Network Load Balancers
A load balancer serves as the single point of contact for clients. Clients send requests to the load balancer, and the load balancer sends them to targets, such as EC2 instances, in one or more Availability Zones.
To configure your load balancer, you create target groups , and then register targets with your target groups. Your load balancer is most effective if you ensure that each enabled Availability Zone has at least one registered target. You also create listeners to check for connection requests from clients and route requests from clients to the targets in your target groups.
Network Load Balancers support connections from clients over VPC peering, AWS managed VPN, AWS Direct Connect, and third-party VPN solutions.

Load balancer state
Load balancer attributes, ip address type, availability zones, cross-zone load balancing, deletion protection, connection idle timeout.
- Create a Network Load Balancer
- IP address types for your Network Load Balancer
- Tags for your Network Load Balancer
- Delete a Network Load Balancer
- Zonal shift
A load balancer has one of the following states:
The load balancer is being set up.
The load balancer is fully set up and ready to route traffic.
The load balancer couldn't be set up.
A load balancer has the following attributes:
Indicates whether access logs stored in Amazon S3 are enabled. The default is false .
The name of the Amazon S3 bucket for the access logs. This attribute is required if access logs are enabled. For more information, see Bucket requirements .
The prefix for the location in the Amazon S3 bucket.
Indicates whether deletion protection is enabled. The default is false .
Blocks internet gateway (IGW) access to the load balancer, preventing unintended access to your internal load balancer through an internet gateway. It is set to false for internet-facing load balancers and true for internal load balancers. This attribute does not prevent non-IGW internet access (for example, through peering, Transit Gateway, AWS Direct Connect, or AWS VPN).
Indicates whether cross-zone load balancing is enabled. The default is false .
You can set the types of IP addresses that clients can use with your load balancer. The following are the IP address types:
Clients must connect to the load balancer using IPv4 addresses (for example, 192.0.2.1). IPv4 enabled load balancers (both internet-facing and internal) support TCP, UDP, TCP_UDP, and TLS listeners.
Clients can connect to the load balancer using both IPv4 addresses (for example, 192.0.2.1) and IPv6 addresses (for example, 2001:0db8:85a3:0:0:8a2e:0370:7334). Dualstack enabled load balancers (both internet-facing and internal) support TCP and TLS listeners.
Dualstack load balancer considerations
The load balancer communicates with targets based on the IP address type of the target group.
When you enable dualstack mode for the load balancer, Elastic Load Balancing provides an AAAA DNS record for the load balancer. Clients that communicate with the load balancer using IPv4 addresses resolve the A DNS record. Clients that communicate with the load balancer using IPv6 addresses resolve the AAAA DNS record.
Access to your internal dualstack load balancers through the internet gateway is blocked to prevent unintended internet access. However, this does not prevent non-IWG internet access (such as, through peering, Transit Gateway, AWS Direct Connect, or AWS VPN).
For more information on load balancer IP address types, see Update the address type .
You enable one or more Availability Zones for your load balancer when you create it. If you enable multiple Availability Zones for your load balancer, this increases the fault tolerance of your applications. You can't disable Availability Zones for a Network Load Balancer after you create it, but you can enable additional Availability Zones.
When you enable an Availability Zone, you specify one subnet from that Availability Zone. Elastic Load Balancing creates a load balancer node in the Availability Zone and a network interface for the subnet (the description starts with "ELB net" and includes the name of the load balancer). Each load balancer node in the Availability Zone uses this network interface to get an IPv4 address. Note that you can view this network interface but you can't modify it.
When you create an internet-facing load balancer, you can optionally specify one Elastic IP address per subnet. If you do not choose one of your own Elastic IP addresses, Elastic Load Balancing provides one Elastic IP address per subnet for you. These Elastic IP addresses provide your load balancer with static IP addresses that will not change during the life of the load balancer. You can't change these Elastic IP addresses after you create the load balancer.
When you create an internal load balancer, you can optionally specify one private IP address per subnet. If you do not specify an IP address from the subnet, Elastic Load Balancing chooses one for you. These private IP addresses provide your load balancer with static IP addresses that will not change during the life of the load balancer. You can't change these private IP addresses after you create the load balancer.
Requirements
For internet-facing load balancers, the subnets that you specify must have at least 8 available IP addresses. For internal load balancers, this is only required if you let AWS select a private IPv4 address from the subnet.
You can't specify a subnet in a constrained Availability Zone. The error message is "Load balancers with type 'network' are not supported in az_name ". You can specify a subnet in another Availability Zone that is not constrained and use cross-zone load balancing to distribute traffic to targets in the constrained Availability Zone.
You can't specify a subnet in a Local Zone.
After you enable an Availability Zone, the load balancer starts routing requests to the registered targets in that Availability Zone. Your load balancer is most effective if you ensure that each enabled Availability Zone has at least one registered target.
To add Availability Zones using the console
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/ .
In the navigation pane, choose Load Balancers .
Select the name of the load balancer to open its details page.
On the Network mapping tab, choose Edit subnets .
To enable an Availability Zone, select the check box for that Availability Zone. If there is one subnet for that Availability Zone, it is selected. If there is more than one subnet for that Availability Zone, select one of the subnets. Note that you can select only one subnet per Availability Zone.
For an internet-facing load balancer, you can select an Elastic IP address for each Availability Zone. For an internal load balancer, you can assign a private IP address from the IPv4 range of each subnet instead of letting Elastic Load Balancing assign one.
Choose Save changes .
To add Availability Zones using the AWS CLI
Use the set-subnets command.
By default, each load balancer node distributes traffic across the registered targets in its Availability Zone only. If you turn on cross-zone load balancing, each load balancer node distributes traffic across the registered targets in all enabled Availability Zones. You can also turn on cross-zone load balancing at the target group level. For more information, see Cross-zone load balancing for target groups and Cross-zone load balancing in the Elastic Load Balancing User Guide .
To prevent your load balancer from being deleted accidentally, you can enable deletion protection. By default, deletion protection is disabled for your load balancer.
If you enable deletion protection for your load balancer, you must disable it before you can delete the load balancer.
To enable deletion protection using the console
On the Attributes tab, choose Edit .
Under Configuration , turn on Deletion protection .
To disable deletion protection using the console
To enable or disable deletion protection using the aws cli.
Use the modify-load-balancer-attributes command with the deletion_protection.enabled attribute.
For each TCP request that a client makes through a Network Load Balancer, the state of that connection is tracked. If no data is sent through the connection by either the client or target for longer than the idle timeout, the connection is closed. If a client or a target sends data after the idle timeout period elapses, it receives a TCP RST packet to indicate that the connection is no longer valid.
We set the idle timeout value for TCP flows to 350 seconds. You can't modify this value. Clients or targets can use TCP keepalive packets to reset the idle timeout. Keepalive packets sent to maintain TLS connections can't contain data or payload.
When a TLS listener receives a TCP keepalive packet from either a client or a target, the load balancer generates TCP keepalive packets and sends them to both the front-end and back-end connections every 20 seconds. You can't modify this behavior.
While UDP is connectionless, the load balancer maintains UDP flow state based on the source and destination IP addresses and ports, ensuring that packets that belong to the same flow are consistently sent to the same target. After the idle timeout period elapses, the load balancer considers the incoming UDP packet as a new flow and routes it to a new target. Elastic Load Balancing sets the idle timeout value for UDP flows to 120 seconds.
EC2 instances must respond to a new request within 30 seconds in order to establish a return path.
Each Network Load Balancer receives a default Domain Name System (DNS) name with the following syntax: name - id .elb. region .amazonaws.com. For example, my-load-balancer-1234567890abcdef.elb.us-east-2.amazonaws.com.
If you'd prefer to use a DNS name that is easier to remember, you can create a custom domain name and associate it with the DNS name for your load balancer. When a client makes a request using this custom domain name, the DNS server resolves it to the DNS name for your load balancer.
First, register a domain name with an accredited domain name registrar. Next, use your DNS service, such as your domain registrar, to create a DNS record to route requests to your load balancer. For more information, see the documentation for your DNS service. For example, if you use Amazon Route 53 as your DNS service, you create an alias record that points to your load balancer. For more information, see Routing traffic to an ELB load balancer in the Amazon Route 53 Developer Guide .
The load balancer has one IP address per enabled Availability Zone. These are the addresses of the load balancer nodes. The DNS name of the load balancer resolves to these addresses. For example, suppose that the custom domain name for your load balancer is example.networkloadbalancer.com . Use the following dig or nslookup command to determine the IP addresses of the load balancer nodes.
Linux or Mac
The load balancer has DNS records for its load balancer nodes. You can use DNS names with the following syntax to determine the IP addresses of the load balancer nodes: az . name - id .elb. region .amazonaws.com.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions.
Thanks for letting us know we're doing a good job!
If you've got a moment, please tell us what we did right so we can do more of it.
Thanks for letting us know this page needs work. We're sorry we let you down.
If you've got a moment, please tell us how we can make the documentation better.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Configure the Software Load Balancer for Load Balancing and Network Address Translation (NAT)
- 6 minutes to read
- 9 contributors
Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Azure Stack HCI, versions 21H2 and 20H2
You can use this topic to learn how to use the Software Defined Networking (SDN) software load balancer (SLB) to provide outbound network address translation (NAT), inbound NAT, or load balancing between multiple instances of an application.
Software Load Balancer overview
The SDN Software Load Balancer (SLB) delivers high availability and network performance to your applications. It is a Layer 4 (TCP, UDP) load balancer that distributes incoming traffic among healthy service instances in cloud services or virtual machines defined in a load balancer set.
Configure SLB to do the following:
- Load balance incoming traffic external to a virtual network to virtual machines (VMs), also called public VIP load balancing.
- Load balance incoming traffic between VMs in a virtual network, between VMs in cloud services, or between on-premises computers and VMs in a cross-premises virtual network.
- Forward VM network traffic from the virtual network to external destinations using network address translation (NAT), also called outbound NAT.
- Forward external traffic to a specific VM, also called inbound NAT.
Example: Create a public VIP for load balancing a pool of two VMs on a virtual network
In this example, you create a load balancer object with a public VIP and two VMs as pool members to serve requests to the VIP. This example code also adds an HTTP health probe to detect whether one of the pool members becomes non-responsive.
Prepare the load balancer object.
The VIP must be from an unused IP in one of the logical network IP pools given to the load balancer manager.
Allocate a back-end address pool, which contains the Dynamic IPs (DIPs) that make up the members of the load-balanced set of VMs.
The health probe must receive an HTTP response code of 200 for 11 consecutive queries for the probe to consider the back-end IP to be healthy. If the back-end IP is not healthy, it does not receive traffic from the load balancer.
Do not block traffic to or from the first IP in the subnet for any Access Control Lists (ACLs) that you apply to the back-end IP because that is the origination point for the probes.
Use the following example to define a health probe.
Use the following example to define a load balancing rule:
Use the following example to add the load balancer configuration to Network Controller:
Follow the next example to add the network interfaces to this back-end pool.
Example: Use SLB for outbound NAT
In this example, you configure SLB with a back-end pool for providing outbound NAT capability for a VM on a virtual network's private address space to reach outbound to the internet.
Create the load balancer properties, front-end IP, and back-end pool.
Define the outbound NAT rule.
Add the load balancer object in Network Controller.
Follow the next example to add the network interfaces to which you want to provide internet access.
Example: Add network interfaces to the back-end pool
In this example, you add network interfaces to the back-end pool. You must repeat this step for each network interface that can process requests made to the VIP.
You can also repeat this process on a single network interface to add it to multiple load balancer objects. For example, if you have a load balancer object for a web server VIP and a separate load balancer object to provide outbound NAT.
Get the load balancer object containing the back-end pool to add a network interface.
Get the network interface and add the backendaddress pool to the loadbalancerbackendaddresspools array.
Put the network interface to apply the change.
Example: Use the Software Load Balancer for forwarding traffic
If you need to map a Virtual IP to a single network interface on a virtual network without defining individual ports, you can create an L3 forwarding rule. This rule forwards all traffic to and from the VM via the assigned VIP contained in a PublicIPAddress object.
If you defined the VIP and DIP as the same subnet, then this is equivalent to performing L3 forwarding without NAT.
This process does not require you to create a load balancer object. Assigning the PublicIPAddress to the network interface is enough information for the Software Load Balancer to perform its configuration.
Create a public IP object to contain the VIP.
Assign the PublicIPAddress to a network interface.
Example: Use the Software Load Balancer for forwarding traffic with a dynamically allocated VIP
This example repeats the same action as the previous example, but it automatically allocates the VIP from the available pool of VIPs in the load balancer instead of specifying a specific IP Address.
Query the PublicIPAddress resource to determine which IP Address was assigned.
The IpAddress property contains the assigned address. The output will look similar to this:
Example: Remove a PublicIP address that is being used for forwarding traffic and return it to the VIP pool
This example removes the PublicIPAddress resource that was created by the previous examples. Once the PublicIPAddress is removed, the reference to the PublicIPAddress will automatically be removed from the network interface, the traffic will stop being forwarded, and the IP address will be returned to the Public VIP pool for re-use.
Remove the PublicIP
Submit and view feedback for
Additional resources
- Stack Overflow Public questions & answers
- Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
- Talent Build your employer brand
- Advertising Reach developers & technologists worldwide
- About the company
Collectives™ on Stack Overflow
Find centralized, trusted content and collaborate around the technologies you use most.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Assigning Static IP Address to AWS Load Balancer
How can I assign a static IP address to a ELB. Seems like I cannot.
Some articles online asks to create a Route 53 record but this requires changing CNAME of domain which also redirect email traffic. I just want to change A record not CNAME.
Some articles also mention that I can use a EC2 instance as a reverse proxy. But will a single proxy be able to handle a lot of traffic?
Any solution for this?
- amazon-web-services

