Implementing NetScaler VPX implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms

Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms About This Book Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms Enrich your networking s...

Descripción completa

Detalles Bibliográficos
Otros Autores: Sandbu, Marius, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham : Packt Publishing 2015.
Edición:2nd ed
Colección:Packt enterprise.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629590006719
Tabla de Contenidos:
  • Deploying VPNDeploying clientless access; Binding the features together; Unified Gateway; Tuning; Redirection; Profiles; GUI customization; Testing; Summary; Chapter 3: Load Balancing; Load balancing a generic web application; Assigning weights to a service; Redirect URL; Logging and statistics; Backup vServer and failover; Load balancing StoreFront; Load balancing a web interface; Load balancing XML Broker; Load balancing the Desktop Delivery Controller; Load balancing TFTP for provisioning servers; Load balancing SharePoint 2013; Load balancing Lync 2013; Load balancing Exchange 2013
  • Load balancing IMAP on ExchangeLoad balancing MSSQL; Load balancing DNS; Persistency groups; Summary; Chapter 4: Mobilestream; Compression; Implementing compression policies; Defining global compression settings; Creating custom compression policies; Testing our compression policies; Caching; Enabling caching; Creating a content group; Creating a caching policy; Fine-tuning caching; Frontend optimization; Summary; Chapter 5: Optimizing NetScaler Traffic; Tuning for virtual environments; TCP tuning; SSL tuning; HTTP/2 and SPDY; Summary; Chapter 6: High Availability
  • Setting up an AAA vServerAuthentication policy; Authorization policy; Authentication profiles; Troubleshooting AAA and setting up audit policies; Audit policies; Summary; Index