Network Load Balancers

A load balancer serves as the single point of contact for clients. Clients send requests to the load balancer, and the load balancer sends them to targets, such as EC2 instances, in one or more Availability Zones.

To configure your load balancer, you create target groups , and then register targets with your target groups. Your load balancer is most effective if you ensure that each enabled Availability Zone has at least one registered target. You also create listeners to check for connection requests from clients and route requests from clients to the targets in your target groups.

Network Load Balancers support connections from clients over VPC peering, AWS managed VPN, AWS Direct Connect, and third-party VPN solutions.

Load balancer state

Load balancer attributes, ip address type, availability zones, cross-zone load balancing, deletion protection, connection idle timeout.

A load balancer has one of the following states:

The load balancer is being set up.

The load balancer is fully set up and ready to route traffic.

The load balancer couldn't be set up.

A load balancer has the following attributes:

Indicates whether access logs stored in Amazon S3 are enabled. The default is false .

The name of the Amazon S3 bucket for the access logs. This attribute is required if access logs are enabled. For more information, see Bucket requirements .

The prefix for the location in the Amazon S3 bucket.

Indicates whether deletion protection is enabled. The default is false .

Blocks internet gateway (IGW) access to the load balancer, preventing unintended access to your internal load balancer through an internet gateway. It is set to false for internet-facing load balancers and true for internal load balancers. This attribute does not prevent non-IGW internet access (for example, through peering, Transit Gateway, AWS Direct Connect, or AWS VPN).

Indicates whether cross-zone load balancing is enabled. The default is false .

You can set the types of IP addresses that clients can use with your load balancer. The following are the IP address types:

Clients must connect to the load balancer using IPv4 addresses (for example, 192.0.2.1). IPv4 enabled load balancers (both internet-facing and internal) support TCP, UDP, TCP_UDP, and TLS listeners.

Clients can connect to the load balancer using both IPv4 addresses (for example, 192.0.2.1) and IPv6 addresses (for example, 2001:0db8:85a3:0:0:8a2e:0370:7334). Dualstack enabled load balancers (both internet-facing and internal) support TCP and TLS listeners.

Dualstack load balancer considerations

The load balancer communicates with targets based on the IP address type of the target group.

When you enable dualstack mode for the load balancer, Elastic Load Balancing provides an AAAA DNS record for the load balancer. Clients that communicate with the load balancer using IPv4 addresses resolve the A DNS record. Clients that communicate with the load balancer using IPv6 addresses resolve the AAAA DNS record.

Access to your internal dualstack load balancers through the internet gateway is blocked to prevent unintended internet access. However, this does not prevent non-IWG internet access (such as, through peering, Transit Gateway, AWS Direct Connect, or AWS VPN).

For more information on load balancer IP address types, see Update the address type .

You enable one or more Availability Zones for your load balancer when you create it. If you enable multiple Availability Zones for your load balancer, this increases the fault tolerance of your applications. You can't disable Availability Zones for a Network Load Balancer after you create it, but you can enable additional Availability Zones.

When you enable an Availability Zone, you specify one subnet from that Availability Zone. Elastic Load Balancing creates a load balancer node in the Availability Zone and a network interface for the subnet (the description starts with "ELB net" and includes the name of the load balancer). Each load balancer node in the Availability Zone uses this network interface to get an IPv4 address. Note that you can view this network interface but you can't modify it.

When you create an internet-facing load balancer, you can optionally specify one Elastic IP address per subnet. If you do not choose one of your own Elastic IP addresses, Elastic Load Balancing provides one Elastic IP address per subnet for you. These Elastic IP addresses provide your load balancer with static IP addresses that will not change during the life of the load balancer. You can't change these Elastic IP addresses after you create the load balancer.

When you create an internal load balancer, you can optionally specify one private IP address per subnet. If you do not specify an IP address from the subnet, Elastic Load Balancing chooses one for you. These private IP addresses provide your load balancer with static IP addresses that will not change during the life of the load balancer. You can't change these private IP addresses after you create the load balancer.

Requirements

For internet-facing load balancers, the subnets that you specify must have at least 8 available IP addresses. For internal load balancers, this is only required if you let AWS select a private IPv4 address from the subnet.

You can't specify a subnet in a constrained Availability Zone. The error message is "Load balancers with type 'network' are not supported in az_name ". You can specify a subnet in another Availability Zone that is not constrained and use cross-zone load balancing to distribute traffic to targets in the constrained Availability Zone.

You can't specify a subnet in a Local Zone.

After you enable an Availability Zone, the load balancer starts routing requests to the registered targets in that Availability Zone. Your load balancer is most effective if you ensure that each enabled Availability Zone has at least one registered target.

To add Availability Zones using the console

Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/ .

In the navigation pane, choose Load Balancers .

Select the name of the load balancer to open its details page.

On the Network mapping tab, choose Edit subnets .

To enable an Availability Zone, select the check box for that Availability Zone. If there is one subnet for that Availability Zone, it is selected. If there is more than one subnet for that Availability Zone, select one of the subnets. Note that you can select only one subnet per Availability Zone.

For an internet-facing load balancer, you can select an Elastic IP address for each Availability Zone. For an internal load balancer, you can assign a private IP address from the IPv4 range of each subnet instead of letting Elastic Load Balancing assign one.

Choose Save changes .

To add Availability Zones using the AWS CLI

Use the set-subnets command.

By default, each load balancer node distributes traffic across the registered targets in its Availability Zone only. If you turn on cross-zone load balancing, each load balancer node distributes traffic across the registered targets in all enabled Availability Zones. You can also turn on cross-zone load balancing at the target group level. For more information, see Cross-zone load balancing for target groups and Cross-zone load balancing in the Elastic Load Balancing User Guide .

To prevent your load balancer from being deleted accidentally, you can enable deletion protection. By default, deletion protection is disabled for your load balancer.

If you enable deletion protection for your load balancer, you must disable it before you can delete the load balancer.

To enable deletion protection using the console

On the Attributes tab, choose Edit .

Under Configuration , turn on Deletion protection .

To disable deletion protection using the console

To enable or disable deletion protection using the aws cli.

Use the modify-load-balancer-attributes command with the deletion_protection.enabled attribute.

For each TCP request that a client makes through a Network Load Balancer, the state of that connection is tracked. If no data is sent through the connection by either the client or target for longer than the idle timeout, the connection is closed. If a client or a target sends data after the idle timeout period elapses, it receives a TCP RST packet to indicate that the connection is no longer valid.

We set the idle timeout value for TCP flows to 350 seconds. You can't modify this value. Clients or targets can use TCP keepalive packets to reset the idle timeout. Keepalive packets sent to maintain TLS connections can't contain data or payload.

When a TLS listener receives a TCP keepalive packet from either a client or a target, the load balancer generates TCP keepalive packets and sends them to both the front-end and back-end connections every 20 seconds. You can't modify this behavior.

While UDP is connectionless, the load balancer maintains UDP flow state based on the source and destination IP addresses and ports, ensuring that packets that belong to the same flow are consistently sent to the same target. After the idle timeout period elapses, the load balancer considers the incoming UDP packet as a new flow and routes it to a new target. Elastic Load Balancing sets the idle timeout value for UDP flows to 120 seconds.

EC2 instances must respond to a new request within 30 seconds in order to establish a return path.

Each Network Load Balancer receives a default Domain Name System (DNS) name with the following syntax: name - id .elb. region .amazonaws.com. For example, my-load-balancer-1234567890abcdef.elb.us-east-2.amazonaws.com.

If you'd prefer to use a DNS name that is easier to remember, you can create a custom domain name and associate it with the DNS name for your load balancer. When a client makes a request using this custom domain name, the DNS server resolves it to the DNS name for your load balancer.

First, register a domain name with an accredited domain name registrar. Next, use your DNS service, such as your domain registrar, to create a DNS record to route requests to your load balancer. For more information, see the documentation for your DNS service. For example, if you use Amazon Route 53 as your DNS service, you create an alias record that points to your load balancer. For more information, see Routing traffic to an ELB load balancer in the Amazon Route 53 Developer Guide .

The load balancer has one IP address per enabled Availability Zone. These are the addresses of the load balancer nodes. The DNS name of the load balancer resolves to these addresses. For example, suppose that the custom domain name for your load balancer is example.networkloadbalancer.com . Use the following dig or nslookup command to determine the IP addresses of the load balancer nodes.

Linux or Mac

The load balancer has DNS records for its load balancer nodes. You can use DNS names with the following syntax to determine the IP addresses of the load balancer nodes: az . name - id .elb. region .amazonaws.com.

Warning

To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions.

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of it.

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Configure the Software Load Balancer for Load Balancing and Network Address Translation (NAT)

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Azure Stack HCI, versions 21H2 and 20H2

You can use this topic to learn how to use the Software Defined Networking (SDN) software load balancer (SLB) to provide outbound network address translation (NAT), inbound NAT, or load balancing between multiple instances of an application.

Software Load Balancer overview

The SDN Software Load Balancer (SLB) delivers high availability and network performance to your applications. It is a Layer 4 (TCP, UDP) load balancer that distributes incoming traffic among healthy service instances in cloud services or virtual machines defined in a load balancer set.

Configure SLB to do the following:

Example: Create a public VIP for load balancing a pool of two VMs on a virtual network

In this example, you create a load balancer object with a public VIP and two VMs as pool members to serve requests to the VIP. This example code also adds an HTTP health probe to detect whether one of the pool members becomes non-responsive.

Prepare the load balancer object.

The VIP must be from an unused IP in one of the logical network IP pools given to the load balancer manager.

Allocate a back-end address pool, which contains the Dynamic IPs (DIPs) that make up the members of the load-balanced set of VMs.

The health probe must receive an HTTP response code of 200 for 11 consecutive queries for the probe to consider the back-end IP to be healthy. If the back-end IP is not healthy, it does not receive traffic from the load balancer.

Do not block traffic to or from the first IP in the subnet for any Access Control Lists (ACLs) that you apply to the back-end IP because that is the origination point for the probes.

Use the following example to define a health probe.

Use the following example to define a load balancing rule:

Use the following example to add the load balancer configuration to Network Controller:

Follow the next example to add the network interfaces to this back-end pool.

Example: Use SLB for outbound NAT

In this example, you configure SLB with a back-end pool for providing outbound NAT capability for a VM on a virtual network's private address space to reach outbound to the internet.

Create the load balancer properties, front-end IP, and back-end pool.

Define the outbound NAT rule.

Add the load balancer object in Network Controller.

Follow the next example to add the network interfaces to which you want to provide internet access.

Example: Add network interfaces to the back-end pool

In this example, you add network interfaces to the back-end pool. You must repeat this step for each network interface that can process requests made to the VIP.

You can also repeat this process on a single network interface to add it to multiple load balancer objects. For example, if you have a load balancer object for a web server VIP and a separate load balancer object to provide outbound NAT.

Get the load balancer object containing the back-end pool to add a network interface.

Get the network interface and add the backendaddress pool to the loadbalancerbackendaddresspools array.

Put the network interface to apply the change.

Example: Use the Software Load Balancer for forwarding traffic

If you need to map a Virtual IP to a single network interface on a virtual network without defining individual ports, you can create an L3 forwarding rule. This rule forwards all traffic to and from the VM via the assigned VIP contained in a PublicIPAddress object.

If you defined the VIP and DIP as the same subnet, then this is equivalent to performing L3 forwarding without NAT.

This process does not require you to create a load balancer object. Assigning the PublicIPAddress to the network interface is enough information for the Software Load Balancer to perform its configuration.

Create a public IP object to contain the VIP.

Assign the PublicIPAddress to a network interface.

Example: Use the Software Load Balancer for forwarding traffic with a dynamically allocated VIP

This example repeats the same action as the previous example, but it automatically allocates the VIP from the available pool of VIPs in the load balancer instead of specifying a specific IP Address.

Query the PublicIPAddress resource to determine which IP Address was assigned.

The IpAddress property contains the assigned address. The output will look similar to this:

Example: Remove a PublicIP address that is being used for forwarding traffic and return it to the VIP pool

This example removes the PublicIPAddress resource that was created by the previous examples. Once the PublicIPAddress is removed, the reference to the PublicIPAddress will automatically be removed from the network interface, the traffic will stop being forwarded, and the IP address will be returned to the Public VIP pool for re-use.

Remove the PublicIP

Submit and view feedback for

Additional resources

Collectives™ on Stack Overflow

Find centralized, trusted content and collaborate around the technologies you use most.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

Assigning Static IP Address to AWS Load Balancer

How can I assign a static IP address to a ELB. Seems like I cannot.

Some articles online asks to create a Route 53 record but this requires changing CNAME of domain which also redirect email traffic. I just want to change A record not CNAME.

Some articles also mention that I can use a EC2 instance as a reverse proxy. But will a single proxy be able to handle a lot of traffic?

Any solution for this?

Narayan Prusty's user avatar

6 Answers 6

AWS' Elastic Load Balancer is actually elastic on two levels as described here: http://shlomoswidler.com/2009/07/elastic-in-elastic-load-balancing-elb.html

The first level is the load balancer itself. In order to make sure that ELB can scale to whatever volume you have and burst to whatever volume you suddenly encounter, AWS assigns a 'static' DNS hostname (e.g. MyDomainELB-918273645.us-east-1.elb.amazonaws.com). That hostname points to multiple IP addresses. You can see that (from a command line) by running

The second form of elasticity within the ELB is obviously then ELB directing the query to one of your EC2 instances in the pool.

So, you can see that trying to assign a static IP address to the load balancer would be self-defeating.

Using an EC2 instance as a reverse proxy would also seem self-defeating as you would then create a bottleneck before even getting to the ELB. Might as well just create your own load balancer.

The recommended solution (which you've pointed out) is to create a CNAME that points to the ELB hostname (which won't change).

i.e. my-app.mycompany.com -> MyDomainELB-918273645.us-east-1.elb.amazonaws.com

This would allow you to integrate your scalable application, behind the ELB within your domain.

I'm not sure I fully understand why you cannot create a CNAME in your DNS or what that has to do with directing email traffic, can you explain?

Brooks's user avatar

A new feature in AWS (I believe it was announced at Re:Invent 2017) allows for static IPs with Network Load Balancers (NLB). NLB can only handle layer 4 (TCP) and not HTTP specifics (layer 7).

You can assign one Elastic IP address per availability zone.

For details see the AWS blog post or the NLB documentation .

The "Classic Load Balancer" and "Application Load Balancer" do not support static IPs. If you need a feature only provided by those, you have to fall back to the CNAME solution described above.