- 3 Possible duplicate of AWS Load Balancer with a static IP address – Volkan Paksoy Feb 10, 2016 at 13:11
- AWS has announced a Network Load Balancer that supports assigning static IPs (EIPs). It operates at the TCP level so you won't be able to use layer 7 features like ELB stickiness or ssl termination – Patrick Sep 11, 2017 at 22:07
- Please see response below. The problem is you need to change Paradigms. AWS is not a Data Center and it shouldn't be treated like so, you have to change the way you look at it in order to know its limitations and WHY they're there. They usually bend to customer's will, and have with the NLB but the idea of the cloud is to be as flexible and decoupled as you can. – eco Aug 23, 2018 at 19:14
6 Answers 6
AWS' Elastic Load Balancer is actually elastic on two levels as described here: http://shlomoswidler.com/2009/07/elastic-in-elastic-load-balancing-elb.html
The first level is the load balancer itself. In order to make sure that ELB can scale to whatever volume you have and burst to whatever volume you suddenly encounter, AWS assigns a 'static' DNS hostname (e.g. MyDomainELB-918273645.us-east-1.elb.amazonaws.com). That hostname points to multiple IP addresses. You can see that (from a command line) by running
The second form of elasticity within the ELB is obviously then ELB directing the query to one of your EC2 instances in the pool.
So, you can see that trying to assign a static IP address to the load balancer would be self-defeating.
Using an EC2 instance as a reverse proxy would also seem self-defeating as you would then create a bottleneck before even getting to the ELB. Might as well just create your own load balancer.
The recommended solution (which you've pointed out) is to create a CNAME that points to the ELB hostname (which won't change).
i.e. my-app.mycompany.com -> MyDomainELB-918273645.us-east-1.elb.amazonaws.com
This would allow you to integrate your scalable application, behind the ELB within your domain.
I'm not sure I fully understand why you cannot create a CNAME in your DNS or what that has to do with directing email traffic, can you explain?
- 4 You can't simply ADD a CNAME? You only get 1 CNAME? That's not why it's called 1and1, is it? – Brooks Feb 10, 2016 at 14:39
- 13 CNAME is only for subdomains. What about the main domain? How can I point example.com to a load balancer? – Narayan Prusty Feb 10, 2016 at 14:47
- 6 Well, I am not a DNS guru, but if I am not mistaken, the 'www' from www.example.com is a CNAME, so you could simply point 'www' to the ELB. If 1and1 allows a small webhosting package, you could then write a simple html page to forward visitors to from example.com to example.com , thus sending them to your ELB. – Brooks Feb 10, 2016 at 14:54
- 7 Also, if I'm not mistaken, MX records are for email routing. Can't you use your MX records to direct email completely independent of where your domain points? For example, I have my domain parked, so the root domain doesn't actually bring you anywhere, but I have multiple CNAME's and my MX records which then point to a completely separate, 3rd party email hosting provider (Zoho). Again, I'm not a DNS expert, but I feel like this is an easily solved problem... – Brooks Feb 10, 2016 at 15:01
- 2 You can also use a A record with type "Alias" to point to an elb. This works for example.com and subdomain.example.com. For those curious, a static IP on an NLB is possible. It's useful for service which do not do a dns lookup on each query, but only do the dns lookup once at startup or first usage, or for something like nginx proxy, which once a connection is lost, it never re-examines the ip. – nelsonenzo Apr 9, 2018 at 19:53
A new feature in AWS (I believe it was announced at Re:Invent 2017) allows for static IPs with Network Load Balancers (NLB). NLB can only handle layer 4 (TCP) and not HTTP specifics (layer 7).
You can assign one Elastic IP address per availability zone.
For details see the AWS blog post or the NLB documentation .
The "Classic Load Balancer" and "Application Load Balancer" do not support static IPs. If you need a feature only provided by those, you have to fall back to the CNAME solution described above.
A blog was recently published by AWS support on this topic leveraging NLB to provide static IP to Classic and Application load balancer - https://aws.amazon.com/blogs/networking-and-content-delivery/using-static-ip-addresses-for-application-load-balancers/
Summary of solution as described by the post
We end up with a TCP listener on a NLB that accepts traffic and forwards it to an internal ALB. The ALB terminates TLS, examines HTTP headers, and routes requests based on your configured rules to target groups with your instances, servers, or containers. The AWS Lambda function keeps everything in sync by watching the ALB for IP address changes and updating the NLB target group. In the end we’ll have a few static IP addresses that are easy for whitelisting, and we won’t lose any of the benefits of ALB. Note that we will be sending all of the traffic through two load balancers
- the downside of this solution is, that you loose direct access to the client ip address – squiddle Jan 21, 2019 at 20:20
- @squiddle : NLB can be configured to use Proxy Protocol that send client ip address to the target ([doc])( docs.aws.amazon.com/elasticloadbalancing/latest/network/… ). But the destination need to be able to read it like Apache mod_remoteip . Not sure that AWS ALB can read it. Another news is that NLB can now do TLS termination but let the destination receive client ip ([blog])( aws.amazon.com/blogs/aws/… ). – Franck Apr 22, 2019 at 18:11
I found setting up AWS Global Accelerator very straight forward and simple. It created 2 static IP Addresses and a static DNS pointing to my Application load balancer.
Configuring Global Accelerator
Set listeners as TCP port 80, 443
Select your load balancer endpoint ( AWS Global Accelerator Configuration )
Add cname record for your dns pointing to the static dns it created (mywebsite.com > globalacceleratorDNS.com). If any client needs to whitelist, give them the 2 static IP it created
Pricing is $18 per month + a few pennies per GB of data transfer. I'm pretty sure its cheaper than the NLB, Nat Gateway, Elastic IP setup.
https://docs.aws.amazon.com/global-accelerator/latest/dg/about-accelerators.html
- Does it carry the client IP to the application ? – Tarun Gupta Dec 12, 2020 at 7:12
- I honestly do not know my apologies, we do not use IP data in our application – C Rudolph Dec 17, 2020 at 20:18
- Yes, it does. docs.aws.amazon.com/global-accelerator/latest/dg/… – Aurvoir Jan 9, 2021 at 4:35
- @CRudolph In step #3, you are adding CNAME record to point to GlobalAccelerator's DNS. Why not point CNAME record directly to ELB DNS? – CᴴᴀZ Jan 13, 2021 at 11:02
- Chaz, if you do that any requests to mywebsite.com will bypass global accelerator. That means that the IP for mywebsite.com would not be the static IP – C Rudolph Jan 15, 2021 at 17:13
For little traffic, it might be a solution to set up an EC2 Instance running Nginx as a forwarding proxy.
So you can use the EC2's static IP Address to forward your traffic resolving the ALB's DNS name.
However, it's a kind of a hack, but using a Global Accelerator or an NLB seems to me also like a hack :-)
Unlike the Network Load Balancer, the Application Load Balancer (ALB) does not support Elastic IPs, but that's not the worst part. If you use Route 53 together with the ALB, the DNS automatically sets the TTL to 60 seconds. This appears to be causing problems for our institutional - mainly government - customers running older Windows DNS servers. They just can't keep up with the ALB's Listener changing its public-facing IP on such a short notice. Older DNS infrastructure is either not respecting or is not capable of handling such aggressive TTL.
While I don't like it, AWS recommends to put a Network Load Balancer in front of the Application Load Balancer, per here: https://aws.amazon.com/blogs/networking-and-content-delivery/using-static-ip-addresses-for-application-load-balancers/

Your Answer
Sign up or log in, post as a guest.
Required, but never shown
By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged amazon-web-services amazon-ec2 amazon-elb amazon-vpc or ask your own question .
- The Overflow Blog
- How Intuit democratizes AI development across teams through reusability sponsored post
- The nature of simulating nature: A Q&A with IBM Quantum researcher Dr. Jamie...
- Featured on Meta
- We've added a "Necessary cookies only" option to the cookie consent popup
- Launching the CI/CD and R Collectives and community editing features for...
- Staging Ground Beta 1 Recap, and Reviewers needed for Beta 2
- The [amazon] tag is being burninated
- Temporary policy: ChatGPT is banned
Hot Network Questions
- Why are physically impossible and logically impossible concepts considered separate in terms of probability?
- Where does this (supposedly) Gibson quote come from?
- What sort of strategies would a medieval military use against a fantasy giant?
- FAA Handbooks Copyrights
- Theoretically Correct vs Practical Notation
- Redoing the align environment with a specific formatting
- The difference between the phonemes /p/ and /b/ in Japanese
- Who owns code in a GitHub organization?
- Why do small African island nations perform better than African continental nations, considering democracy and human development?
- Do I need a thermal expansion tank if I already have a pressure tank?
- Why are Suriname, Belize, and Guinea-Bissau classified as "Small Island Developing States"?
- Largest Binary Area
- My code is GPL licensed, can I issue a license to have my code be distributed in a specific MIT licensed project?
- Do roots of these polynomials approach the negative of the Euler-Mascheroni constant?
- What can a lawyer do if the client wants him to be acquitted of everything despite serious evidence?
- remove package from CTAN
- Can airtags be tracked from an iMac desktop, with no iPhone?
- How do you ensure that a red herring doesn't violate Chekhov's gun?
- What is pictured in this SHERLOC camera?
- How to tell which packages are held back due to phased updates
- About an argument in Famine, Affluence and Morality
- Do new devs get fired if they can't solve a certain bug?
- Calculating probabilities from d6 dice pool (Degenesis rules for botches and triggers)
- What is the purpose of this D-shaped ring at the base of the tongue on my hiking boots?
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
Need help setting up a load balancer on a home network with 2 ONTs from 2 separate ISPs

I've been troubleshooting for a couple of days on how to do this and I actually got my Internet to work with some janky setup. It was working when both of the ONTs were in their default CFGs and the load balancer were just acting as a client getting a dynamic IP, but that's not what I want.
Both of the ISP provide me with a static public IP and IPV6.
I wanna be able to host game servers and such after the load balancer, so in case one of the connections go down the other one is still effective.
From what I've been researching I need to set both the ONTs as bridge and do the PPPoE authentication on the load balancer, but I can't get that to work.
And after messing around for 2 days, none of my ports in all devices do Gigabit anymore. I'm really confused and have no idea what I should do. Anything I Google seems useful nor related at all to what I need to do.
I know it's really unlikely for someone to just help me online for free, but if that's the case I can send my discord. Also, if you wanna try to help me thru comments on this thread, let me know. I can post all the models of the devices and their settings (without personal info) to clarify better what's going on.
Just to summarize, I have two ONTs from separate ISP's that I need to connect on a load balancer that then connects to my home server/pc/ap/etc...
Thanks for taking your time to read this and I hope you can help me!
Edit1: BTW, I'm connected to the internet rn thru a direct cable to one of my ONTs.
Shut up, get back into the discord call!

Setting up a load balancer at home with two separate Internet Service Providers can be complicated, but it's possible. Here's what you need to do:
First, you need to configure both of your Internet boxes (ONTs) to bridge mode, which is like turning them into simple modems that just pass traffic to the load balancer. Then, you need to connect both ONTs to the load balancer with Ethernet cables, and configure the load balancer to handle the two connections, and to manage the PPPoE authentication for each ISP.
Once the load balancer is set up, you can connect your devices like your server or PC to it, and they'll get an IP address from the load balancer. You should test everything to make sure it's working correctly, and if it's not, you might want to check the cables or network settings on your devices.
That is exactly what I've been trying to do, but I can`t seem to get the load balancer to do the pppoe authentication. I got the password from the config file of the router and decrypted it using an online tool. Is it possible that it's wrong?
Also, if I set the ONT to bridge mode, dos it still have an effective firewall or do I have to handle everything on the load balancer?
About Community
Ranked by Size
- Documentation and Tutorials
- All the cloud universes
- Hosted Private Cloud powered by VMware
Load Balancing configuration in NSX
Learn how to configure Load Balancing
Last updated 27th February 2023
NSX allows load balancing on a level 4 (TCP or UDP) layer or level 7 (HTTP or HTTPS) layer.
Learn how to set up load balancing in NSX
OVHcloud provides services for which you are responsible, with regard to their configuration and management. It is therefore your responsibility to ensure that they work properly.
This guide is designed to assist you as much as possible with common tasks. However, we recommend contacting a specialist provider if you experience any difficulties or doubts when it comes to managing, using or setting up a service on a server.

Requirements
- Being an administrative contact of your Hosted Private Cloud infrastructure to receive login credentials.
- A user account with access to the OVHcloud Control Panel .
- Having NSX deployed with two segments configured in your NSX configuration, you can use this guide Segment management in NSX .
- Two virtual machines with NGINX enabled on one segment.
Instructions
- Enable Load Balancing on the gateway ovh-T1-gw .
- Create a server pool from two virtual machines that use a web server running on port 80.
- Add a virtual server in the Load Balancer configuration which contains our server pool.
- Set a NAT rule to redirect to the virtual server.
Creating the tag on both virtual machines.
To simplify the administration of the Load Balancer, we will use a tag on the two virtual machines in the future server pool.
In the NSX interface go to the Inventory tab and click on Virtual Machines on the left.
Then click on the three vertical dots to the left of the first virtual machine and choose Edit from the menu.

Replace Tag with loadbl , then click Add Item(s) loadbl below.

Change Scope to nginx , then click Add Item(s) nginx below.

Click the + sign next to your tag to add it to your virtual machine.

The tag appears, click SAVE .

Click the three vertical dots to the left of the second virtual machine and choose Edit from the menu.

Replace Tag with load and select the Tag: loadbl Scope: nginx that just appeared below.

Click the + sign next to your tag to add it to your second virtual machine.

Click SAVE to add the tag to your virtual machine.

Stay on Inventory , click Tags and click on the number to the right of the marker you created.

You can see your two virtual machines using the same tag.

Add group with created tag
Select Groups on the left and click ADD GROUP .

Enter nginx-server below Name and click SET under Compute Members .

Click + ADD CRITERION .

Keep Virtual Machine Tag Equals and select your loadbl tag with its nginx scope and click APPLY .

Click SAVE .

Click View Members to the right of the group.

The list of virtual machines is automatically added to the group based on the criteria in your tag.

Activating the Load Balancer
Go to the Networking tab and click on Load Balancing in the Network Services section on the left.
Then go to the Load Balancers tab and click ADD LOAD BALANCER .

Enter loadbalancer-on-t1 below Name , select ovh-T1-gw under Attachment and click SAVE .

The Load Balancer is created and activated on the ovh-T1-gw gateway.

Server pool creation
Go to the Server Pools tab and click ADD SERVER POOL .

Enter sp-nginx below Name and click Select Members under Members/Group .

Click Select a group and choose the nginx-servers group you created then click APPLY .

Click SAVE to apply your changes.

Your server pool is created with your two virtual machines that are members of the group.

Virtual server creation
Your server pool is created with your two virtual machines which are members of the group. Go to the Virtual Servers tab and click on ADD VIRTUAL SERVER .

Select L4 TCP .

Fill in this information :
- Name : Name of your virtual server vs-nginx .
- IP Address : Front-end IP address of your virtual server on the same network as your NGINX virtual machines 192.168.102.3 .
- Port : Port 80 .
- Load Balancer : Your load balancer loadbalancer-on-t1 .
- Server Pool : Your server pool sp-nginx .
Then click SAVE .

Your virtual server is active. If you connect from a machine that uses a segment on a gateway of type Tier-1 Gateways with this URL http://192.168.102.3 , the Load Balancer will connect to one of the two virtual machines configured in your group.
Adding a NAT rule
Go to NAT in the Network Services section on the left and click ADD NAT RULE .

Enter to-lb-virtual-server in your rule Name with these options :
- Action : DNAT .
- Destination IP : A virtual IP address of your T0 such as 198.51.100.1 .
- Translated IP : IP address of your virtual server 192.168.102.103 .
- Service PORT : Choose the predefined port HTTP| 80 .

Your rule is active. If you click on http://virtual-ip-address-on-T0 you will be connected to your virtual server which will redirect the flow to one of the servers in your group.

