It has been a while but here is some more NetScaler madness for you, on Spilt Tunnelling this time. Hopefully I’m not boring you guys just yet (because there are a few more coming). Split tunnelling is a feature specific to SSL VPN’s and controls how the client (plugin) decides what traffic must (or may) be sent through the VPN tunnel and what traffic may be sent out directly on its local network, usually involving Internet facing traffic.
Citrix NetScaler… The basics continued, part four. What about SSL?
I think we all know port 443 and the SSL (Secure Socket Layer) protocol that goes with it right? When securing our inbound (incoming) as well outbound (outgoing) network traffic we have to deal with things like certificates, public and private key’s, certificate authorities (CA), and so on and so forth. This can be confusing. Where do certificates get applied, what is a CA, what types of certificates are there and which ones do we use? Also, once applied, how does the NetScaler actually know who it is communicating with and how is traffic secured? Using the NetScaler to offload SSL you say? Let’s have a look.
NetScaler SSL Offloading for XenMobile MDM… Finally!
Well over a month ago Citrix released the XenMobile Device Manager SSL Offload Server Patch for NetScaler. And although this has been something we’ve been waiting for, although ‘we’ is probably still a relatively small group, for some reason I haven’t read or heard a thing about it. Perhaps XenMobile isn’t as popular as I thought or people just don’t mind putting their MDM machines in their DMZ’s, I know I would. Whichever the case may be, from now on you can securely place your MDM machine on your internal network without having to worry about potential unsecure connections, SSL only! Although I do highlight the XenMobile MDM server patch, the below is applicable to other sorts of (web) services as well.