SlideShare a Scribd company logo
1 of 25
© Indira Gandhi Delhi Technical University for Women
Presenting
SUBMISSION BY
Yansi Keim
M. Tech 1st Year
Information Security Management
April 2016
 What is Citrix?
 Overview of Citrix NetScaler
 Understanding Citrix NetScaler
 References
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
•
©I.G.D.T.U.W.
Researching
Shopping
©I.G.D.T.U.W.
SLOW NETWORK
HIGH SERVER LOADS
loading
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
For Mobile and Desktop
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
©I.G.D.T.U.W.
 The Citrix NetScaler product is an application switch that performs application-
specific traffic analysis to intelligently distribute, optimize, and secure Layer 4-
Layer 7 (L4-L7) network traffic for web applications.
 It has switching feature. When deployed in front of application servers, a
NetScaler ensures optimal distribution of traffic by the way in which it directs
client requests.
 NetScaler security and protection features protect web applications from
application-layer attacks.
 A NetScaler allows legitimate client requests and can block malicious requests.
 It provides built-in defenses against denial-of-service (DoS) attacks and supports
features that protect applications against legitimate surges in application traffic
that would otherwise overwhelm the servers.
©I.G.D.T.U.W.
 A NetScaler resides between the clients and the servers, so that client requests
and server responses pass through it.
 In a typical installation, virtual servers (vservers) configured on the NetScaler
provide connection points that clients use to access the applications behind the
NetScaler.
 In this case, the NetScaler owns public IP addresses that are associated with its
vservers, while the real servers are isolated in a private network.
20
©I.G.D.T.U.W.
©I.G.D.T.U.W.
Server sees eleven packets
Client Server
SYN
ACK
SYN+ACK
GET
FIN
ACK
ACK
Data
Data
Data
FIN
Server de-allocates storage for
the connection
Server allocates storage for
connection
Server sees
four packets
Client ServerNetScaler
SYN
ACK
SYN+ACK
GET
FIN
ACK
ACK
Data
Data
Data
GET
Data
Data
Data
FIN
Citrix Confidential - Do Not Distribute
Compression
Caching
TCP Session
Management
Citrix

More Related Content

Viewers also liked

July132000
July132000July132000
July132000
CTIN
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
CTIN
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Basis Technology
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
Mandy Jenkins
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
Chandra Pr. Singh
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
Eduardo Chavarro
 

Viewers also liked (20)

Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
July132000
July132000July132000
July132000
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Sleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKINGSleuth kit by echavarro - HABEMUSHACKING
Sleuth kit by echavarro - HABEMUSHACKING
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 

Similar to Citrix

Sprin VTUG citrix Solutions
Sprin VTUG citrix SolutionsSprin VTUG citrix Solutions
Sprin VTUG citrix Solutions
csharney
 
ig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xgig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xg
Ian Messiter
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
The-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdfThe-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdf
NetCom Learning
 

Similar to Citrix (20)

Cloud computing intro
Cloud computing introCloud computing intro
Cloud computing intro
 
Sprin VTUG citrix Solutions
Sprin VTUG citrix SolutionsSprin VTUG citrix Solutions
Sprin VTUG citrix Solutions
 
Cisco + Intel Cloud Services
Cisco + Intel Cloud ServicesCisco + Intel Cloud Services
Cisco + Intel Cloud Services
 
ig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xgig_push_your_business_forward_faster_en_xg
ig_push_your_business_forward_faster_en_xg
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
2015 Phoenix Mobile Festival Keynote
2015 Phoenix Mobile Festival Keynote2015 Phoenix Mobile Festival Keynote
2015 Phoenix Mobile Festival Keynote
 
Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0Cloud Computing & Cybersecurity in Industry 4.0
Cloud Computing & Cybersecurity in Industry 4.0
 
The future of work
The future of workThe future of work
The future of work
 
Highlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case StudiesHighlights from 2015 Citrix Customer Case Studies
Highlights from 2015 Citrix Customer Case Studies
 
The-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdfThe-Roadmap-to-Master-Cloud.pdf
The-Roadmap-to-Master-Cloud.pdf
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 
Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?Citrix Cloud Services - Are they right for you ?
Citrix Cloud Services - Are they right for you ?
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一
 
Big data on cloud infrastructure
Big data on cloud infrastructure Big data on cloud infrastructure
Big data on cloud infrastructure
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Agile at the Intersection of Mobile, Cloud, and the Internet of Things
Agile at the Intersection of Mobile, Cloud, and the Internet of ThingsAgile at the Intersection of Mobile, Cloud, and the Internet of Things
Agile at the Intersection of Mobile, Cloud, and the Internet of Things
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 

More from Yansi Keim

Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication Generation
Yansi Keim
 

More from Yansi Keim (15)

Different climatic regions of the world
Different climatic regions of the worldDifferent climatic regions of the world
Different climatic regions of the world
 
E commerce
E commerceE commerce
E commerce
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Introduction to Facebook
Introduction to FacebookIntroduction to Facebook
Introduction to Facebook
 
Using Smartphones
Using SmartphonesUsing Smartphones
Using Smartphones
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 
Security economics
Security economicsSecurity economics
Security economics
 
The design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocolsThe design philosophy of DARPA internet protocols
The design philosophy of DARPA internet protocols
 
Vartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatvVartman samaz mein vigyapan ka mahatv
Vartman samaz mein vigyapan ka mahatv
 
Sleeping beauty
Sleeping beautySleeping beauty
Sleeping beauty
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
BitCoins
BitCoinsBitCoins
BitCoins
 
Mobile Communication Generation
Mobile Communication GenerationMobile Communication Generation
Mobile Communication Generation
 
Docker
DockerDocker
Docker
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Recently uploaded (20)

AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Citrix

  • 1. © Indira Gandhi Delhi Technical University for Women Presenting SUBMISSION BY Yansi Keim M. Tech 1st Year Information Security Management April 2016
  • 2.  What is Citrix?  Overview of Citrix NetScaler  Understanding Citrix NetScaler  References ©I.G.D.T.U.W.
  • 7. SLOW NETWORK HIGH SERVER LOADS loading ©I.G.D.T.U.W.
  • 16.
  • 19.  The Citrix NetScaler product is an application switch that performs application- specific traffic analysis to intelligently distribute, optimize, and secure Layer 4- Layer 7 (L4-L7) network traffic for web applications.  It has switching feature. When deployed in front of application servers, a NetScaler ensures optimal distribution of traffic by the way in which it directs client requests.  NetScaler security and protection features protect web applications from application-layer attacks.  A NetScaler allows legitimate client requests and can block malicious requests.  It provides built-in defenses against denial-of-service (DoS) attacks and supports features that protect applications against legitimate surges in application traffic that would otherwise overwhelm the servers. ©I.G.D.T.U.W.
  • 20.  A NetScaler resides between the clients and the servers, so that client requests and server responses pass through it.  In a typical installation, virtual servers (vservers) configured on the NetScaler provide connection points that clients use to access the applications behind the NetScaler.  In this case, the NetScaler owns public IP addresses that are associated with its vservers, while the real servers are isolated in a private network. 20 ©I.G.D.T.U.W.
  • 22. Server sees eleven packets Client Server SYN ACK SYN+ACK GET FIN ACK ACK Data Data Data FIN Server de-allocates storage for the connection Server allocates storage for connection
  • 23. Server sees four packets Client ServerNetScaler SYN ACK SYN+ACK GET FIN ACK ACK Data Data Data GET Data Data Data FIN
  • 24. Citrix Confidential - Do Not Distribute Compression Caching TCP Session Management