Getting started with NSX
Segment management in NSX
Implementing NAT for port redirections in NSX
VMware NSX Load Balancer documentation
Join our community of users on https://community.ovh.com/en/ .
Did you find this guide useful?
Please feel free to give any suggestions in order to improve this documentation.
Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.
Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.
Thank you. Your feedback has been received.
These guides might also interest you...
- Move a failover IP
- Make a failover IP configuration persistent
- Import a failover IP
- Recognising fraud and phishing emails/SMS messages
- Securing OVHcloud accounts with two-factor authentication
- Increasing the quota of Public Cloud instances
- Rebooting a Public Cloud instance
- Activating and using rescue mode
- Using the IPMI with dedicated servers
- Enabling backup storage on a dedicated server
- Access your backup
- Reboot a VPS
- Restoring backups via the OVHcloud API
- Reregister VMs in a new Hosted Private Cloud
OVHcloud Community
Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.
Oracle Cloud Infrastructure Documentation
- Introduction to Network Load Balancer
Describes about how network load balancers can provide automated traffic distribution from one entry point to multiple servers in a backend set.
- Network Load Balancer Types
The Flexible Network Load Balancer service enables you to create a public or private network load balancer in your VCN. A public network load balancer has a public IP address that is accessible from the internet. A private network load balancer has an IP address from the hosting subnet, which is visible only within your VCN. You can configure multiple listeners for an IP address to load balance Layer 4 (TCP/UDP/ICMP) traffic. Both public and private load balancers can route data traffic to any backend server that is inside the VCN.
- Public Network Load Balancer
To accept traffic from the internet, create a public network load balancer. The service assigns it a public IP address that serves as the entry point for incoming traffic. Associate the public IP address with a friendly DNS name through any DNS vendor.
A public network load balancer can be either regional or availability domain-specific in scope. The subnet in which the network load balancer is created determines this scope. A public network load balancer created in a regional subnet is regional in scope. A public network load balancer created in an availability domain-specific subnet is availability domain-specific in scope. Network Load Balancer ensures high availability and accessibility even when one of the availability domains has an outage.
You cannot specify a private subnet for your public load balancer. See Public vs. Private Subnets for more information.
- Private Network Load Balancer
To isolate your network load balancer from the internet and simplify your security posture, create a private network load balancer. The network load balancer assigns it a private IP address that serves as the entry point for incoming traffic. The network load balancer is accessible only from within the VCN that contains the host regional subnet, or as further restricted by your security rules.
- Network Load Balancer Reachability
The network load balancer does not directly respond to a client ICMP or TCP/UDP ping packet. Instead, the network load balancer directs the packet to a backend server in accordance with the load balancing policy. The backend server then returns a response to the client.
Only private network load balancers support the ICMP protocol. The network load balancer must also have the Source/Destination Header (IP, Port) Preservation feature enabled. If this feature is not enabled, or if you are using a public network load balancer, you can check your network load balancer's reachability through available listener-enabled protocols (TCP/UDP).
- Using Private Network Load Balancer as Next Hop Route Target with VCN Transit Routing
Use a private network load balancer as the next-hop private IP route target with VCN transit routing. This method enables the network load balancer to operate as a bump-in-the-wire layer 3 transparent load balancer to which packets are forwarded along the path to their final destination. Transit routing refers to a network topology in which your on-premises network uses a connected virtual cloud network (VCN) to reach Oracle resources or services beyond that VCN. Connect the on-premises network to the VCN with FastConnect or Site-to-Site VPN , and then configure the VCN routing so that traffic transits through the VCN to its destination beyond the VCN. See Transit Routing inside a hub VCN for more information.
The network load balancer routes user traffic to the firewall instances hosted behind network load balancer in the Hub VCN using VCN route tables. This user traffic that would otherwise flow from source directly to destination. In this mode, network load balancer does not modify the client packet characteristics and preserves the client source and destination IP header information. This method enables the firewall appliances to inspect the original client packet and apply security policies before forwarding it to the application backend servers in the spoke VCNs.
The following illustrates the network load balancer architecture.

