Services NetScaler 10.1 XenMobile XDM and NetScaler Integration High Availability and ActiveSync Filtering Hands-on lab exercise guide 04/2013 – Version 1.0 Services Table of Contents Table of Contents .............................................................................................................................................. 2 Overview............................................................................................................................................................. 3 Exercise 1: External access to XDM components ....................................................................................... 4 Exercise 2: Front-ending Microsoft Exchange deployments with NetScaler ........................................ 14 Exercise 3: Installing and configuring XenMobile NetScaler Connector ............................................... 21 Exercise 4: Device enrollment and MDM policy configuration .............................................................. 29 Exercise 5: Configuring “Callout” to enforce XDM mail delivery policies ............................................ 39 Exercise 6: Configuring MDM policies to enforce email security for ActiveSync enabled devices. .. 47 Exercise 7: Optimizing and securing the “Callout” evaluation ................................................................ 56 Page 2 Services Overview Hands-on Training Module This training module has the following details: Objective Audience Provide hands on experience with the new features included in NetScaler 10.1 Highlight some of solutions that can be accomplished by the new features included in NetScaler 10.1 Provide additional documentation on the required components for some of the features in order to successfully implement NetScaler 10.1. Primary: Citrix Sales Engineers, Consultants, and Support Team members Lab Environment Details This section is used to describe the lab environment and the virtual machines that are used. Machine XenServer Client Tools VM Windows 7 Demo Linux (1) Details Hosts virtual machines Thin-Client Notebook Virtual Machine with the workshops tools installed Virtual Machine Virtual Machine (Will be created during the workshop) Required Lab Credentials Below are the login credentials required to connect to the workshop system and complete the lab exercises. Machine PVS1 XenServer Tools VM Windows 7 Demo Linux (1) Username root user user root Password citrix citrix citrix citrix Page 3 Services Exercise 1: External access to XDM components Overview XenMobile Device Manager is one of the key components of the XenMobile solution. Simpler deployments usually contain a single XDM server; however, for high availability, it is recommended to have multiple servers. Some of the key functionality for XDM is to provide device enrollment services and this requires that the end-point devices establishes an SSL handshake to the XDM server. In order to load balance these components, it is required to have an SSL_BRIDGE configuration to provide simple TCP offloading while still allowing the mobile device to SSL handshake with the corresponding XDM server. In this lab, we will configure external access using SSL to this component of the XenMobile solution bundle. These instructions can be reused to add additional services for a full load-balancing setup. Step by step guidance Estimated time to complete this lab: XYZ minutes. Step Action 1. Once logged in at the self-paced portal, click the Start lab button to launch a connection to published XenCenter. 2. When XenCenter loads, right-click the XenCenter node and select Add… Page 4 Services Step 3. Action On the Add New Server screen enter the XenServer IP address provided on the portal and in the Password field enter the password provided on the portal. The user name will always be root. 4. In XenCenter, click on the Site1-Win8Client VM and choose the Console tab. Login with the following Credentials: Username: TRAINING\Administrator Password: Citrix123 NOTE: For better performance, switch to a Remote Desktop connection. 5. Login to the Site1-Win8Client with the following credentials: Username: Administrator Password: Citrix123 Page 5 Services Step 6. 7. Action Click on the Desktop tile. Check that the XenMobile Device Manager (XDM) component was installed by accessing the XDM console. Open IE and navigate to the following URL: http://192.168.10.13/zdm/ Username: Administrator Password: Citrix123 Page 6 Services Step 8. Action Click on the Policies tab. The external FQDN should be displayed. This tell us that the product was installed and customized for each environment correctly. NOTE: The FQDN shown below will be different than the one in your environment. Please refer back to the Student portal page for a list of external FQDNs assigned to your lab. Next, we will allow external access to XDM components. For this we will use the NetScaler appliance to allow SSL connections to the XDM servers on ports TCP-443 (XenMobile Device Manager UI) and TCP-8443 (XenMobile device enrollment). 