global answering aaa_err_login_blockip_5min_policy 110 END -type REQ_DEFAULT

What can we do?

  1. Using 2-factor authentication such as RSA SecurID, PhoneFactor, CryptoCard, etc ...
    When a second factor auth is provided, which greatly improves posture overall security authentication. The most common is a One-Time-Password solution (OTP) which requires the user to use something they know and a form of challenge that can go from a random code from a chip to a phone call, email, or SMS message. NetScaler supports many of the 2-factor solutions as they are standard RADIUS-based. Many suppliers have also achieved Citrix Ready certification means that they have checked their solution works properly with Citrix NetScaler and Access Gateway.
  2. Using an authentication method to 2 factors as the primary authentication
    The NetScaler and Access Gateway allows configuration of primary and secondary authentication methods In addition, this second factor method can be specified as the primary authentication method. The significance of this is that the second factor auth would first be tempted by the devil NetScaler AAA and will fail if the attempt if before the auth directory is attempted
  3. Implement Captcha image verification -. (See Part 2)
    Captcha stands for automated public Turing test to tell Computers Completely and Humans Apart. This method involves presenting a challenge problem that humans can solve, but it would be very difficult for a computer. Captcha has been specially designed to prevent automated software to fill out a HTML form such as those used for logon. A common type of CAPTCHA requires the user to type letters or numbers from a distorted image that appears on the screen.

What HTTP Rate Limitation not to answer?

  • account Directory Lockout
    HTTP Rate limiting is not fully help you with the problem account lockouts unless you set the thresholds for the selector to be lower than the account security policy. This phenomenon is common with brute force attacks because they often use the same name iterative user with different combinations of passwords. This problem can fight using a factor auth method 2nd or Captcha as described above.
  • False Positive Forward Blocking proxies
    The users coming to the same direct proxy access could be blocked if multiple users attempt a connection in the time slot window. This is due to all customers who present themselves with the same IP address that the CBC limit identifier is followed.

Download batch configuration script

More information

  • OWASP Testing Project
  • Citrix NetScaler Application Delivery Controller
  • Citrix NetScaler Access Gateway
  • Part 2 - implementation Captcha Citrix (soon!) NetScaler / Access Gateway

If Cloud Hosting Providers Focus on SMB?

4:11 PM Add Comment
If Cloud Hosting Providers Focus on SMB? -

In a recent interview with Michael Dell, the host of a notice of Business TV weekly show called, "In this era of the cloud, just go allergic PC away? ". His answer: "Not anytime soon" What he has also said that Dell is focusing on four main areas related to their business Consumer, SMB, public and large companies While big business contributes 29% to the first... online, Dell also knows how SMB is. You see, the $ 61.5 billion Dell did in 2011, $ 14.76 billion came from small and mid companies.

According to Dell, as a service is growing by leaps and bounds. They focused efforts in 2011 on health care and now claim to be the number one iT healthcare provider based services. a fairly big demand when there 's huge monoliths Cerner and McKesson in health care services hosted today. Any way you cut it, Dell is definitely focused on new cloud services as they build their business in 2012. given their success in healthcare health and having a good part of their business in SMB, it is conceivable that they could have a plan for cloud computing services for SMEs in '12.

Microsoft is yet to publish its 2011 SMB survey for hosted services. But in their 2010 study, 29% of SMEs surveyed said they use some sort of cloud service today, 36% said they intended to use three or more services and 2013 46% said they will adopt cloud as their IT service model. DaaS at Citrix believe will be a big part of this business. By the way I do not speak as office infrastructure (which may be the biggest trick of the decade). I speak of seamless applications provided via a cost-effective desktop with application provisioning, application integration and hosting these applications to create a desktop computer. The real desktop as a service model.

So if 24% of $ 61 billion of Dell's SMB business and 46% said they will adopt cloud services (inclusive of DaaS), the addressable market based on Dell earnings only more than six and a half billion dollars. If the cloud hosting providers focus on SMB?

In a word, YES.

Understand the memory footprint on NetScaler

3:10 PM Add Comment
Understand the memory footprint on NetScaler -

Last week we discussed in Tech support tools (/ blogs / 2012/02/03 / NetScaler-diagnosis-tech- support-tools /) to help whenever you post any question around NetScaler. Continuing on similar lines let us understand the memory usage on NetScaler and how can you use the diagnostic page to resolve memory-related problems.