- All Network Load Balancers
Your network load balancer has a backend set to route incoming traffic to your compute instances. The backend set is a logical entity that includes:
A list of backend servers
A load balancing policy
A health check policy
The backend servers (compute instances) associated with a backend set can exist anywhere, as long as the associated network security groups (NSGs), security lists, and route tables allow the intended traffic flow.
If your VCN uses network security groups (NSGs), you can associate your load balancer with an NSG. An NSG has a set of security rules that controls allowed types of inbound and outbound traffic. The rules apply only to the resources in the group. Contrast NSGs with a security list, where the rules apply to all the resources in any subnet that uses the list. See Network Security Groups for more information about NSGs.
If you prefer to use security lists for your VCN, the Load Balancing service can suggest appropriate security list rules. You also can configure them yourself through the Networking service. See Security Lists for more information. See Security Rules for detailed information comparing NSGs and security lists.
Oracle recommends that you distribute your backend servers across all availability domains within the region.
- Private IP Address Consumption
A public network load balancer created in a public subnet consumes one private IP address from the host subnet.
A private network load balancer created in a single subnet consumes one private IP address from the host subnet.
- Network Load Balancer Concepts
The backend server cannot function as both a client and a backend simultaneously as it is unable to initiate traffic to the network load balancer's virtual IP (VIP).
A health check is a test to confirm the availability of backend servers. A health check can be a request or a connection attempt. Based on a time interval you specify, the load balancer applies the health check policy to continuously monitor backend servers. If a server fails the health check, the load balancer takes the server temporarily out of rotation. If the server later passes the health check, the load balancer returns it to the rotation.
You configure your health check policy when you create a backend set. You can configure TCP-level, UDP-level, or HTTP-level health checks for your backend servers.
TCP-level health checks attempt to make a TCP connection with the backend servers and validate the response based on the connection status.
UDP-level health checks attempt to make a UDP connection with the backend servers and validate the response based on the connection status.
HTTP-level health checks send requests to the backend servers at a specific URI and validate the response based on the status code or entity data (body) returned.
The service provides application-specific health check capabilities to help you increase availability and reduce your application maintenance window. For more information on health check configuration, see Health Check Policies for Network Load Balancers .
Supported protocols include:
Private network load balancers only support the ICMP protocol if the Source/Destination Header (IP, Port) Preservation feature is enabled. See Enabling Network Load Balancer Source/Destination Preservation for more information.
For more information, see Listeners for Network Load Balancers .
Common load balancer policies include:
5-Tuple Hash
3-Tuple Hash
2-Tuple Hash
For more information, see Network Load Balancer Policies .
You can apply tags to your resources to help you organize them according to your business needs. You can apply tags at the time you create a resource, or you can update the resource later with the wanted tags. For general information about applying tags, see Resource Tags .
You can access the private network load balancer using methods and technology that can provide access to a private IP, such as:
Cross-VCN (using LPG peering)
From another region (using RPC)
From on-prem (using FC private peering)
For more information, see Network Load Balancer Management .
- Resource Identifiers
Most types of Oracle Cloud Infrastructure resources have a unique, Oracle-assigned identifier called an Oracle Cloud ID (OCID). For information about the OCID format and other ways to identify your resources, see Resource Identifiers .
- Ways to Access Oracle Cloud Infrastructure
You can access Oracle Cloud Infrastructure using the Console (a browser-based interface) or the REST API . Instructions for the Console and API are included in topics throughout this guide. For a list of available SDKs, see Software Development Kits and Command Line Interface .
- Monitoring Resources
You can monitor the health, capacity, and performance of your Oracle Cloud Infrastructure resources by using metrics, alarms, and notifications. For more information, see Monitoring and Notifications .
For information about monitoring the traffic passing through your network load balancer, see Network Load Balancer Metrics .
- Authentication and Authorization
Each service in Oracle Cloud Infrastructure integrates with IAM for authentication and authorization, for all interfaces (the Console , SDK or CLI, and REST API).
An administrator in your organization needs to set up groups , compartments , and policies that control which users can access which services, which resources, and the type of access. For example, the policies control who can create new users, create and manage the cloud network, launch instances, create buckets, download objects, etc. For more information, see Getting Started with Policies . For specific details about writing policies for each of the different services, see Policy Reference .
If you’re a regular user (not an administrator) who needs to use the Oracle Cloud Infrastructure resources that your company owns, contact your administrator to set up a user ID for you. The administrator can confirm which compartment or compartments you should be using.
- Limits on Network Load Balancers
Each load balancer has the following configuration limits:
One IPv4 address and one IPv6 address
50 backend sets
512 backend servers per backend set
1024 backend servers total
50 listeners
Default 1 million concurrent connection limit
See Service Limits for a list of applicable limits and instructions for requesting a limit increase.
- Required IAM Policies
To use Oracle Cloud Infrastructure , you must be granted security access in a policy by an administrator. This access is required whether you're using the Console or the REST API with an SDK, CLI, or other tool. If you get a message that you don’t have permission or are unauthorized, verify with your administrator what type of access you have and which compartment to work in.
For administrators: For a typical policy that gives access to load balancers and their components, see Let network admins manage load balancers .
Also, be aware that a policy statement with inspect load-balancers gives the specified group the ability to see all information about the load balancers. For more information, see Details for Network Load Balancer .
If you are new to policies, see Getting Started with Policies and Common Policies .
- Network Load Balancer Policies
After you create a network load balancer, you can apply policies to control traffic distribution to your backend servers. See Creating a Network Load Balancer .
The Network Load Balancer service supports three primary network load balancer policy types:
5-Tuple Hash : Routes incoming traffic based on 5-Tuple (source IP and port, destination IP and port, protocol) Hash. This is the default network load balancer policy.
3-Tuple Hash : Routes incoming traffic based on 3-Tuple (source IP, destination IP, protocol) Hash.
2-Tuple Hash : Routes incoming traffic based on 2-Tuple (source IP, destination IP) Hash.
The 5-Tuple Hash policy provides session affinity within a given TCP or UDP session, where packets in the same session are directed to the same backend server behind the flexible network load balancer. Use a 3-Tuple or 2-Tuple network load balancing policy to provide session affinity beyond the lifetime of a given session.
When processing load or capacity varies among backend servers, you can refine each of these policy types with backend server weighting . Weighting affects the proportion of requests directed to each server. For example, a server weighted as 3 receives three times the number of connections as a server weighted as 1. You assign weights based on criteria of your choosing, such as each server's traffic-handling capacity. Weight values must be from 1 to 100.
- Connections Idle Timeout
The network load balancer tracks the state of all TCP and UDP flows passing through it. A combination of IP protocol and source and destination IP addresses and ports define a flow. The flow can be removed if no traffic is received from either the client or the server for longer than the idle timeout. Any TCP packets received after the idle timeout are dropped. For UDP flows, a subsequent packet is considered as a new flow and routed to a new backend.
The idle timeout duration for TCP flows is 6 minutes and for UDP flows is 2 minutes. You cannot change the idle timeout duration.
Network load balancing activities are logged through the virtual cloud network (VCN) flow logs. See VCN Flow Logs for more information.
The Network Load Balancer service does not directly modify any traffic that it receives. Therefore, if you want to secure the traffic being sent through the network load balancer to the backends, you are responsible for encrypting the applications on the backends receiving the traffic. If you want to incorporate SSL termination on a load balancer, use the Load Balancer service instead.
- No suggested jump to results
- Notifications
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement . We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Accessing network ip inner wsl from windows #9733
mehdihadeli commented Mar 4, 2023 • edited
No branches or pull requests
Select Product
Machine Translated
Current Release
Citrix ADC Release Notes
Build 42.47
Build 37.38
Build 33.54
Build 30.52
Build 27.59
Build 24.38
Build 21.50
Build 17.42
Build 12.51
Getting Started with Citrix ADC
Where Does a Citrix ADC Appliance Fit in the Network?
How a Citrix ADC Communicates with Clients and Servers
Introduction to the Citrix ADC Product Line
Install the hardware
Access a Citrix ADC
Configure the ADC for the first time
Secure your Citrix ADC deployment
Configure high availability
Change an RPC node password
Configuring a FIPS Appliance for the First Time
Understanding Common Network Topologies
System management settings
System settings
Packet forwarding modes
Network interfaces
Clock synchronization
DNS configuration
SNMP configuration
Verify Configuration
Load balance traffic on a Citrix ADC appliance
Load balancing
Persistence settings
Configure features to protect the load balancing configuration
A typical load balancing scenario
Use case - How to force Secure and HttpOnly cookie options for websites using the Citrix ADC appliance
Accelerate load balanced traffic by using compression
Secure load balanced traffic by using SSL
Features at a Glance
Application Switching and Traffic Management Features
Application Acceleration Features
Application Security and Firewall Features
Application Visibility Feature
Citrix ADC Solutions
Setting up Citrix ADC for Citrix Virtual Apps and Desktops
Global Server Load Balancing (GSLB) Powered Zone Preference
Anycast support in Citrix ADC
Deploy digital advertising platform on AWS with Citrix ADC
Enhancing Clickstream analytics in AWS using Citrix ADC
Citrix ADC in a Private Cloud Managed by Microsoft Windows Azure Pack and Cisco ACI
Creating a Citrix ADC Load Balancer in a Plan in the Service Management Portal (Admin Portal)
Configuring a Citrix ADC Load Balancer by Using the Service Management Portal (Tenant Portal)
Deleting a Citrix ADC Load Balancer from the Network
Citrix cloud native solution
Kubernetes Ingress solution
Service mesh
Solutions for observability
API gateway for Kubernetes
Use Citrix ADM to Troubleshoot Citrix Cloud Native Networking
Deploy a Citrix ADC VPX instance
Support matrix and usage guidelines
Optimize Citrix ADC VPX performance on VMware ESX, Linux KVM, and Citrix Hypervisors
Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance in cloud
Improve SSL-TPS performance on public cloud platforms
Install a Citrix ADC VPX instance on a bare metal server
Install a Citrix ADC VPX instance on Citrix Hypervisor
Configuring Citrix ADC Virtual Appliances to use Single Root I/O Virtualization (SR-IOV) Network Interfaces
Install a Citrix ADC VPX instance on VMware ESX
Configuring Citrix ADC Virtual Appliances to use VMXNET3 Network Interface
Configuring Citrix ADC Virtual Appliances to use Single Root I/O Virtualization (SR-IOV) Network Interface
Migrating the Citrix ADC VPX from E1000 to SR-IOV or VMXNET3 Network Interfaces
Configuring Citrix ADC Virtual Appliances to use PCI Passthrough Network Interface
Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance on VMware ESX hypervisor
Install a Citrix ADC VPX instance on VMware cloud on AWS
Install a Citrix ADC VPX instance on Microsoft Hyper-V servers
Install a Citrix ADC VPX instance on Linux-KVM platform
Prerequisites for installing Citrix ADC VPX virtual appliances on Linux-KVM platform
Provisioning the Citrix ADC virtual appliance by using OpenStack
Provisioning the Citrix ADC virtual appliance by using the Virtual Machine Manager
Configuring Citrix ADC virtual appliances to use SR-IOV network interface
Configuring Citrix ADC virtual appliances to use PCI Passthrough network interface
Provisioning the Citrix ADC virtual appliance by using the virsh Program
Managing the Citrix ADC Guest VMs
Provisioning the Citrix ADC virtual appliance with SR-IOV on OpenStack
Configuring a Citrix ADC VPX instance on KVM to use OVS DPDK-Based host interfaces
Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance on the KVM hypervisor
Deploy a Citrix ADC VPX instance on AWS
AWS terminology
AWS-VPX support matrix
Limitations and usage guidelines
Prerequisites
Configure AWS IAM roles on Citrix ADC VPX instance
How a Citrix ADC VPX instance on AWS works
Deploy a Citrix ADC VPX standalone instance on AWS
Scenario: standalone instance
Download a Citrix ADC VPX license
Load balancing servers in different availability zones
How high availability on AWS works
Deploy a VPX HA pair in the same AWS availability zone
High availability across different AWS availability zones
Deploy a VPX high-availability pair with elastic IP addresses across different AWS zones
Deploy a VPX high-availability pair with private IP addresses across different AWS zones
Deploy a Citrix ADC VPX instance on AWS Outposts
Protect AWS API Gateway using the Citrix Web Application Firewall
Add back-end AWS auto scaling service
Configure a Citrix ADC VPX instance to use SR-IOV network interface
Configure a Citrix ADC VPX instance to use Enhanced Networking with AWS ENA
Upgrade a Citrix ADC VPX instance on AWS
Troubleshoot a VPX instance on AWS
Deploy a Citrix ADC VPX instance on Microsoft Azure
Azure terminology
Network architecture for Citrix ADC VPX instances on Microsoft Azure
Configure a Citrix ADC standalone instance
Configure multiple IP addresses for a Citrix ADC VPX standalone instance
Configure a high-availability setup with multiple IP addresses and NICs
Configure a high-availability setup with multiple IP addresses and NICs by using PowerShell commands
Deploy a Citrix ADC high-availability pair on Azure with ALB in the floating IP-disabled mode
Configure a Citrix ADC VPX instance to use Azure accelerated networking
Configure HA-INC nodes by using the Citrix high availability template with Azure ILB
Configure HA-INC nodes by using the Citrix high availability template for internet-facing applications
Configure a high-availability setup with Azure external and internal load balancers simultaneously
Install a Citrix ADC VPX instance on Azure VMware solution
Configure a Citrix ADC VPX standalone instance on Azure VMware solution
Configure a Citrix ADC VPX high availability setup on Azure VMware solution
Configure Azure route server with Citrix ADC VPX HA pair
Add Azure autoscale settings
Azure tags for Citrix ADC VPX deployment
Configure GSLB on Citrix ADC VPX instances
Configure GSLB on an active-standby high availability setup
Deploy Citrix ADC GSLB and domain-based services back-end autoscale with cloud load balancer
Configure address pools (IIP) for a Citrix Gateway appliance
Configure multiple IP addresses for a Citrix ADC VPX instance in standalone mode by using PowerShell commands
Additional PowerShell scripts for Azure deployment
Deploy a Citrix ADC VPX instance on Google Cloud Platform
Deploy a VPX high-availability pair on Google Cloud Platform
Deploy a VPX high-availability pair with external static IP address on Google Cloud Platform
Deploy a single NIC VPX high-availability pair with private IP address on Google Cloud Platform
Deploy a VPX high-availability pair with private IP addresses on Google Cloud Platform
Install a Citrix ADC VPX instance on Google Cloud VMware Engine
Add back-end GCP Autoscaling service
VIP scaling support for Citrix ADC VPX instance on GCP
Troubleshoot a VPX instance on GCP
Jumbo frames on Citrix ADC VPX instances
Automate deployment and configurations of Citrix ADC
Allocate and apply a license
Data governance
Citrix ADM service connect
Upgrade and downgrade a Citrix ADC appliance
Before you begin
Upgrade considerations for customized configuration files
Upgrade considerations - SNMP configuration
Download a Citrix ADC release package
Upgrade a Citrix ADC standalone appliance
Downgrade a Citrix ADC standalone appliance
Upgrade a high availability pair
In Service Software Upgrade support for high availability
Downgrade a high availability pair
Troubleshooting
New and deprecated commands, parameters, and SNMP OIDs
Solutions for Telecom Service Providers
Large Scale NAT
Points to Consider before Configuring LSN
Configuration Steps for LSN
Sample LSN Configurations
Configuring Static LSN Maps
Configuring Application Layer Gateways
Logging and Monitoring LSN
TCP SYN Idle Timeout
Overriding LSN configuration with Load Balancing Configuration
Clearing LSN Sessions
Load Balancing SYSLOG Servers
Port Control Protocol
LSN44 in a cluster setup
Dual-Stack Lite
Points to Consider before Configuring DS-Lite
Configuring DS-Lite
Configuring DS-Lite Static Maps
Configuring Deterministic NAT Allocation for DS-Lite
Configuring Application Layer Gateways for DS-Lite
Logging and Monitoring DS-Lite
Port Control Protocol for DS-Lite
Large Scale NAT64
Points to Consider for Configuring Large Scale NAT64
Configuring DNS64
Configuring Large Scaler NAT64
Configuring Application Layer Gateways for Large Scale NAT64
Configuring Static Large Scale NAT64 Maps
Logging and Monitoring Large Scale NAT64
Port Control Protocol for Large Scale NAT64
LSN64 in a cluster setup
Mapping Address and Port using Translation
Telco subscriber management
Subscriber aware traffic steering
Subscriber aware service chaining
Subscriber aware traffic steering with TCP optimization
Policy based TCP profile selection
Load Balance Control-Plane Traffic that is based on Diameter, SIP, and SMPP Protocols
Provide DNS Infrastructure/Traffic Services, such as, Load Balancing, Caching, and Logging for Telecom Service Providers
Provide Subscriber Load Distribution Using GSLB Across Core-Networks of a Telecom Service Provider
Bandwidth Utilization Using Cache Redirection Functionality
Citrix ADC TCP Optimization
Getting Started
Management Network
High Availability
Gi-LAN Integration
TCP Optimization Configuration
Analytics and Reporting
Real-time Statistics
Technical Recipes
Scalability
Optimizing TCP Performance using TCP Nile
Troubleshooting Guidelines
Frequently Asked Questions
Citrix ADC Video Optimization
Configuring Video Optimization over TCP
Video Optimization over UDP
Citrix ADC URL Filtering
URL Categorization
Admin Partition
Connection Management
Content Switching
Integrated Caching
Installing, Upgrading, and Downgrading
Load Balancing
Citrix ADC GUI
Authentication, authorization, and auditing application traffic
How authentication, authorization, and auditing works
Basic components of authentication, authorization, and auditing configuration
Authentication virtual server
Authorization policies
Authentication profiles
Authentication policies
Users and groups
Authentication methods
Multi-Factor (nFactor) authentication
SAML authentication
OAuth authentication
LDAP authentication
RADIUS authentication
TACACS authentication
Client certificate authentication
Negotiate authentication
Web authentication
Forms based authentication
401 based authentication
reCaptcha for nFactor authentication
Native OTP support for authentication
Push notification for OTP
Authentication, authorization, and auditing configuration for commonly used protocols
Single sign-on types
Citrix ADC Kerberos single sign-on
Enable SSO for Basic, Digest, and NTLM authentication
Content Security Policy response header support for Citrix Gateway and authentication virtual server generated responses
Self-service password reset
Polling during authentication
Session and traffic management
Rate Limiting for Citrix Gateway
Authorizing user access to application resources
Auditing authenticated sessions
Citrix ADC as an Active Directory Federation Service proxy
Web Services Federation protocol
Active Directory Federation Service Proxy Integration Protocol compliance
On-premises Citrix Gateway as an identity provider to Citrix Cloud
Support for active-active GSLB deployments on Citrix Gateway
Configuration support for SameSite cookie attribute
Handling authentication, authorization and auditing with Kerberos/NTLM
Troubleshoot authentication and authorization related issues
Admin partition
Citrix ADC configuration support in admin partition
Configure admin partitions
VLAN configuration for admin partitions
VXLAN support for admin partitions
SNMP support for admin partitions
Audit log support for admin partitions
Display configured PMAC addresses for shared VLAN configuration
Action Analytics
Configure a selector
Configure a stream identifier
View statistics
Group records on attribute values
Clear stream session
Configure policy for optimizing traffic
How to limit bandwidth consumption for user or client device
AppExpert Applications
How AppExpert application works
Customize AppExpert Configuration
Configure user authentication
Monitor Citrix ADC statistics
Delete an AppExpert application
Configure application authentication, authorization, and auditing
Set up a custom Citrix ADC application
Citrix Gateway Applications
Enabling AppQoE
AppQOE Actions
AppQoE Parameters
AppQoE Policies
Entity Templates
HTTP Callouts
How an HTTP Callout Works
Notes on the Format of HTTP Requests and Responses
Configuring an HTTP Callout
Verifying the Configuration
Invoking an HTTP Callout
Avoiding HTTP Callout Recursion
Caching HTTP Callout Responses
Use Case: Filtering Clients by Using an IP Blacklist
Use Case: ESI Support for Fetching and Updating Content Dynamically
Use Case: Access Control and Authentication
Use Case: OWA-Based Spam Filtering
Use Case: Dynamic Content Switching
Pattern Sets and Data Sets
How String Matching works with Pattern Sets and Data Sets
Configuring a Pattern Set
Configuring a Data Set
Using Pattern Sets and Data Sets
Sample Usage
Configuring and Using Variables
Use Case for Caching User Privileges
Use Case for Limiting the Number of Sessions
Policies and Expressions
Introduction to Policies and Expressions
Configuring Advanced Policy Infrastructure
Configuring Advanced Policy Expression: Getting Started
Advanced Policy Expressions: Evaluating Text
Advanced Policy Expressions: Working with Dates, Times, and Numbers
Advanced Policy Expressions: Parsing HTTP, TCP, and UDP Data
Advanced Policy Expressions: Parsing SSL Certificates
Advanced Policy Expressions: IP and MAC Addresses, Throughput, VLAN IDs
Advanced Policy Expressions: Stream Analytics Functions
Advanced Policy Expressions: DataStream
Typecasting Data
Regular Expressions
Summary Examples of Advanced Policy Expressions
Tutorial Examples of Advanced Policies for Rewrite
Rewrite and Responder Policy examples
Rate Limiting
Configuring a Stream Selector
Configuring a Traffic Rate Limit Identifier
Configuring and Binding a Traffic Rate Policy
Viewing the Traffic Rate
Testing a Rate-Based Policy
Examples of Rate-Based Policies
Sample Use Cases for Rate-Based Policies
Rate Limiting for Traffic Domains
Configure rate limit at packet level
Enabling the Responder Feature
Configuring a Responder Action
Configuring a Responder Policy
Binding a Responder Policy
Setting the Default Action for a Responder Policy
Responder Action and Policy Examples
Diameter Support for Responder
RADIUS Support for Responder
DNS Support for the Responder Feature
MQTT support for responder
How to Redirect HTTP Requests
Rewrite Action and Policy Examples
URL Transformation
RADIUS Support for the Rewrite Feature
Diameter Support for Rewrite
DNS Support for the Rewrite Feature
MQTT Support for Rewrite
String Maps
Advanced Policy Expressions for URL Evaluation
Configuring URL Set
URL Pattern Semantics
URL Categories
Configuring the AppFlow Feature
Exporting Performance Data of Web Pages to AppFlow Collector
Session Reliability on Citrix ADC High Availability Pair
Monitoring Citrix ADC and applications using Prometheus
Application Firewall
FAQs and Deployment Guide
Introduction to Citrix Web App Firewall
Configuring the Application Firewall
Enabling the Application Firewall
The Application Firewall Wizard
Manual Configuration
Manual Configuration By Using the GUI
Manual Configuration By Using the Command Line Interface
Manually Configuring the Signatures Feature
Adding or Removing a Signatures Object
Configuring or Modifying a Signatures Object
Protecting JSON Applications using Signatures
Updating a Signatures Object
Signature Auto Update
Snort rule integration
Exporting a Signatures Object to a File
The Signatures Editor
Signature Updates in High-Availability Deployment and Build Upgrades
Overview of Security checks
Top-Level Protections
HTML Cross-Site Scripting Check
HTML SQL Injection Checks
SQL grammar-based protection for HTML and JSON payload
Command injection grammar-based protection for HTML payload
Relaxation and deny rules for handling HTML SQL injection attacks
HTML Command Injection Protection
Custom keyword support for HTML payload
XML External Entity Protection
Buffer Overflow Check
Application Firewall Support for Google Web Toolkit
Cookie Protection
Cookie Consistency Check
Cookie Hijacking Protection
SameSite cookie attribute
Data Leak Prevention Checks
Credit Card Check
Safe Object Check
Advanced Form Protection Checks
Field Formats Check
Form Field Consistency Check
CSRF Form Tagging Check
Managing CSRF Form Tagging Check Relaxations
URL Protection Checks
Start URL Check
Deny URL Check
XML Protection Checks
XML Format Check
XML Denial-of-Service Check
XML Cross-Site Scripting Check
XML SQL Injection Check
XML Attachment Check
Web Services Interoperability Check
XML Message Validation Check
XML SOAP Fault Filtering Check
JSON Protection Checks
JSON DOS Protection
JSON SQL Protection
JSON XSS Protection
JSON Command Injection Protection
Managing Content Types
Creating Application Firewall Profiles
Enforcing HTTP RFC Compliance
Configuring Application Firewall Profiles
Application Firewall Profile Settings
Changing an Application Firewall Profile Type
Exporting and Importing an Application Firewall Profile
Detailed troubleshooting with WAF logs
File Upload Protection
Configuring and Using the Learning Feature
Dynamic Profiling
Supplemental Information about Profiles
Custom error status and message for HTML, XML, or JSON error object
Policy Labels
Firewall Policies
Auditing Policies
Importing and Exporting Files
Global Configuration
Engine Settings
Confidential Fields
Field Types
XML Content Types
JSON Content Types
Statistics and Reports
Application Firewall Logs
PCRE Character Encoding Format
Whitehat WASC Signature Types for WAF Use
Streaming Support for Request Processing
Trace HTML Requests with Security Logs
Application Firewall Support for Cluster Configurations
Debugging and Troubleshooting
Large File Upload Failure
Miscellaneous
Signatures Alert Articles
Signature update version 97
Signature update version 96
Signature update version 95
Signature update version 94
Signature update version 93
Signature update version 92
Signature update version 91
Signature update version 90
Signature update version 89
Signature update version 88
Signature update version 87
Signature update version 86
Signature update version 85
Signature update version 84
Signature update version 83
Signature update version 82
Signature update version 81
Signature update version 80
Signature update version 79
Signature update version 78
Signature update version 77
Signature update version 76
Signature update version 75
Signature update version 74
Signature update version 73
Signature update version 72
Signature update version 71
Signature update version 70
Signature update version 69
Signature update version 68
Signature update version 67
Signature update version 66
Signature update version 65
Signature update version 64
Signature update version 63
Signature update version 62
Signature update version 61
Signature update version 60
Signature update version 59
Signature update version 58
Signature update version 57
Signature update version 56
Signature update version 55
Signature update version 54
Signature update version 53
Signature update version 52
Signature update version 51
Signature update version 50
Signature update version 49
Signature update version 48
Signature update version 47
Signature update version 46
Signature update version 45
Signature update version 44
Signature update version 43
Signature update version 42
Signature update version 41
Signature update version 40
Signature update version 39
Signature update version 38
Signature update version 37
Signature update version 36
Signature update version 35
Signature update version 34
Signature update version 33
Signature update version 32
Signature update version 30
Signature update version 29
Signature update version 28
Signature update version 27
Bot Management
Bot Detection
Bot troubleshooting
Bot Signature Auto Update
Bot Signature Alert Articles
Bot signature update version 5
Bot signature update version 6
Bot signature update version 7
Bot signature update version 8
Bot signature update version 9
Bot signature update version 10
Bot signature update version 11
Bot signature update version 12
Bot signature update version 13
Cache Redirection
Cache redirection policies
Built-in cache redirection policies
Configure a cache redirection policy
Cache redirection configurations
Configure transparent redirection
Configure forward proxy redirection
Configure reverse proxy redirection
Selective cache redirection
Enable content switching
Configure a load balancing virtual server for the cache
Configure policies for content switching
Configure precedence for policy evaluation
Administer a cache redirection virtual server
View cache redirection virtual server statistics
Enable or disable a cache redirection virtual server
Direct policy hits to the cache instead of the origin
