Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing NetScaler VPX??? - Second Edition

You're reading from   Implementing NetScaler VPX??? - Second Edition Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms

Arrow left icon
Product type Paperback
Published in Oct 2015
Publisher
ISBN-13 9781785288982
Length 202 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Marius Sandbu Marius Sandbu
Author Profile Icon Marius Sandbu
Marius Sandbu
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. NetScaler VPX™ 11 – Basics and Setup FREE CHAPTER 2. NetScaler Gateway™ 3. Load Balancing 4. Mobilestream 5. Optimizing NetScaler Traffic 6. High Availability 7. Security and Troubleshooting 8. AAA Application Traffic Index

Access lists


NetScaler also has support for the traditional access control list (ACL), where we can define four types of lists. All of them have the option to define protocol, but simple ACLs only support TCP/UDP, while extended has a long list of different protocols, such as EGP, ICMP, GRE, and so on.

  • Simple ACL: This defines only DENY rules for source IP addresses.

  • Simple ACL6: This defines only DENY rules for source IPv6 addresses.

  • Extended ACL: This allows us to define DENY/ALLOW/BRIDGE rules for source IP, source-range and destination IP, or destination IP-range. It also allows us to configure source MAC and destination MAC.

  • Extended ACL6: This allows us to define DENY/ALLOW/BRIDGE rules for source IPv6, source-range and destination IPv6, or destination IPv6-range. It also allows us to configure source MAC and destination MAC.

Simple ACLs are only stored in memory and cannot be seen in the running configuration, so when we define a simple ACL, it has the TTL of 8 seconds and therefore...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image