The memory is expensive in the context :) and is for NetScaler. It becomes even important when we start using more and more memory-related features you must buffer data NetScaler or to the detection of special attack, etc. It is also essential to the scalability of the connection layer on the system, each time we see high memory usage on NetScaler, we are worried. The truth is that each symptom using high memory is not a problem (some may be) and probably an indication of the running system on resources. In other words, you must update the platform for better resources :)

To understand the artifacts and we have the "Using the Memory" tool "Troubleshooting", page diagnostic. This tool can you many details on the overall footprint memory usage in NetScaler. Let us in every part of it and to understand it better:

It begins:

TotalMEM (70980052/13344178176) Allocated: 1,958,819,924 (14.68% ) ActualInUse: 1262898384 (9.46%) Free: 11385358252

this gives you a summary of the amount of memory the device has, which is allocated in use and memory available in the system. In the model nCore we divide the entire memory in the foreground, packet engines start with minimum memory required to operate and maintain the allocation of memory depending on the need. Then it enters each individual memory pool allocation and show:

MemPool MaxAllowd CurAlloc ErrLmtFailed ErrAllocFailed ErrFreeFailed

Bytes (Own%) ( % overall)

-------------------------------------- -

MEM_PE 146800640 3775030 (2.57% to 0.03%) 0 0 0

MEM_LB_SERVER 30,064,771,065 16,757,580 (0.06% to 0.13%) 0 0 0

MEM_LB_SESSION 954,204,0 3,670,464 (0.38% to 0.03%) 0 0 0

MEM_LB_SERVICE 30,064,771,065 in 1792 (0.00% 0.00%) 0 0 0

MEM_CSWMEM 176 0 768 200 ( 0.01% 0.00%) 0 0 0

MEM_IOH 36,700,0 0 (0.00% 0.00%) 0 0 0

MEM_LOGGING 30,064,771,065 16,777,215 (0.06% to 0.13%) 0 0 0

MEM_CONN 30,064,771,065 524,302,848 (1.74% 3.93%) 0 0 0

MEM_SNMP 30064771065 118336 (0.00% 0.00%) 0 0 0

MEM_DEBUG 1835008 9632 (0.52% 0.00%) 0 0 0

MEM_MISC 30,064,771,065 15,598,450 (0.05% to 0.12%) 0 0 0

......

This is interesting because it shows the memory allocation details by internal pool and there is a long list of pools. The important thing to note is that each pool has a hat on "MaxAllowd" So there are rare chances of a pool affect overall utilization of system memory. The "CurAlloc" also shows the percentage of memory used from the pool clean over the entire system. Debugging and troubleshooting perspective that you are most interested is "ErrLmtFailed, ErrAllocFailed and ErrFreeFailed". "ErrLmtFailed" tell you the number of times that you have exceeded the sharing limit. "ErrAllocFailed" indicates the number of times the memory allocation failed for this pool. "ErrFreeFailed" indicates the number of times a memory operation failed for this pool. These 3 points of information can tell you if there is some kind of memory of crisis or issue in the system. . If you use a configuration command that returns a memory failure, then you need to check these counters for specific pool

Then you see the big picture of the pool and details on AllocFailed shared memory and FreeFailed events:

SHARED MEMORY POOL

MaxAllowd CurAllocd ErrAllocFailed ErrFreeFailed

---------- ---- -------------------

381681664 108294128 0 0

key buffer structures that play essential role in the framework and session establishment.

CONN_POOL_MEMBERS:

Name CurAllocd CurFree PgAllocd PgAllocFailed

------------ - ---------------

NSB 194666 147036 141 (2.2%) 0

PCB 28 83384 83196 (0.4%) 0

NATPCB 57344 57344 7 (0.1%) 0

B64 229376 22015 7 (0.1%) 0

B128 114688 114681 7 (0.1%) 0

B256 32768 32768 4 (0.1%) 0

SPCB 0 0 0 (0.0%) 0

...

These are database structures that are important for the type of connections and different sessions. The "CurAllocd" may continue to rise according to the requirement to run until the max button. "CurFree" indicates the number of buffers sitting in the pool free to use as you get more connections. "CurAllocd" will be further increased when "CurFree" down significantly and you need more traffic in progress. "PgAllocd" indicates the number of allocated memory pages and the system allocates more pages than "CurFree" down significantly. "PgAllocFailed" indicates the number of memory page allocation failure and it directly impacts the current and new operations. For example, if you hit the allocation failures for NSB and there is no free structure while NetScaler will not be able to pick up new connections or packets. Similarly, if you see failure for the SPCB block, it will impact SSL transactions and failures will be noticed.