Back up a cache redirection virtual server
Manage client connections for a virtual server
Enable external TCP health check for UDP virtual servers
N-tier cache redirection
Configure the upper-tier Citrix ADC appliances
Configure the lower-tier Citrix ADC appliances
Translate destination IP address of a request to origin IP address
Citrix ADC configuration support in a cluster
Cluster overview
Synchronization across cluster nodes
Striped, partially striped, and spotted configurations
Communication in a cluster setup
Traffic distribution in a cluster setup
Cluster nodegroups
Cluster and node states
Routing in a cluster
IP addressing for a cluster
Configuring layer 3 clustering
Setting up a Citrix ADC cluster
Setting up inter-node communication
Creating a Citrix ADC cluster
Adding a node to the cluster
Viewing the details of a cluster
Distributing traffic across cluster nodes
Using Equal Cost Multiple Path (ECMP)
Using cluster link aggregation
Using USIP mode in cluster
Managing the Citrix ADC cluster
Configuring linksets
Nodegroups for spotted and partially-striped configurations
Configuring redundancy for nodegroups
Disabling steering on the cluster backplane
Synchronizing cluster configurations
Synchronizing time across cluster nodes
Synchronizing cluster files
Viewing the statistics of a cluster
Discovering Citrix ADC appliances
Disabling a cluster node
Removing a cluster node
Removing a node from a cluster deployed using cluster link aggregation
Detecting jumbo probe on a cluster
Route monitoring for dynamic routes in cluster
Monitoring cluster setup using SNMP MIB with SNMP link
Monitoring command propagation failures in a cluster deployment
Graceful shutdown of nodes
Graceful shutdown of services
IPv6 ready logo support for clusters
Managing cluster heartbeat messages
Configuring owner node response status
Monitor Static Route (MSR) support for inactive nodes in a spotted cluster configuration
VRRP interface binding in a single node active cluster
Cluster setup and usage scenarios
Creating a two-node cluster
Migrating an HA setup to a cluster setup
Transitioning between a L2 and L3 cluster
Setting up GSLB in a cluster
Using cache redirection in a cluster
Using L2 mode in a cluster setup
Using cluster LA channel with linksets
Backplane on LA channel
Common interfaces for client and server and dedicated interfaces for backplane
Common switch for client, server, and backplane
Common switch for client and server and dedicated switch for backplane
Different switch for every node
Sample cluster configurations
Using VRRP in a cluster setup
Monitoring services in a cluster using path monitoring
Backup and restore of cluster setup
Upgrading or downgrading the Citrix ADC cluster
Operations supported on individual cluster nodes
Support for heterogeneous cluster
Troubleshooting the Citrix ADC cluster
Tracing the packets of a Citrix ADC cluster
Troubleshooting common issues
Configuring Basic Content Switching
Customizing the Basic Content Switching Configuration
Content Switching for Diameter Protocol
Protecting the Content Switching Setup against Failure
Managing a Content Switching Setup
Managing Client Connections
Persistence support for content switching virtual server
Configure database users
Configure a database profile
Configure load balancing for DataStream
Configure content switching for DataStream
Configure monitors for DataStream
Use Case 1: Configure DataStream for a primary/secondary database architecture
Use Case 2: Configure the token method of load balancing for DataStream
Use Case 3: Log MSSQL transactions in transparent mode
Use Case 4: Database specific load balancing
DataStream reference
Domain Name System
Configure DNS resource records
Create SRV records for a service
Create AAAA Records for a domain name
Create address records for a domain name
Create MX records for a mail exchange server
Create NS records for an authoritative server
Create CNAME records for a subdomain
Create NAPTR records for telecommunications domain
Create PTR records for IPv4 and IPv6 addresses
Create SOA records for authoritative information
Create TXT records for holding descriptive text
Create CAA records for a domain name
View DNS statistics
Configure a DNS zone
Configure the Citrix ADC as an ADNS server
Configure the Citrix ADC as a DNS proxy server
Configure the Citrix ADC as an end resolver
Configure the Citrix ADC as a forwarder
Configure Citrix ADC as a non-validating security aware stub-resolver
Jumbo frames support for DNS to handle responses of large sizes
Configure DNS logging
Configure DNS suffixes
DNS ANY query
Configure negative caching of DNS records
Caching of EDNS0 client subnet data when the Citrix ADC appliance is in proxy mode
Domain name system security extensions
Configure DNSSEC
Configure DNSSEC when the Citrix ADC is authoritative for a zone
Configure DNSSEC for a zone for which the Citrix ADC is a DNS proxy server
Configure DNSSEC for GSLB domain names
Zone maintenance
Offload DNSSEC operations to the Citrix ADC
Admin partition support for DNSSEC
Support for wildcard DNS domains
Mitigate DNS DDoS attacks
Firewall Load Balancing
Sandwich Environment
Enterprise Environment
Multiple-Firewall Environment
Global Server Load Balancing
GSLB deployment types
Active-active site deployment
Active-passive site deployment
Parent-child topology deployment using the MEP protocol
GSLB configuration entities
GSLB methods
GSLB algorithms
Static proximity
Dynamic round trip time method
Configure static proximity
Add a location file to create a static proximity database
Add custom entries to a static proximity database
Set location qualifiers
Specify proximity method
Synchronize GSLB static proximity database
Configure site-to-site communication
Configure metrics exchange protocol
Configure GSLB by using a wizard
Configure active-active site
Configure active-passive site
Configure parent-child topology
Configure GSLB entities individually
Configure an authoritative DNS service
Configure a basic GSLB site
Configure a GSLB service
Configure a GSLB service group
Configure a GSLB virtual server
Bind GSLB services to a GSLB virtual server
Bind a domain to a GSLB virtual server
Example of a GSLB setup and configuration
Synchronize the configuration in a GSLB setup
Manual synchronization between sites participating in GSLB
Real-time synchronization between sites participating in GSLB
View GSLB synchronization status and summary
SNMP traps for GSLB configuration synchronization
GSLB dashboard
Monitor GSLB services
How domain name system works with GSLB
Priority order for GSLB services
Upgrade recommendations for GSLB deployment
Use case: Deployment of domain name based autoscale service group
Use case: Deployment of IP address based autoscale service group
How-to articles
Customize your GSLB configuration
Configure persistent connections
Manage client connections
Configure GSLB for proximity
Protect the GSLB setup against failure
Configure GSLB for disaster recovery
Override static proximity behavior by configuring preferred locations
Configure GSLB service selection using content switching
Configure GSLB for DNS queries with NAPTR records
Configure GSLB for wildcard domain
Use the EDNS0 client subnet option for GSLB
Example of a complete parent-child configuration using the metrics exchange protocol
Link Load Balancing
Configuring a Basic LLB Setup
Configuring RNAT with LLB
Configuring a Backup Route
Resilient LLB Deployment Scenario
Monitoring an LLB Setup
How load balancing works
Set up basic load balancing
Load balance virtual server and service states
Support for load balancing profile
Load balancing algorithms
Least connection method
Round robin method
Least response time method
LRTM method
Hashing methods
Least bandwidth method
Least packets method
Custom load method
Static proximity method
Token method
Configure a load balancing method that does not include a policy
Persistence and persistent connections
About Persistence
Source IP address persistence
HTTP cookie persistence
SSL session ID persistence
Diameter AVP number persistence
Custom server ID persistence
IP address persistence
SIP Call ID persistence
RTSP session ID persistence
Configure URL passive persistence
Configure persistence based on user-defined rules
Configure persistence types that do not require a rule
Configure backup persistence
Configure persistence groups
Share persistent sessions between virtual servers
Configure RADIUS load balancing with persistence
View persistence sessions
Clear persistence sessions
Override persistence settings for overloaded services
Insert cookie attributes to ADC generated cookies
Customize a load balancing configuration
Customize the hash algorithm for persistence across virtual servers
Configure the redirection mode
Configure per-VLAN wildcarded virtual servers
Assign weights to services
Configure the MySQL and Microsoft SQL server version setting
Multi-IP virtual servers
Limit the number of concurrent requests on a client connection
Configure diameter load balancing
Configure FIX load balancing
MQTT load balancing
Protect a load balancing configuration against failure
Redirect client requests to an alternate URL
Configure a backup load balancing virtual server
Configure spillover
Connection failover
Flush the surge queue
Manage a load balancing setup
Manage server objects
Manage services
Manage a load balancing virtual server
Load balancing visualizer
Manage client traffic
Configure sessionless load balancing virtual servers
Redirect HTTP requests to a cache
Enable cleanup of virtual server connections
Rewrite ports and protocols for HTTP redirection
Insert IP address and port of a virtual server in the request header
Use a specified source IP for backend communication
Set a time-out value for idle client connections
Manage RTSP connections
Manage client traffic on the basis of traffic rate
Identify a connection with layer 2 parameters
Configure the prefer direct route option
Use a source port from a specified port range for backend communication
Configure source IP persistency for backend communication
Use IPv6 link local addresses on server side of a load balancing setup
Advanced load balancing settings
Gradually stepping up the load on a new service with virtual server–level slow start
The no-monitor option for services
Protect applications on protected servers against traffic surges
Enable cleanup of virtual server and service connections
Enable or disable persistence session on TROFS services
Direct requests to a custom web page
Enable access to services when down
Enable TCP buffering of responses
Enable compression
Maintain client connection for multiple client requests
Insert the IP address of the client in the request header
Retrieve location details from user IP address using geolocation database
Use source IP address of the client when connecting to the server
Use client source IP address for backend communication in a v4-v6 load balancing configuration
Configure the source port for server-side connections
Set a limit on the number of client connections
Set a limit on number of requests per connection to the server
Set a threshold value for the monitors bound to a service
Set a timeout value for idle client connections
Set a timeout value for idle server connections
Set a limit on the bandwidth usage by clients
Redirect client requests to a cache
Retain the VLAN identifier for VLAN transparency
Configure automatic state transition based on percentage health of bound services
Built-in monitors
TCP-based application monitoring
SSL service monitoring
HTTP/2 service monitoring
Proxy protocol service monitoring
FTP service monitoring
Secure monitoring of servers by using SFTP
Set SSL parameters on a secure monitor
SIP service monitoring
RADIUS service monitoring
Monitor accounting information delivery from a RADIUS server
DNS and DNS-TCP service monitoring
LDAP service monitoring
MySQL service monitoring
SNMP service monitoring
NNTP service monitoring
POP3 service monitoring
SMTP service monitoring
RTSP service monitoring
XML broker service monitoring
ARP request monitoring
Citrix Virtual Desktops Delivery Controller service monitoring
Citrix StoreFront stores monitoring
Custom monitors
Configure HTTP-inline monitors
Understand user monitors
How to use a user monitor to check web sites
Understand the internal dispatcher
Configure a user monitor
Understand load monitors
Configure load monitors
Unbind metrics from a metrics table
Configure reverse monitoring for a service
Configure monitors in a load balancing setup
Create monitors
Configure monitor parameters to determine the service health
Bind monitors to services
Modify monitors
Enable and disable monitors
Unbind monitors
Remove monitors
View monitors
Close monitor connections
Ignore the upper limit on client connections for monitor probes
Manage a large scale deployment
Ranges of virtual servers and services
Configure service groups
Manage service groups
Configure a desired set of service group members for a service group in one NITRO API call
Configure automatic domain based service group scaling
Service discovery using DNS SRV records
Translate the IP address of a domain-based server
Mask a virtual server IP address
Configure load balancing for commonly used protocols
Load balance a group of FTP servers
Load balance DNS servers
Load balance domain-name based services
Load balance a group of SIP servers
Load balance RTSP servers
Load balance remote desktop protocol (RDP) servers
Priority order for load balancing services
Use case 1: SMPP load balancing
Use case 2: Configure rule based persistence based on a name-value pair in a TCP byte stream
Use case 3: Configure load balancing in direct server return mode
Use case 4: Configure LINUX servers in DSR mode
Use case 5: Configure DSR mode when using TOS
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field
Use case 7: Configure load balancing in DSR mode by using IP Over IP
Use case 8: Configure load balancing in one-arm mode
Use case 9: Configure load balancing in the inline mode
Use case 10: Load balancing of intrusion detection system servers
Use case 11: Isolating network traffic using listen policies
Use case 12: Configure Citrix Virtual Desktops for load balancing
Use case 13: Configure Citrix Virtual Apps and Desktops for load balancing
Use case 14: ShareFile wizard for load balancing Citrix ShareFile
Use case 15: Configure layer 4 load balancing on the Citrix ADC appliance
Load balancing FAQs
IP Addressing
Configuring NetScaler-Owned IP Addresses
How the Citrix ADC Proxies Connections
Enabling Use Source IP Mode
Configuring Network Address Translation
Configuring Static ARP
Setting the Timeout for Dynamic ARP Entries
Configuring Neighbor Discovery
Configuring IP Tunnels
Class E IPv4 packets
Monitor the free ports available on a Citrix ADC appliance for a new back-end connection
Configuring MAC-Based Forwarding
Configuring Network Interfaces
Configuring Forwarding Session Rules
Understanding VLANs
Configuring a VLAN
Configuring NSVLAN
Configuring Allowed VLAN List
Configuring Bridge Groups
Configuring Virtual MACs
Configuring Link Aggregation
Redundant Interface Set
Binding an SNIP address to an Interface
Monitoring the Bridge Table and Changing the Aging time
Citrix ADC Appliances in Active-Active Mode Using VRRP
Using the Network Visualizer
Configuring Link Layer Discovery Protocol
Jumbo Frames
Citrix ADC Support for Microsoft Direct Access Deployment
Access Control Lists
Simple ACLs and Simple ACL6s
Extended ACLs and Extended ACL6s
MAC Address Wildcard Mask for ACLs
Blocking Traffic on Internal Ports
Configuring Dynamic Routes
Configuring Static Routes
Route Health Injection Based on Virtual Server Settings
Configuring Policy-Based Routes
Traffic distribution in multiple routes based on five tuples information
Troubleshooting Routing Issues
Internet Protocol version 6 (IPv6)
Traffic Domains
Inter Traffic Domain Entity Bindings
Virtual MAC Based Traffic Domains
Geneve tunnels
Best practices for networking configurations
Configure to source Citrix ADC FreeBSD data traffic from a SNIP address
Priority Load Balancing
Citrix ADC Extensions
Citrix ADC extensions - language overview
Simple types
Expressions
Control structures
Citrix ADC extensions - library reference
Citrix ADC extensions API reference
Protocol extensions
Protocol extensions - architecture
Protocol extensions - traffic pipeline for user defined TCP client and server behaviors
Protocol extensions - use cases
Tutorial – Add MQTT protocol to the Citrix ADC appliance by using protocol extensions
Tutorial - Load balancing syslog messages by using protocol extensions
Protocol extensions command reference
Troubleshoot protocol extensions
Policy extensions
Configure policy extensions
Policy extensions - use cases
Troubleshooting policy extensions
Optimization
Client Keep-Alive
HTTP Compression
Configure selectors and basic content groups
Configure policies for caching and invalidation
Cache support for database protocols
Configure expressions for caching policies and selectors
Display cached objects and cache statistics
Improve cache performance
Configure cookies, headers, and polling
Configure integrated cache as a forward proxy
Default Settings for the Integrated Cache
Front End Optimization
Content Accelerator
Media Classification
IP Reputation
SSL offload and acceleration
SSL offloading configuration
TLSv1.3 protocol support as defined in RFC 8446
SSL certificates
Create a certificate
Install, link, and update certificates
Generate a server test certificate
Import and convert SSL files
Bind an SSL certificate to a virtual server on the Citrix ADC appliance
SSL profiles
SSL profile infrastructure
Secure front-end profile
Appendix A: Sample migration of the SSL configuration after upgrade
Appendix B: Default front-end and back-end SSL profile settings
Legacy SSL profile
Certificate revocation lists
Monitor certificate status with OCSP
OCSP stapling
Ciphers available on the Citrix ADC appliances
ECDHE ciphers
Diffie-Hellman (DH) key generation and achieving PFS with DHE
Cipher redirection
Leverage hardware and software to improve ECDHE and ECDSA cipher performance
ECDSA cipher suites support
Configure user-defined cipher groups on the ADC appliance
Server certificate support matrix on the ADC appliance
Client authentication
Server authentication
SSL actions and policies
SSL policies
SSL built-in actions and user-defined actions
SSL policy binding
SSL policy labels
Selective SSL logging
Support for DTLS protocol
Support for Intel Coleto SSL chip based platforms
MPX 14000 FIPS appliances
SDX 14000 FIPS appliances
Limitations
Terminology
Initialize the HSM
Create partitions
Provision a new instance or modify an existing instance and assign a partition
Configure the HSM for an instance on an SDX 14030/14060/14080 FIPS appliance
Create a FIPS key for an instance on an SDX 14030/14060/14080 FIPS appliance
Upgrade the FIPS firmware on a VPX instance
Support for Thales Luna Network hardware security module
Configure a Thales Luna client on the ADC
Configure Thales Luna HSMs in a high availability setup on the ADC
Additional ADC configuration
Citrix ADC appliances in a high availability setup
Support for Azure Key Vault
Content inspection
ICAP for remote content inspection
Inline Device Integration with Citrix ADC
Integration with IPS or NGFW as inline devices
IDS Integration
IDS Layer 3 Integration
Content Inspection Statistics for ICAP, IPS, and IDS
SSL forward proxy
Getting started with SSL forward proxy
Proxy modes
SSL interception
User identity management
URL filtering for SSL forward proxy
URL categorization
URL reputation score
Analytics for SSL forward proxy
Using ICAP for remote content inspection
Surge protection
Disable and reenable surge protection
Set thresholds for surge protection
DNS security options
Basic operations
Authentication and authorization for System Users
Configuring Users, User Groups, and Command Policies
User Account and Password Management
Resetting the Default Administrator (nsroot) Password
Configuring External User Authentication
SSH Key-based Authentication for Citrix ADC Administrators
Two Factor Authentication for System Users
Restricted Management Interface Access
TCP Configurations
HTTP Configurations
Configuring HTTP/2 on the Citrix ADC Appliance
HTTP/2 DoS mitigation
HTTP/3 over QUIC
HTTP/3 Configuration
HTTP/3 Policy Configuration
HTTP/3 Service Discovery
gRPC End-to-End Configuration
gRPC Bridging
gRPC Reverse Bridging
gRPC Call Termination
gRPC with Rewrite Policy Configuration
gRPC with Responder Policy Configuration
gRPC Health Monitor
QUIC bridge configuration
Proxy Protocol
Client IP Address in TCP Option
Configuring the Citrix ADC to Generate SNMP Traps
Configuring the Citrix ADC for SNMP v1 and v2 Queries
Configuring the Citrix ADC for SNMPv3 Queries
Configuring SNMP Alarms for Rate Limiting
Configuring SNMP in FIPS Mode
Audit Logging
Configuring the Citrix ADC Appliance for Audit Logging
Installing and Configuring the NSLOG Server
Running the NSLOG Server
Customizing Logging on the NSLOG Server
SYSLOG Over TCP
Default Settings for the Log Properties
Sample Configuration File (audit.conf)
Web Server Logging
Configuring the Citrix ADC for Web Server Logging
Installing the Citrix ADC Web Logging (NSWL) Client
Configuring the NSWL Client
Customizing Logging on the NSWL Client System
Reporting Tool
CloudBridge Connector
Monitoring CloudBridge Connector Tunnels
Configuring a CloudBridge Connector Tunnel between two Datacenters
Configuring CloudBridge Connector between Datacenter and AWS Cloud
Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Virtual Private Gateway on AWS
Configuring a CloudBridge Connector Tunnel Between a Datacenter and Azure Cloud
Configuring CloudBridge Connector Tunnel between Datacenter and SoftLayer Enterprise Cloud
Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Cisco IOS Device
Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Fortinet FortiGate Appliance
CloudBridge Connector Tunnel Diagnostics and Troubleshooting
CloudBridge Connector Interoperability – StrongSwan
CloudBridge Connector Interoperability – F5 BIG-IP
CloudBridge Connector Interoperability – Cisco ASA
Points to Consider for a High Availability Setup
Configuring High Availability
Configuring the Communication Intervals
Configuring Synchronization
Synchronizing Configuration Files in a High Availability Setup
Configuring Command Propagation
Restricting High-Availability Synchronization Traffic to a VLAN
Configuring Fail-Safe Mode
Configuring Virtual MAC Addresses
Configuring High Availability Nodes in Different Subnets
Configuring Route Monitors
Limiting Failovers Caused by Route Monitors in non-INC mode
Configuring Failover Interface Set
Understanding the Causes of Failover
Forcing a Node to Fail Over
Forcing the Secondary Node to Stay Secondary
Forcing the Primary Node to Stay Primary
Understanding the High Availability Health Check Computation
High Availability FAQs
Troubleshooting High Availability Issues
Managing High Availability Heartbeat Messages on a Citrix ADC Appliance
Remove and Replace a Citrix ADC in a High Availability Setup
Request retry
TCP Optimization
How to record a packet trace on Citrix ADC
How to free space on /var directory
How to download core or crashed files from Citrix ADC appliance
How to collect performance statistics and event logs
How to configure log file rotation
How to free space on /flash directory
Reference Material
Document History
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。 免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica. (Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています. 免責事項
이 기사는 기계 번역되었습니다. 책임 부인
Este artigo foi traduzido automaticamente. (Aviso legal)
这篇文章已经过机器翻译. 放弃
Questo articolo è stato tradotto automaticamente. (Esclusione di responsabilità))
Translation failed!
Release Notes for Citrix ADC 13.1-42.47 Release
This release notes document describes the enhancements and changes, fixed and known issues that exist for the Citrix ADC release Build 13.1-42.47.
- This release notes document does not include security related fixes. For a list of security related fixes and advisories, see the Citrix security bulletin.
The enhancements and changes that are available in Build 13.1-42.47.
Support to stop the IP reputation downloads in bot settings After you disable the IP reputation feature, set the Default Nonintrusive Profile to BOT_BYPASS in the Citrix bot management settings. This configuration stops the IP reputation downloads.
To change the bot management settings, navigate to Security > Citrix Bot Management > Change Citrix Bot Management Settings .
[NSBOT-1050, NSHELP-34310, NSHELP-33835, NSHELP-34410]
New bot violations appear in the Citrix ADM GUI
The following bot violations are newly introduced in the Citrix ADM GUI:
- No user-agent header
- Multiple user-agent headers
An application server uses the user-agent header information to know more about an incoming request. Some bot requests can have multiple user-agent headers or no user-agent header. You can detect such bot violations using a Citrix bot management profile. Then, use the Citrix ADM GUI to monitor bot violations. For more information, see Violation categories .
[NSBOT-1023]
Citrix ADC SDX Appliance
SD-WAN support is deprecated from the Management Service
From release 13.1 build 42.x and later, SD-WAN support is deprecated from the Citrix ADC SDX appliance.
[NSSVM-5465]
“Gateway” and “Nexthop” fields are optional while provisioning or editing the VPX
In a Citrix ADC SDX appliance Management Service, the Gateway and Nexthop fields are no longer mandatory for provisioning, editing, taking backup, or restoring VPX when the following conditions are met:
- “Manage through the internal network” is enabled for VPX.
- VPX IP address is in the same subnet as the Management Service IP address.
- VPX is provisioned with version 13.0-88.9 or 13.1-37.8, and their higher versions.
For more information, see Provision Citrix ADC instances .
[NSSVM-5307]
Citrix Gateway
Support to enable DF bit propagation for EDT by default
On the Citrix Gateway appliance, the DF bit enforcement for the EDT path maximum transmission unit discovery (PMTUD) option is now enabled, by default. This option prevents EDT fragmentation that might result in performance degradation or failure to establish a session. Previously, this option was disabled, by default. Administrators had to enable the option using the ICA parameter settings.
[CGOP-22615]
Citrix Web App Firewall
Use CLI or API to enable signatures in your Citrix Web App Firewall
You can now enable individual signatures in your Citrix Web App Firewall through CLI commands or API calls. To do so, select signatures by their IDs or categories and then set actions. Earlier, you were able to enable signatures only by uploading a signature file.
import appfw signature DEFAULT object_name -sigRuleId 1001 9882 2000 1250 810 -Enabled ON -Action LOG BLOCK
Example-2: import appfw signature DEFAULT object_name -sigCategory web-misc -Enabled ON -Action LOG BLOCK
See, To add individual signatures by using CLI .
[NSWAF-9333]
New match patterns for the Citrix WAF signatures
For the Citrix Web App Firewall signatures, you can now select the following new match patterns:
- Command Injection
- SQL Injection Grammar
- Command Injection Grammar
The Citrix Web App Firewall looks for the selected pattern and categorizes the attack.
Note: You can modify the signature rule patterns only for the custom signatures.
For more information, see Add signature rule patterns .
[NSWAF-9280]
Configure global lists to bypass WAF or deny requests
You can now configure global lists in a Citrix Web App Firewall profile to bypass Web App Firewall or deny requests. If the incoming requests match the global bypass list, they skip the Web App Firewall in Citrix ADC. If the incoming requests match the global deny list, Citrix Web App Firewall blocks those requests and applies the defined action.
The bypass and deny lists support URL, IPv4, and IPv6 addresses. You can specify them using literals, PCRE, and expressions. For more information, see Manage global lists to bypass WAF or deny requests .
[NSWAF-8981]
Simplified the Citrix WAF profile creation to protect from CVEs
Protect your Citrix ADC appliance by applying an appropriate signature in the Citrix Web App Firewall. You might want to secure the appliance from CVEs without performing any other security checks. In this case, you can now create a profile that disables the remaining checks from the Citrix Web App Firewall.
In a Citrix Web App Firewall profile, select the CVE option as defaults. With this option, you need to simply add and bind a signature. It automatically disables the remaining checks. Earlier, you had to manually disable the security checks from the profile one by one.
For more information, see Creating Web App Firewall profiles .
[NSWAF-8970]
Support for multiple services with the same Autoscaling group in public cloud
For the back-end Autoscaling feature in public cloud, the Citrix ADC VPX instance now supports multiple services with the same autoscaling group. This feature is supported on Azure, AWS, and GCP clouds. In the Citrix ADC GUI, you can create different cloud profiles for different services (using different ports) with the same autoscaling group in cloud.
Earlier, the Citrix ADC VPX instance support was limited to a single service per autoscaling group. You had to add different autoscaling groups for different services.
[NSPLAT-21596]
Support for Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor
The Citrix ADC VPX instance now supports Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor.
[NSPLAT-20295]
Increase in the limit of patterns that can be bound to a pattern set
In a Citrix ADC appliance, you can now bind 50000 patterns to a pattern set. With the pattern set file, only 10000 patterns can be bound to a pattern set. Also, If the pattern set is used in streaming, then only 5000 patterns can be bound to that pattern set. A pattern set for streaming is used in the rewrite action search parameter, HTTP body, or TCP payload based expression. Previously, you could only bind 5000 patterns to a pattern set.
[NSPOLICY-2733]
Support for all the expressions associated with the UDP headers and payloads on the client side and the server side
The following enhancements are done for UDP headers and payloads on the client side and server side:
- Expressions associated with the UDP protocol are split into client side and server side expressions.
- Earlier support was available only for client side expressions and the same expressions were used for the server side.
- The UDP protocol now has support for server side expressions. This expression can be used to extract the UDP Source port, Destination port, Length, Checksum, and Payload.
- The client side expressions are also enhanced to extract Length, Checksum, and Payload from a given UDP packet.
- For backward compatibility, if a client side expression is used on the server side it continues to be supported. Citrix recommends you to use the server side expressions for the server side.
For more information, see Expressions for TCP, UDP, and VLAN data .
[NSPOLICY-1829]
Support for cross-signed certificate validation
The Citrix ADC appliance now supports cross-signed certificate validation. If a certificate is signed by multiple issuers, the validation passes if there is at least one valid path to the root certificate.
