CITRIX SYSTEMS, INC., 2012. ALL RIGHTS RESERVED. NO PART OF THIS DOCUMENT MAY BE
REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS OR USED TO MAKE DERIVATIVE WORK
(SUCH AS TRANSLATION, TRANSFORMATION, OR ADAPTATION) WITHOUT THE EXPRESS WRITTEN
PERMISSION OF CITRIX SYSTEMS, INC.
ALTHOUGH THE MATERIAL PRESENTED IN THIS DOCUMENT IS BELIEVED TO BE ACCURATE, IT IS
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE ALL
RESPONSIBILITY FOR THE USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS MANUAL.
CITRIX SYSTEMS, INC. OR ITS SUPPLIERS DO NOT ASSUME ANY LIABILITY THAT MAY OCCUR DUE TO THE
USE OR APPLICATION OF THE PRODUCT(S) DESCRIBED IN THIS DOCUMENT. INFORMATION IN THIS
DOCUMENT IS SUBJECT TO CHANGE WITHOUT NOTICE. COMPANIES, NAMES, AND DATA USED IN
EXAMPLES ARE FICTITIOUS UNLESS OTHERWISE NOTED.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to
comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to
provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this
equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the
interference at their own expense.
Modifying the equipment without Citrix' written authorization may result in the equipment no longer complying with FCC
requirements for Class A digital devices. In that event, your right to use the equipment may be limited by FCC
regulations, and you may be required to correct any interference to radio or television communications at your own
expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was
probably caused by the NetScaler appliance. If the NetScaler equipment causes interference, try to correct the
interference by using one or more of the following measures:
Move the NetScaler equipment to one side or the other of your equipment.
Move the NetScaler equipment farther away from your equipment.
Plug the NetScaler equipment into an outlet on a different circuit from your equipment. (Make sure the NetScaler
equipment and your equipment are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Citrix Systems, Inc., could void the FCC approval and negate your
authority to operate the product.
BroadCom is a registered trademark of BroadCom Corporation. Fast Ramp, NetScaler, and NetScaler Request Switch
are trademarks of Citrix Systems, Inc. Linux is a registered trademark of Linus Torvalds. Internet Explorer, Microsoft,
PowerPoint, Windows and Windows product names such as Windows NT are trademarks or registered trademarks of
the Microsoft Corporation. NetScape is a registered trademark of Netscape Communications Corporation. Red Hat is a
trademark of Red Hat, Inc. Sun and Sun Microsystems are registered trademarks of Sun Microsystems, Inc. Other
brand and product names may be registered trademarks or trademarks of their respective holders.
Learn about the Citrix® NetScaler® collection of documentation, including information
about support options and ways to send us feedback.
In This Preface:
w Formatting Conventions for NetScaler Documentation
w Documentation Available on the NetScaler Appliance
w Getting Service and Support
w NetScaler Documentation Feedback
For information about new features and enhancements for this release, see the Citrix
NetScaler 9.3 Release Notes at http://support.citrix.com/article/CTX128669.
Formatting Conventions for NetScaler
Documentation
The NetScaler documentation uses the following formatting conventions.
Table 1. Formatting Conventions
ConventionMeaning
BoldfaceIn text paragraphs or steps in a
procedure, information that you type
exactly as shown (user input), or an
element in the user interface.
Monospace
<angle brackets>A term enclosed in angle brackets is a
[ brackets ]
Text that appears in a command-line
interface. Used for examples of
command-line procedures. Also used to
distinguish interface terms, such as
names of directories and files, from
ordinary text.
variable placeholder, to be replaced with
an appropriate value. Do not enter the
angle brackets.
Optional items in command statements.
For example, in the following command,
[ -range <positiveInteger> ] means that
17
Preface
ConventionMeaning
you have the option of entering a range,
but it is not required:
A separator between options in braces or
brackets in command statements. For
example, the following indicates that
you choose one of the following load
balancing methods:
items in command statements. For
example, /route:<DeviceName>[ ,…]
means you can type additional
<DeviceNames> separated by commas.