Bernhard's user avatar

A blog was recently published by AWS support on this topic leveraging NLB to provide static IP to Classic and Application load balancer - https://aws.amazon.com/blogs/networking-and-content-delivery/using-static-ip-addresses-for-application-load-balancers/

Summary of solution as described by the post

We end up with a TCP listener on a NLB that accepts traffic and forwards it to an internal ALB. The ALB terminates TLS, examines HTTP headers, and routes requests based on your configured rules to target groups with your instances, servers, or containers. The AWS Lambda function keeps everything in sync by watching the ALB for IP address changes and updating the NLB target group. In the end we’ll have a few static IP addresses that are easy for whitelisting, and we won’t lose any of the benefits of ALB. Note that we will be sending all of the traffic through two load balancers

Aditya's user avatar

I found setting up AWS Global Accelerator very straight forward and simple. It created 2 static IP Addresses and a static DNS pointing to my Application load balancer.

Configuring Global Accelerator

Set listeners as TCP port 80, 443

Select your load balancer endpoint ( AWS Global Accelerator Configuration )

Add cname record for your dns pointing to the static dns it created (mywebsite.com > globalacceleratorDNS.com). If any client needs to whitelist, give them the 2 static IP it created

Pricing is $18 per month + a few pennies per GB of data transfer. I'm pretty sure its cheaper than the NLB, Nat Gateway, Elastic IP setup.

https://docs.aws.amazon.com/global-accelerator/latest/dg/about-accelerators.html

C Rudolph's user avatar

For little traffic, it might be a solution to set up an EC2 Instance running Nginx as a forwarding proxy.

So you can use the EC2's static IP Address to forward your traffic resolving the ALB's DNS name.

However, it's a kind of a hack, but using a Global Accelerator or an NLB seems to me also like a hack :-)

Stefan M's user avatar

Unlike the Network Load Balancer, the Application Load Balancer (ALB) does not support Elastic IPs, but that's not the worst part. If you use Route 53 together with the ALB, the DNS automatically sets the TTL to 60 seconds. This appears to be causing problems for our institutional - mainly government - customers running older Windows DNS servers. They just can't keep up with the ALB's Listener changing its public-facing IP on such a short notice. Older DNS infrastructure is either not respecting or is not capable of handling such aggressive TTL.

While I don't like it, AWS recommends to put a Network Load Balancer in front of the Application Load Balancer, per here: https://aws.amazon.com/blogs/networking-and-content-delivery/using-static-ip-addresses-for-application-load-balancers/

Slawomir's user avatar

Your Answer

Sign up or log in, post as a guest.

Required, but never shown

By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy

Not the answer you're looking for? Browse other questions tagged amazon-web-services amazon-ec2 amazon-elb amazon-vpc or ask your own question .

Hot Network Questions

assign ip address to network load balancer

Your privacy

By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .

Need help setting up a load balancer on a home network with 2 ONTs from 2 separate ISPs

assign ip address to network load balancer

I've been troubleshooting for a couple of days on how to do this and I actually got my Internet to work with some janky setup. It was working when both of the ONTs were in their default CFGs and the load balancer were just acting as a client getting a dynamic IP, but that's not what I want.

Both of the ISP provide me with a static public IP and IPV6.

I wanna be able to host game servers and such after the load balancer, so in case one of the connections go down the other one is still effective.

From what I've been researching I need to set both the ONTs as bridge and do the PPPoE authentication on the load balancer, but I can't get that to work.

And after messing around for 2 days, none of my ports in all devices do Gigabit anymore. I'm really confused and have no idea what I should do. Anything I Google seems useful nor related at all to what I need to do.

I know it's really unlikely for someone to just help me online for free, but if that's the case I can send my discord. Also, if you wanna try to help me thru comments on this thread, let me know. I can post all the models of the devices and their settings (without personal info) to clarify better what's going on.

Just to summarize, I have two ONTs from separate ISP's that I need to connect on a load balancer that then connects to my home server/pc/ap/etc...

Thanks for taking your time to read this and I hope you can help me!

Edit1: BTW, I'm connected to the internet rn thru a direct cable to one of my ONTs.

Shut up, get back into the discord call!

Cake day

Setting up a load balancer at home with two separate Internet Service Providers can be complicated, but it's possible. Here's what you need to do:

First, you need to configure both of your Internet boxes (ONTs) to bridge mode, which is like turning them into simple modems that just pass traffic to the load balancer. Then, you need to connect both ONTs to the load balancer with Ethernet cables, and configure the load balancer to handle the two connections, and to manage the PPPoE authentication for each ISP.

Once the load balancer is set up, you can connect your devices like your server or PC to it, and they'll get an IP address from the load balancer. You should test everything to make sure it's working correctly, and if it's not, you might want to check the cables or network settings on your devices.

That is exactly what I've been trying to do, but I can`t seem to get the load balancer to do the pppoe authentication. I got the password from the config file of the router and decrypted it using an online tool. Is it possible that it's wrong?

Also, if I set the ONT to bridge mode, dos it still have an effective firewall or do I have to handle everything on the load balancer?

About Community

Ranked by Size

Load Balancing configuration in NSX

Learn how to configure Load Balancing

Last updated 27th February 2023

NSX allows load balancing on a level 4 (TCP or UDP) layer or level 7 (HTTP or HTTPS) layer.

Learn how to set up load balancing in NSX

OVHcloud provides services for which you are responsible, with regard to their configuration and management. It is therefore your responsibility to ensure that they work properly.

This guide is designed to assist you as much as possible with common tasks. However, we recommend contacting a specialist provider if you experience any difficulties or doubts when it comes to managing, using or setting up a service on a server.

Requirements

Instructions

Creating the tag on both virtual machines.

To simplify the administration of the Load Balancer, we will use a tag on the two virtual machines in the future server pool.

In the NSX interface go to the Inventory tab and click on Virtual Machines on the left.

Then click on the three vertical dots to the left of the first virtual machine and choose Edit from the menu.

01 Add tag to VMs 01

Replace Tag with loadbl , then click Add Item(s) loadbl below.

01 Add tag to VMs 02

Change Scope to nginx , then click Add Item(s) nginx below.

01 Add tag to VMs 03

Click the + sign next to your tag to add it to your virtual machine.

01 Add tag to VMs 04

The tag appears, click SAVE .

01 Add tag to VMs 05

Click the three vertical dots to the left of the second virtual machine and choose Edit from the menu.

01 Add tag to VMs 06

Replace Tag with load and select the Tag: loadbl Scope: nginx that just appeared below.

01 Add tag to VMs 07

Click the + sign next to your tag to add it to your second virtual machine.

01 Add tag to VM 08

Click SAVE to add the tag to your virtual machine.

01 Add tag to VM 09

Stay on Inventory , click Tags and click on the number to the right of the marker you created.

02 Show member tag 01

You can see your two virtual machines using the same tag.

02 Show member tag 02

Add group with created tag

Select Groups on the left and click ADD GROUP .

03 ADD GROUP 01

Enter nginx-server below Name and click SET under Compute Members .

03 ADD GROUP 02

Click + ADD CRITERION .

03 ADD GROUP 03

Keep Virtual Machine Tag Equals and select your loadbl tag with its nginx scope and click APPLY .

03 ADD GROUP 04

Click SAVE .

03 ADD GROUP 05

Click View Members to the right of the group.

03 ADD GROUP 06

The list of virtual machines is automatically added to the group based on the criteria in your tag.

03 ADD GROUP 07

Activating the Load Balancer

Go to the Networking tab and click on Load Balancing in the Network Services section on the left.

Then go to the Load Balancers tab and click ADD LOAD BALANCER .

04 Activate Load Balancer 01

Enter loadbalancer-on-t1 below Name , select ovh-T1-gw under Attachment and click SAVE .

04 Activate Load Balancer 02

The Load Balancer is created and activated on the ovh-T1-gw gateway.

04 Activate Load Balancer 04

Server pool creation

Go to the Server Pools tab and click ADD SERVER POOL .

05 Add server pool 01

Enter sp-nginx below Name and click Select Members under Members/Group .

05 Add server pool 02

Click Select a group and choose the nginx-servers group you created then click APPLY .

05 Add server pool 03

Click SAVE to apply your changes.

05 Add server pool 04

Your server pool is created with your two virtual machines that are members of the group.

05 Add server pool 05

Virtual server creation

Your server pool is created with your two virtual machines which are members of the group. Go to the Virtual Servers tab and click on ADD VIRTUAL SERVER .

06 Add virtual Server 01

Select L4 TCP .

06 Add virtual Server 02

Fill in this information :

Then click SAVE .

06 Add virtual Server 03

Your virtual server is active. If you connect from a machine that uses a segment on a gateway of type Tier-1 Gateways with this URL http://192.168.102.3 , the Load Balancer will connect to one of the two virtual machines configured in your group.

Adding a NAT rule

Go to NAT in the Network Services section on the left and click ADD NAT RULE .

07 ADD DNAT TO VIRTUAL SERVER 01

Enter to-lb-virtual-server in your rule Name with these options :

07 ADD DNAT TO VIRTUAL SERVER 02

Your rule is active. If you click on http://virtual-ip-address-on-T0 you will be connected to your virtual server which will redirect the flow to one of the servers in your group.

07 ADD DNAT TO VIRTUAL SERVER 03

Getting started with NSX

Segment management in NSX

Implementing NAT for port redirections in NSX

VMware NSX Load Balancer documentation

Join our community of users on https://community.ovh.com/en/ .

Did you find this guide useful?

Please feel free to give any suggestions in order to improve this documentation.

Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.

Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.

Thank you. Your feedback has been received.

These guides might also interest you...

 alt=

OVHcloud Community

Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.

Oracle Cloud Infrastructure Documentation

Describes about how network load balancers can provide automated traffic distribution from one entry point to multiple servers in a backend set.

The Flexible Network Load Balancer service enables you to create a public or private network load balancer in your VCN. A public network load balancer has a public IP address that is accessible from the internet. A private network load balancer has an IP address from the hosting subnet, which is visible only within your VCN. You can configure multiple listeners for an IP address to load balance Layer 4 (TCP/UDP/ICMP) traffic. Both public and private load balancers can route data traffic to any backend server that is inside the VCN.

To accept traffic from the internet, create a public network load balancer. The service assigns it a public IP address that serves as the entry point for incoming traffic. Associate the public IP address with a friendly DNS name through any DNS vendor.

A public network load balancer can be either regional or availability domain-specific in scope. The subnet in which the network load balancer is created determines this scope. A public network load balancer created in a regional subnet is regional in scope. A public network load balancer created in an availability domain-specific subnet is availability domain-specific in scope. Network Load Balancer ensures high availability and accessibility even when one of the availability domains has an outage.

You cannot specify a private subnet for your public load balancer. See Public vs. Private Subnets for more information.

To isolate your network load balancer from the internet and simplify your security posture, create a private network load balancer. The network load balancer assigns it a private IP address that serves as the entry point for incoming traffic. The network load balancer is accessible only from within the VCN that contains the host regional subnet, or as further restricted by your security rules.

The network load balancer does not directly respond to a client ICMP or TCP/UDP ping packet. Instead, the network load balancer directs the packet to a backend server in accordance with the load balancing policy. The backend server then returns a response to the client.

Only private network load balancers support the ICMP protocol. The network load balancer must also have the Source/Destination Header (IP, Port) Preservation feature enabled. If this feature is not enabled, or if you are using a public network load balancer, you can check your network load balancer's reachability through available listener-enabled protocols (TCP/UDP).

Use a private network load balancer as the next-hop private IP route target with VCN transit routing. This method enables the network load balancer to operate as a bump-in-the-wire layer 3 transparent load balancer to which packets are forwarded along the path to their final destination. Transit routing refers to a network topology in which your on-premises network uses a connected virtual cloud network (VCN) to reach Oracle resources or services beyond that VCN. Connect the on-premises network to the VCN with FastConnect or Site-to-Site VPN , and then configure the VCN routing so that traffic transits through the VCN to its destination beyond the VCN. See Transit Routing inside a hub VCN for more information.

The network load balancer routes user traffic to the firewall instances hosted behind network load balancer in the Hub VCN using VCN route tables. This user traffic that would otherwise flow from source directly to destination. In this mode, network load balancer does not modify the client packet characteristics and preserves the client source and destination IP header information. This method enables the firewall appliances to inspect the original client packet and apply security policies before forwarding it to the application backend servers in the spoke VCNs.

The following illustrates the network load balancer architecture.

Network load balancer architecture

Your network load balancer has a backend set to route incoming traffic to your compute instances. The backend set is a logical entity that includes:

A list of backend servers

A load balancing policy

A health check policy

The backend servers (compute instances) associated with a backend set can exist anywhere, as long as the associated network security groups (NSGs), security lists, and route tables allow the intended traffic flow.

If your VCN uses network security groups (NSGs), you can associate your load balancer with an NSG. An NSG has a set of security rules that controls allowed types of inbound and outbound traffic. The rules apply only to the resources in the group. Contrast NSGs with a security list, where the rules apply to all the resources in any subnet that uses the list. See Network Security Groups for more information about NSGs.

If you prefer to use security lists for your VCN, the Load Balancing service can suggest appropriate security list rules. You also can configure them yourself through the Networking service. See Security Lists for more information. See Security Rules for detailed information comparing NSGs and security lists.

Oracle recommends that you distribute your backend servers across all availability domains within the region.

A public network load balancer created in a public subnet consumes one private IP address from the host subnet.

A private network load balancer created in a single subnet consumes one private IP address from the host subnet.

The backend server cannot function as both a client and a backend simultaneously as it is unable to initiate traffic to the network load balancer's virtual IP (VIP).

A health check is a test to confirm the availability of backend servers. A health check can be a request or a connection attempt. Based on a time interval you specify, the load balancer applies the health check policy to continuously monitor backend servers. If a server fails the health check, the load balancer takes the server temporarily out of rotation. If the server later passes the health check, the load balancer returns it to the rotation.

You configure your health check policy when you create a backend set. You can configure TCP-level, UDP-level, or HTTP-level health checks for your backend servers.

TCP-level health checks attempt to make a TCP connection with the backend servers and validate the response based on the connection status.

UDP-level health checks attempt to make a UDP connection with the backend servers and validate the response based on the connection status.

HTTP-level health checks send requests to the backend servers at a specific URI and validate the response based on the status code or entity data (body) returned.

The service provides application-specific health check capabilities to help you increase availability and reduce your application maintenance window. For more information on health check configuration, see Health Check Policies for Network Load Balancers .

Supported protocols include:

Private network load balancers only support the ICMP protocol if the Source/Destination Header (IP, Port) Preservation feature is enabled. See Enabling Network Load Balancer Source/Destination Preservation for more information.

For more information, see Listeners for Network Load Balancers .

Common load balancer policies include:

5-Tuple Hash

3-Tuple Hash

2-Tuple Hash

For more information, see Network Load Balancer Policies .