9. Open IE and navigate to the NetScaler Administration UI using the default credentials: http://192.168.10.50 Username: nsroot Password: nsroot Page 7 Services Step 10. Action First, create the Subnet IP for the NetScaler to contact backend resources. Navigate to Configuration -> System -> Network -> IPs -> Add IP Address: 192.168.10.51 Netmask: 255.255.255.0 IP Type: Subnet IP 11. Click Create. Navigate to Configuration -> Settings -> Configure Basic Features and enable the following options: SSL Offloading, Load Balancing. Page 8 Services Step 12. 13. Action Navigate to Configuration -> Settings -> Configure Advanced Features and enable the following options: Responder. Next we will create the Server Object for XenMobile. Navigate to Configuration -> Traffic Management -> Load Balancing -> Servers -> Add. Use the following parameters: Name: XenMobile IPAddress: 192.168.10.13 Click Create and Close to continue. NOTE: XenMobile Device Manager (XDM) requires all mobile devices to establish an SSL handshake directly with the MDM server. We need to configure an SSL_BRIDGE setup in order for devices to register correctly with the server. Page 9 Services Step 14. Action Create the SSL_BRIDGE service on TCP port 443. In the NetScaler UI, navigate to Configuration -> Traffic Management -> Load Balancing -> Services -> Add. Use the following parameters: Service Name: XenMobile_SVC Server: XenMobile Protocol: SSL_BRIDGE Port: 443 Monitor: TCP Click Create and then Close. Page 10 Services Step 15. Action Device enrollment requires access to an additional TCP port on the XDM server. Add another service for TCP port 8443: Service Name: XenMobileEnroll_SVC Server: XenMobile Protocol: SSL_BRIDGE Port: 8443 Monitor: TCP Click Create and then Close to finish. Page 11 Services Step 16. Action Next, create the XenMobile virtual server listening on port TCP 443. Use the following parameters: Vserver Name: XenMobile_vserver Protocol: SSL_BRIDGE Port: 443 Monitor: TCP Service: XenMobile_SVC 17. Click create and close to finish. Lastly, add the XenMobile virtual server listening on port 8443. Vserver Name: XenMobileEnroll_vserver Protocol: SSL_BRIDGE Port: 8443 Monitor: TCP Service: XenMobileEnroll_SVC Page 12 Services Step Action We will now test external access to these components. From your workstation (external device), navigate to the FQDN of the second public IP address provided. This is located in the student portal. <Include snapshot> 18. From an external browser, enter the corresponding URL for the 2nd Public IP address in the address bar. Login with the following credentials: Username: Administrator Password: Citrix123 You should be able to login without receiving any SSL warnings. 19. This completes with this exercise. Next, we will configure external access to Exchange 2010 by SSL offloading with NetScaler. Summary Key Takeaways The key takeaways for this exercise are: SSL_BRIDGE is required to successfully front-end the XDM component. Multiple services can be bound to the virtual server in order to provide redundancy. Use SSLSESSIONID or SRCIP persistence depending on the requirements. Page 13 Services Exercise 2: Front-ending Microsoft Exchange deployments with NetScaler Overview In order for enforcing mail delivery policies to external mobile devices, the NetScaler appliance needs to be the front-end device to the internal Microsoft Exchange infrastructure. In this exercise, we will complete the necessary configuration on the NetScaler appliance as well as the Exchange server for the deployment to be externally accessible. Step by step guidance Estimated time to complete this lab: XYZ minutes. Step Action 1. In the Site1-Win8Client VM, open a new instance of IE and navigate to the OWA URL to verify that Exchange 2010 was correctly provisioned: https://ex1.training.lab/owa/ Username: TRAINING\User1 Password: Citrix123 Since this is the first time accessing the user’s mailbox, accept the defaults for language and time-zone. If you are able to login to the user’s mailbox, continue with the next step. Page 14 Services Step 2. 