Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Netscaler VPX

You're reading from   Mastering Netscaler VPX Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know

Arrow left icon
Product type Paperback
Published in Nov 2015
Publisher Packt
ISBN-13 9781785281730
Length 218 pages
Edition 1st Edition
Concepts
Arrow right icon
Authors (3):
Arrow left icon
Rick Roetenberg Rick Roetenberg
Author Profile Icon Rick Roetenberg
Rick Roetenberg
Andy Paul Andy Paul
Author Profile Icon Andy Paul
Andy Paul
Marius Sandbu Marius Sandbu
Author Profile Icon Marius Sandbu
Marius Sandbu
Arrow right icon
View More author details
Toc

Table of Contents (9) Chapters Close

Preface 1. Configuring the Standard Features of NetScaler® 2. Using the Features of NetScaler® AppExpert FREE CHAPTER 3. Integration with Citrix® Components 4. Traffic Management 5. Tuning and Monitoring NetScaler® Performances 6. Security Features and Troubleshooting 7. Real-World Deployment Scenarios Index

Access-lists


NetScaler also has support for the traditional access-list where we can define four types of lists. All of them have the option to define protocol, but simple ACLs only support TCP/UDP while extended ACLs have a long list of different protocols such as EGP, ICMP, GRE, and so on:

  • Simple ACL, which defines only DENY rules for source IP addresses.

  • Simple ACL6, which defines only DENY rules for source IPv6 addresses.

  • Extended ACL, which allow us to define DENY/ALLOW/BRIDGE rules for source ip, source-range and destination ip, and destination ip-range. It also allows us to configure the source MAC and destination MAC.

  • Extended ACL6, which allows us to define DENY/ALLOW/BRIDGE rules for source IPv6, source-range and destination IPv6, and destination IPv6-range. It also allows us to configure the source MAC and destination MAC.

Simple ACLs are only stored in memory and cannot be seen in the running configuration; so, when we define a simple ACL, it has a TTL of eight seconds and therefore...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image