Earlier, if one of the certificates in the certificate chain was cross-signed and had multiple paths to the root certificate, the ADC appliance only checked for one path. And if that path was not valid, the validation failed.
[NSSSL-11259]
Support for exporting metrics directly to Prometheus from the Citrix ADC appliance
Citrix ADC now supports the direct export of metrics to Prometheus. With this feature, Prometheus pulls metrics directly from the Citrix ADC instances without the need for any external exporter. Previously, an exporter resource was required outside the appliance to export metrics from Citrix ADC to the Prometheus server.
[NSBASE-17100]
User Interface
8 MB upload limit support for systemfile NITRO API
The maximum upload limit for the systemfile NITRO API has been increased from 2 MB to 8 MB.
[NSCONFIG-7089]
Support for 64-bit numerical value in NITRO API responses
Earlier, the Citrix ADC appliance returned an unsigned integer or a long property-type value as a string in the NITRO API response because integer response was not supported for these types. Also, the appliance returned a double-data type stats-counter-rate value as an integer.
The NITRO APIs now support 64-bit integers. This support enables the appliance to return the following in the NITRO API responses:
- the exact integer value instead of a string for an unsigned integer or long integer data type.
- the exact serialized counter rate value instead of an integer.
A new query parameter largeintsupport has been introduced for enabling the 64-bit integers support in the NITRO APIs.
When largeintsupport is set to yes in a NITRO API request, the Citrix ADC appliance returns the exact integer value, in the NITRO API response. The earlier functionality is retained when largeintsupport is set to no , which is also the default setting.
[NSCONFIG-5399]
- Fixed Issues
The issues that are addressed in Build 13.1-42.47.
Authentication, authorization, and auditing
When a Citrix ADC appliance is upgraded, users cannot access the Citrix ADC appliance using RADIUS authentication.
[NSHELP-33200]
On the Citrix ADC GUI, the Response Policies section on the Authentication Virtual Server page does not display the responder type cache policies.
[NSHELP-33111]
Gateway authentication via CWA client or native VPN clients might fail because of missing strings in the ns_aaa_relaystate_param_whitelist patset.
[NSHELP-33054]
Kerberos SSO impersonation with advanced encryption types might fail when an incorrect user principal name is used in the SSO credentials.
[NSHELP-32890, NSHELP-34087]
Citrix ADC appliance crashes while processing a bot signature if the format of the signature file is invalid.
[NSHELP-33690]
In the Citrix ADC GUI, the user-defined bot signature displays an incorrect base version.
[NSHELP-33546]
When you upgrade a Citrix ADC SDX appliance, in rare cases the following incorrect event appears in the Management Service GUI:
“SVM version and Hypervisor version are not compatible”
[NSHELP-32949]
A Citrix Gateway appliance crashes when evaluating a classic policy for a VPN URL.
[NSHELP-33683, CGOP-20369, NSHELP-34002, NSHELP-34030, NSHELP-34052, NSHELP-34076, NSHELP-34077, NSHELP-34100, NSHELP-34151, NSHELP-34180, NSHELP-34243, NSHELP-34276, NSHELP-34327, NSHELP-34402]
After upgrading a Citrix ADC appliance, the RDP proxy URLs do not work with the X1 portal theme and the message “Http/1.1 Object Not Found” appears.
[NSHELP-33676, NSHELP-33845, NSHELP-33921, NSHELP-34032]
When a Citrix ADC appliance is upgraded, the appliance might crash while processing the UDP traffic.
[NSHELP-33417, NSHELP-34031]
After upgrading a Citrix ADC appliance, the RDP proxy URLs become inaccessible and the error message “Http/1.1 Object Not Found” appears. This issue occurs when the custom parameters of the RDP URLs contain spaces.
[NSHELP-33333]
In a Citrix Gateway high availability setup, the primary and the secondary appliances might crash during a failover.
[NSHELP-33198, NSHELP-33483]
Some of the VPN sessions might get cleared or removed from the secondary ADC appliance after a failover.
[NSHELP-33125]
The Citrix Gateway appliance might crash if HDX Insight is enabled and a user logs in to StoreFront immediately after logging out.
[NSHELP-32907, NSHELP-33079, NSHELP-33289]
In a rare case, the Citrix ADC appliance might crash while fetching a STA monitor in a VPN deployment.
[NSHELP-32893]
After upgrading a Citrix Gateway appliance, the Configuration > Integrate with Citrix Products section is not displayed in the Citrix ADC GUI.
[NSHELP-32335]
The EPA scan to check the CA certificate of a client device fails on the Citrix ADC appliance when the CA certificates are of different domains.
[NSHELP-32118]
Citrix EPA plug-in for macOS crashes when GSLB is enabled on a Citrix ADC appliance.
[CGOP-22722]
In the Citrix Web App Firewall, when you enable the streaming and field consistency checks, it delays the transfer of the payload to the origin server. As a result, the POST method for the payload fails.
[NSHELP-33700]
The cookie hijacking redirect drops the query parameters from the request URL. As a result, the redirected request might fail.
[NSHELP-33633, NSHELP-33812]
The secondary node might crash if you use the same GSLB virtual server as the backup for multiple GSLB virtual servers.
[NSHELP-33400, NSHELP-34247]
The Citrix ADC appliance does not respond with the correct service IP address for GSLB domain query if the following settings are configured on the GSLB virtual server:
- ECS option is enabled.
- Static proximity is configured as the load balancing method.
[NSHELP-32879]
In a high availability setup in INC mode, when there is an HA version mismatch, the secondary node might learn invalid routes from the primary node.
[NSHELP-33948]
In a Citrix ADC appliance with OSPF routing configured, the default route is not installed even when the OSPF default route LSA is present.
[NSHELP-33070]
The nstrace of a few incoming packets of an SSH session might incorrectly display a different receiving interface number and VLAN ID when all of the following conditions are met:
- ECMP routes for the client of the SSH session are present on the Citrix ADC appliance.
- SSH session is idle for a few seconds.
[NSHELP-32734]
The loading of SNMP MIB file to a network morning tool might fail because the SNMP trap name dataStreamRateLimitHit in the file is not in camel case.
[NSHELP-32634]
In a large scale NAT 64 setup, the Citrix ADC appliance might crash because of an internal packet engine mismatch issue.
[NSHELP-31985]
In a GSLB setup with one of the GSLB site IP address is configured in an admin partition, ARP requests for this GSLB site IP address from upstream routers fails to reach the admin partition. This issue occurs when all of the following conditions are met:
- A shared VLAN is bound to the admin partition.
- A SNIP IP address, say SNIP-1, in the same subnet as the GSLB site IP address is present on the shared VLAN.
- Another SNIP IP address, say SNIP-2, in the same subnet as the GSLB site IP address is added and SNIP-1 is removed.
[NSHELP-30552]
For a Citrix ADC VPX release 13.1 build 37.38 on VMware ESX hypervisor with VMXNET3 interfaces, you see the following behavior in the HA setup:
The Citrix ADC VPX HA pair is not configured because the communication between the HA nodes is not established. As a result, the peer node status is displayed as UNKNOWN.
[NSPLAT-25677]
When you provide preboot user data in an OVF template from the ESX vSphere client, the ESXi host does not apply the preboot configuration.
[NSPLAT-24233, NSPLAT-25551]
DNS resolution fails if you configure more than three DNS server names in the DHCP option set in AWS VPC. This issue is seen in Citrix ADC VPX instances with releases earlier than 13.1 build 42.x.
[NSHELP-33171]
On the Citrix ADC SDX 8015/8400/8600 platform, you might see increased memory consumption on Xen Server.
[NSHELP-32260]
You might experience transmit stalls on a Citrix ADC SDX appliance with a 10G interface when heavy traffic is sent on this interface.
[NSHELP-31232]
A virtual server crashes due to a failed TLS1.3 connection, because the Citrix ADC appliance runs out of memory and a memory allocation request fails during the start of a TLS 1.3 handshake.
With this fix, the TLS 1.3 connection fails but the appliance does not crash.
[NSSSL-12200]
A virtual server may incorrectly terminate a TLS 1.3 handshake with a decrypt_error alert if the following conditions are met:
- The client is authenticating with a certificate.
- The virtual server is configured to perform a certificate status check using OCSP or a CRL.
- The client sends both Certificate and CertificateVerify messages in the same TLS record.
[NSHELP-33355]
After unbinding the DEFAULT cipher, when you disable a protocol version on a virtual server and later try to bind a cipher with this protocol listed in the description, the following error message appears.
No usable ciphers configured on the SSL vserver/service
This message is incorrect because the cipher is supported with other protocols that are enabled on the virtual server. For example,
Cipher Name: TLS1-ECDHE-RSA-AES256-SHA Description: SSLv3 Kx=ECC-DHE Au=RSA Enc=AES(256) Mac=SHA1 HexCode=0xc014
This cipher is supported for all the protocols starting from SSLv3 (SSLv3, TLS1, TLS11, TLS12). When you disable SSLv3 on a virtual server and then try to bind this cipher to that virtual server, the warning appears even though TLS1, TLS11, TLS12 protocols are still enabled on the virtual server.
With this fix, the warning appears only when a cipher is not supported for the configuration.
[NSHELP-32739]
The Citrix ADC appliance does not allow configuring certificates with a notBefore date older than 1970.
[NSHELP-32677]
The Citrix ADC appliance might crash if the following conditions are met:
- A client sends TLS1.3 early data in the Client Hello message to an SSL Insight virtual server.
- ECDHE ciphers are enabled on this virtual server.
[NSHELP-31560]
Customer applications that are not RFC compliant (RFC 7230) might fail after an upgrade to Citrix ADC 13.1. This failure occurs because of a mandatory compliance check that is enforced on the Citrix ADC appliance to comply with RFC 7230.
As part of the fix, this specific compliance check is moved under the HTTP profile parameter “-markRfc7230NonCompliantInval. “ Customers can disable this compliance check that was previously enforced.
[NSHELP-34046]
A Citrix ADC appliance might crash when both of the following conditions are met:
- The content inspection device sends a reset (RST) response to the ADC appliance and one of the Intrusion Prevention System (IPS) resources is not cleared properly.
- The same IPS resource is accessed in further transactions.
[NSHELP-33691]
In some cases, a Citrix ADC appliance might crash while processing a corrective acknowledgment sent by a server connection that is in the TIME_WAIT state.
[NSHELP-33469]
A Citrix ADC appliance might crash when it tries to access resources on the freed ICAP. This condition happens when the ICAP is in response modification (RESPMOD) mode.
[NSHELP-33403]
The Citrix ADC appliance is unable to send Logstream data from partitions consistently.
[NSHELP-33237]
The Citrix ADC appliance aborts the connection when it fails to parse the chunked value. This issue occurs when the Transfer-Encoding header has multiple values and Chunked is not the first value.
[NSHELP-32420]
The Citrix ADC appliance might crash if it processes a corrective ACK packet related to a server-side TCP connection.
[NSHELP-32290]
The Citrix ADC appliance configured with an SSL service crashes when the appliance receives a TCP FIN control packet followed by a TCP RESET control packet.
[NSHELP-31656]
When you create a Citrix Web App Firewall profile of the JSON type and try to update the Profile Settings , the JSON Error Object displays an empty list.
[NSUI-18453]
A system user account bound to a set of admin partitions might not be able to access the default partition through the NITRO APIs even if the Allow Default Partition option is enabled as part of the system global settings.
[NSHELP-33990]
The link for Citrix bot management profiles incorrectly appears in the Traffic Management > Content Switching page. When you click on that link, it renders a blank page. This issue occurs if you bind a bot policy to the content-switching virtual server.
[NSHELP-33697]
Logging on to the Citrix ADC GUI fails if your user name or domain name has a special character.
[NSHELP-33684]
When you clear the running Citrix ADC configurations, the Citrix ADC management session created by a classic TACACS configuration is disconnected even when the RBAconfig parameter is set to NO.
[NSHELP-33655]
When a user views the binding on a content switching policy, the content switching virtual server details are not displayed in the same row under Show Bindings .
[NSHELP-33149]
Support for power off option in the shutdown NITRO API
The shutdown NITRO API now supports the “-p now” option to shut down and power off a Citrix ADC appliance.
In the following example of a curl request, the shutdown NITRO API is used with the “-p now” option to shut down and power off a Citrix ADC appliance having the IP address 192.0.0.33.
curl -v -X POST -H Content-Type: application/json -u nsroot:examplepassword [http://192.0.0.33/nitro/v1/config/install?warning=yes](http://192.0.0.33/nitro/v1/config/install?warning=yes) -d '{"shutdown": {"args":"-p now"}}'
[NSHELP-32915]
After you create a profile for Citrix Web App Firewall and try to generate the configuration report of the application firewall in System > Reports , the following error appears:
“Failed to load PDF document.”
[NSHELP-32469]
In the cluster setup, the TFTP option is not displayed in the Protocol list, when creating a virtual server using the Citrix ADC GUI.
[NSHELP-32036]
On the Citrix ADC GUI, the System Log Files page (Configuration > System > Auditing > Syslog messages) and the Logs page (Configuration > Authentication > Logs) fail to load the log files.
[NSHELP-30868]
On the Citrix ADC GUI, the Saved vs Running configuration screen (System > Diagnostics) incorrectly displays HTML tags instead of displaying plain text.
[NSHELP-27169]
While viewing the policies bound to a content switching policy label in the Citrix ADC GUI, only 25 policies are displayed even though there are more policies bound to that policy label.
[NSHELP-23428]
- Known Issues
The issues that exist in release 13.1-42.47.
HDX Insight does not report an application launch failure caused by a user trying to launch an application or desktop to which the user does not have access.
[NSINSIGHT-943]
Administrators cannot perform custom logging for authentication failures that happen due to invalid credentials. This issue occurs because the Citrix ADC responder policies fail to detect errors for login failures.
[NSAUTH-11151]
ADFS proxy profile can be configured in a cluster deployment. The status for a proxy profile is incorrectly displayed as blank upon issuing the following command. show adfsproxyprofile <profile name>
Workaround: Connect to the primary active Citrix ADC in the cluster and run the show adfsproxyprofile <profile name> command. It would display the proxy profile status.
[NSAUTH-5916]
The Configure Authentication LDAP Server page on the Citrix ADC GUI becomes unresponsive if you pursue the following steps:
- The Test LDAP Reachability option is opened.
- Invalid login credentials are populated and submitted.
- Valid login credentials are populated and submitted.
Workaround: Close and open the Test LDAP Reachability option.
[NSAUTH-2147]
Packet drops are seen on a VPX instance hosted on a Citrix ADC SDX appliance if the following conditions are met:
- Throughput allocation mode is burst.
- There is a large difference between the throughput and the maximum burst capacity.
[NSHELP-21992]
If the Citrix Secure Access related registry values are greater than 1500 characters, then the log collector fails to gather the error logs.
[NSHELP-33457]
When using Windows Filtering Platform (WFP) driver, sometimes intranet access does not work after the VPN is reconnected.
[NSHELP-32978]
The Citrix Secure Access client, version 21.7.1.2 and later, fails to upgrade to later versions for users with no administrative privileges. This issue is applicable only if the Citrix Secure Access client upgrade is done from a Citrix ADC appliance.
[NSHELP-32793]
When users click the Home Page tab on the Citrix Secure Access screen for Windows, the page displays the connection refused error.
[NSHELP-32510]
On a Mac device using Chrome, the VPN extension crashes while accessing two FQDNs.
[NSHELP-32144]
In some cases, empty proxy settings in Citrix Gateway release 13.0 or 13.1 causes Citrix SSO to create improper proxy settings.
[NSHELP-31970]
Debug logging control for Citrix Secure Access client is now independent of Citrix Gateway and it can be enabled or disabled from the plug-in UI for both machine and user tunnel.
[NSHELP-31968]
Direct connections to the resources outside of the tunnel established by Citrix Secure Access might fail if there is a significant delay or congestion.
[NSHELP-31598]
Customized EPA failure log message is not displayed on the Citrix Gateway portal. Instead, the message “internal error” is displayed.
[NSHELP-31434]
Sometimes, the Windows auto logon does not work when a user logs into the windows machine in an Always-On service mode. The machine tunnel does not transition to the user tunnel and the message “Connecting…” is displayed in the VPN plug-in UI.
[NSHELP-31357, CGOP-21192, NSHELP-34211]
When Always on is configured, the user tunnel fails because of the incorrect version number (1.1.1.1) in the aoservice.exe file.
[NSHELP-30662]
Users cannot connect to the Citrix Gateway appliance after changing the ‘networkAccessOnVPNFailure’ always on profile parameter from ‘fullAccess’ to ‘onlyToGateway`.
[NSHELP-30236]
The gateway home page is not displayed immediately after the gateway plug-in establishes the VPN tunnel successfully. To fix this issue, the following registry value is introduced.
HKLMSoftwareCitrixSecure Access ClientSecureChannelResetTimeoutSeconds Type: DWORD
By default, this registry value is not set or added. When the value of “SecureChannelResetTimeoutSeconds” is 0 or not added, the fix to handle the delay does not work, which is the default behavior. Admin has to set this registry on the client to enable the fix (that is to display the home page immediately after the gateway plug-in establishes the VPN tunnel successfully).
[NSHELP-30189]
The Windows VPN client does not honor the ‘SSL close notify’ alert from the server and sends the transfer login request on the same connection.
[NSHELP-29675]
Client certificate authentication fails for Citrix SSO for macOS if there are no client certificates in the macOS Keychain.
[NSHELP-28551]
Sometimes, a user is logged out of Citrix Gateway within a few seconds when the client idle timeout is set.
[NSHELP-28404]
EPA plug-in for Windows does not use local machine’s configured proxy and connects directly to the gateway server.
[NSHELP-24848]
VPN plug-in doesn’t establish tunnel after Windows logon, if the following conditions are met:
- Citrix Gateway appliance is configured for Always On feature
- The appliance is configured for certificate-based authentication with two factor authentication “off”
[NSHELP-23584]
Sometimes while browsing through schemas, the error message “Cannot read property ‘type’ of undefined” appears.
[NSHELP-21897]
In a Citrix ADC cluster setup, HDX Insight and Gateway Insight cannot be enabled simultaneously.
[CGOP-23570]
The Windows OS option is not listed in the Expression Editor drop-down list for pre-authentication policies and authentication actions on the Citrix ADC GUI. However, if you have already configured the Widows OS scan on a previous Citrix ADC build using the GUI or the CLI, the upgrade does not impact the functionality. You can use the CLI to make changes, if required.
Workaround:
Use the CLI commands for the configuration.
- To configure advanced EPA action in nFactor authentication, use the following command. add authentication epaAction adv_win_scan -csecexpr “sys.client_expr(“sys_0_WIN-OS_NAME_anyof_WIN-10[COMMENT: Windows OS]”)”
- To configure a classic pre-authentication action, use the following commands. add aaa preauthenticationaction win_scan_action ALLOW add aaa preauthenticationpolicy win_scan_policy "CLIENT.SYSTEM('WIN-OS_NAME_anyof_WIN-10[COMMENT: Windows OS]') EXISTS" win_scan_action
[CGOP-22966]
If you would like to use Always On VPN before Windows Logon functionality, it is recommended to upgrade to Citrix Gateway 13.0 or later. This enables you to leverage the additional enhancements introduced in release 13.0 that is not available in the 12.1 release.
[CGOP-19355]
The Gateway Insight report incorrectly displays the value “Local” instead of “SAML” in the Authentication Type field for SAML error failures.
[CGOP-13584]
In a high availability setup, during Citrix ADC failover, SR count increments instead of the failover count in Citrix ADM.
[CGOP-13511]
When an ICA connection is launched from a MAC receiver version 19.6.0.32 or Citrix Virtual Apps and Desktops version 7.18, HDX Insight feature is disabled.
[CGOP-13494]
When EDT Insight feature is enabled, sometimes audio channels might fail during network discrepancy.
[CGOP-13493]
While accepting local host connections from the browser, the Accept Connection dialog box for macOS displays content in the English language irrespective of the language selected.
[CGOP-13050]
The text “Home Page” in the Citrix SSO app > Home page is truncated for some languages.
[CGOP-13049]
An error message appears when you add or edit a session policy from the Citrix ADC GUI.
[CGOP-11830]
In Outlook Web App (OWA) 2013, clicking Options under the Setting menu displays a Critical error dialog box. Also, the page becomes unresponsive.
[CGOP-7269]
In a high-availability setup, subscriber sessions of the primary node might not be synchronized to the secondary node. This is a rare case.
[NSLB-7679]
The serviceGroupName format in the entityofs trap for the service group is as follows: <service(group)name>?<ip/DBS>?<port>
In the trap format, the service group is identified by an IP address or a DBS name and port. The question mark (“?”) is used as a separator. The Citrix ADC sends the trap with the question mark (“?”). The format appears the same in the Citrix ADM GUI. This is the expected behavior.
[NSHELP-28080]
When a forced synchronization takes place in a high availability setup, the appliance executes the set urlfiltering parameter command in the secondary node. As a result, the secondary node skips any scheduled update until the next scheduled time mentioned in the “TimeOfDayToUpdateDB” parameter.
[NSSWG-849]
AlwaysOnAllow list registry does not work as expected if the registry value is greater than 2000 bytes.
[NSHELP-31836]
A Citrix ADC appliance might restart due to management CPU stagnation if connectivity issue occurs with the URL Filtering third party vendor.
[NSHELP-22409]
In a Citrix ADC BLX appliance with DPDK support, tagged VLANs are not supported for DPDK Intel i350 NIC ports. This is observed as it is a known issue present on the DPDK driver.
[NSNET-25299]
A Citrix ADC BLX appliance with DPDK might fail to restart if all of the following conditions are met:
- The Citrix ADC BLX appliance is allocated with a low number of hugepages . For example, 1G.
- The Citrix ADC BLX appliance is allocated with a high number of worker-process. For example, 28.
The issue is logged as an error message in “/var/log/ns.log”:
- BLX-DPDK:DPDK Mempool could Not be Initialized for PE-x
Note: x is a number <= number of worker-processes.
Workaround: Allocate a high number of hugepages and then restart the appliance.
[NSNET-25173]
A Citrix ADC BLX appliance in DPDK mode might take a little longer to restart because of the DPDK easiness functionality.
[NSNET-24449]
The following interface operations are not supported for Intel X710 10G (i40e) interfaces on a Citrix ADC BLX appliance with DPDK:
[NSNET-16559]
Installation of a Citrix ADC BLX appliance might fail on a Debian based Linux host (Ubuntu version 18 and later) with the following dependency error:
The following packages have unmet dependencies: blx-core-libs:i386 : PreDepends: libc6:i386 (>= 2.19) but it is not installable
Workaround: Run the following commands in the Linux host CLI before installing a Citrix ADC BLX appliance:
- dpkg --add-architecture i386
- apt-get update
- apt-get install libc6:i386
[NSNET-14602]
In some cases of FTP data connections, the Citrix ADC appliance performs only NAT operation and not TCP processing on the packets for TCP MSS negotiation. As a result, the optimal interface MTU is not set for the connection. This incorrect MTU setting results in fragmentation of packets and impacts CPU performance.
[NSNET-5233]
The Citrix ADC appliance might not generate “coldStart” SNMP trap messages after a cold restart.
[NSHELP-27917]
When an admin partition memory limit is changed in Citrix ADC appliance, the TCP buffering memory limit gets automatically set to admin partition new memory limit.
[NSHELP-21082]
Some python packages are not installed, when you downgrade the Citrix ADC appliance from 13.1-4.x version and higher versions to any of the following versions:
- Any 11.1 build
- 12.1-62.21 and earlier
- 13.0-81.x and earlier
[NSPLAT-21691]
When you delete an autoscale setting or a VM scale set from an Azure resource group, delete the corresponding cloud profile configuration from the Citrix ADC instance. Use the rm cloudprofile command to delete the profile.
[NSPLAT-4520]
In a high availability setup on Azure, upon logon to the secondary node through GUI, the first-time user (FTU) screen for autoscale cloud profile configuration appears. Workaround: Skip the screen, and log on to the primary node to create the cloud profile. The cloud profile should be always configured on the primary node.
[NSPLAT-4451]
Connections might hang if the size of processing data is more than the configured default TCP buffer size.
Workaround: Set the TCP buffer size to maximum size of data that needs to be processed.
[NSPOLICY-1267]
On a heterogeneous cluster of Citrix ADC SDX 22000 and Citrix ADC SDX 26000 appliances, there is a config loss of SSL entities if the SDX 26000 appliance is restarted.
- On the CLIP, disable SSLv3 on all the existing and new SSL entities, such as virtual server, service, service group, and internal services. For example, set ssl vserver <name> -SSL3 DISABLED .
- Save the configuration.
[NSSSL-9572]
You cannot add an Azure Key Vault object if an authentication Azure Key Vault object is already added.
[NSSSL-6478]
You can create multiple Azure Application entities with the same client ID and client secret. The Citrix ADC appliance does not return an error.
[NSSSL-6213]
The following incorrect error message appears when you remove an HSM key without specifying KEYVAULT as the HSM type. ERROR: crl refresh disabled
[NSSSL-6106]
Session Key Auto Refresh incorrectly appears as disabled on a cluster IP address. (This option cannot be disabled.)
[NSSSL-4427]
An incorrect warning message, “Warning: No usable ciphers configured on the SSL vserver/service,” appears if you try to change the SSL protocol or cipher in the SSL profile.
[NSSSL-4001]
An expired session ticket is honored on a non-CCO node and on an HA node after an HA failover.
[NSSSL-3184, NSSSL-1379, NSSSL-1394]
High RTT is observed for a TCP connection if the following condition is met:
- a high maximum congestion window (>4 MB) is set
- TCP NILE algorithm is enabled
For a Citrix ADC appliance to use the NILE algorithm for congestion control, the conditions must exceed the slow start threshold, which is coupled with the maximum congestion window
So, until the maximum configured congestion window is reached, the Citrix ADC continues to accept data and ends up with high RTT.
[NSHELP-31548]
The MAX_CONCURRENT_STREAMS value is set to 100 by default if the appliance does not receive the max_concurrent_stream settings frame from the client.
[NSHELP-21240]
The mptcp_cur_session_without_subflow counters incorrectly decrement to a negative value instead of zero.
[NSHELP-10972]
In rare case scenarios, the streams that were created before HTTP/2 WebSocket stream was created might get terminated when the WebSocket’s server-side connection closes.
This issue occurs because the Citrix ADC appliance does not support connection multiplexing for HTTP/2 WebSocket.
Workaround: Disable connection multiplexing for the related HTTP2 profile by using the following command:
set httpProfile <name> [-conMultiplex ( ENABLED | DISABLED )]
[NSBASE-17449]
In a cluster deployment, if you run “force cluster sync” command on a non-CCO node, the ns.log file contains duplicate log entries.
[NSBASE-16304, NSGI-1293]
When you install Citrix ADM on a Kubernetes cluster, it does not work as expected because the required processes might not come up.
Workaround : Reboot the Management pod.
[NSBASE-15556]
Client IP and Server IP are inverted in HDX Insight SkipFlow record when LogStream transport type is configured for Insight.
[NSBASE-8506]
In Citrix ADC GUI, the “Help” link present under the “Dashboard” tab is broken.
[NSUI-14752]
Create/Monitor CloudBridge Connector wizard might become unresponsive or fails to configure a cloudbridge connector.
Workaround: Configure cloudbridge connectors by adding IPSec profiles, IP tunnels, and PBR rules by using the Citrix ADC GUI or CLI.
[NSUI-13024]
If you create an ECDSA key by using the GUI, the type of curve is not displayed.
[NSUI-6838]
In a high availability setup, VPN user sessions get disconnected if the following condition is met:
- If two or more successive manual HA failover operations are performed when HA synchronization is in progress.
Workaround: Perform successive manual HA failover only after the HA synchronization is completed (Both the nodes are in Sync success state).
[NSHELP-25598]
If you (system administrator) perform all the following steps on a Citrix ADC appliance, the system users might fail to log in to the downgraded Citrix ADC appliance.
- 13.0 52.24 build
- 12.1 57.18 build
- 11.1 65.10 build
- Add a system user, or change the password of an existing system user, and save the configuration, and
- Downgrade the Citrix ADC appliance to any older build.
To display the list of these system users by using the CLI: At the command prompt, type:
query ns config -changedpassword [-config <full path of the configuration file (ns.conf)>]
Workaround: To fix this issue, use one of the following independent options:
- If the Citrix ADC appliance is not yet downgraded (step 3 in above mentioned steps), downgrade the Citrix ADC appliance using a previously backed up configuration file (ns.conf) of the same release build.
- Any system administrator whose password was not changed on the upgraded build, can log in to the downgraded build, and update the passwords for other system users.
- If none of the above options work, a system administrator can reset the system user passwords.
For more information, see /en-us/citrix-adc/13/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-reset-default-amin-pass-tsk.html .
[NSCONFIG-3188]
In this article
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select Do Not Agree to exit.
Machine Translation Feedback Form