3. Action Go back to the NetScaler Configuration utility already opened in IE. Re-login with the following credentials, if the session has expired: Username: nsroot Password: nsroot Next, we have to create the Exchange server object. Navigate to Configuration -> Traffic Management -> Load Balancing -> Servers -> Add. Use the following parameters: Name: Exchange IPAddress: 192.168.10.15 Page 15 Services Step 4. Action Proceed to create the associated services. On the NetScaler UI, navigate to Configuration > Traffic Management -> Load Balancing -> Services -> Add. First create the Exchange Service on port 443: Service Name: Exchange_SVC Protocol: SSL Port: 443 Monitor: TCP Click Create and then Close. Page 16 Services Step 5. Action Next, let’s create the virtual server used for external access. Navigate to Configuration -> Traffic Management -> Load Balancing -> Virtual Servers -> Add Vserver Name: Exchange_vserver Protocol: SSL Port: 443 Monitor: TCP Service: Exchange_SVC 6. Continue with the next step. Since this is an SSL virtual server, we need to bind a server certificate. For this lab, we will use a production SSL certificate already preloaded in the default configuration. Click on the SSL settings tab, and bind the wildcard.mycitrixtraining.net certificate. Click Create and then Close. Page 17 Services Step 7. Action From your workstation, open a browser instance (IE / Firefox / Chrome / or Safari) and test connectivity to OWA by entering the external URL for IP#2. https://your-dashed-fqnd.mycitrixtraining.net/owa/ Use the following credentials: Username: TRAINING\user1 Password: Citrix123 You should be able to login and access the user’s mailbox: Page 18 Services Step 8. Action Now, we will test connectivity from your mobile device using the ActiveSync protocol. Add a new Exchange account and configure email access using the following settings: Since there are many different mobile device Server: your-dashed-fqdn.mycitrixtraining.net Email: user1@training.lab Username: user1 Password: Citrix123 Domain: TRAINING SSL enabled: YES Port: 443 You should be able to access the user’s mailbox. NOTE: In Android devices, the device will prompt you to allow the server to control some of the security features required when setting up a new Exchange account. Click OK to accept. 9. To test basic Exchange functionality across different clients, on your external workstation, go back to the OWA session you previously signed in using the User1 account. Logout from that session and log back in with the credentials for User2. Username: TRAINING/user2 Password: Citrix123 10. Send an email to user1@training.lab. Verify that you receive this email on your mobile device. This concludes with this exercise. Next, we will install and configure the XenMobile NetScaler connector. Page 19 Services Summary Key Takeaways The key takeaways for this exercise are: In order for the NetScaler appliance to interface with the XenMobile Device Manager API, it uses an intermediary component called XenMobile NetScaler Connector The NetScaler leverages a new RESTful API via callout to enforce mail delivery policies according to the security requirements of the enterprise Page 20 Services Exercise 3: Installing and configuring XenMobile NetScaler Connector Overview One of the features XM offers is the ability to apply policies to mobile devices. The XenMobile solution leverages additional components to enforce external mail clients from accessing the Microsoft Exchange infrastructure in order to retrieve mail according to applied policies. As part of a new component announced with NetScaler 10.1, the NetScaler appliance can interface with the XDM API through a new component labeled “XenMobile NetScaler Connector”. XNC provides a device level authorization service of ActiveSync clients to NetScaler acting as a reverse proxy for the Exchange ActiveSync protocol. In this exercise, we will focus on installing the XNC component and configuring it properly to continue with the NetScaler integration configuration. Step by step guidance Description: Estimated time to complete this lab: XYZ minutes. Step Action 1. In XenCenter, select the Site1-XenMobile VM and click on the Console tab. Login with the following credentials: Username: TRAINING\Administrator Password: Citrix123 Page 21 Services Step 2. 3. 4. 5. 6. Action Click on Start-> Run and open the following UNC path: \\AD\Software\XNC\ Copy the XncInstall.zip file to the desktop. Extract the content of this file and execute the installer. Click next to continue. Accept the default options, agree to the license terms, and click Next to install the component. Click Next and then Close to finish. Page 22 Services Step 7. 8. Action Choose No when prompted to display the release notes. Click Start and then open the XenMobile NetScaler Configuration utility. Page 23 Services Step 9. 10. Action In the XNC Configuration utility, select the Web Service tab and configure the listening address for the XNC service. Click Save and then Start the service. NOTE: Since we have installed XNC on the XDM host, we do not require encryption as all the traffic will not be placed on the wire. We will chose HTTP and port 9080 for the configuration service. Since XDM users SSL for its API, we need to use a valid FQDN to resolve to server IP. Open the hosts file located at the following location: C:\Windows\System32\drivers\etc and add a new entry as follows: 192.168.10.13 your-dashed-fqdn.mycitrixtraining.net Page 24 Services Step 11. Action Next, we have to define a provider. Go back to the XNC configuration utility and configure a new Provider using the following parameters: Name: ZDM Url: https://your-dashed-fqdn.mycitrixtraining.net/zdm/services/MagConfigService Username: Training\Administator Password: Citrix123 Click Test Connectivity and Save to continue. 