Documentation Available on the NetScaler
Appliance
A complete set of Citrix® NetScaler® documentation is available on the Documentation
tab of your NetScaler appliance and at http://support.citrix.com/ (PDF version), and at
http://edocs.citrix.com (HTML version). (The PDF version of the documents require
Adobe Reader, available at http://adobe.com/.)
To view the documentation
1. From a Web browser, log on to the NetScaler Appliance.
2. Click the Documentation tab.
3. To view a short description of each document, hover the mouse pointer over the
title. To open a document, click the title.
18
Getting Service and Support
Citrix® offers a variety of resources for support with your Citrix environment, including
the following:
w The Knowledge Center is a self-service, Web-based technical support database that
contains thousands of technical solutions, including access to the latest hotfixes,
service packs, and security bulletins.
w Technical Support Programs for both software support and appliance maintenance
are available at a variety of support levels.
w The Subscription Advantage program is a one-year membership that gives you an
easy way to stay current with the latest product version upgrades and enhancements.
w Citrix Education provides official training and certification programs on virtually all
Citrix products and technologies.
For more information about Citrix services and support, see the Citrix Systems Support
Web site at http://www.citrix.com/lang/English/support.asp.
You can also participate in and follow technical discussions offered by the experts on
various Citrix products at the following sites:
Citrix NetScaler Administration Guide
w http://community.citrix.com
w http://twitter.com/citrixsupport
w http://forums.citrix.com/support
NetScaler Documentation Feedback
You are encouraged to provide feedback and suggestions so that we can enhance the
documentation. You can send an email to nsdocs_feedback@citrix.com. In the subject
line, specify "Documentation Feedback." Please include the title of the guide and the
page number in the email message.
You can also provide feedback through the Knowledge Center at http://
support.citrix.com/.
To provide feedback at the Knowledge Center home page
1. Go to the Knowledge Center home page at http://support.citrix.com/.
2. On the Knowledge Center home page, under Products, expand NetScaler, and then
click the NetScaler release for which you want to provide feedback.
3. On the Documentation tab, click the guide name, and then click Article Feedback.
4. On the Documentation Feedback page, complete the form, and then click Submit.
19
Preface
20
Chapter 1
Authentication and Authorization
Topics:
• Configuring Users and
Groups
• Configuring Command
Policies
• Resetting the Default
Administrator (nsroot)
Password
• Example of a User Scenario
• Configuring External User
Authentication
To configure Citrix® NetScaler® authentication and
authorization, you must first define the users who have access
to the NetScaler appliance, and then you can organize these
users into groups. After configuring users and groups, you
need to configure command policies to define types of access,
and assign the policies to users and/or groups.
You must log on as an administrator to configure users,
groups, and command policies. The default NetScaler
administrator user name is nsroot. After logging on as the
default administrator, you should change the password for the
nsroot account. Once you have changed the password, no user
can access the NetScaler appliance until you create an
account for that user. If you forget the administrator password
after changing it from the default, you can reset it to nsroot.
21
Chapter 1 Authentication and Authorization
Configuring Users and Groups
You must define your users by configuring accounts for them. To simplify the
management of user accounts, you can organize them into groups.
You can also customize the NetScaler command-line prompt for a user. Prompts can be
defined in a user’s configuration, in a user-group configuration, and in the global
configuration. The prompt displayed for a given user is determined by the following
order of precedence:
1. Display the prompt as defined in the user's configuration.
2. Display the prompt as defined in the group configuration for the user’s group.
3. Display the prompt as defined in the system global configuration.
You can now specify a time-out value for inactive CLI sessions for a system user. If a
user's CLI session is idle for a time that exceeds the time-out value, the NetScaler
appliance terminates the connection. The timeout can be defined in a user’s
configuration, in a user-group configuration, and in the global configuration. The timeout for inactive CLI sessions for a user is determined by the following order of precedence:
1. Time-out value as defined in the user's configuration.
2. Time-out value as defined in the group configuration for the user’s group.
3. Time-out value as defined in the system global configuration.
Configuring User Accounts
To configure user accounts, you simply specify user names and passwords. You can
change passwords and remove user accounts at any time.
