Release Notes for Build 63.16 of NetScaler 11.0 Release

Updated: February 24, 2016 | Release notes version: 4.0
This release notes document describes the enhancements and changes (what's new), lists the issues that are fixed, and specifies the issues that exist, for the NetScaler 11.0 Build 63.16 release. See Release history.
Points to Note
Some important aspects to keep in mind while using Build 63.16.
Web Interface on NetScaler (WIonNS)
  • OpenJDK version for Web Interface on NetScaler (WIonNS)
    For NetScaler 10.5 and later releases, Web Interface on NetScaler (WIonNS) must use the OpenJDK7 package since NetScaler now uses FreeBSD 8.x/amd64. You can download the package from either one of the following links:
    Background: When the NetScaler is upgraded to version 10.5, it still has OpenJDK1.6 instead of OpenJDK1.7 which is required for NetScaler version 10.5. Therefore, when the configurations are saved (after upgrading), the Web Interface sites become inaccessible.
    Workaround: Before you save the configurations on the upgraded appliance, make sure you reinstall the Web Interface on NetScaler version 10.5 by using OpenJDK1.7.
    [# 464854]
What's New?
The enhancements and changes that are available in Build 63.16.
  • GSLB Service Selection using Content Switching
    Description: You can now configure a content switching (CS) policy to customize a GSLB deployment so that you can:
    * Restrict the selection of a GSLB service to a subset of GSLB services bound to a GSLB virtual server for the given domain.
    * Apply different Load Balancing methods on the different subsets of GSLB services in the deployment.
    * Apply spillover policies on a subset of GSLB services, and you can have a backup for a subset of GSLB services.
    * Configure a subset of GSLB services to serve a specific type of content.
    * Define a subset GSLB services with different priorities, and define the order in which the services in the subset are applied to a request.
    For more information, see Configuring GSLB Service Selection Using Content Switching.
    [# 503588]
NetScaler Gateway
  • For Linux Clients, support for binding Intranet IPv6 to VPN Virtual Server is introduced.
    IPv6 binding with VPN Global support is also introduced with the same.
    [# 556101]
  • The NetScaler appliance was enhanced so the Portal Theme can be added using the NetScaler Gateway Wizard.
    [# 591427]
  • High Availability Support for Dynamic Subscriber Sessions
    In the absence of a high availability (HA) setup, the subscriber information that is received from the RADIUS client is lost if the appliance fails. With HA support, the subscriber sessions are continually synchronized on the secondary node. In the event of a failover, the subscriber information is still available on the secondary node.
    [# 574838]
Fixed Issues
The issues that are addressed in Build 63.16.
  • The "show aaa session" command causes a high level of CPU usage when executed with the "-username" or "-group" option.
    [# 577778, 595104, 595185]
  • When routes are updated after an AppFlow collector is added, the NetScaler appliance sends ARP requests for the AppFlow collector IP address, even when the collector is reachable only through a router.
    [# 574420]
Application Firewall
  • The NetScaler application firewall terminates the connection when the request comes with a tampered session cookie and the cookie protection is enabled.
    [# 574498, 591172]
  • If learning thresholds for the application firewall security checks are set to a value greater than 1, the configuration utility displays the following error message when you try to access the learned data: "communication error with aslearn."
    Workaround: Use the command line interface (CLI) to access the learned data.
    [# 584621]
  • The NetScaler appliance might become unresponsive when processing a request, because of an interoperability issue between the application firewall, SSL, and the responder module. The issue arises under the following set of circumstances:
    The configuration includes an application firewall profile protecting an SSL virtual server.
    A responder policy is configured to reset the connection, and this policy is bound either globally or to the virtual server that receives the request.
    [# 592429]
  • The NetScaler appliance might fail when the application firewall is processing the cookie header(s) in an HTTP request. This occurs when the cookie transform action is enabled and all other security checks that apply to establishing a user session are disabled.
    [# 591176, 593996, 597440, 601359]
  • The Skip operation for the application firewall learned rules might take longer than expected.
    [# 547978]
  • NetScaler application firewall resets the connection when the request contains tampered session cookie and the cookie protection is enabled.
    [# 591172, 574498]
  • If you use the default browser PDF plugin to view an application firewall report, embedded links might be inactive.
    Workaround: Use the Adobe PDF browser plugin.
    [# 372768]
  • The Citrix application firewall silently resets the connection when it receives a malformed or invalid request. With this fix, the application firewall logs such events.