You can apply tags to your resources to help you organize them according to your business needs. You can apply tags at the time you create a resource, or you can update the resource later with the wanted tags. For general information about applying tags, see Resource Tags .

You can access the private network load balancer using methods and technology that can provide access to a private IP, such as:

Cross-VCN (using LPG peering)

From another region (using RPC)

From on-prem (using FC private peering)

For more information, see Network Load Balancer Management .

Most types of Oracle Cloud Infrastructure resources have a unique, Oracle-assigned identifier called an Oracle Cloud ID (OCID). For information about the OCID format and other ways to identify your resources, see Resource Identifiers .

You can access Oracle Cloud Infrastructure using the Console (a browser-based interface) or the REST API . Instructions for the Console and API are included in topics throughout this guide. For a list of available SDKs, see Software Development Kits and Command Line Interface .

You can monitor the health, capacity, and performance of your Oracle Cloud Infrastructure resources by using metrics, alarms, and notifications. For more information, see Monitoring and Notifications .

For information about monitoring the traffic passing through your network load balancer, see Network Load Balancer Metrics .

Each service in Oracle Cloud Infrastructure integrates with IAM for authentication and authorization, for all interfaces (the Console , SDK or CLI, and REST API).

An administrator in your organization needs to set up groups  , compartments  , and policies  that control which users can access which services, which resources, and the type of access. For example, the policies control who can create new users, create and manage the cloud network, launch instances, create buckets, download objects, etc. For more information, see Getting Started with Policies . For specific details about writing policies for each of the different services, see Policy Reference .

If you’re a regular user (not an administrator) who needs to use the Oracle Cloud Infrastructure resources that your company owns, contact your administrator to set up a user ID for you. The administrator can confirm which compartment or compartments you should be using.

Each load balancer has the following configuration limits:

One IPv4 address and one IPv6 address

50 backend sets

512 backend servers per backend set

1024 backend servers total

50 listeners

Default 1 million concurrent connection limit

See Service Limits for a list of applicable limits and instructions for requesting a limit increase.

To use Oracle Cloud Infrastructure , you must be granted security access in a policy  by an administrator. This access is required whether you're using the Console or the REST API with an SDK, CLI, or other tool. If you get a message that you don’t have permission or are unauthorized, verify with your administrator what type of access you have and which compartment  to work in.

For administrators: For a typical policy that gives access to load balancers and their components, see Let network admins manage load balancers .

Also, be aware that a policy statement with inspect load-balancers gives the specified group the ability to see all information about the load balancers. For more information, see Details for Network Load Balancer .

If you are new to policies, see Getting Started with Policies and Common Policies .

After you create a network load balancer, you can apply policies to control traffic distribution to your backend servers. See Creating a Network Load Balancer .

The Network Load Balancer service supports three primary network load balancer policy types:

5-Tuple Hash : Routes incoming traffic based on 5-Tuple (source IP and port, destination IP and port, protocol) Hash. This is the default network load balancer policy.

3-Tuple Hash : Routes incoming traffic based on 3-Tuple (source IP, destination IP, protocol) Hash.

2-Tuple Hash : Routes incoming traffic based on 2-Tuple (source IP, destination IP) Hash.

The 5-Tuple Hash policy provides session affinity within a given TCP or UDP session, where packets in the same session are directed to the same backend server behind the flexible network load balancer. Use a 3-Tuple or 2-Tuple network load balancing policy to provide session affinity beyond the lifetime of a given session.

When processing load or capacity varies among backend servers, you can refine each of these policy types with backend server weighting . Weighting affects the proportion of requests directed to each server. For example, a server weighted as 3 receives three times the number of connections as a server weighted as 1. You assign weights based on criteria of your choosing, such as each server's traffic-handling capacity. Weight values must be from 1 to 100.

The network load balancer tracks the state of all TCP and UDP flows passing through it. A combination of IP protocol and source and destination IP addresses and ports define a flow. The flow can be removed if no traffic is received from either the client or the server for longer than the idle timeout. Any TCP packets received after the idle timeout are dropped. For UDP flows, a subsequent packet is considered as a new flow and routed to a new backend.

The idle timeout duration for TCP flows is 6 minutes and for UDP flows is 2 minutes. You cannot change the idle timeout duration.

Network load balancing activities are logged through the virtual cloud network (VCN) flow logs. See VCN Flow Logs for more information.

The Network Load Balancer service does not directly modify any traffic that it receives. Therefore, if you want to secure the traffic being sent through the network load balancer to the backends, you are responsible for encrypting the applications on the backends receiving the traffic. If you want to incorporate SSL termination on a load balancer, use the Load Balancer service instead.

assign ip address to network load balancer

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement . We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Accessing network ip inner wsl from windows #9733

@mehdihadeli

mehdihadeli commented Mar 4, 2023 • edited

No branches or pull requests

@mehdihadeli

Select Product

Machine Translated

Current Release

Citrix ADC Release Notes

Build 42.47

Build 37.38

Build 33.54

Build 30.52

Build 27.59

Build 24.38

Build 21.50

Build 17.42

Build 12.51

Getting Started with Citrix ADC

Where Does a Citrix ADC Appliance Fit in the Network?

How a Citrix ADC Communicates with Clients and Servers

Introduction to the Citrix ADC Product Line

Install the hardware

Access a Citrix ADC

Configure the ADC for the first time

Secure your Citrix ADC deployment

Configure high availability

Change an RPC node password

Configuring a FIPS Appliance for the First Time

Understanding Common Network Topologies

System management settings

System settings

Packet forwarding modes

Network interfaces

Clock synchronization

DNS configuration

SNMP configuration

Verify Configuration

Load balance traffic on a Citrix ADC appliance

Load balancing

Persistence settings

Configure features to protect the load balancing configuration

A typical load balancing scenario

Use case - How to force Secure and HttpOnly cookie options for websites using the Citrix ADC appliance

Accelerate load balanced traffic by using compression

Secure load balanced traffic by using SSL

Features at a Glance

Application Switching and Traffic Management Features

Application Acceleration Features

Application Security and Firewall Features

Application Visibility Feature

Citrix ADC Solutions

Setting up Citrix ADC for Citrix Virtual Apps and Desktops

Global Server Load Balancing (GSLB) Powered Zone Preference

Anycast support in Citrix ADC

Deploy digital advertising platform on AWS with Citrix ADC

Enhancing Clickstream analytics in AWS using Citrix ADC

Citrix ADC in a Private Cloud Managed by Microsoft Windows Azure Pack and Cisco ACI

Creating a Citrix ADC Load Balancer in a Plan in the Service Management Portal (Admin Portal)

Configuring a Citrix ADC Load Balancer by Using the Service Management Portal (Tenant Portal)

Deleting a Citrix ADC Load Balancer from the Network

Citrix cloud native solution

Kubernetes Ingress solution

Service mesh

Solutions for observability

API gateway for Kubernetes

Use Citrix ADM to Troubleshoot Citrix Cloud Native Networking

Deploy a Citrix ADC VPX instance

Support matrix and usage guidelines

Optimize Citrix ADC VPX performance on VMware ESX, Linux KVM, and Citrix Hypervisors

Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance in cloud

Improve SSL-TPS performance on public cloud platforms

Install a Citrix ADC VPX instance on a bare metal server

Install a Citrix ADC VPX instance on Citrix Hypervisor

Configuring Citrix ADC Virtual Appliances to use Single Root I/O Virtualization (SR-IOV) Network Interfaces

Install a Citrix ADC VPX instance on VMware ESX

Configuring Citrix ADC Virtual Appliances to use VMXNET3 Network Interface

Configuring Citrix ADC Virtual Appliances to use Single Root I/O Virtualization (SR-IOV) Network Interface

Migrating the Citrix ADC VPX from E1000 to SR-IOV or VMXNET3 Network Interfaces

Configuring Citrix ADC Virtual Appliances to use PCI Passthrough Network Interface

Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance on VMware ESX hypervisor

Install a Citrix ADC VPX instance on VMware cloud on AWS

Install a Citrix ADC VPX instance on Microsoft Hyper-V servers

Install a Citrix ADC VPX instance on Linux-KVM platform

Prerequisites for installing Citrix ADC VPX virtual appliances on Linux-KVM platform

Provisioning the Citrix ADC virtual appliance by using OpenStack

Provisioning the Citrix ADC virtual appliance by using the Virtual Machine Manager

Configuring Citrix ADC virtual appliances to use SR-IOV network interface

Configuring Citrix ADC virtual appliances to use PCI Passthrough network interface

Provisioning the Citrix ADC virtual appliance by using the virsh Program

Managing the Citrix ADC Guest VMs

Provisioning the Citrix ADC virtual appliance with SR-IOV on OpenStack

Configuring a Citrix ADC VPX instance on KVM to use OVS DPDK-Based host interfaces

Apply Citrix ADC VPX configurations at the first boot of the Citrix ADC appliance on the KVM hypervisor

Deploy a Citrix ADC VPX instance on AWS

AWS terminology

AWS-VPX support matrix

Limitations and usage guidelines

Prerequisites

Configure AWS IAM roles on Citrix ADC VPX instance

How a Citrix ADC VPX instance on AWS works

Deploy a Citrix ADC VPX standalone instance on AWS

Scenario: standalone instance

Download a Citrix ADC VPX license

Load balancing servers in different availability zones

How high availability on AWS works

Deploy a VPX HA pair in the same AWS availability zone

High availability across different AWS availability zones

Deploy a VPX high-availability pair with elastic IP addresses across different AWS zones

Deploy a VPX high-availability pair with private IP addresses across different AWS zones

Deploy a Citrix ADC VPX instance on AWS Outposts

Protect AWS API Gateway using the Citrix Web Application Firewall

Add back-end AWS auto scaling service

Configure a Citrix ADC VPX instance to use SR-IOV network interface

Configure a Citrix ADC VPX instance to use Enhanced Networking with AWS ENA

Upgrade a Citrix ADC VPX instance on AWS

Troubleshoot a VPX instance on AWS

Deploy a Citrix ADC VPX instance on Microsoft Azure

Azure terminology

Network architecture for Citrix ADC VPX instances on Microsoft Azure

Configure a Citrix ADC standalone instance

Configure multiple IP addresses for a Citrix ADC VPX standalone instance

Configure a high-availability setup with multiple IP addresses and NICs

Configure a high-availability setup with multiple IP addresses and NICs by using PowerShell commands

Deploy a Citrix ADC high-availability pair on Azure with ALB in the floating IP-disabled mode

Configure a Citrix ADC VPX instance to use Azure accelerated networking

Configure HA-INC nodes by using the Citrix high availability template with Azure ILB

Configure HA-INC nodes by using the Citrix high availability template for internet-facing applications

Configure a high-availability setup with Azure external and internal load balancers simultaneously

Install a Citrix ADC VPX instance on Azure VMware solution

Configure a Citrix ADC VPX standalone instance on Azure VMware solution

Configure a Citrix ADC VPX high availability setup on Azure VMware solution

Configure Azure route server with Citrix ADC VPX HA pair

Add Azure autoscale settings

Azure tags for Citrix ADC VPX deployment

Configure GSLB on Citrix ADC VPX instances

Configure GSLB on an active-standby high availability setup

Deploy Citrix ADC GSLB and domain-based services back-end autoscale with cloud load balancer

Configure address pools (IIP) for a Citrix Gateway appliance

Configure multiple IP addresses for a Citrix ADC VPX instance in standalone mode by using PowerShell commands

Additional PowerShell scripts for Azure deployment

Deploy a Citrix ADC VPX instance on Google Cloud Platform

Deploy a VPX high-availability pair on Google Cloud Platform

Deploy a VPX high-availability pair with external static IP address on Google Cloud Platform

Deploy a single NIC VPX high-availability pair with private IP address on Google Cloud Platform

Deploy a VPX high-availability pair with private IP addresses on Google Cloud Platform

Install a Citrix ADC VPX instance on Google Cloud VMware Engine

Add back-end GCP Autoscaling service

VIP scaling support for Citrix ADC VPX instance on GCP

Troubleshoot a VPX instance on GCP

Jumbo frames on Citrix ADC VPX instances

Automate deployment and configurations of Citrix ADC

Allocate and apply a license

Data governance

Citrix ADM service connect

Upgrade and downgrade a Citrix ADC appliance

Before you begin

Upgrade considerations for customized configuration files

Upgrade considerations - SNMP configuration

Download a Citrix ADC release package

Upgrade a Citrix ADC standalone appliance

Downgrade a Citrix ADC standalone appliance

Upgrade a high availability pair

In Service Software Upgrade support for high availability

Downgrade a high availability pair

Troubleshooting

New and deprecated commands, parameters, and SNMP OIDs

Solutions for Telecom Service Providers

Large Scale NAT

Points to Consider before Configuring LSN

Configuration Steps for LSN

Sample LSN Configurations

Configuring Static LSN Maps

Configuring Application Layer Gateways

Logging and Monitoring LSN

TCP SYN Idle Timeout

Overriding LSN configuration with Load Balancing Configuration

Clearing LSN Sessions

Load Balancing SYSLOG Servers

Port Control Protocol

LSN44 in a cluster setup

Dual-Stack Lite

Points to Consider before Configuring DS-Lite

Configuring DS-Lite

Configuring DS-Lite Static Maps

Configuring Deterministic NAT Allocation for DS-Lite

Configuring Application Layer Gateways for DS-Lite

Logging and Monitoring DS-Lite

Port Control Protocol for DS-Lite

Large Scale NAT64

Points to Consider for Configuring Large Scale NAT64

Configuring DNS64

Configuring Large Scaler NAT64

Configuring Application Layer Gateways for Large Scale NAT64

Configuring Static Large Scale NAT64 Maps

Logging and Monitoring Large Scale NAT64

Port Control Protocol for Large Scale NAT64

LSN64 in a cluster setup

Mapping Address and Port using Translation

Telco subscriber management

Subscriber aware traffic steering

Subscriber aware service chaining

Subscriber aware traffic steering with TCP optimization

Policy based TCP profile selection

Load Balance Control-Plane Traffic that is based on Diameter, SIP, and SMPP Protocols

Provide DNS Infrastructure/Traffic Services, such as, Load Balancing, Caching, and Logging for Telecom Service Providers

Provide Subscriber Load Distribution Using GSLB Across Core-Networks of a Telecom Service Provider