To create a user account by using the NetScaler command
line
At the NetScaler command prompt, type the following command to create a user
account and verify the configuration:
w add system user <userName> [-promptString <string>] [-timeout <secs>]
w show system user
Example
> add system user user1
Enter password:
Confirm password:
Done
22
> add system user johnd -promptString user-%u-at-%T
Enter password:
Confirm password:
Done
Citrix NetScaler Administration Guide
> show system user
1) User name: nsroot
2) User name: user1
3) User name: johnd Prompt String: user-%u-at%T Prompt Inherited From: User
Done
To modify or remove a user account by using the NetScaler
command line
w To modify a user's password, type the set system user <userName> command and
the parameters to be changed, with their new values.
w To remove a user account, type the rm system user <userName> command.
Parameters for configuring a user account
userName (User Name)
A name for the user. The name can begin with a letter, number, or the underscore
symbol, and can consist of from 1 to 31 letters, numbers, and the hyphen (-), period
(.), pound (#), space ( ), at sign (@), equals (=), colon (:), and underscore (_) symbols.
password (Password)
A password that the user uses to log on.
promptString (CLI Prompt)
A name for the user’s NetScaler command-line prompt. The name can consist of
letters, numbers, the hyphen (-), period (.) pound (#), space ( ), at sign (@), equals
(=), colon (:), underscore (_) symbols, and the following variables:
w %u—Is replaced by the user name.
w %h—Is replaced by the host name of the NetScaler appliance.
w %t—Is replaced by the current time in 12-hour format.
w %T—Is replaced by the current time in 24-hour format.
w %d—Is replaced by the current date.
w %s—Is replaced by the state of the NetScaler appliance.
A maximum of 63 characters are allowed for this parameter. A variable (for example,
%u) is counted as two characters. The resulting prompt can be longer than 63
characters.
timeout (CLI Idle Session Timeout (Secs))
Time-out value, in seconds, for inactive CLI sessions for a system user. If a user's CLI
session is idle for a time that exceeds the time-out value, the NetScaler appliance
terminates the connection.
23
Chapter 1 Authentication and Authorization
To configure a user account by using the configuration utility
1. In the navigation pane, expand System and click Users.
2. In the details pane, do one of the following:
• To create a user account, click Add.
• To modify an existing user account, select the user, and then click Open.
3. In the Create System User or Configure System User dialog box, set the following
parameters:
• User Name*(Cannot be changed for an existing user.)
• Password*
• Confirm Password*
• CLI Prompt
• CLI Idle Session Timeout (Secs)
* A required parameter
4. Click Create or OK, and then click Close.
A message appears in the status bar, stating that the user has been configured
successfully.
Configuring User Groups
After configuring a user group, you can easily grant the same access rights to everyone
in the group. To configure a group, you create the group and bind users to the group.
You can bind each user account to more than one group. Binding user accounts to
multiple groups may allow more flexibility when applying command policies.
To create a user group by using the NetScaler command line
At the NetScaler command prompt, type the following commands to create a user
group and verify the configuration:
w add system group <groupName> [-promptString <string>] [-timeout <secs>]
w show system group
Example
> add system group Managers -promptString GroupManagers-at-%h
Done
> show system group
1) Group name: group1
2) Group name: Managers Prompt String: GroupManagers-at-%h
Done
24
Citrix NetScaler Administration Guide
To modify or remove a user group by using the NetScaler
command line
w To modify a user group, type the set system group <groupName> command and the
parameters to be changed, with their new values.
w To remove a user group, type rm system group <groupName>.