12. After you save the configuration, the utility prompts you to start the Configuration Service and Notification Services. Click OK to acknowledge each prompt. Page 25 Services 13. Click on Start and select Run. Type services.msc to open the Services management console and start the required services: 14. The next step is to define the type of access to restrict. Since mobile devices use the ActiveSync protocol, highlight the Microsoft-Server-ActiveSync entry and click on edit: 15. In the Policy option, select Static + ZDM: Block mode to block 16. NOTE: These policies combine local (aka static) rules with those from ZDM. Block Mode means that all devices not explicitly identified by the rules will be blocked access to ActiveSync. Click Save to finish. Page 26 Services 17. Lastly, we need to allow XDM to report additional information to XNC via its API. From your workstation, access the XDM console using the following URL: https://your-dashed-ip.mycitrixtraining.net/zdm/ 18. 19. Username: Administrator Password: Citrix123 Once logged in, click on the Options link on the top right corner. On the XenMobile Server Options, navigate to the Modules Configurations -> Secure Mobile Gateway and enable the following filters: Forbidden Apps: Deny Implicit Allow / Deny: Allow Click Close to commit the changes. 20. This concludes with this exercise. Next we will configure the necessary callout policy on the NetScaler to interface XNC in order to determine if a user/device should be allowed/blocked to access the Exchange infrastructure using ActiveSync. Summary Page 27 Services Key Takeaways The key takeaways for this exercise are: In order for the NetScaler appliance to interface with the XenMobile Device Manager API, it uses an intermediary component called XenMobile NetScaler Connector The NetScaler leverages a new RESTful API via callout to enforce mail delivery policies according to the security requirements of the enterprise Page 28 Services Exercise 4: Device enrollment and MDM policy configuration Overview In order to apply ActiveSync policies, the mobile device needs to register with the XDM server. This requires to install the XenMobile Connect agent on the mobile device and complete the enrollment process. By default, our XenMobile Device Manager applies the following policies: Performs a software inventory and reports back to the MDM server Configures the XenMobile Connect agent to check-in every 2 minutes (Android-only setting) Sets a 5-digit PIN number requirement (Completed already for Android devices, in our lab we will add it to the iOS packed in order to get some practice configuring deployment package options) Offers the user the possibility to install Citrix Receiver and GotoMeeting clients from the App Store Step by step guidance Estimated time to complete this lab: XYZ minutes. Step Action 1. First, let’s configure the PIN requirement policy for iOS devices in order for you to get familiar with the console. From your workstation, open a browser instance (IE/Chrome/Firefox/Safari) and login the XDM console by navigating to the external URL corresponding to the 2nd external IP used in the previous exercise. https://your-dashed-fqdn.mycitrixtraining.net/zdm/ 2. Username: Administrator Password: Citrix123 Depending on your platform (iOS/Android), labels for packages and other options change. In the following section, we will list the actions required for each platform. Page 29 Services Step 3. Action In the XDM console, navigate to the Deployment tab. For Android: Highlight the Base Android package and click Edit. For iOS: the name of the package is Base iOS package. Highlight it and Click edit. 4. Select the resources link on the left menu to jump to the policies bound to this deployment package. Page 30 Services Step 5. Action For Android: Expand the MDM policies, select the Require Pin policy, and click finish to commit the changes. For iOS: Expand the Configurations node. Select “Require PIN” and added to the Resources to Deploy list. Click on Finish to finalize the configuration. 6. Before sending notifications to mobile devices via email, we need to configure a notification SMTP server. In the XDM console, click on the Options link on the top right corner. Page 31 Services Step 7. 