Bandwidth Utilization Using Cache Redirection Functionality

Citrix ADC TCP Optimization

Getting Started

Management Network

High Availability

Gi-LAN Integration

TCP Optimization Configuration

Analytics and Reporting

Real-time Statistics

Technical Recipes

Scalability

Optimizing TCP Performance using TCP Nile

Troubleshooting Guidelines

Frequently Asked Questions

Citrix ADC Video Optimization

Configuring Video Optimization over TCP

Video Optimization over UDP

Citrix ADC URL Filtering

URL Categorization

Admin Partition

Connection Management

Content Switching

Integrated Caching

Installing, Upgrading, and Downgrading

Load Balancing

Citrix ADC GUI

Authentication, authorization, and auditing application traffic

How authentication, authorization, and auditing works

Basic components of authentication, authorization, and auditing configuration

Authentication virtual server

Authorization policies

Authentication profiles

Authentication policies

Users and groups

Authentication methods

Multi-Factor (nFactor) authentication

SAML authentication

OAuth authentication

LDAP authentication

RADIUS authentication

TACACS authentication

Client certificate authentication

Negotiate authentication

Web authentication

Forms based authentication

401 based authentication

reCaptcha for nFactor authentication

Native OTP support for authentication

Push notification for OTP

Authentication, authorization, and auditing configuration for commonly used protocols

Single sign-on types

Citrix ADC Kerberos single sign-on

Enable SSO for Basic, Digest, and NTLM authentication

Content Security Policy response header support for Citrix Gateway and authentication virtual server generated responses

Self-service password reset

Polling during authentication

Session and traffic management

Rate Limiting for Citrix Gateway

Authorizing user access to application resources

Auditing authenticated sessions

Citrix ADC as an Active Directory Federation Service proxy

Web Services Federation protocol

Active Directory Federation Service Proxy Integration Protocol compliance

On-premises Citrix Gateway as an identity provider to Citrix Cloud

Support for active-active GSLB deployments on Citrix Gateway

Configuration support for SameSite cookie attribute

Handling authentication, authorization and auditing with Kerberos/NTLM

Troubleshoot authentication and authorization related issues

Admin partition

Citrix ADC configuration support in admin partition

Configure admin partitions

VLAN configuration for admin partitions

VXLAN support for admin partitions

SNMP support for admin partitions

Audit log support for admin partitions

Display configured PMAC addresses for shared VLAN configuration

Action Analytics

Configure a selector

Configure a stream identifier

View statistics

Group records on attribute values

Clear stream session

Configure policy for optimizing traffic

How to limit bandwidth consumption for user or client device

AppExpert Applications

How AppExpert application works

Customize AppExpert Configuration

Configure user authentication

Monitor Citrix ADC statistics

Delete an AppExpert application

Configure application authentication, authorization, and auditing

Set up a custom Citrix ADC application

Citrix Gateway Applications

Enabling AppQoE

AppQOE Actions

AppQoE Parameters

AppQoE Policies

Entity Templates

HTTP Callouts

How an HTTP Callout Works

Notes on the Format of HTTP Requests and Responses

Configuring an HTTP Callout

Verifying the Configuration

Invoking an HTTP Callout

Avoiding HTTP Callout Recursion

Caching HTTP Callout Responses

Use Case: Filtering Clients by Using an IP Blacklist

Use Case: ESI Support for Fetching and Updating Content Dynamically

Use Case: Access Control and Authentication

Use Case: OWA-Based Spam Filtering

Use Case: Dynamic Content Switching

Pattern Sets and Data Sets

How String Matching works with Pattern Sets and Data Sets

Configuring a Pattern Set

Configuring a Data Set

Using Pattern Sets and Data Sets

Sample Usage

Configuring and Using Variables

Use Case for Caching User Privileges

Use Case for Limiting the Number of Sessions

Policies and Expressions

Introduction to Policies and Expressions

Configuring Advanced Policy Infrastructure

Configuring Advanced Policy Expression: Getting Started

Advanced Policy Expressions: Evaluating Text

Advanced Policy Expressions: Working with Dates, Times, and Numbers

Advanced Policy Expressions: Parsing HTTP, TCP, and UDP Data

Advanced Policy Expressions: Parsing SSL Certificates

Advanced Policy Expressions: IP and MAC Addresses, Throughput, VLAN IDs

Advanced Policy Expressions: Stream Analytics Functions

Advanced Policy Expressions: DataStream

Typecasting Data

Regular Expressions

Summary Examples of Advanced Policy Expressions

Tutorial Examples of Advanced Policies for Rewrite

Rewrite and Responder Policy examples

Rate Limiting

Configuring a Stream Selector

Configuring a Traffic Rate Limit Identifier

Configuring and Binding a Traffic Rate Policy

Viewing the Traffic Rate

Testing a Rate-Based Policy

Examples of Rate-Based Policies

Sample Use Cases for Rate-Based Policies

Rate Limiting for Traffic Domains

Configure rate limit at packet level

Enabling the Responder Feature

Configuring a Responder Action

Configuring a Responder Policy

Binding a Responder Policy

Setting the Default Action for a Responder Policy

Responder Action and Policy Examples

Diameter Support for Responder

RADIUS Support for Responder

DNS Support for the Responder Feature

MQTT support for responder

How to Redirect HTTP Requests

Rewrite Action and Policy Examples

URL Transformation

RADIUS Support for the Rewrite Feature

Diameter Support for Rewrite

DNS Support for the Rewrite Feature

MQTT Support for Rewrite

String Maps

Advanced Policy Expressions for URL Evaluation

Configuring URL Set

URL Pattern Semantics

URL Categories

Configuring the AppFlow Feature

Exporting Performance Data of Web Pages to AppFlow Collector

Session Reliability on Citrix ADC High Availability Pair

Monitoring Citrix ADC and applications using Prometheus

Application Firewall

FAQs and Deployment Guide

Introduction to Citrix Web App Firewall

Configuring the Application Firewall

Enabling the Application Firewall

The Application Firewall Wizard

Manual Configuration

Manual Configuration By Using the GUI

Manual Configuration By Using the Command Line Interface

Manually Configuring the Signatures Feature

Adding or Removing a Signatures Object

Configuring or Modifying a Signatures Object

Protecting JSON Applications using Signatures

Updating a Signatures Object

Signature Auto Update

Snort rule integration

Exporting a Signatures Object to a File

The Signatures Editor

Signature Updates in High-Availability Deployment and Build Upgrades

Overview of Security checks

Top-Level Protections

HTML Cross-Site Scripting Check

HTML SQL Injection Checks

SQL grammar-based protection for HTML and JSON payload

Command injection grammar-based protection for HTML payload

Relaxation and deny rules for handling HTML SQL injection attacks

HTML Command Injection Protection

Custom keyword support for HTML payload

XML External Entity Protection

Buffer Overflow Check

Application Firewall Support for Google Web Toolkit

Cookie Protection

Cookie Consistency Check

Cookie Hijacking Protection

SameSite cookie attribute

Data Leak Prevention Checks

Credit Card Check

Safe Object Check

Advanced Form Protection Checks

Field Formats Check

Form Field Consistency Check

CSRF Form Tagging Check

Managing CSRF Form Tagging Check Relaxations

URL Protection Checks

Start URL Check

Deny URL Check

XML Protection Checks

XML Format Check

XML Denial-of-Service Check

XML Cross-Site Scripting Check

XML SQL Injection Check

XML Attachment Check

Web Services Interoperability Check

XML Message Validation Check

XML SOAP Fault Filtering Check

JSON Protection Checks

JSON DOS Protection

JSON SQL Protection

JSON XSS Protection

JSON Command Injection Protection

Managing Content Types

Creating Application Firewall Profiles

Enforcing HTTP RFC Compliance

Configuring Application Firewall Profiles

Application Firewall Profile Settings

Changing an Application Firewall Profile Type

Exporting and Importing an Application Firewall Profile

Detailed troubleshooting with WAF logs

File Upload Protection

Configuring and Using the Learning Feature

Dynamic Profiling

Supplemental Information about Profiles

Custom error status and message for HTML, XML, or JSON error object

Policy Labels

Firewall Policies

Auditing Policies

Importing and Exporting Files

Global Configuration

Engine Settings

Confidential Fields

Field Types

XML Content Types

JSON Content Types

Statistics and Reports

Application Firewall Logs

PCRE Character Encoding Format

Whitehat WASC Signature Types for WAF Use

Streaming Support for Request Processing

Trace HTML Requests with Security Logs

Application Firewall Support for Cluster Configurations

Debugging and Troubleshooting

Large File Upload Failure

Miscellaneous

Signatures Alert Articles

Signature update version 97

Signature update version 96

Signature update version 95

Signature update version 94

Signature update version 93

Signature update version 92

Signature update version 91

Signature update version 90

Signature update version 89

Signature update version 88

Signature update version 87

Signature update version 86

Signature update version 85

Signature update version 84

Signature update version 83

Signature update version 82

Signature update version 81

Signature update version 80

Signature update version 79

Signature update version 78

Signature update version 77

Signature update version 76

Signature update version 75

Signature update version 74

Signature update version 73

Signature update version 72

Signature update version 71

Signature update version 70

Signature update version 69

Signature update version 68

Signature update version 67

Signature update version 66

Signature update version 65

Signature update version 64

Signature update version 63

Signature update version 62

Signature update version 61

Signature update version 60

Signature update version 59

Signature update version 58

Signature update version 57

Signature update version 56

Signature update version 55

Signature update version 54

Signature update version 53

Signature update version 52

Signature update version 51

Signature update version 50

Signature update version 49

Signature update version 48

Signature update version 47

Signature update version 46

Signature update version 45

Signature update version 44

Signature update version 43

Signature update version 42

Signature update version 41

Signature update version 40

Signature update version 39

Signature update version 38

Signature update version 37

Signature update version 36

Signature update version 35

Signature update version 34

Signature update version 33

Signature update version 32

Signature update version 30

Signature update version 29

Signature update version 28

Signature update version 27

Bot Management

Bot Detection

Bot troubleshooting

Bot Signature Auto Update

Bot Signature Alert Articles

Bot signature update version 5

Bot signature update version 6

Bot signature update version 7

Bot signature update version 8

Bot signature update version 9

Bot signature update version 10

Bot signature update version 11

Bot signature update version 12

Bot signature update version 13

Cache Redirection

Cache redirection policies

Built-in cache redirection policies

Configure a cache redirection policy

Cache redirection configurations

Configure transparent redirection

Configure forward proxy redirection

Configure reverse proxy redirection

Selective cache redirection

Enable content switching

Configure a load balancing virtual server for the cache

Configure policies for content switching

Configure precedence for policy evaluation

Administer a cache redirection virtual server

View cache redirection virtual server statistics

Enable or disable a cache redirection virtual server

Direct policy hits to the cache instead of the origin

Back up a cache redirection virtual server

Manage client connections for a virtual server

Enable external TCP health check for UDP virtual servers

N-tier cache redirection

Configure the upper-tier Citrix ADC appliances

Configure the lower-tier Citrix ADC appliances

Translate destination IP address of a request to origin IP address

Citrix ADC configuration support in a cluster

Cluster overview

Synchronization across cluster nodes

Striped, partially striped, and spotted configurations

Communication in a cluster setup

Traffic distribution in a cluster setup

Cluster nodegroups

Cluster and node states

Routing in a cluster

IP addressing for a cluster

Configuring layer 3 clustering

Setting up a Citrix ADC cluster

Setting up inter-node communication

Creating a Citrix ADC cluster

Adding a node to the cluster

Viewing the details of a cluster

Distributing traffic across cluster nodes

Using Equal Cost Multiple Path (ECMP)

Using cluster link aggregation

Using USIP mode in cluster

Managing the Citrix ADC cluster

Configuring linksets

Nodegroups for spotted and partially-striped configurations

Configuring redundancy for nodegroups

Disabling steering on the cluster backplane

Synchronizing cluster configurations

Synchronizing time across cluster nodes

Synchronizing cluster files

Viewing the statistics of a cluster

Discovering Citrix ADC appliances

Disabling a cluster node

Removing a cluster node

Removing a node from a cluster deployed using cluster link aggregation

Detecting jumbo probe on a cluster

Route monitoring for dynamic routes in cluster

Monitoring cluster setup using SNMP MIB with SNMP link

Monitoring command propagation failures in a cluster deployment

Graceful shutdown of nodes

Graceful shutdown of services

IPv6 ready logo support for clusters

Managing cluster heartbeat messages

Configuring owner node response status

Monitor Static Route (MSR) support for inactive nodes in a spotted cluster configuration

VRRP interface binding in a single node active cluster

Cluster setup and usage scenarios

Creating a two-node cluster

Migrating an HA setup to a cluster setup

Transitioning between a L2 and L3 cluster

Setting up GSLB in a cluster

Using cache redirection in a cluster

Using L2 mode in a cluster setup

Using cluster LA channel with linksets

Backplane on LA channel

Common interfaces for client and server and dedicated interfaces for backplane

Common switch for client, server, and backplane

Common switch for client and server and dedicated switch for backplane

Different switch for every node

Sample cluster configurations

Using VRRP in a cluster setup

Monitoring services in a cluster using path monitoring

Backup and restore of cluster setup

Upgrading or downgrading the Citrix ADC cluster

Operations supported on individual cluster nodes

Support for heterogeneous cluster

Troubleshooting the Citrix ADC cluster

Tracing the packets of a Citrix ADC cluster

Troubleshooting common issues

Configuring Basic Content Switching

Customizing the Basic Content Switching Configuration

Content Switching for Diameter Protocol

Protecting the Content Switching Setup against Failure

Managing a Content Switching Setup

Managing Client Connections

Persistence support for content switching virtual server

Configure database users

Configure a database profile

Configure load balancing for DataStream

Configure content switching for DataStream

Configure monitors for DataStream

Use Case 1: Configure DataStream for a primary/secondary database architecture

Use Case 2: Configure the token method of load balancing for DataStream

Use Case 3: Log MSSQL transactions in transparent mode

Use Case 4: Database specific load balancing

DataStream reference

Domain Name System

Configure DNS resource records

Create SRV records for a service

Create AAAA Records for a domain name

Create address records for a domain name

Create MX records for a mail exchange server

Create NS records for an authoritative server

Create CNAME records for a subdomain

Create NAPTR records for telecommunications domain

Create PTR records for IPv4 and IPv6 addresses

Create SOA records for authoritative information

Create TXT records for holding descriptive text

Create CAA records for a domain name

View DNS statistics

Configure a DNS zone

Configure the Citrix ADC as an ADNS server

Configure the Citrix ADC as a DNS proxy server

Configure the Citrix ADC as an end resolver

Configure the Citrix ADC as a forwarder

Configure Citrix ADC as a non-validating security aware stub-resolver

Jumbo frames support for DNS to handle responses of large sizes

Configure DNS logging

Configure DNS suffixes

DNS ANY query

Configure negative caching of DNS records

Caching of EDNS0 client subnet data when the Citrix ADC appliance is in proxy mode