To bind a user to a group by using the NetScaler command
line
At the NetScaler command prompt, type the following commands to bind a user
account to a group and verify the configuration:
w bind system group <groupName> -userName <userName>
w show system group <groupName>
Example
> bind system group Managers -userName user1
Done
> bind system group Managers -userName johnd
Done
> show system group Managers
Group name: Managers Prompt String: GroupManagers-at-%h
User name: user1
User name: johnd
Done
> show system user user1
User name: user1 Prompt String: Group-Managers-at%h Prompt Inherited From: Group
Group name: Managers
Done
> show system user johnd
User name: johnd Prompt String: user-%u-at-%T
Prompt Inherited From: User
Group name: Managers
Done
To unbind a user from a group by using the NetScaler
command line
At the NetScaler command prompt, type the following commands to unbind a user
account and verify the configuration:
25
Chapter 1 Authentication and Authorization
w unbind system group <groupName> -userName <userName>
w show system group <groupName>
Parameters for configuring a user group
groupName (Group Name)
A name for the group you are creating. The name can begin with a letter, number, or
the underscore symbol, and can consist of from 1 to 31 letters, numbers, and the
hyphen (-), period (.), pound (#), space ( ), at sign (@), equals (=), colon (:), and
underscore (_) symbols. (Cannot be changed for existing groups.)
userName
The name that was assigned to a previously configured user.
promptString (CLI Prompt)
A name for the NetScaler command-line prompt for all the users that are part of this
group. The name can consist of letters, numbers, the hyphen (-), period (.), pound
(#), space ( ), at sign (@), equals (=), colon (:), underscore (_) symbols, and the
following variables:
w %u—Is replaced by the user name.
w %h—Is replaced by the host name of the NetScaler appliance.
w %t—Is replaced by the current time in 12-hour format.
w %T—Is replaced by the current time in 24-hour format.
w %d—Is replaced by the current date.
w %s—Is replaced by the state of the NetScaler appliance.
A maximum of 63 characters are allowed for this parameter. A variable (for example,
%u) is counted as two characters. The resulting prompt can be longer than 63
characters.
timeout (CLI Idle Session Timeout (Secs))
Time-out value, in seconds, for inactive CLI sessions for all the users that are part of
this group. If a user's CLI session is idle for a time that exceeds the time-out value,
the NetScaler appliance terminates the connection.
To configure a user group by using the configuration utility
1. In the navigation pane, expand System, and then click Groups.
2. In the details pane, do one of the following:
• To create a new user group, click Add.
• To modify an existing user group, select the group, and then click Open.
26
3. In the Create System Group or Configure System Group dialog box, set the
following parameters:
Citrix NetScaler Administration Guide
• Group Name* (Required for a new group. Cannot be changed for an existing
group.)
• CLI Prompt
• CLI Idle Session Timeout (Secs)
* A required parameter
4. Under Members, select users from the Available Users list and click Add to move
them to the Configured Users list.
5. Click Create or OK, and then click Close.
A message appears in the status bar, stating that the group has been configured
successfully.
Configuring Command Policies
Command policies regulate which commands, command groups, vservers, and other
entities that users and user groups are permitted to use.
The Citrix® NetScaler® appliance provides a set of built-in command policies, and you
can configure custom policies. To apply the policies, you bind them to users and/or
groups.
Here are the key points to keep in mind when defining and applying command policies.
w You cannot create global command policies. Command policies must be bound
directly to NetScaler users and groups.
w Users or groups with no associated command policies are subject to the default (DENY-
ALL) command policy, and are therefore unable to execute any configuration
commands until the proper command policies are bound to their accounts.
w All users inherit the policies of the groups to which they belong.
w You must assign a priority to a command policy when you bind it to a user account
or group account. This enables the NetScaler to determine which policy has priority
when two or more conflicting policies apply to the same user or group.
w The following commands are available by default to any user and are unaffected by
any command you specify:
help cli, show cli attribute, clear cli prompt, alias, unalias, help, history, quit,
exit, whoami, config, set cli mode, unset cli mode, show cli mode, set cli
prompt, and show cli prompt.