8. Action On the Options window, expand Notifications and highlight Notification Server. Select New -> SMTP server. Complete the “Create a new SMTP configuration” using the following parameters: Name: Exchange Description: Training.lab Exchange SMTP Server: ex1.training.lab SMTP port: 25 Secure Channel Protocol: None No Authentication: Checked From Name: Administrator From Email: adminnistrator@training.lab Click create to commit the changes and then close to return to the XDM console. Page 32 Services Step 9. Action It is time to register our devices with the MDM server. For this, we will send an enrollment invitation to the User1. Click on the enrollment tab, select New -> Enrollment invitation 10. In the General tab, select your device platform (Android / iOS) For device ownership and enrollment mode select the following defaults: Device Ownership: Employee Enrollment Mode: Invitation URL 11. Click on the User tab. Fill in the user filed with “user1”. Since we are using email for enrollment invite, leave the Notification section empty. Page 33 Services Step 12. Action The enrollment invite is create, but will not get sent immediately. In the enrollment tab, check the box next to the new notification, and click on the Notify button. 13. Accept the prompt and send the notification: 14. On your device, you should have received an email with the enrollment URL. To make sure that we download the latest version of the agent, tap on the second link to download the package from the App Store for your device. NOTE: The screenshot might change depending on your device/platform/Mobile OS version. This was tested on a Nexus 7 tablet running Android 4.2.2. Page 34 Services Step 15. Action Install the Citrix Mobile Connect agent. Android: iOS: NOTE: Once the application is installed, the device will prompt you to install the Citrix Mobile Enroll agent. Page 35 Services Step 16. Action Once installed, open the application and complete the enrollment process by providing the following information: Username: user1 Server: your-dashed-fqdn.mycitrixtraining.net Password: Citrix123 17. NOTE: The device will prompt you to install additional profiles (iOS) or active device administrators (Android). The prompts will be different depending on the platform/OS version/device type. Accept by installing the required profiles or adding the corresponding device administrators in order to complete the enrollment process. In the Citrix Mobile Connect agent, your device should be able to display the applications pushed as part of the default packages as well as other settings in the configuration node. For Android, inspect the Apps option and verify the applications appear on the list. For iOS, open the Connect application and inspect the Configuration -> App Info option to verify the Connect status. Force a Refresh to check-in with the server. Page 36 Services Step 18. Action On your workstation, go back to the XenMobile console and inspect the devices tab. Verify your device was registered. 19. Check if software inventory was performed on the device. Highlight the device and click on edit. 20. Inspect the Software Tab. Verify that all the installed applications show up on the list. We will use this information later when configuring additional mail policies. 21. This concludes with this exercise. Next, we will configure the NetScaler to interface with XNC and allow or deny the user to get their mail. Page 37 Services Summary Key Takeaways The key takeaways for this exercise are: A device can be registered in multiple ways. The XDM server is able to contact the user via SMS or e-mail and send an enrollment URL to download the package directly from the server or App Store. Alternatively, this can be completed manually by download the package directly and completing the enrollment process. By default no configuration is pushed to the mobile device. In our example, base packages have been provisioned to perform simple actions on the mobile device Page 38 Services Exercise 5: Configuring “Callout” to enforce XDM mail delivery policies Overview In this exercise, we will complete the necessary configuration to leverage the callout feature and interface with the XNC in order to enforce any mail delivery policies available to the device or user. Step by step guidance Estimated time to complete this lab: XYZ minutes. Step Action 1. In XenCenter, login to Site1-Win8Client. Open IE and login to the NetScaler administration utility with the following credentials: Username: nsroot Password: nsroot 2. http://192.168.10.50 Navigate to Configuration -> Traffic Management -> Load Balancing -> Services. Click on add to create a new service for the XenMobile NetScaler Connector listening on port TCP 9080 using the following parameters: Click Create and Close to commit the changes. Page 39 Services Step 3. Action Next, we will create the vserver where we will bind the