    [# 577742]
  • After processing a request that consists of multiple headers of the same type, a subsequent request might invoke a 302 response due to the way the application firewall stores the information about the parsed headers. With this fix, the variable that stores the information regarding the headers is reinitialized accurately before the next request is processed.
    [# 580564]
  • During an application firewall security check inspection, a compressed response from the server might trigger a violation if the XML format check is enabled. With this fix, the Accept-Encoding request header is removed when the XML protections are enabled. If content compression is enabled on the server, the XML check inspection is bypassed when the server sends a compressed response.
    [# 580273]
  • In a cluster setup, a command that is executed on the cluster configuration coordinator is propagated to the other cluster nodes. Therefore, a command that takes a long time to complete (such as "save ns config"), can take a little extra time to complete on all the cluster nodes. During this time, if you execute another command on the cluster (through another session), that command will fail because the previous command is not yet complete.
    [# 551607, 495270, 562651]
Command Line Interface
  • A customized CLI prompt is not persisted after rebooting the appliance.
    [# 583625]
Configuration Utility
  • You cannot configure the service path AVP by using the configuration utility.
    Workaround: Use the NetScaler command line to configure the service path AVP. At the command prompt, type:
    set subscriber gxinterface -servicepathAVP 1001 1005
    [# 576603]
  • SUBSCRIBER expressions do not appear in the list for rewrite and responder policies and action.
    [# 583751]
  • The operation to download the nstrace file from the configuration utility fails.
    [# 571814, 581955]
  • The values for the parameters on the "Configure Load Balancing Parameters" page do not appear even though they have been set.
    [# 583741]
  • The query logs contain incorrect information if the UDP payload size in the OPT record is not 1280. Also, if a load balancing virtual server on the NetScaler appliance receives a request with the CD bit set, and the "RecusionAvailable" parameter is disabled on the DNS or DNS-TCP load balancing virtual server, the CD bit is not logged.
    [# 579942]
  • GSLB virtual server configured with Dynamic Proximity as LB method fails.
    [# 578969]
  • If you have configured the canonical name as the GSLB domain in NetScaler appliance, when the backend server returns the CNAME record without the requested record, NetScaler appliance changes the TTL value of the GSLB domain with the TTL value of the CNAME record.
    [# 582925]
High Availability
  • The HA traffic between the HA pair is abnormally high. This issue is caused by a loop that repeatedly tries to push the same sessions to the secondary appliance after failover.
    [# 560640, 566710, 576012, 576096, 579037, 582354, 590730]
  • When there is a HA issue, the synchronization of persistence sessions between the primary and secondary appliances can fail. This can cause some of the persistence sessions not being replicated on the secondary appliance.
    [# 580703, 579037, 595491, 595506, 596002, 596215, 599250, 599396, 604164, 605112, 608450, 608485]
Load Balancing
  • If an SSL monitor is bound to a domain-based service that is configured with non-default SSL settings, the monitor might not show the service as UP.
    [# 575171, 576012]
  • The appliance fails if non-reachable autoscale entities that are part of a service group later become reachable and, in the interim, the service group name has changed.
    [# 583647]
  • When editing a service group in the configuration utility, the cacheable option is automatically set to true.
    [# 592235]
  • In a load balancing group configuration, the "sh run" command sometimes runs in a loop, which exponentially increases the size of the temporary configuration file. As a result, saving the configuration and synchronizing the nodes in a high availability setup might fail.
    [# 587812, 598499, 601918]
  • The TCP connection is not persistent for NITRO requests. Therefore, the underlying TCP connection is getting closed for each NITRO request.
    [# 583395, 457969]
  • For the .NET SDK, when "nitro.dll" is used along with a version later than 4.0 of the "Newtonsoft.json.dll" file, "private" properties cannot be serialized.
    [# 567162, 571309]
NetScaler Gateway
  • When launching applications through NetScaler Gateway, which has an AppFlow policy bound with the type of OTHERTCP_REQUEST, the Gateway can fail. This failure is not seen if the AppFlow policy is bound with the type ICA_REQUEST.
    [# 582075, 587347]
  • Changes made to the Login page using the GUI are not reflected on the virtual server login page.
    1. Use any browser other than IE to make changes to Portal themes.
    [# 586483]
  • If an invalid certificate is selected as part of login, when certificate Authentication is optional, and two factor authentication is ON, the login fails as expected. But an app saves the certificate, though login failed. The user has to manually delete the saved certificate from the EditConnection Page to retry with a valid/no certificate.
    [# 575047]
  • The NetScaler counters, used to verify connected users, displays a value that does not reflect actual connections.
