Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The Smiling、Proud Wanderer, seeking defeat alone-detailed explanation of NetScaler MAS application delivery

2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

It takes ten years to sharpen a sword, and today we will show you

As the history of NetScaler progressed to version 11.1, a cross-era NetScaler MAS system emerged, integrating the management and analysis choreography of data center applications. As a witness to history, the author is amazed at its powerful function and brand-new technology.

The great man of chivalry is for the country and the people. The focus of MAS is not on the NetScaler device itself, but on the application and data of the entire network. Let's talk about the eight-way magic of MAS:

The first method of star absorption

As the entrance to all applications, all data flows through the application delivery system day and night, every packet, every connection, every request and response contains a lot of valuable information, due to the technical limitations of the traditional log system, most of this information is actually not recorded, but falls to dust. If you go back to Baoshan empty-handed, you can only look at the ocean and sigh.

MAS has introduced a new log streaming log collection technology to improve performance by more than 100 times!

Countless vast amounts of information are gathered in one point and used by MAS for its own use. The following figure of the user system, the global division of 1021 NetScaler,25010 servers access logs, all master!

The second style Dugujiu nine swords

Dugujiujian is familiar with the sword, gun, whip and arrow method all over the world, and the latter comes first, breaking it one by one, and the general decision even reaches the expected enemy machine first.

Various schools of martial arts are strange, and the only nine swords are strong in learning and using, there is no trace to be found. Each server and each application has its own characteristics, pressure, connection, delay and other characteristics, we can not use a simple manual configuration threshold to assess the fault.

For any abnormal data, the MAS that is different from the normal state will see through or even predict it at a glance, tick out the logo, and the small red flag in the figure below. After clicking, it will provide users with all abnormal-related data logs, and give various action suggestions to fix them manually or automatically.

The third form of Yijin Sutra

In the knight-errant world, martial arts moves are empty, do not just focus on external skills, skin and bone exercise, internal skills and righteousness is the secret to becoming a master. In the world of application delivery, this watershed has also arrived.

With the rise of container docker, the interaction of data is not only the traditional client and server in the north-south direction, but also the responsibility of each microservice. The continuous communication within the container generates a large amount of east-west traffic. If only the external application delivery system is no longer suitable, it is necessary to get through the governor's second pulse, both internal and external repair, and the unity of heaven and man.

At this point, the container version of NetScaler CPX is critical. MAS can uniformly manage, maintain and analyze all hardware virtual machines and containers.

The fourth style is the return of ten thousand swords.

How many data centers do you have? How many applications do you have to deliver hardware and how many applications do you have to deliver virtual machines? How many application delivery containers do you have?

Are you integrated with Cisco ACI? Are you integrated with OpenStack? Are you integrated with CloudStack? Are you integrated with Vmware NSX? Are you integrated with systems such as docker mesos kubernetes?

If each system is your sword, how much do you want to hold?

If every API is a language, how many languages do you want to master?

MAS aggregates all devices and becomes a resource pool. Various cloud platforms only need to schedule resources from the resource pool and do not need each device to talk separately. MAS also acts as an API translator to accurately translate the cloud language into NetScaler standard API.

The fifth style is the great shift of the universe

When you decided to move the configuration from the test area to the production area, how did you do it? When you propose a new security policy, how do you audit and deploy to all systems?

MAS can push the changed configuration of a device to all other devices according to the time period, and provides a new record and play technology to record your configuration on a device in real time, translate the live changes of the graphical interface into the command line, and push directly through api!

What if there is an ip address and so on in the configuration that is configured separately on each device? If selected, it becomes a variable! Configure separately when pushing, or define it in batch with excel table directly!

The transfer of the universe was completed in an instant.

Type 6 rainstorm pear flower needle

Rainstorm pear needles such as rain, airtight, silent, injuring the enemy in the invisible, is a necessary weapon for self-defense. HTTPS SSL's network traffic encryption is also everywhere with the emphasis on our security and the popularity of http2.

But it also brings problems while improving security: there are more and more certificates and more and more locations that need to be deployed. Which are about to expire? Which devices do not have the required certificates? Which algorithms are not strong enough? How do I update certificates in batches? How to replace the add certificate in batch?

MAS has a unified certificate management audit distribution system, all certificates are clear at a glance, unified audit, collective distribution.

The seventh type of split avatar

At present, when applications are king, different applications have different administrators, and different applications need to go online and offline to observe the number of performance throughput connections. Different applications may belong to different devices, and different applications also hope that the configuration of other applications can not affect each other. If it is still managed and controlled by traditional equipment administrators, not only the workload of operation and maintenance is very large, but also the process cycle is tedious, and even the needs of many application administrators can not be met, and the advantages of application development can not be reflected in this model.

What if you assign some permissions that the application cares about to the application administrator?

Traditionally, it is difficult, because traditional devices always divide permissions according to hardware, virtualization sub-permissions, unable to isolate applications, and MAS brings application rights separation RBAC! There are multiple incarnations of a MAS. Different application administrators can only monitor and manage their own applications when logging in to MAS.

The eighth type of power transfer top

In The Demi-Gods & Semi-Devils, Wuyazi, the head of the Xiaoyao School, was injured by his apprentice and passed on his lifelong skills to Xu Zhu, who instantly became a martial arts master.

There is a saying in the NetScaler industry: NetScaler can do anything, if there is something you can't do, but you don't think of a way to do it.

As the business becomes more and more complex, many users are too busy to grasp all the configuration details and can not make full use of the powerful advantages of NetScaler.

MAS transfers power to you from the perspectives of application and equipment, making you a master expert in an instant.

Application Angle: stylebook

Stylebook is a custom template developed based on a variety of popular applications, and application deployers no longer need to understand the meaning of each option as before, and all stylebook presets are hidden. Run the required stylebook directly and simply fill in the wizard to successfully deploy all the optimal configurations. Of course, you can also design your own stylebook for reuse.

Also, all these stylebook can be operated and modified through API.

Device perspective: configuration audit

MAS provides configuration audit function, preset a variety of standards, can directly audit all device configurations to give recommendations and push. For example, best practice standards, security reinforcement standards, system global parameter standards, PCI DSS standards, and so on.

Of course, you can also customize the standard configuration that suits you, and then audit all devices

-

When reaching the great peak, we hold all mountains in a single glance. Citrix NetScaler ascends high and looks far, accumulates abruptly, and has made a cross-era technological evolution, so Gartner Huashan is at the top of the pack, ranking first in the leader quadrant, The Smiling、Proud Wanderer.

The word "technology" is vast, extensive and profound. This article only has a glimpse of the tip of the NetScaler MAS iceberg. In the future, the author will continue to communicate and learn with you.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report