callout. Since this vserver will not receive live traffic, but just callouts when evaluating an ActiveSync request, we can disable the directly addressable option. Navigate to Configuration -> Traffic Management -> Load Balancing -> Virtual Servers. Click Add and configure a virtual server with the following parameters. Don’t forget to bind the service created in the previous step. Click Create and then Close. Page 40 Services Step 4. Action Now, we will create the HTTP callout. Navigate to Configuration -> AppExpert -> HTTP Callouts -> Add. Create a new callout with the following parameters: Name: ActiveSyncFilter Virtual Server: ActiveSyncFilter_vserver Attribute-based: Checked Return Type: TEXT Expression to extract data from Response: HTTP.RES.BODY(20) Do not click create just yet! We need to define the Request Attributes for the callout to complete correctly. See next step. Page 41 Services Step 5. Action In the Create HTTP Callout window, click on configure Request Attributes: Page 42 Services Step Action 6. In the Configure HTTP Callout Request Attributes window, configure the callout with the following parameters: IMPORTANT: Please note that the user expression below has a SPACE “ “ after the keyword “Basic”: Name Method Host Expression URL Stem Expression GET “callout.asfilter.internal” “/services/ActiveSync/Authorize” user PARAMETERS HTTP.REQ.HEADER("authorization").AFTER_STR("Basic ").B64DECODE.BEFORE_STR(":").HTTP_URL_SAFE Agent url resultType Value HTTP.REQ.HEADER(“user-agent”).HTTP_URL_SAFE ("https://"+HTTP.REQ.HOSTNAME+HTTP.REQ.URL).B64EN CODE “json” Click OK and OK to commit the changes. Page 43 Services Step 7. Action Next navigate to Configuration -> AppExpert -> Responder -> Policies -> Add Configure a Responder policy with the following parameters: Name: ActiveSyncFilter Action: Drop Expression: HTTP.REQ.URL.STARTSWITH("/Microsoft-Server-ActiveSync") && HTTP.REQ.HOSTNAME.EQ("callout.asfilter.internal").NOT && SYS.HTTP_CALLOUT(ActiveSyncFilter).CONTAINS("deny") Click Create and then Close. Page 44 Services Step 8. 9. 10. Action Bind this Responder policy to the Exchange virtual server. Navigate to Configuration -> Traffic Management -> Virtual Servers. Open the properties of the Exchange_vserver, select the Policies tab, click on Responder, then Insert Policy, and bind the ActiveSyncFilter policy. Click OK to commit the changes. Go back to your mobile device and try to get your mail, you should be successful. Next we will create a blacklist application policy to restrict the existence of some packages in order for the user to be able to access their mailbox. This concludes with this exercise. Page 45 Services Summary Key Takeaways The key takeaways for this exercise are: All the components of the solution use an API to exchange information about the status of users and devices. This information can be used on the NetScaler to enforce security policies based on the device actions. Page 46 Services Exercise 6: Configuring MDM policies to enforce email security for ActiveSync enabled devices. Overview In this exercise, we will configure MDM policies to determine device compliance based on the software packages installed on the device. This information will be made available to the NetScaler appliance via the XNC API in order to enforce email security policies. Step by step guidance Estimated time to complete this lab: XYZ minutes. Step Action 1. On your external workstation, open the XDM console by navigating to the following URL which corresponds to your external IP #2: https://your-dashed-fqdn.mycitrixtraining.net/zdm/ 2. Username: Administrator Password: Citrix123 Click on the Policies tab. Expand App Policies and highlight Applications Access Policies. Page 47 Services Step 3. Action Click on New Applications Access Policy and create a new policy with the following parameters: For Android: Name: Android App Black List Access Policy: Forbidden OS type: Android 4. For iOS: Name: iOS App Black List Access Policy: Forbidden OS type: iOS Click on New app and enter the following information: For Android: App Name: Instagram App package name: com.instagram.android For iOS: App Name: Instagram App bundle ID: com.burbn.instagram Click Create and Create again to commit the changes. NOTE: This application will be used to determine if the device is in compliance. This lab requires that you install/uninstall the application multiple times to test for the policy. If you would like to use another application, please note the package name exactly as it appears in the software inventory list. Next, we will need to modify the deployment package to enforce this rules during the next agent check-in. This will determine the device compliance and modifies the SMG status flag. Page 48 Services Step 5. Action Click on Deployment tab, highlight the package for your platform, click edit, and navigate to the Resources option. 