A server is configured with two network cards. To utilize th
Clustering
NIC teaming
VLAN tagging
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()
- A、network or subnetwork IP address
- B、broadcast address on the network
- C、IP address leased to the LAN
- D、IP address used by the interfaces
- E、manually assigned address to the clients
- F、designated IP address to the DHCP server
Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address. What should you modify on Server1?()
- A、The Advanced settings of Res_Server2
- B、The MAC address of Res Server2
- C、The Network Access Protection Settings of Scope1
- D、The Name Protection settings of Scope1
Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()
A. SHA not responding to NAP client
B. SHA unable to contact required services
C. SHV not responding
D. SHV unable to contact required services
An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface. How is it accomplished?()
- A、Enable routed on the server
- B、Enable gated on the server
- C、Enable ipforwarding on the server
- D、Set network options back to default
A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()
- A、NIC filtering is enabled.
- B、Port security is configured.
- C、NIC is not in promiscuous mode.
- D、NIC is in promiscuous mode.
A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()
- A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.
- B、For the two vlans to communicate, a network statement for each subinterface needs to be added to the OSPF configuration.
- C、Direct inter-vlan communication does not require OSPF
- D、OSPF cannot be used if router-on-a-stick is configured on the router
A server is configured with two network cards. To utilize the bandwidth of both network cards at the same time without assigning more than one IP address, which of the following load balancing techniques should be used?()
- A、Clustering
- B、NIC teaming
- D、VLAN tagging
A. network or subnetwork IP address
B. broadcast address on the network
C. IP address leased to the LAN
D. IP address used by the interfaces
E. manually assigned address to the clients
F. designated IP address to the DHCP server
A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()
- A、 Clustering
- B、 NIC teaming
- D、 VLAN tagging
Your network consists of a single Active Directory domain and a single network segment. All client computers are configured to receive their IP configurations automatically.You deploy two DHCP servers named Server1 and Server2. Each DHCP server has one scope. Users report IP address conflicts.You need to ensure that clients receive unique addresses. What should you do on Server1 and Server2?()
- A、Create a superscope.
- B、Create a multicast scope.
- C、Configure Network Load Balancing.
- D、Modify the address range for the scopes on both servers.
单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A SHA not responding to NAP clientB SHA unable to contact required servicesC SHV not respondingD SHV unable to contact required services
单选题Your network contains two Windows Server Update Services (WSUS) servers named Server1 and Server2. Server1 is a member of a domain named contoso.com. Server2 is a standalone server. Server2 is configured as an autonomous downstream server.You need to ensure that all updates approved on Server1 are automatically approved on Server2. Which options should you modify?()A Automatic ApprovalsB Products and ClassificationsC Synchronization ScheduleD Update Source and Proxy Server
多选题Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()AInstall the Routing and Remote Access Services role service.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPv4 Router Routing and Remote Access option.
多选题Your network uses ipv4. You install a server that runs windows server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform? ()AInstall the routing and remote access role.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPV4 router routing and remote access option.
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company. You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers. You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails. What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.
单选题Your network consists of a single Active Directory domain and two network segments named Subnet1 and Subnet2.You deploy a server named Server1 that runs Routing and Remote Access. Server1 is configured as a router between the two network segments.You deploy a DHCP server on Subnet1. You configure a DHCP scope for each network segment.Client computers that run Windows XP Professional Service Pack 3 (SP3) are deployed on both network segments and are configured to receive IP configurations dynamically.You discover that all client computers on Subnet2 have Automatic Private IP Addressing (APIPA) addresses.You need to ensure that all client computers on Subnet2 receive their IP configurations from the DHCP server. What should you do in Routing and Remote Access?()A Disable IP Routing. B Create a static route. C Enable demand-dial routing. D Enable a DHCP Relay Agent.
Your network uses IPv4.You install a server that runs Windows Server 2008 R2 at a branch office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform?()A、Install the Routing and Remote Access Services role service.B、Run the netsh ras ip set access ALL command.C、Run the netsh interface ipv4 enable command.D、Enable the IPv4 Router Routing and Remote Access option.
单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2. Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address. What should you modify on Server1?()A The Advanced settings of Res_Server2B The MAC address of Res Server2C The Network Access Protection Settings of Scope1D The Name Protection settings of Scope1
Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?() A、 Install the Routing and Remote Access role.B、 Run the netsh ras ip set access ALL commandC、 Run the netsh interface ipv4 enable commandD、 Enable the IPv4 Router Routing and Remote Access option
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
- 病案信息技术(师)专业知识