Domain name system security extensions

Configure DNSSEC

Configure DNSSEC when the Citrix ADC is authoritative for a zone

Configure DNSSEC for a zone for which the Citrix ADC is a DNS proxy server

Configure DNSSEC for GSLB domain names

Zone maintenance

Offload DNSSEC operations to the Citrix ADC

Admin partition support for DNSSEC

Support for wildcard DNS domains

Mitigate DNS DDoS attacks

Firewall Load Balancing

Sandwich Environment

Enterprise Environment

Multiple-Firewall Environment

Global Server Load Balancing

GSLB deployment types

Active-active site deployment

Active-passive site deployment

Parent-child topology deployment using the MEP protocol

GSLB configuration entities

GSLB methods

GSLB algorithms

Static proximity

Dynamic round trip time method

Configure static proximity

Add a location file to create a static proximity database

Add custom entries to a static proximity database

Set location qualifiers

Specify proximity method

Synchronize GSLB static proximity database

Configure site-to-site communication

Configure metrics exchange protocol

Configure GSLB by using a wizard

Configure active-active site

Configure active-passive site

Configure parent-child topology

Configure GSLB entities individually

Configure an authoritative DNS service

Configure a basic GSLB site

Configure a GSLB service

Configure a GSLB service group

Configure a GSLB virtual server

Bind GSLB services to a GSLB virtual server

Bind a domain to a GSLB virtual server

Example of a GSLB setup and configuration

Synchronize the configuration in a GSLB setup

Manual synchronization between sites participating in GSLB

Real-time synchronization between sites participating in GSLB

View GSLB synchronization status and summary

SNMP traps for GSLB configuration synchronization

GSLB dashboard

Monitor GSLB services

How domain name system works with GSLB

Priority order for GSLB services

Upgrade recommendations for GSLB deployment

Use case: Deployment of domain name based autoscale service group

Use case: Deployment of IP address based autoscale service group

How-to articles

Customize your GSLB configuration

Configure persistent connections

Manage client connections

Configure GSLB for proximity

Protect the GSLB setup against failure

Configure GSLB for disaster recovery

Override static proximity behavior by configuring preferred locations

Configure GSLB service selection using content switching

Configure GSLB for DNS queries with NAPTR records

Configure GSLB for wildcard domain

Use the EDNS0 client subnet option for GSLB

Example of a complete parent-child configuration using the metrics exchange protocol

Link Load Balancing

Configuring a Basic LLB Setup

Configuring RNAT with LLB

Configuring a Backup Route

Resilient LLB Deployment Scenario

Monitoring an LLB Setup

How load balancing works

Set up basic load balancing

Load balance virtual server and service states

Support for load balancing profile

Load balancing algorithms

Least connection method

Round robin method

Least response time method

LRTM method

Hashing methods

Least bandwidth method

Least packets method

Custom load method

Static proximity method

Token method

Configure a load balancing method that does not include a policy

Persistence and persistent connections

About Persistence

Source IP address persistence

HTTP cookie persistence

SSL session ID persistence

Diameter AVP number persistence

Custom server ID persistence

IP address persistence

SIP Call ID persistence

RTSP session ID persistence

Configure URL passive persistence

Configure persistence based on user-defined rules

Configure persistence types that do not require a rule

Configure backup persistence

Configure persistence groups

Share persistent sessions between virtual servers

Configure RADIUS load balancing with persistence

View persistence sessions

Clear persistence sessions

Override persistence settings for overloaded services

Insert cookie attributes to ADC generated cookies

Customize a load balancing configuration

Customize the hash algorithm for persistence across virtual servers

Configure the redirection mode

Configure per-VLAN wildcarded virtual servers

Assign weights to services

Configure the MySQL and Microsoft SQL server version setting

Multi-IP virtual servers

Limit the number of concurrent requests on a client connection

Configure diameter load balancing

Configure FIX load balancing

MQTT load balancing

Protect a load balancing configuration against failure

Redirect client requests to an alternate URL

Configure a backup load balancing virtual server

Configure spillover

Connection failover

Flush the surge queue

Manage a load balancing setup

Manage server objects

Manage services

Manage a load balancing virtual server

Load balancing visualizer

Manage client traffic

Configure sessionless load balancing virtual servers

Redirect HTTP requests to a cache

Enable cleanup of virtual server connections

Rewrite ports and protocols for HTTP redirection

Insert IP address and port of a virtual server in the request header

Use a specified source IP for backend communication

Set a time-out value for idle client connections

Manage RTSP connections

Manage client traffic on the basis of traffic rate

Identify a connection with layer 2 parameters

Configure the prefer direct route option

Use a source port from a specified port range for backend communication

Configure source IP persistency for backend communication

Use IPv6 link local addresses on server side of a load balancing setup

Advanced load balancing settings

Gradually stepping up the load on a new service with virtual server–level slow start

The no-monitor option for services

Protect applications on protected servers against traffic surges

Enable cleanup of virtual server and service connections

Enable or disable persistence session on TROFS services

Direct requests to a custom web page

Enable access to services when down

Enable TCP buffering of responses

Enable compression

Maintain client connection for multiple client requests

Insert the IP address of the client in the request header

Retrieve location details from user IP address using geolocation database

Use source IP address of the client when connecting to the server

Use client source IP address for backend communication in a v4-v6 load balancing configuration

Configure the source port for server-side connections

Set a limit on the number of client connections

Set a limit on number of requests per connection to the server

Set a threshold value for the monitors bound to a service

Set a timeout value for idle client connections

Set a timeout value for idle server connections

Set a limit on the bandwidth usage by clients

Redirect client requests to a cache

Retain the VLAN identifier for VLAN transparency

Configure automatic state transition based on percentage health of bound services

Built-in monitors

TCP-based application monitoring

SSL service monitoring

HTTP/2 service monitoring

Proxy protocol service monitoring

FTP service monitoring

Secure monitoring of servers by using SFTP

Set SSL parameters on a secure monitor

SIP service monitoring

RADIUS service monitoring

Monitor accounting information delivery from a RADIUS server

DNS and DNS-TCP service monitoring

LDAP service monitoring

MySQL service monitoring

SNMP service monitoring

NNTP service monitoring

POP3 service monitoring

SMTP service monitoring

RTSP service monitoring

XML broker service monitoring

ARP request monitoring

Citrix Virtual Desktops Delivery Controller service monitoring

Citrix StoreFront stores monitoring

Custom monitors

Configure HTTP-inline monitors

Understand user monitors

How to use a user monitor to check web sites

Understand the internal dispatcher

Configure a user monitor

Understand load monitors

Configure load monitors

Unbind metrics from a metrics table

Configure reverse monitoring for a service

Configure monitors in a load balancing setup

Create monitors

Configure monitor parameters to determine the service health

Bind monitors to services

Modify monitors

Enable and disable monitors

Unbind monitors

Remove monitors

View monitors

Close monitor connections

Ignore the upper limit on client connections for monitor probes

Manage a large scale deployment

Ranges of virtual servers and services

Configure service groups

Manage service groups

Configure a desired set of service group members for a service group in one NITRO API call

Configure automatic domain based service group scaling

Service discovery using DNS SRV records

Translate the IP address of a domain-based server

Mask a virtual server IP address

Configure load balancing for commonly used protocols

Load balance a group of FTP servers

Load balance DNS servers

Load balance domain-name based services

Load balance a group of SIP servers

Load balance RTSP servers

Load balance remote desktop protocol (RDP) servers

Priority order for load balancing services

Use case 1: SMPP load balancing

Use case 2: Configure rule based persistence based on a name-value pair in a TCP byte stream

Use case 3: Configure load balancing in direct server return mode

Use case 4: Configure LINUX servers in DSR mode

Use case 5: Configure DSR mode when using TOS

Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field

Use case 7: Configure load balancing in DSR mode by using IP Over IP

Use case 8: Configure load balancing in one-arm mode

Use case 9: Configure load balancing in the inline mode

Use case 10: Load balancing of intrusion detection system servers

Use case 11: Isolating network traffic using listen policies

Use case 12: Configure Citrix Virtual Desktops for load balancing

Use case 13: Configure Citrix Virtual Apps and Desktops for load balancing

Use case 14: ShareFile wizard for load balancing Citrix ShareFile

Use case 15: Configure layer 4 load balancing on the Citrix ADC appliance

Load balancing FAQs

IP Addressing

Configuring NetScaler-Owned IP Addresses

How the Citrix ADC Proxies Connections

Enabling Use Source IP Mode

Configuring Network Address Translation

Configuring Static ARP

Setting the Timeout for Dynamic ARP Entries

Configuring Neighbor Discovery

Configuring IP Tunnels

Class E IPv4 packets

Monitor the free ports available on a Citrix ADC appliance for a new back-end connection

Configuring MAC-Based Forwarding

Configuring Network Interfaces

Configuring Forwarding Session Rules

Understanding VLANs

Configuring a VLAN

Configuring NSVLAN

Configuring Allowed VLAN List

Configuring Bridge Groups

Configuring Virtual MACs

Configuring Link Aggregation

Redundant Interface Set

Binding an SNIP address to an Interface

Monitoring the Bridge Table and Changing the Aging time

Citrix ADC Appliances in Active-Active Mode Using VRRP

Using the Network Visualizer

Configuring Link Layer Discovery Protocol

Jumbo Frames

Citrix ADC Support for Microsoft Direct Access Deployment

Access Control Lists

Simple ACLs and Simple ACL6s

Extended ACLs and Extended ACL6s

MAC Address Wildcard Mask for ACLs

Blocking Traffic on Internal Ports

Configuring Dynamic Routes

Configuring Static Routes

Route Health Injection Based on Virtual Server Settings

Configuring Policy-Based Routes

Traffic distribution in multiple routes based on five tuples information

Troubleshooting Routing Issues

Internet Protocol version 6 (IPv6)

Traffic Domains

Inter Traffic Domain Entity Bindings

Virtual MAC Based Traffic Domains

Geneve tunnels

Best practices for networking configurations

Configure to source Citrix ADC FreeBSD data traffic from a SNIP address

Priority Load Balancing

Citrix ADC Extensions

Citrix ADC extensions - language overview

Simple types

Expressions

Control structures

Citrix ADC extensions - library reference

Citrix ADC extensions API reference

Protocol extensions

Protocol extensions - architecture

Protocol extensions - traffic pipeline for user defined TCP client and server behaviors

Protocol extensions - use cases

Tutorial – Add MQTT protocol to the Citrix ADC appliance by using protocol extensions

Tutorial - Load balancing syslog messages by using protocol extensions

Protocol extensions command reference

Troubleshoot protocol extensions

Policy extensions

Configure policy extensions

Policy extensions - use cases

Troubleshooting policy extensions

Optimization

Client Keep-Alive

HTTP Compression

Configure selectors and basic content groups

Configure policies for caching and invalidation

Cache support for database protocols

Configure expressions for caching policies and selectors

Display cached objects and cache statistics

Improve cache performance

Configure cookies, headers, and polling

Configure integrated cache as a forward proxy

Default Settings for the Integrated Cache

Front End Optimization

Content Accelerator

Media Classification

IP Reputation

SSL offload and acceleration

SSL offloading configuration

TLSv1.3 protocol support as defined in RFC 8446

SSL certificates

Create a certificate

Install, link, and update certificates

Generate a server test certificate

Import and convert SSL files

Bind an SSL certificate to a virtual server on the Citrix ADC appliance

SSL profiles

SSL profile infrastructure

Secure front-end profile

Appendix A: Sample migration of the SSL configuration after upgrade

Appendix B: Default front-end and back-end SSL profile settings

Legacy SSL profile

Certificate revocation lists

Monitor certificate status with OCSP

OCSP stapling

Ciphers available on the Citrix ADC appliances

ECDHE ciphers

Diffie-Hellman (DH) key generation and achieving PFS with DHE

Cipher redirection

Leverage hardware and software to improve ECDHE and ECDSA cipher performance

ECDSA cipher suites support

Configure user-defined cipher groups on the ADC appliance

Server certificate support matrix on the ADC appliance

Client authentication

Server authentication

SSL actions and policies

SSL policies

SSL built-in actions and user-defined actions

SSL policy binding

SSL policy labels

Selective SSL logging

Support for DTLS protocol

Support for Intel Coleto SSL chip based platforms

MPX 14000 FIPS appliances

SDX 14000 FIPS appliances

Limitations

Terminology

Initialize the HSM

Create partitions

Provision a new instance or modify an existing instance and assign a partition

Configure the HSM for an instance on an SDX 14030/14060/14080 FIPS appliance

Create a FIPS key for an instance on an SDX 14030/14060/14080 FIPS appliance

Upgrade the FIPS firmware on a VPX instance

Support for Thales Luna Network hardware security module

Configure a Thales Luna client on the ADC

Configure Thales Luna HSMs in a high availability setup on the ADC

Additional ADC configuration

Citrix ADC appliances in a high availability setup

Support for Azure Key Vault

Content inspection

ICAP for remote content inspection

Inline Device Integration with Citrix ADC

Integration with IPS or NGFW as inline devices

IDS Integration

IDS Layer 3 Integration

Content Inspection Statistics for ICAP, IPS, and IDS

SSL forward proxy

Getting started with SSL forward proxy

Proxy modes

SSL interception

User identity management

URL filtering for SSL forward proxy

URL categorization

URL reputation score

Analytics for SSL forward proxy

Using ICAP for remote content inspection

Surge protection

Disable and reenable surge protection

Set thresholds for surge protection

DNS security options

Basic operations

Authentication and authorization for System Users

Configuring Users, User Groups, and Command Policies

User Account and Password Management

Resetting the Default Administrator (nsroot) Password

Configuring External User Authentication

SSH Key-based Authentication for Citrix ADC Administrators

Two Factor Authentication for System Users

Restricted Management Interface Access

TCP Configurations

HTTP Configurations

Configuring HTTP/2 on the Citrix ADC Appliance

HTTP/2 DoS mitigation

HTTP/3 over QUIC

HTTP/3 Configuration

HTTP/3 Policy Configuration

HTTP/3 Service Discovery

gRPC End-to-End Configuration

gRPC Bridging

gRPC Reverse Bridging

gRPC Call Termination

gRPC with Rewrite Policy Configuration

gRPC with Responder Policy Configuration

gRPC Health Monitor

QUIC bridge configuration

Proxy Protocol

Client IP Address in TCP Option

Configuring the Citrix ADC to Generate SNMP Traps

Configuring the Citrix ADC for SNMP v1 and v2 Queries

Configuring the Citrix ADC for SNMPv3 Queries

Configuring SNMP Alarms for Rate Limiting

Configuring SNMP in FIPS Mode

Audit Logging

Configuring the Citrix ADC Appliance for Audit Logging

Installing and Configuring the NSLOG Server

Running the NSLOG Server

Customizing Logging on the NSLOG Server

SYSLOG Over TCP

Default Settings for the Log Properties

Sample Configuration File (audit.conf)