6. Expand Application Access Policy and select the App Black List for your platform as a Resource to Deploy. Click Finish to commit deploy the package. 7. In the Application Access Policy settings, tick the checkboxes for each App Black List and click on Apply App List. Page 49 Services Step 8. Action Package deployment might take a few mins as it will be completed during the next agent check in. If you would like to force an agent check-in, open the Citrix Mobile Connect application on your mobile device and complete the below instructions for each platform: For Android: Tap on the Configuration -> Connection Status option to force an agent check-in. For iOS: Tap on the Configuration -> Refresh option to force a policy refresh. Page 50 Services Step 9. Action In a few mins, the devices will report its status to the XDM server. Go back to the XDM console and navigate to the Devices tab. Expand ActiveDirectory -> traning.lab and highlight the Training Users container. You will see that the devices are now flagged as blocked for the SMG status: Page 51 Services Step 10. Action Go back to your mobile device and attempt to access the user’s mailbox. You should be denied access. Android mail client: iOS mail client: Page 52 Services Step 11. Action To verify the configuration, let’s inspect the dynamic policies and logs in XNC. On the Site1-XenMobile VM, open the XenMobile NetScaler Configuration Console and Click on the Policies tab. 12. 13. In the upper right corner click on Refresh to get the latest policies from XDM. Expand the ZDM (deny) node. You should see the list of devices on the deny list according to the SMG status being reported. 14. Click on the Log tab. Select All Actions from the menu and click Go. The XNC log should display the latest attempts from any device connecting through the NetScaler. Page 53 Services Step 15. 16. 17. 18. Action From your mobile device, attempt to access the user’s mailbox. You should receive the same denied message. Go back to the XNC Console log and Click go. New requests should appear on the list. Now, on your mobile device, proceed to uninstall Instagram and force and agent check-in. Wait a few mins and inspect the SMG status on the XDM console. The system should have cleared the flag as the device is back in compliance. Attempt to access the user’s mailbox. The mail client should be able to perform a full refresh. This concludes with this exercise. Page 54 Services Summary Key Takeaways The key takeaways for this exercise are: XNC queries the XenMobile Device Manager API to build a dynamic policy set. The NetScaler appliance uses this information to enforce email restriction rules. Page 55 Services Exercise 7: Optimizing and securing the “Callout” evaluation Overview In this exercise, we leverage the new support in NetScaler 10.1 to perform callouts over SSL as well as the new Integrated Caching options to secure and optimize the callout policy result evaluation to avoid having to query the XNC component on every single request. Step by step guidance Description: Estimated time to complete this lab: XYZ minutes. Step Action 1. 2. 3. 4. 5. 6. 7. 8. 9. Page 56 Services Summary Key Takeaways The key takeaways for this exercise are: Callouts over HTTPs are now possible in NetScaler 10.1 New options in the callout configuration allows us to cache the result without overloading the web service providing the results for the callout policy. This is a desirable configuration for any customer implementation. Page 57 Services Revision History Revision 1.0 Change Description Updated By Original Version David Jimenez Date 04/18/2018 About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) is the leading provider of virtualization, networking and software as a service technologies for more than 230,000 organizations worldwide. Its Citrix Delivery Center, Citrix Cloud Center (C3) and Citrix Online Services product families radically simplify computing for millions of users, delivering applications as an on-demand service to any user, in any location on any device. Citrix customers include the world’s largest Internet companies, 99 percent of Fortune Global 500 enterprises, and hundreds of thousands of small businesses and prosumers worldwide. Citrix partners with over 10,000 companies worldwide in more than 100 countries. Founded in 1989, annual revenue in 2008 was $1.6 billion. http://www.citrix.com © 2013 Citrix Systems, Inc. All rights reserved. Citrix®, Citrix Delivery Center™, Citrix Cloud Center™, XenApp™, XenServer™, NetScaler®, XenDesktop™, Citrix Repeater™, Citrix Receiver™, Citrix Workflow Studio™, GoToMyPC®, GoToAssist®, GoToMeeting®, GoToWebinar®, GoView™ and HiDef Corporate™ are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. Page 58