Beyond what you see several other specific pool detailed related information. All that is structured to provide a single point to run through system-level details on the use of the entire memory. The coolest part is that you get all this information without NetScaler CLI or GUI 😉 Shell rock ...

Only 1 Day Left! Sign up for Cloud Technical Webinar

2:08 PM Add Comment
Only 1 Day Left! Sign up for Cloud Technical Webinar -

The cloud age is here ... Is your Network Ready? Join us for this technical webinar 60 minutes from 10:00 PT - 13:00 ET to discuss how virtualization basic networking services, new architectures for data centers, and flat network topologies change basically the deployment of network services. We will also provide you the tools to reshape your network architecture and deliver capabilities- "cloud-savvy" with greater security, scalability and flexibility. Do not wait any longer! REGISTER NOW!

Follow me on twitter and get the latest updates @GabriellaFPinto

CloudStack の ソ ー ス コ ー ド に 触 れ て み よ う

1:07 PM Add Comment
CloudStack の ソ ー ス コ ー ド に 触 れ て み よ う -

CloudStack の ソ ー ス コ ー ド は, Git で 管理 さ れ て い ま す の で,誰 で も ソ ー ス コ ー ド を 参照 す る こ と が 可能 で す.こ こ で は, そ の 手 順 を 説明 し た い と 思 い ま す.

手 順

  1. msysgit の ダ ウ ン ロ ー ド と イ ン ス ト ー ル
  2. TortoiseGit の ダウ ン ロ ー ド と イ ン ス ト ー ル (こ こ で は を 使用 1.7.6)
  3. CloudStack の リ ポ ジ ト リ を 保存 す る Git 用 の フ ォ ル ダ を 作成 (例: e: src)
  4. 上 記 フ ォ ル ダ を 右 ク リ ッ ク し, "Git Clone" を ク リ ッ ク
  5. に URL, http: // git .cloud.com / cgit / CloudStack-oss / を 設定 し OK
  6. CloudStack Git の リ ポ ジ ト リ: http: // git. cloud.com/cloudstack-oss/
  7. ソ ー ス コ ー ド の ダ ウ ン ロ ー ド が は じ ま り ま す.
  8. し ば ら く す る と ダ ウ ン ロ ー ド が 終了
  9. Git 用 の フ ォ ル ダ の 下 に, CloudStack の リ ポ ジ ト リ (CloudStack-oss)が 作成 さ れ て い ま す.
  10. 修正 履 歴 を 確認 し た い 場合, "Git View Log" を ク リ ッ ク す る と 現時 点 ま で の 修正 履 歴 が 参照 で き ま す.

そ の 他

  • msysgit と TortoiseGit の イ ン ス ト ー ル は, デ フ ォ ル ト イ ン ス ト ー ル で い い で す が, 必要 に 応 じ て 「分散 バ ー ジ ョ ン 管理 シ ス テ ム を Git Windows で 活用 し よ う」 を 参照 に す る と い い で し ょ う.
  • Git の ソ ー ス ツ リ ー の 考 え 方 に 関 し て は, 色 々 資料 が あ り ま す が, 「GitHub ハ ン ズ オ ン」 が 分 か り や す い でし ょ う.
  • Repo が 古 く な り, 同期 を と る 場合, "Git Pull" を ク リ ッ ク
  • OpenStack の プ ロ ジ ェ ク ト (例: Nova) も Git で管理 さ れ て い る の で, 同 様 に し て ソ ー ス コ ー ド を 参照 で き ま す

以上

-

Kimihiko Kitase
marketing Solution
Citrix Systems Japan KK
twitter: @kktiase
Facebook: XenServer Fan page
Facebook: CloudStack Fan page

How to get exciting AppFw reports ??

12:06 PM Add Comment
How to get exciting AppFw reports ?? -

Citrix NetScaler Application Firewall is a comprehensive security solution ICSA-certified web application that blocks known and unknown attacks against web and web services applications. NetScaler supports a good range of AppFirewall security controls that can be customized as needed. But what do you do, when you want to have aggregated view of these violations with graphical analysis?