Web Server Logging

Configuring the Citrix ADC for Web Server Logging

Installing the Citrix ADC Web Logging (NSWL) Client

Configuring the NSWL Client

Customizing Logging on the NSWL Client System

Reporting Tool

CloudBridge Connector

Monitoring CloudBridge Connector Tunnels

Configuring a CloudBridge Connector Tunnel between two Datacenters

Configuring CloudBridge Connector between Datacenter and AWS Cloud

Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Virtual Private Gateway on AWS

Configuring a CloudBridge Connector Tunnel Between a Datacenter and Azure Cloud

Configuring CloudBridge Connector Tunnel between Datacenter and SoftLayer Enterprise Cloud

Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Cisco IOS Device

Configuring a CloudBridge Connector Tunnel Between a Citrix ADC Appliance and Fortinet FortiGate Appliance

CloudBridge Connector Tunnel Diagnostics and Troubleshooting

CloudBridge Connector Interoperability – StrongSwan

CloudBridge Connector Interoperability – F5 BIG-IP

CloudBridge Connector Interoperability – Cisco ASA

Points to Consider for a High Availability Setup

Configuring High Availability

Configuring the Communication Intervals

Configuring Synchronization

Synchronizing Configuration Files in a High Availability Setup

Configuring Command Propagation

Restricting High-Availability Synchronization Traffic to a VLAN

Configuring Fail-Safe Mode

Configuring Virtual MAC Addresses

Configuring High Availability Nodes in Different Subnets

Configuring Route Monitors

Limiting Failovers Caused by Route Monitors in non-INC mode

Configuring Failover Interface Set

Understanding the Causes of Failover

Forcing a Node to Fail Over

Forcing the Secondary Node to Stay Secondary

Forcing the Primary Node to Stay Primary

Understanding the High Availability Health Check Computation

High Availability FAQs

Troubleshooting High Availability Issues

Managing High Availability Heartbeat Messages on a Citrix ADC Appliance

Remove and Replace a Citrix ADC in a High Availability Setup

Request retry

TCP Optimization

How to record a packet trace on Citrix ADC

How to free space on /var directory

How to download core or crashed files from Citrix ADC appliance

How to collect performance statistics and event logs

How to configure log file rotation

How to free space on /flash directory

Reference Material

Document History

This content has been machine translated dynamically.

Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)

Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)

Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)

此内容已经过机器动态翻译。 放弃

このコンテンツは動的に機械翻訳されています。 免責事項

이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인

Este texto foi traduzido automaticamente. (Aviso legal)

Questo contenuto è stato tradotto dinamicamente con traduzione automatica. (Esclusione di responsabilità))

This article has been machine translated.

Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)

Ce article a été traduit automatiquement. (Clause de non responsabilité)

Este artículo ha sido traducido automáticamente. (Aviso legal)

この記事は機械翻訳されています. 免責事項

이 기사는 기계 번역되었습니다. 책임 부인

Este artigo foi traduzido automaticamente. (Aviso legal)

这篇文章已经过机器翻译. 放弃

Questo articolo è stato tradotto automaticamente. (Esclusione di responsabilità))

Translation failed!

Release Notes for Citrix ADC 13.1-42.47 Release

This release notes document describes the enhancements and changes, fixed and known issues that exist for the Citrix ADC release Build 13.1-42.47.

The enhancements and changes that are available in Build 13.1-42.47.

Support to stop the IP reputation downloads in bot settings After you disable the IP reputation feature, set the Default Nonintrusive Profile to BOT_BYPASS in the Citrix bot management settings. This configuration stops the IP reputation downloads.

To change the bot management settings, navigate to Security > Citrix Bot Management > Change Citrix Bot Management Settings .

[NSBOT-1050, NSHELP-34310, NSHELP-33835, NSHELP-34410]

New bot violations appear in the Citrix ADM GUI

The following bot violations are newly introduced in the Citrix ADM GUI:

An application server uses the user-agent header information to know more about an incoming request. Some bot requests can have multiple user-agent headers or no user-agent header. You can detect such bot violations using a Citrix bot management profile. Then, use the Citrix ADM GUI to monitor bot violations. For more information, see Violation categories .

[NSBOT-1023]

Citrix ADC SDX Appliance

SD-WAN support is deprecated from the Management Service

From release 13.1 build 42.x and later, SD-WAN support is deprecated from the Citrix ADC SDX appliance.

[NSSVM-5465]

“Gateway” and “Nexthop” fields are optional while provisioning or editing the VPX

In a Citrix ADC SDX appliance Management Service, the Gateway and Nexthop fields are no longer mandatory for provisioning, editing, taking backup, or restoring VPX when the following conditions are met:

For more information, see Provision Citrix ADC instances .

[NSSVM-5307]

Citrix Gateway

Support to enable DF bit propagation for EDT by default

On the Citrix Gateway appliance, the DF bit enforcement for the EDT path maximum transmission unit discovery (PMTUD) option is now enabled, by default. This option prevents EDT fragmentation that might result in performance degradation or failure to establish a session. Previously, this option was disabled, by default. Administrators had to enable the option using the ICA parameter settings.

[CGOP-22615]

Citrix Web App Firewall

Use CLI or API to enable signatures in your Citrix Web App Firewall

You can now enable individual signatures in your Citrix Web App Firewall through CLI commands or API calls. To do so, select signatures by their IDs or categories and then set actions. Earlier, you were able to enable signatures only by uploading a signature file.

import appfw signature DEFAULT object_name -sigRuleId 1001 9882 2000 1250 810 -Enabled ON -Action LOG BLOCK

Example-2: import appfw signature DEFAULT object_name -sigCategory web-misc -Enabled ON -Action LOG BLOCK

See, To add individual signatures by using CLI .

[NSWAF-9333]

New match patterns for the Citrix WAF signatures

For the Citrix Web App Firewall signatures, you can now select the following new match patterns:

The Citrix Web App Firewall looks for the selected pattern and categorizes the attack.

Note: You can modify the signature rule patterns only for the custom signatures.

For more information, see Add signature rule patterns .

[NSWAF-9280]

Configure global lists to bypass WAF or deny requests

You can now configure global lists in a Citrix Web App Firewall profile to bypass Web App Firewall or deny requests. If the incoming requests match the global bypass list, they skip the Web App Firewall in Citrix ADC. If the incoming requests match the global deny list, Citrix Web App Firewall blocks those requests and applies the defined action.

The bypass and deny lists support URL, IPv4, and IPv6 addresses. You can specify them using literals, PCRE, and expressions. For more information, see Manage global lists to bypass WAF or deny requests .

[NSWAF-8981]

Simplified the Citrix WAF profile creation to protect from CVEs

Protect your Citrix ADC appliance by applying an appropriate signature in the Citrix Web App Firewall. You might want to secure the appliance from CVEs without performing any other security checks. In this case, you can now create a profile that disables the remaining checks from the Citrix Web App Firewall.

In a Citrix Web App Firewall profile, select the CVE option as defaults. With this option, you need to simply add and bind a signature. It automatically disables the remaining checks. Earlier, you had to manually disable the security checks from the profile one by one.

For more information, see Creating Web App Firewall profiles .

[NSWAF-8970]

Support for multiple services with the same Autoscaling group in public cloud

For the back-end Autoscaling feature in public cloud, the Citrix ADC VPX instance now supports multiple services with the same autoscaling group. This feature is supported on Azure, AWS, and GCP clouds. In the Citrix ADC GUI, you can create different cloud profiles for different services (using different ports) with the same autoscaling group in cloud.

Earlier, the Citrix ADC VPX instance support was limited to a single service per autoscaling group. You had to add different autoscaling groups for different services.

[NSPLAT-21596]

Support for Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor

The Citrix ADC VPX instance now supports Mellanox ConnectX-4 NIC with SR-IOV on VMware ESXi hypervisor.

[NSPLAT-20295]

Increase in the limit of patterns that can be bound to a pattern set

In a Citrix ADC appliance, you can now bind 50000 patterns to a pattern set. With the pattern set file, only 10000 patterns can be bound to a pattern set. Also, If the pattern set is used in streaming, then only 5000 patterns can be bound to that pattern set. A pattern set for streaming is used in the rewrite action search parameter, HTTP body, or TCP payload based expression. Previously, you could only bind 5000 patterns to a pattern set.

[NSPOLICY-2733]

Support for all the expressions associated with the UDP headers and payloads on the client side and the server side

The following enhancements are done for UDP headers and payloads on the client side and server side:

For more information, see Expressions for TCP, UDP, and VLAN data .

[NSPOLICY-1829]

Support for cross-signed certificate validation

The Citrix ADC appliance now supports cross-signed certificate validation. If a certificate is signed by multiple issuers, the validation passes if there is at least one valid path to the root certificate.

Earlier, if one of the certificates in the certificate chain was cross-signed and had multiple paths to the root certificate, the ADC appliance only checked for one path. And if that path was not valid, the validation failed.

[NSSSL-11259]

Support for exporting metrics directly to Prometheus from the Citrix ADC appliance

Citrix ADC now supports the direct export of metrics to Prometheus. With this feature, Prometheus pulls metrics directly from the Citrix ADC instances without the need for any external exporter. Previously, an exporter resource was required outside the appliance to export metrics from Citrix ADC to the Prometheus server.

[NSBASE-17100]

User Interface

8 MB upload limit support for systemfile NITRO API

The maximum upload limit for the systemfile NITRO API has been increased from 2 MB to 8 MB.

[NSCONFIG-7089]

Support for 64-bit numerical value in NITRO API responses

Earlier, the Citrix ADC appliance returned an unsigned integer or a long property-type value as a string in the NITRO API response because integer response was not supported for these types. Also, the appliance returned a double-data type stats-counter-rate value as an integer.

The NITRO APIs now support 64-bit integers. This support enables the appliance to return the following in the NITRO API responses:

A new query parameter largeintsupport has been introduced for enabling the 64-bit integers support in the NITRO APIs.

When largeintsupport is set to yes in a NITRO API request, the Citrix ADC appliance returns the exact integer value, in the NITRO API response. The earlier functionality is retained when largeintsupport is set to no , which is also the default setting.

[NSCONFIG-5399]

The issues that are addressed in Build 13.1-42.47.

Authentication, authorization, and auditing

When a Citrix ADC appliance is upgraded, users cannot access the Citrix ADC appliance using RADIUS authentication.

[NSHELP-33200]

On the Citrix ADC GUI, the Response Policies section on the Authentication Virtual Server page does not display the responder type cache policies.

[NSHELP-33111]

Gateway authentication via CWA client or native VPN clients might fail because of missing strings in the ns_aaa_relaystate_param_whitelist patset.

[NSHELP-33054]

Kerberos SSO impersonation with advanced encryption types might fail when an incorrect user principal name is used in the SSO credentials.

[NSHELP-32890, NSHELP-34087]

Citrix ADC appliance crashes while processing a bot signature if the format of the signature file is invalid.

[NSHELP-33690]

In the Citrix ADC GUI, the user-defined bot signature displays an incorrect base version.

[NSHELP-33546]

When you upgrade a Citrix ADC SDX appliance, in rare cases the following incorrect event appears in the Management Service GUI:

“SVM version and Hypervisor version are not compatible”

[NSHELP-32949]

A Citrix Gateway appliance crashes when evaluating a classic policy for a VPN URL.

[NSHELP-33683, CGOP-20369, NSHELP-34002, NSHELP-34030, NSHELP-34052, NSHELP-34076, NSHELP-34077, NSHELP-34100, NSHELP-34151, NSHELP-34180, NSHELP-34243, NSHELP-34276, NSHELP-34327, NSHELP-34402]

After upgrading a Citrix ADC appliance, the RDP proxy URLs do not work with the X1 portal theme and the message “Http/1.1 Object Not Found” appears.

[NSHELP-33676, NSHELP-33845, NSHELP-33921, NSHELP-34032]

When a Citrix ADC appliance is upgraded, the appliance might crash while processing the UDP traffic.

[NSHELP-33417, NSHELP-34031]

After upgrading a Citrix ADC appliance, the RDP proxy URLs become inaccessible and the error message “Http/1.1 Object Not Found” appears. This issue occurs when the custom parameters of the RDP URLs contain spaces.

[NSHELP-33333]

In a Citrix Gateway high availability setup, the primary and the secondary appliances might crash during a failover.

[NSHELP-33198, NSHELP-33483]

Some of the VPN sessions might get cleared or removed from the secondary ADC appliance after a failover.

[NSHELP-33125]

The Citrix Gateway appliance might crash if HDX Insight is enabled and a user logs in to StoreFront immediately after logging out.

[NSHELP-32907, NSHELP-33079, NSHELP-33289]

In a rare case, the Citrix ADC appliance might crash while fetching a STA monitor in a VPN deployment.

[NSHELP-32893]

After upgrading a Citrix Gateway appliance, the Configuration > Integrate with Citrix Products section is not displayed in the Citrix ADC GUI.

[NSHELP-32335]

The EPA scan to check the CA certificate of a client device fails on the Citrix ADC appliance when the CA certificates are of different domains.

[NSHELP-32118]

Citrix EPA plug-in for macOS crashes when GSLB is enabled on a Citrix ADC appliance.

[CGOP-22722]

In the Citrix Web App Firewall, when you enable the streaming and field consistency checks, it delays the transfer of the payload to the origin server. As a result, the POST method for the payload fails.

[NSHELP-33700]

The cookie hijacking redirect drops the query parameters from the request URL. As a result, the redirected request might fail.

[NSHELP-33633, NSHELP-33812]

The secondary node might crash if you use the same GSLB virtual server as the backup for multiple GSLB virtual servers.

[NSHELP-33400, NSHELP-34247]

The Citrix ADC appliance does not respond with the correct service IP address for GSLB domain query if the following settings are configured on the GSLB virtual server:

[NSHELP-32879]

In a high availability setup in INC mode, when there is an HA version mismatch, the secondary node might learn invalid routes from the primary node.

[NSHELP-33948]

In a Citrix ADC appliance with OSPF routing configured, the default route is not installed even when the OSPF default route LSA is present.

[NSHELP-33070]

The nstrace of a few incoming packets of an SSH session might incorrectly display a different receiving interface number and VLAN ID when all of the following conditions are met:

[NSHELP-32734]

The loading of SNMP MIB file to a network morning tool might fail because the SNMP trap name dataStreamRateLimitHit in the file is not in camel case.

[NSHELP-32634]

In a large scale NAT 64 setup, the Citrix ADC appliance might crash because of an internal packet engine mismatch issue.