Built-in Command Policies
The following table describes the built-in policies.
27
Chapter 1 Authentication and Authorization
Table 1-1. Built-in Command Policies
Policy nameAllows
read-onlyRead-only access to all show commands
operatorRead-only access and access to
networkFull access, except to the set and unset
superuserFull access. Same privileges as the
except show runningconfig, showns.conf, and the show commands for
the NetScaler command group.
commands to enable and disable services
and servers or place them in
ACCESSDOWN mode.
SSL commands, sh ns.conf, sh
runningconfig, and sh gslb
runningconfig commands.
nsroot user.
Creating Custom Command Policies
Regular expression support is offered for users with the resources to maintain more
customized expressions, and for those deployments that require the flexibility that
regular expressions offer. For most users, the built-in command policies are sufficient.
Users who need additional levels of control but are unfamiliar with regular expressions
may want to use only simple expressions, such as those in the examples provided in this
section, to maintain policy readability.
When you use a regular expression to create a command policy, keep the following in
mind.
w When you use regular expressions to define commands that will be affected by a
command policy, you must enclose the commands in double quotation marks. For
example, to create a command policy that includes all commands that begin with
show, type the following:
"^show .*$"
To create a command policy that includes all commands that begin with rm, type
the following:
"^rm .*$"
w Regular expressions used in command policies are not case sensitive.
The following table lists examples of regular expressions:
28
Citrix NetScaler Administration Guide
Table 1-2. Examples of Regular Expressions for Command Policies
Command specificationMatches these commands
"^rm\s+.*$"All remove actions, because all remove
actions begin with the rm string,
followed by a space and additional
parameters and flags.
"^show\s+.*$"All show commands, because all show
actions begin with the show string,
followed by a space and additional
parameters and flags.
"^shell$"The shell command alone, but not
combined with any other parameters or
flags.
"^add\s+vserver\s+.*$"All create vserver actions, which consist
of the add vserver command followed
by a space and additional parameters
and flags.
"^add\s+(lb\s+vserver)\s+.*"All create lb vserver actions, which
consist of the add lb vserver command
followed by a space and additional
parameters and flags.
The following table shows the command specifications for each of the built-in
command policies.
Table 1-3. Expressions Used in the Built-in Command Policies
To create a command policy by using the NetScaler
command line
At the NetScaler command prompt, type the following commands to create a command
policy and verify the configuration:
w add system cmdPolicy <policyname> <action> <cmdspec>
w sh system cmdPolicy
Example
> add system cmdPolicy read_all ALLOW (^show\s+(!
system)(!ns ns.conf)(!ns runningConfig).*)|
(^stat.*)
Done
> sh system cmdPolicy
1) Command policy: operator
2) Command policy: read-only
3) Command policy: network
4) Command policy: superuser
5) Command policy: allow_portaladmin
6) Command policy: read_all
Done
To modify or remove a command policy by using the
NetScaler command line
w To modify a command policy, type the set system cmdPolicy <PolicyName>
command and the parameters to be changed, with their new values.
w To remove a command policy, type rm system cmdPolicy <PolicyName>.
Note: The built-in command policies cannot be removed.
Parameters for configuring a command policy
policyname
A name for the command policy you are creating. The name can begin with a letter,
number, or the underscore symbol, and can consist of from one to 31 letters,
numbers, and the hyphen (-), period (.), pound (#), space ( ), at sign (@), equals (=),
colon (:), and underscore (_) symbols. (Cannot be changed for existing policies.)
action
The action the policy applies when the command specification pattern matches.
Possible values: ALLOW, DENY
cmdspec
Rule (expression) that the policy uses for pattern matching.
30
Loading...
+ 165 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.