Command Center collects this AppFw system logs generated on NetScaler appliance, produce complete graphics and supply of integrated reports to provide a view of the image that violations are generated.

steps to get these reports on the Command Center Device is very simple. In this blog, we'll cover all the configurations that must be made on NetScaler for the generation of report on Command Center. In a word, simply configure Command Center as Syslog server on NetScaler and you're just one login below to see violations on the Command Center configuration

NOTE :. In this blog, we assume that you have configured on the device configuration AppFirewall NetScaler

Just to give you an overview, here's how the process of how to generate reports AppFw Command Center.

Step 1: Setting Command Center as Syslog server

Command Center AppFw reports based on data collected from syslog NetScaler. To have some sort of AppFw reports generated on Command Center, the first and foremost step is to ensure the availability of the NetScaler appliance control center. To do this, we need to configure Command Center as audit server appliance NetScaler. This will redirect the syslog product on the NetScaler Command Center device.

As we can see, Figure 1 shows the steps to configure Command Center as syslog server appliance NetScaler NetScaler via GUI. When creating audit server, ensure that the Audit Type is selected as SYSLOG

2nd step:. Audit Policy Configuration

In this step, you must create a policy said . Go to Application Firewall >> Policies >> Audit in the navigation pane on the left. Select Policies tab next to the Server . Click Add mentioned at the bottom of the window. Select Type Audit as SYSLOG and Server as Command Center syslog server configured in step 1 and click Create . This Verification Policy defines the type and protocol Server definition defines what the papers are sent when

Step 3 .: Binding overall, the audit policy

After setting the verification Policy , you will need to link the audit policy at the global level to ensure Registration for all events AppFw NetScaler system. To do this, select the defined strategy, click Global Bindings (shown at the bottom of the window) and click insertion policy to select the defined audit strategy defined step 2. Click OK

NOTE :. Save the configuration made so far on the NetScaler appliance with Save (mentioned at the top right of the window).

Step 4: Connect to Command Center

now, the last and most important step is to connect to the device Command Center, go to reports thento Scoreboard AppFirewall and see violations generated on NetScaler are also reflected on AppFirewall Dashboard Command Center :.)

with these simple steps you will be able to generate and synchronize violations generated on NetScaler and violations reflected in these graphs.

Note that the dashboard will begin to fill the data from the time that you configure all of step 1 to step 3 just starting. It will not report violations on Command Center before these installation configurations are performed.

Citrix Receiver App wins Best Mobile for companies at Mobile World Congress

10:04 PM Add Comment
Citrix Receiver App wins Best Mobile for companies at Mobile World Congress -

What Citrix Receiver and Angry Birds have in common? This week, judges at Mobile World Congress decided the best applications for Work & Play. Perhaps it is no surprise ... Citrix Receiver got the best mobile application for businesses and Angry Birds won the best mobile application for consumers

As noted MWC: .
"Citrix Receiver provides incredible access to business offices and corporate applications from any device, including the latest Android, BlackBerry and iOS-based smartphones and tablets."

Citrix Receiver is now the industry standard application for securely deliver enterprise applications to mobile devices. This represents real progress since not long Citrix did not have much to offer in anything smaller than a laptop. Now with support for iPad, iPhone, Android, Amazon Fire, Blackberry, Chromebook and he can rely on a solution that will grow with an ever-expanding devices to the list of employees want to bring to work. Beyond access to virtual desktops and application receiver with Cloud Gateway allows access to the Web and SaaS applications and soon HTML5 and native mobile applications. This means Citrix provides a mobile solution that is future proof.

Receiver has been a top download business application of the Apple App Store since it was released. New leading smartphones like the Razr, Droid and ATRIX, receiver provide preloaded and the Motorola Xoom 2 and Lenovo ThinkPad tablet. It is now rare for a new mobile device will only be used as a gimmick for consumption, most provide a dual purpose for work and play. Manufacturers of top devices know Citrix is ​​the safe answer to most lending business devices.

Dell and Citrix just blew the desktop virtualization the lid

11:05 AM Add Comment
Dell and Citrix just blew the desktop virtualization the lid -

Imagine you unbox a VDI hardware appliance, power on, add your Windows desktop image and deploy positions virtual work. Nothing in the architect, no servers to size, no software to install; no separate connection brokers, provisioning servers, Storage Area Networks, or SQL databases to deploy, coordinate or manage. Scaling simply means adding more devices. And you can do all this with transparent, linear, repeatable performance and price with each virtual desktop costing less than PCs. This is now a reality.