IMAGES
VIDEO
COMMENTS
You can set the types of IP addresses that clients can use with your load balancer. The following are the IP address types: ipv4 Clients must connect to the load balancer using IPv4 addresses (for example, 192.0.2.1). IPv4 enabled load balancers (both internet-facing and internal) support TCP, UDP, TCP_UDP, and TLS listeners. dualstack
Add a new node with an Elastic IP address to an existing Network Load Balancer Open the Amazon EC2 console. Choose the Region where your Network Load Balancer is located. Under Load Balancing, choose Load Balancers. Select your Network Load Balancer. Choose Actions, and then choose Edit Subnets.
To create and configure a Network Load Balancer to forward HTTP and HTTPS traffic to your Application Load Balancer, follow these steps: 1. Open the Amazon EC2 console. 2. In the navigation pane, expand Load Balancing, and then choose Load Balancers. 3. Choose Create a Load Balancer. 4.
You'll select the IP address you created in the prerequisites as the frontend IP of the load balancer. Sign in to the Azure portal. In the search box at the top of the portal, enter Load balancer. In the search results, select Load balancers. Select + Create. In the Basics tab of Create Load balancer, enter or select the following information:
Assign a front-end IP address, commonly referred to as a Virtual IP (VIP). The VIP must be from an unused IP in one of the logical network IP pools given to the load balancer manager.
It created 2 static IP Addresses and a static DNS pointing to my Application load balancer. Configuring Global Accelerator Set listeners as TCP port 80, 443 Select your load balancer endpoint ( AWS Global Accelerator Configuration) Add cname record for your dns pointing to the static dns it created (mywebsite.com > globalacceleratorDNS.com).
Then, you need to connect both ONTs to the load balancer with Ethernet cables, and configure the load balancer to handle the two connections, and to manage the PPPoE authentication for each ISP. Once the load balancer is set up, you can connect your devices like your server or PC to it, and they'll get an IP address from the load balancer.
Activating the Load Balancer. Go to the Networking tab and click on Load Balancing in the Network Services section on the left. Then go to the Load Balancers tab and click ADD LOAD BALANCER. Enter loadbalancer-on-t1 below Name, select ovh-T1-gw under Attachment and click SAVE. Click NO.
A public network load balancer has a public IP address that is accessible from the internet. A private network load balancer has an IP address from the hosting subnet, which is visible only within your VCN. You can configure multiple listeners for an IP address to load balance Layer 4 (TCP/UDP/ICMP) traffic.
Hi, I have a load-balancer on my WSL with a dedicate IP address on port 80, this IP is not the same as my WSL IP (WSL IP is accessible from the windows). Is there any way to access this IP on port ...
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field. Use case 7: Configure load balancing in DSR mode by using IP Over IP. Use case 8: Configure load balancing in one-arm mode. Use case 9: Configure load balancing in the inline mode. Use case 10: Load balancing of intrusion detection system servers
Zaref what you really should do is figure out which base ip you want to use. For example 192.168.1.110 then subnet the network so that computer 2, 3, 4, etc. Will share a different segment of the same network. Check out this youtube video ( IP Addresses and Subnetting - YouTube) which will teach you more than you need to know about it.
Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field. Use case 7: Configure load balancing in DSR mode by using IP Over IP. Use case 8: Configure load balancing in one-arm mode. Use case 9: Configure load balancing in the inline mode. Use case 10: Load balancing of intrusion detection system servers
When a DHCP server is configured, which two IP addresses should never be assignable to hosts? () A、network or subnetwork IP address; B、broadcast address on the network; C、IP address leased to the LAN; D、IP address used by the interfaces; E、manually assigned address to the clients; F、designated IP address to the DHCP server ...