[NSHELP-31985]

In a GSLB setup with one of the GSLB site IP address is configured in an admin partition, ARP requests for this GSLB site IP address from upstream routers fails to reach the admin partition. This issue occurs when all of the following conditions are met:

[NSHELP-30552]

For a Citrix ADC VPX release 13.1 build 37.38 on VMware ESX hypervisor with VMXNET3 interfaces, you see the following behavior in the HA setup:

The Citrix ADC VPX HA pair is not configured because the communication between the HA nodes is not established. As a result, the peer node status is displayed as UNKNOWN.

[NSPLAT-25677]

When you provide preboot user data in an OVF template from the ESX vSphere client, the ESXi host does not apply the preboot configuration.

[NSPLAT-24233, NSPLAT-25551]

DNS resolution fails if you configure more than three DNS server names in the DHCP option set in AWS VPC. This issue is seen in Citrix ADC VPX instances with releases earlier than 13.1 build 42.x.

[NSHELP-33171]

On the Citrix ADC SDX 8015/8400/8600 platform, you might see increased memory consumption on Xen Server.

[NSHELP-32260]

You might experience transmit stalls on a Citrix ADC SDX appliance with a 10G interface when heavy traffic is sent on this interface.

[NSHELP-31232]

A virtual server crashes due to a failed TLS1.3 connection, because the Citrix ADC appliance runs out of memory and a memory allocation request fails during the start of a TLS 1.3 handshake.

With this fix, the TLS 1.3 connection fails but the appliance does not crash.

[NSSSL-12200]

A virtual server may incorrectly terminate a TLS 1.3 handshake with a decrypt_error alert if the following conditions are met:

[NSHELP-33355]

After unbinding the DEFAULT cipher, when you disable a protocol version on a virtual server and later try to bind a cipher with this protocol listed in the description, the following error message appears.

No usable ciphers configured on the SSL vserver/service

This message is incorrect because the cipher is supported with other protocols that are enabled on the virtual server. For example,

Cipher Name: TLS1-ECDHE-RSA-AES256-SHA Description: SSLv3 Kx=ECC-DHE Au=RSA Enc=AES(256) Mac=SHA1 HexCode=0xc014

This cipher is supported for all the protocols starting from SSLv3 (SSLv3, TLS1, TLS11, TLS12). When you disable SSLv3 on a virtual server and then try to bind this cipher to that virtual server, the warning appears even though TLS1, TLS11, TLS12 protocols are still enabled on the virtual server.

With this fix, the warning appears only when a cipher is not supported for the configuration.

[NSHELP-32739]

The Citrix ADC appliance does not allow configuring certificates with a notBefore date older than 1970.

[NSHELP-32677]

The Citrix ADC appliance might crash if the following conditions are met:

[NSHELP-31560]

Customer applications that are not RFC compliant (RFC 7230) might fail after an upgrade to Citrix ADC 13.1. This failure occurs because of a mandatory compliance check that is enforced on the Citrix ADC appliance to comply with RFC 7230.

As part of the fix, this specific compliance check is moved under the HTTP profile parameter “-markRfc7230NonCompliantInval. “ Customers can disable this compliance check that was previously enforced.

[NSHELP-34046]

A Citrix ADC appliance might crash when both of the following conditions are met:

[NSHELP-33691]

In some cases, a Citrix ADC appliance might crash while processing a corrective acknowledgment sent by a server connection that is in the TIME_WAIT state.

[NSHELP-33469]

A Citrix ADC appliance might crash when it tries to access resources on the freed ICAP. This condition happens when the ICAP is in response modification (RESPMOD) mode.

[NSHELP-33403]

The Citrix ADC appliance is unable to send Logstream data from partitions consistently.

[NSHELP-33237]

The Citrix ADC appliance aborts the connection when it fails to parse the chunked value. This issue occurs when the Transfer-Encoding header has multiple values and Chunked is not the first value.

[NSHELP-32420]

The Citrix ADC appliance might crash if it processes a corrective ACK packet related to a server-side TCP connection.

[NSHELP-32290]

The Citrix ADC appliance configured with an SSL service crashes when the appliance receives a TCP FIN control packet followed by a TCP RESET control packet.

[NSHELP-31656]

When you create a Citrix Web App Firewall profile of the JSON type and try to update the Profile Settings , the JSON Error Object displays an empty list.

[NSUI-18453]

A system user account bound to a set of admin partitions might not be able to access the default partition through the NITRO APIs even if the Allow Default Partition option is enabled as part of the system global settings.

[NSHELP-33990]

The link for Citrix bot management profiles incorrectly appears in the Traffic Management > Content Switching page. When you click on that link, it renders a blank page. This issue occurs if you bind a bot policy to the content-switching virtual server.

[NSHELP-33697]

Logging on to the Citrix ADC GUI fails if your user name or domain name has a special character.

[NSHELP-33684]

When you clear the running Citrix ADC configurations, the Citrix ADC management session created by a classic TACACS configuration is disconnected even when the RBAconfig parameter is set to NO.

[NSHELP-33655]

When a user views the binding on a content switching policy, the content switching virtual server details are not displayed in the same row under Show Bindings .

[NSHELP-33149]

Support for power off option in the shutdown NITRO API

The shutdown NITRO API now supports the “-p now” option to shut down and power off a Citrix ADC appliance.

In the following example of a curl request, the shutdown NITRO API is used with the “-p now” option to shut down and power off a Citrix ADC appliance having the IP address 192.0.0.33.

curl -v -X POST -H Content-Type: application/json -u nsroot:examplepassword [http://192.0.0.33/nitro/v1/config/install?warning=yes](http://192.0.0.33/nitro/v1/config/install?warning=yes) -d '{"shutdown": {"args":"-p now"}}'

[NSHELP-32915]

After you create a profile for Citrix Web App Firewall and try to generate the configuration report of the application firewall in System > Reports , the following error appears:

“Failed to load PDF document.”

[NSHELP-32469]

In the cluster setup, the TFTP option is not displayed in the Protocol list, when creating a virtual server using the Citrix ADC GUI.

[NSHELP-32036]

On the Citrix ADC GUI, the System Log Files page (Configuration > System > Auditing > Syslog messages) and the Logs page (Configuration > Authentication > Logs) fail to load the log files.

[NSHELP-30868]

On the Citrix ADC GUI, the Saved vs Running configuration screen (System > Diagnostics) incorrectly displays HTML tags instead of displaying plain text.

[NSHELP-27169]

While viewing the policies bound to a content switching policy label in the Citrix ADC GUI, only 25 policies are displayed even though there are more policies bound to that policy label.

[NSHELP-23428]

The issues that exist in release 13.1-42.47.

HDX Insight does not report an application launch failure caused by a user trying to launch an application or desktop to which the user does not have access.

[NSINSIGHT-943]

Administrators cannot perform custom logging for authentication failures that happen due to invalid credentials. This issue occurs because the Citrix ADC responder policies fail to detect errors for login failures.

[NSAUTH-11151]

ADFS proxy profile can be configured in a cluster deployment. The status for a proxy profile is incorrectly displayed as blank upon issuing the following command. show adfsproxyprofile <profile name>

Workaround: Connect to the primary active Citrix ADC in the cluster and run the show adfsproxyprofile <profile name> command. It would display the proxy profile status.

[NSAUTH-5916]

The Configure Authentication LDAP Server page on the Citrix ADC GUI becomes unresponsive if you pursue the following steps:

Workaround: Close and open the Test LDAP Reachability option.

[NSAUTH-2147]

Packet drops are seen on a VPX instance hosted on a Citrix ADC SDX appliance if the following conditions are met:

[NSHELP-21992]

If the Citrix Secure Access related registry values are greater than 1500 characters, then the log collector fails to gather the error logs.

[NSHELP-33457]

When using Windows Filtering Platform (WFP) driver, sometimes intranet access does not work after the VPN is reconnected.

[NSHELP-32978]

The Citrix Secure Access client, version 21.7.1.2 and later, fails to upgrade to later versions for users with no administrative privileges. This issue is applicable only if the Citrix Secure Access client upgrade is done from a Citrix ADC appliance.

[NSHELP-32793]

When users click the Home Page tab on the Citrix Secure Access screen for Windows, the page displays the connection refused error.

[NSHELP-32510]

On a Mac device using Chrome, the VPN extension crashes while accessing two FQDNs.

[NSHELP-32144]

In some cases, empty proxy settings in Citrix Gateway release 13.0 or 13.1 causes Citrix SSO to create improper proxy settings.

[NSHELP-31970]

Debug logging control for Citrix Secure Access client is now independent of Citrix Gateway and it can be enabled or disabled from the plug-in UI for both machine and user tunnel.

[NSHELP-31968]

Direct connections to the resources outside of the tunnel established by Citrix Secure Access might fail if there is a significant delay or congestion.

[NSHELP-31598]

Customized EPA failure log message is not displayed on the Citrix Gateway portal. Instead, the message “internal error” is displayed.

[NSHELP-31434]

Sometimes, the Windows auto logon does not work when a user logs into the windows machine in an Always-On service mode. The machine tunnel does not transition to the user tunnel and the message “Connecting…” is displayed in the VPN plug-in UI.

[NSHELP-31357, CGOP-21192, NSHELP-34211]

When Always on is configured, the user tunnel fails because of the incorrect version number (1.1.1.1) in the aoservice.exe file.

[NSHELP-30662]

Users cannot connect to the Citrix Gateway appliance after changing the ‘networkAccessOnVPNFailure’ always on profile parameter from ‘fullAccess’ to ‘onlyToGateway`.

[NSHELP-30236]

The gateway home page is not displayed immediately after the gateway plug-in establishes the VPN tunnel successfully. To fix this issue, the following registry value is introduced.

HKLMSoftwareCitrixSecure Access ClientSecureChannelResetTimeoutSeconds Type: DWORD

By default, this registry value is not set or added. When the value of “SecureChannelResetTimeoutSeconds” is 0 or not added, the fix to handle the delay does not work, which is the default behavior. Admin has to set this registry on the client to enable the fix (that is to display the home page immediately after the gateway plug-in establishes the VPN tunnel successfully).

[NSHELP-30189]

The Windows VPN client does not honor the ‘SSL close notify’ alert from the server and sends the transfer login request on the same connection.

[NSHELP-29675]

Client certificate authentication fails for Citrix SSO for macOS if there are no client certificates in the macOS Keychain.

[NSHELP-28551]

Sometimes, a user is logged out of Citrix Gateway within a few seconds when the client idle timeout is set.

[NSHELP-28404]

EPA plug-in for Windows does not use local machine’s configured proxy and connects directly to the gateway server.

[NSHELP-24848]

VPN plug-in doesn’t establish tunnel after Windows logon, if the following conditions are met:

[NSHELP-23584]

Sometimes while browsing through schemas, the error message “Cannot read property ‘type’ of undefined” appears.

[NSHELP-21897]

In a Citrix ADC cluster setup, HDX Insight and Gateway Insight cannot be enabled simultaneously.

[CGOP-23570]

The Windows OS option is not listed in the Expression Editor drop-down list for pre-authentication policies and authentication actions on the Citrix ADC GUI. However, if you have already configured the Widows OS scan on a previous Citrix ADC build using the GUI or the CLI, the upgrade does not impact the functionality. You can use the CLI to make changes, if required.

Workaround:

Use the CLI commands for the configuration.

[CGOP-22966]

If you would like to use Always On VPN before Windows Logon functionality, it is recommended to upgrade to Citrix Gateway 13.0 or later. This enables you to leverage the additional enhancements introduced in release 13.0 that is not available in the 12.1 release.

[CGOP-19355]

The Gateway Insight report incorrectly displays the value “Local” instead of “SAML” in the Authentication Type field for SAML error failures.

[CGOP-13584]

In a high availability setup, during Citrix ADC failover, SR count increments instead of the failover count in Citrix ADM.

[CGOP-13511]

When an ICA connection is launched from a MAC receiver version 19.6.0.32 or Citrix Virtual Apps and Desktops version 7.18, HDX Insight feature is disabled.

[CGOP-13494]

When EDT Insight feature is enabled, sometimes audio channels might fail during network discrepancy.

[CGOP-13493]

While accepting local host connections from the browser, the Accept Connection dialog box for macOS displays content in the English language irrespective of the language selected.

[CGOP-13050]

The text “Home Page” in the Citrix SSO app > Home page is truncated for some languages.

[CGOP-13049]

An error message appears when you add or edit a session policy from the Citrix ADC GUI.

[CGOP-11830]

In Outlook Web App (OWA) 2013, clicking Options under the Setting menu displays a Critical error dialog box. Also, the page becomes unresponsive.

[CGOP-7269]

In a high-availability setup, subscriber sessions of the primary node might not be synchronized to the secondary node. This is a rare case.

[NSLB-7679]

The serviceGroupName format in the entityofs trap for the service group is as follows: <service(group)name>?<ip/DBS>?<port>

In the trap format, the service group is identified by an IP address or a DBS name and port. The question mark (“?”) is used as a separator. The Citrix ADC sends the trap with the question mark (“?”). The format appears the same in the Citrix ADM GUI. This is the expected behavior.

[NSHELP-28080]

When a forced synchronization takes place in a high availability setup, the appliance executes the set urlfiltering parameter command in the secondary node. As a result, the secondary node skips any scheduled update until the next scheduled time mentioned in the “TimeOfDayToUpdateDB” parameter.

[NSSWG-849]

AlwaysOnAllow list registry does not work as expected if the registry value is greater than 2000 bytes.

[NSHELP-31836]

A Citrix ADC appliance might restart due to management CPU stagnation if connectivity issue occurs with the URL Filtering third party vendor.

[NSHELP-22409]

In a Citrix ADC BLX appliance with DPDK support, tagged VLANs are not supported for DPDK Intel i350 NIC ports. This is observed as it is a known issue present on the DPDK driver.

[NSNET-25299]

A Citrix ADC BLX appliance with DPDK might fail to restart if all of the following conditions are met:

The issue is logged as an error message in “/var/log/ns.log”:

Note: x is a number <= number of worker-processes.

Workaround: Allocate a high number of hugepages and then restart the appliance.

[NSNET-25173]

A Citrix ADC BLX appliance in DPDK mode might take a little longer to restart because of the DPDK easiness functionality.

[NSNET-24449]

The following interface operations are not supported for Intel X710 10G (i40e) interfaces on a Citrix ADC BLX appliance with DPDK:

[NSNET-16559]

Installation of a Citrix ADC BLX appliance might fail on a Debian based Linux host (Ubuntu version 18 and later) with the following dependency error:

The following packages have unmet dependencies: blx-core-libs:i386 : PreDepends: libc6:i386 (>= 2.19) but it is not installable

Workaround: Run the following commands in the Linux host CLI before installing a Citrix ADC BLX appliance:

[NSNET-14602]

In some cases of FTP data connections, the Citrix ADC appliance performs only NAT operation and not TCP processing on the packets for TCP MSS negotiation. As a result, the optimal interface MTU is not set for the connection. This incorrect MTU setting results in fragmentation of packets and impacts CPU performance.