The new Dell DVS Simplified hardware appliance running VDI Citrix VDI-in-a-Box is an integrated hardware-software appliance. It couples the architecture of the VDI-in-a-Box network with the efficiency of Dell servers to provide a simple, cost-effective VDI offering predictable performance and scaling. The all-in-one VDI-in-a-Box eliminates the need for separate connection brokers, provisioning servers, SAN, SQL databases and load balancers. Each unit comes with VDI-in-a-Box software and factory hypervisor installed and validated and evaluated the number of workstations it can serve. You just break together like most devices that you need to answer the office capacity you need. High availability is also integrated, and simply requires a replacement device in case of failure.

This simple, efficient, cost effective VDI brings to the masses and allows many organizations that previously did not have the expertise or infrastructure to finally realize the benefits of desktop virtualization.

Why is it so much easier than traditional desktop virtualization solutions? Let's look at all the steps traditionally needed to deploy VDI :.

  1. Deployment Scope and determine growth over time
  2. architect your solution (consisting of connection brokers, load balancers, provisioning servers, management servers, SQL databases cluster, SAN, etc.).
  3. Size infrastructure to allow growth (ie on-reserve).
  4. Provides all hardware and software components (servers for running connection brokers, provisioning servers, shared storage, make sure there are suitable for high speed interconnections to shared storage, Windows Server OS, SQL clustering for high availability, the VDI software, etc.).
  5. Install all components.
  6. Configure and do all the different components work with each other.
  7. Create Windows desktop gold images and generate virtual desktops.

Once you have rolled and you need to scale the solution you have to review the deployment and determine which components you need to add. Do you need multiple servers to handle the added office workload? Another connection broker? SAN bigger, faster? What analysis should you do to understand what components you should add to offer the same performance as before?

With Dell DVS Simplified powered by Citrix VDI-in-a-Box, here are your first steps for deployment: ..

  1. Scope of deployment
  2. Buy enough servers Dell DVS simplified (they are marked with many workstations, they can be used)
  3. Configuring a device (using a wizard in 4 steps to provide your directory and domain assets details ).
  4. Create Windows desktop gold images and generate virtual desktops.

The all-in-one VDI-in-a-Box architecture eliminates the expertise and resources needed to deploy desktop virtualization. Each unit is equipped with an integrated whole connection broker, the supply and storage software so you must ... you must not think. We do not need an analyst performance, network or SAN expert to architect the solution and ensure future growth. You save time, consulting fees (if you do not have in-house expertise) and infrastructure costs compared to traditional VDI deployment.

And you're not painting yourself into a corner with this device. When you are ready to expand the deployment, just add more devices. This "not think" Scaling is a repeatable solution with predictable performance if deployed standalone or in a grid of many devices. This makes it easier for the administrator and since all that is needed are more Dell DVS devices, it is also very profitable.

We are delighted to launch this solution with Dell and offer unprecedented simplicity that will reshape the desktop virtualization market. Try the new DVS device (www.dell.com/dvssimplified~~V), and tell us what you think!

Citrix VDI-in-a-Box Content is available for Web Syndication

9:03 PM Add Comment
Citrix VDI-in-a-Box Content is available for Web Syndication -

Sample view of VDI-in-a-Box syndicated showcase Citrix Solution Advisors - you know how simple and easy Citrix VDI-in-a-Box implement, but do you also know that it is quick and easy to start syndicating relevant product messaging and lead generation resource directly from your own website?

Citrix Syndication, a free service that dynamically updates your website with Citrix current product information, now offers a VDI-in-a-Box window will appear seamlessly with your web visitors. VDI-in-a-Box syndicated content is packaged as a micro mini-site which included three tabs, plus header banners. Your customers will learn how the product works and can access value-added resources, including a white paper, data sheet, quick solutions and guides. Embedded videos also help further explain the features and benefits of VDI-in-a-Box.

Start syndicating Citrix VDI-in-a-Box, the simple VDI solution, affordable, specially designed for the SME market and complements the product range Citrix XenDesktop market leader class desktop virtualization solutions business.

Getting started

If you are a counselor Solution and already registered for Citrix Syndication program, you can access the VDI-in-a-Box content from your Partner Syndication Citrix console. The content of three tabs, including resource is packed and ready to be syndicated to your site.

Not registered for Citrix Syndication?

Visit Citrix Syndication Center for details on how content syndication works and to register. Video and FAQ are available to answer your questions. You can also see a sample site that shows all unionized windows available to partners. You will find a showcase sample for the VDI-in-a-Box content here. Once you register, you will receive an e-mail Access to the Citrix Partner Syndication console.