[NSNET-5233]

The Citrix ADC appliance might not generate “coldStart” SNMP trap messages after a cold restart.

[NSHELP-27917]

When an admin partition memory limit is changed in Citrix ADC appliance, the TCP buffering memory limit gets automatically set to admin partition new memory limit.

[NSHELP-21082]

Some python packages are not installed, when you downgrade the Citrix ADC appliance from 13.1-4.x version and higher versions to any of the following versions:

[NSPLAT-21691]

When you delete an autoscale setting or a VM scale set from an Azure resource group, delete the corresponding cloud profile configuration from the Citrix ADC instance. Use the rm cloudprofile command to delete the profile.

[NSPLAT-4520]

In a high availability setup on Azure, upon logon to the secondary node through GUI, the first-time user (FTU) screen for autoscale cloud profile configuration appears. Workaround: Skip the screen, and log on to the primary node to create the cloud profile. The cloud profile should be always configured on the primary node.

[NSPLAT-4451]

Connections might hang if the size of processing data is more than the configured default TCP buffer size.

Workaround: Set the TCP buffer size to maximum size of data that needs to be processed.

[NSPOLICY-1267]

On a heterogeneous cluster of Citrix ADC SDX 22000 and Citrix ADC SDX 26000 appliances, there is a config loss of SSL entities if the SDX 26000 appliance is restarted.

[NSSSL-9572]

You cannot add an Azure Key Vault object if an authentication Azure Key Vault object is already added.

[NSSSL-6478]

You can create multiple Azure Application entities with the same client ID and client secret. The Citrix ADC appliance does not return an error.

[NSSSL-6213]

The following incorrect error message appears when you remove an HSM key without specifying KEYVAULT as the HSM type. ERROR: crl refresh disabled

[NSSSL-6106]

Session Key Auto Refresh incorrectly appears as disabled on a cluster IP address. (This option cannot be disabled.)

[NSSSL-4427]

An incorrect warning message, “Warning: No usable ciphers configured on the SSL vserver/service,” appears if you try to change the SSL protocol or cipher in the SSL profile.

[NSSSL-4001]

An expired session ticket is honored on a non-CCO node and on an HA node after an HA failover.

[NSSSL-3184, NSSSL-1379, NSSSL-1394]

High RTT is observed for a TCP connection if the following condition is met:

For a Citrix ADC appliance to use the NILE algorithm for congestion control, the conditions must exceed the slow start threshold, which is coupled with the maximum congestion window

So, until the maximum configured congestion window is reached, the Citrix ADC continues to accept data and ends up with high RTT.

[NSHELP-31548]

The MAX_CONCURRENT_STREAMS value is set to 100 by default if the appliance does not receive the max_concurrent_stream settings frame from the client.

[NSHELP-21240]

The mptcp_cur_session_without_subflow counters incorrectly decrement to a negative value instead of zero.

[NSHELP-10972]

In rare case scenarios, the streams that were created before HTTP/2 WebSocket stream was created might get terminated when the WebSocket’s server-side connection closes.

This issue occurs because the Citrix ADC appliance does not support connection multiplexing for HTTP/2 WebSocket.

Workaround: Disable connection multiplexing for the related HTTP2 profile by using the following command:

set httpProfile <name> [-conMultiplex ( ENABLED | DISABLED )]

[NSBASE-17449]

In a cluster deployment, if you run “force cluster sync” command on a non-CCO node, the ns.log file contains duplicate log entries.

[NSBASE-16304, NSGI-1293]

When you install Citrix ADM on a Kubernetes cluster, it does not work as expected because the required processes might not come up.

Workaround : Reboot the Management pod.

[NSBASE-15556]

Client IP and Server IP are inverted in HDX Insight SkipFlow record when LogStream transport type is configured for Insight.

[NSBASE-8506]

In Citrix ADC GUI, the “Help” link present under the “Dashboard” tab is broken.

[NSUI-14752]

Create/Monitor CloudBridge Connector wizard might become unresponsive or fails to configure a cloudbridge connector.

Workaround: Configure cloudbridge connectors by adding IPSec profiles, IP tunnels, and PBR rules by using the Citrix ADC GUI or CLI.

[NSUI-13024]

If you create an ECDSA key by using the GUI, the type of curve is not displayed.

[NSUI-6838]

In a high availability setup, VPN user sessions get disconnected if the following condition is met:

Workaround: Perform successive manual HA failover only after the HA synchronization is completed (Both the nodes are in Sync success state).

[NSHELP-25598]

If you (system administrator) perform all the following steps on a Citrix ADC appliance, the system users might fail to log in to the downgraded Citrix ADC appliance.

To display the list of these system users by using the CLI: At the command prompt, type:

query ns config -changedpassword [-config <full path of the configuration file (ns.conf)>]

Workaround: To fix this issue, use one of the following independent options:

For more information, see /en-us/citrix-adc/13/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-reset-default-amin-pass-tsk.html .

[NSCONFIG-3188]

In this article

This Preview product documentation is Citrix Confidential.

You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.

The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.

The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.

If you do not agree, select Do Not Agree to exit.

Machine Translation Feedback Form

assign ip address to network load balancer

A server is configured with two network cards. To utilize th

 Clustering

 NIC teaming

 VLAN tagging

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()

Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.  Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address.  What should you modify on Server1?()

Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()

A. SHA not responding to NAP client

B. SHA unable to contact required services

C. SHV not responding

D. SHV unable to contact required services

An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()

A server is configured with two network cards. To utilize the bandwidth of both network cards at the same time without assigning more than one IP address, which of the following load balancing techniques should be used?()

A. network or subnetwork IP address

B. broadcast address on the network

C. IP address leased to the LAN

D. IP address used by the interfaces

E. manually assigned address to the clients

F. designated IP address to the DHCP server

A server is configured with two network cards. To utilize the band width of both network cards at the same time without assigning more than one IP address,which of the following load balancing techniques should be used?()

Your network consists of a single Active Directory domain and a single network segment. All client computers are configured to receive their IP configurations automatically.You deploy two DHCP servers named Server1 and Server2. Each DHCP server has one scope. Users report IP address conflicts.You need to ensure that clients receive unique addresses.  What should you do on Server1 and Server2?()

单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A SHA not responding to NAP clientB SHA unable to contact required servicesC SHV not respondingD SHV unable to contact required services

单选题Your network contains two Windows Server Update Services (WSUS) servers named Server1 and Server2. Server1 is a member of a domain named contoso.com. Server2 is a standalone server. Server2 is configured as an autonomous downstream server.You need to ensure that all updates approved on Server1 are automatically approved on Server2. Which options should you modify?()A Automatic ApprovalsB Products and ClassificationsC Synchronization ScheduleD Update Source and Proxy Server

多选题Your network uses IPv4.You install a server that runs Windows Server 2008 at a branch office.The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform? (Each correct answer presents part of the solution.()AInstall the Routing and Remote Access Services role service.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPv4 Router Routing and Remote Access option.

多选题Your network uses ipv4. You install a server that runs windows server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform? ()AInstall the routing and remote access role.BRun the netsh ras ip set access ALL command.CRun the netsh interface ipv4 enable command.DEnable the IPV4 router routing and remote access option.

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

单选题Your network consists of a single Active Directory domain and two network segments named Subnet1 and Subnet2.You deploy a server named Server1 that runs Routing and Remote Access. Server1 is configured as a router between the two network segments.You deploy a DHCP server on Subnet1. You configure a DHCP scope for each network segment.Client computers that run Windows XP Professional Service Pack 3 (SP3) are deployed on both network segments and are configured to receive IP configurations dynamically.You discover that all client computers on Subnet2 have Automatic Private IP Addressing (APIPA) addresses.You need to ensure that all client computers on Subnet2 receive their IP configurations from the DHCP server.  What should you do in Routing and Remote Access?()A Disable IP Routing. B Create a static route. C Enable demand-dial routing. D Enable a DHCP Relay Agent.

Your network uses IPv4.You install a server that runs Windows Server 2008 R2 at a branch office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office.Which two actions should you perform?()A、Install the Routing and Remote Access Services role service.B、Run the netsh ras ip set access ALL command.C、Run the netsh interface ipv4 enable command.D、Enable the IPv4 Router Routing and Remote Access option.

单选题Your network contains two servers named Server1 and Server2 that run Windows Server 2012 R2.  Server1 is a DHCP server that is configured to have a scope named Scope1. Server2 is configured to obtain an IP address automatically. In Scope1, you create a reservation named Res_Server2 for Server2. A technician replaces the network adapter on Server2. You need to ensure that Server2 can obtain the same IP address.  What should you modify on Server1?()A The Advanced settings of Res_Server2B The MAC address of Res Server2C The Network Access Protection Settings of Scope1D The Name Protection settings of Scope1

Your network uses IPv4. You install a server that runs Windows Server 008 at a brach office. The server is configured with two network interfaces. You need to configure routing on the server at the branch office. Which two actions should you perform?() A、 Install the Routing and Remote Access role.B、 Run the netsh ras ip set access ALL commandC、 Run the netsh interface ipv4 enable commandD、 Enable the IPv4 Router Routing and Remote Access option

多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

IMAGES

  1. amazon web services

    assign ip address to network load balancer

  2. Assign Static IP Address

    assign ip address to network load balancer

  3. IP Addresses

    assign ip address to network load balancer

  4. Client IP Address Logging in IIS with Source NAT Load Balancer

    assign ip address to network load balancer

  5. Assign a Static IP Address

    assign ip address to network load balancer

  6. Static IP Addresses with AWS Network Load Balancer (NLB)

    assign ip address to network load balancer

VIDEO

  1. CCNA Service Provider (SPNGN1) -lesson 7

  2. Network Load Balancer (NLB) Hands On

  3. Hardware and Networking training in hyderabad

  4. HTTP Load Balancer with Cloud Armor

  5. IP Addressing

  6. How to Configure DHCP Server & Reserved IP Address to a DHCP Client

COMMENTS

  1. Network Load Balancers

    You can set the types of IP addresses that clients can use with your load balancer. The following are the IP address types: ipv4 Clients must connect to the load balancer using IPv4 addresses (for example, 192.0.2.1). IPv4 enabled load balancers (both internet-facing and internal) support TCP, UDP, TCP_UDP, and TLS listeners. dualstack

  2. Attach an Elastic IP address to an internet-facing Network Load Balancer

    Add a new node with an Elastic IP address to an existing Network Load Balancer Open the Amazon EC2 console. Choose the Region where your Network Load Balancer is located. Under Load Balancing, choose Load Balancers. Select your Network Load Balancer. Choose Actions, and then choose Edit Subnets.

  3. I need a static IP address for my Application Load Balancer. How can I

    To create and configure a Network Load Balancer to forward HTTP and HTTPS traffic to your Application Load Balancer, follow these steps: 1. Open the Amazon EC2 console. 2. In the navigation pane, expand Load Balancing, and then choose Load Balancers. 3. Choose Create a Load Balancer. 4.

  4. Manage a public IP address with a load balancer

    You'll select the IP address you created in the prerequisites as the frontend IP of the load balancer. Sign in to the Azure portal. In the search box at the top of the portal, enter Load balancer. In the search results, select Load balancers. Select + Create. In the Basics tab of Create Load balancer, enter or select the following information:

  5. Configure the Software Load Balancer for Load Balancing and Network

    Assign a front-end IP address, commonly referred to as a Virtual IP (VIP). The VIP must be from an unused IP in one of the logical network IP pools given to the load balancer manager.

  6. Assigning Static IP Address to AWS Load Balancer

    It created 2 static IP Addresses and a static DNS pointing to my Application load balancer. Configuring Global Accelerator Set listeners as TCP port 80, 443 Select your load balancer endpoint ( AWS Global Accelerator Configuration) Add cname record for your dns pointing to the static dns it created (mywebsite.com > globalacceleratorDNS.com).

  7. Need help setting up a load balancer on a home network with 2 ONTs from

    Then, you need to connect both ONTs to the load balancer with Ethernet cables, and configure the load balancer to handle the two connections, and to manage the PPPoE authentication for each ISP. Once the load balancer is set up, you can connect your devices like your server or PC to it, and they'll get an IP address from the load balancer.

  8. Load Balancing configuration in NSX

    Activating the Load Balancer. Go to the Networking tab and click on Load Balancing in the Network Services section on the left. Then go to the Load Balancers tab and click ADD LOAD BALANCER. Enter loadbalancer-on-t1 below Name, select ovh-T1-gw under Attachment and click SAVE. Click NO.

  9. Introduction to Network Load Balancer

    A public network load balancer has a public IP address that is accessible from the internet. A private network load balancer has an IP address from the hosting subnet, which is visible only within your VCN. You can configure multiple listeners for an IP address to load balance Layer 4 (TCP/UDP/ICMP) traffic.

  10. Accessing network ip inner wsl from windows #9733

    Hi, I have a load-balancer on my WSL with a dedicate IP address on port 80, this IP is not the same as my WSL IP (WSL IP is accessible from the windows). Is there any way to access this IP on port ...

  11. Monitoring Citrix ADC and applications using Prometheus

    Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field. Use case 7: Configure load balancing in DSR mode by using IP Over IP. Use case 8: Configure load balancing in one-arm mode. Use case 9: Configure load balancing in the inline mode. Use case 10: Load balancing of intrusion detection system servers

  12. Is it possible to assign a static IP for each network

    Zaref what you really should do is figure out which base ip you want to use. For example 192.168.1.110 then subnet the network so that computer 2, 3, 4, etc. Will share a different segment of the same network. Check out this youtube video ( IP Addresses and Subnetting - YouTube) which will teach you more than you need to know about it.

  13. Release Notes for Citrix ADC 13.1-42.47 Release

    Use case 6: Configure load balancing in DSR mode for IPv6 networks by using the TOS field. Use case 7: Configure load balancing in DSR mode by using IP Over IP. Use case 8: Configure load balancing in one-arm mode. Use case 9: Configure load balancing in the inline mode. Use case 10: Load balancing of intrusion detection system servers

  14. 单选题A server is configured with two network cards. To utilize the band

    When a DHCP server is configured, which two IP addresses should never be assignable to hosts? () A、network or subnetwork IP address; B、broadcast address on the network; C、IP address leased to the LAN; D、IP address used by the interfaces; E、manually assigned address to the clients; F、designated IP address to the DHCP server ...