    [# 490991, 398874]
  • The Client and EPA Plug-ins don't work with the latest Chrome versions as support for NPAPI is disabled by default. The support will be deprecated entirely in Chrome version 45 in September 2015.
    From Chrome version 42, all NPAPI plugins will appear as if they are not installed. This will affect customers upgrading from 10.5 to 11.0. This is also applicable to customers who upgrade from 11.0 Beta builds and later Release builds. Affected customers will see a download prompt even though the VPN or EPA plugin is installed.
    There is no work around to enable NPAPI for Chrome on Linux.
    Users need to use a browser which allows NPAPI (e.g. Firefox).
    More about NPAPI deprecation in Chrome browsers can be found at:
    [# 574355]
  • Smart Control does not work for applications that have SSL relay enabled on the server with few ICAPOLICY rules.
    [# 570437]
  • The Portal Customization feature does not offer the option to cancel or remove the default GUI or custom GUI images.
    [# 572723, 555553]
  • Audio over UDP is not supported with ICA sessiontimeout enabled or with Smart Control.
    [# 572850]
  • RPC (Remote Procedure Call) over HTTP communication is blocked if the AppFlow or HTML Injection features are enabled.
    [# 592904, 593008, 594149, 595496]
  • During the installation of Logon Point, the following error message was issued: "Couldn't execute error".
    [# 578144, 582708, 583061, 583300, 593263]
  • The Mac OS Endpoint Analysis (EPA) client only supports TLS1.0 and thus cannot perform EPA if the server has only TLS1.1/1.2 enabled.
    There is no workaround for this problem, but a customer can still perform EPA with the Mac VPN plugin. EPA from a browser will not be available if TLS1.0 is not enabled.
    [# 572969]
NetScaler Insight Center
  • Poor performance or latency is observed while accessing published applications over plain ICA port 1494 when AppFlow is enabled. This issue is not observed on ICA over CGP port 2598.
    [# 591437, 586981, 591338, 591696]
  • The SNMP daemon runs on NetScaler Insight Center even though NetScaler Insight Center does not support SNMP requests.
    [# 537253]
  • The NTP server configuration on NetScaler Insight Center is not propagated to the connector, agent, and database nodes.
    [# 579777]
  • If you enable the Appflow feature, the NetScaler appliance might become unresponsive while processing ICA connections.
    [# 584795]
  • If you enable Appflow for ICA and there are a large number of ICA connections which have reconnected after a network disruption, the NetScaler appliance will experience a memory leak.
    [# 587725]
  • The NetScaler appliance might become unresponsive if Appflow reporting is enabled for ICA traffic and network disruptions occur while the ICA connections are being processed.
    [# 580581, 580579, 583831, 584155, 589925, 590656, 594604, 595717, 595718, 595719]
NetScaler SDX Appliance
  • Citrix User Experience Improvement Program (CUXIP) collects data for the sole purpose of improving the graphical user interface. The collected data is used only by Citrix engineers. It is not shared with anyone.
    CUXIP collects the following types of data:
    1. Number of clicks by a user
    2. Information about the client browser and operating system
    For more information, see
    [# 542084]
  • You cannot restore any NetScaler instance from a backup file unless you first upload the XVA files for all of the instances that are included in the backup file.
    [# 585161, 584634]
  • Performing SNMP walk using the EMC SMART tool is slow.
    [# 588451]
  • You cannot configure INAT46, INAT64, or INAT66 rules by using the configuration utility.
    Workaround: Use the command line interface.
    [# 582682]
  • The NetScaler appliance might assign the NTP module a port that is used by some other feature module. Therefore, an incoming NTP response can be processed by the feature module. This can result in the failure of the NetScaler appliance.
    [# 588477]
  • The output of the show ACL does not display the correct hits for ICMP packets that match the ACL rules.
    [# 585265]
  • In a high availability configuration, when the connection between primary and secondary goes down and comes up again, the secondary node receives HA INIT request from the primary node and it terminates all BGP connections.
    [# 588509]
  • The memory usage statistic shown on the LCD display of a NetScaler appliance is the allocated memory. The NetScaler configuration utility displays the currently used memory. Therefore, the two values are different.
    [# 334358, 576545]
  • Some IP based expressions might not work for IP addresses starting from octet 128 or greater (128.x.x.x - 254.x.x.x).
    The following expressions are not impacted:
    The following expressions do not work:
    [# 534244]
  • If TLS1.1/1.2 protocol is used with AES/3DES ciphers, the length of the TCP window at the back end shrinks to zero. As a result, after some time, the connection is terminated.
    [# 591600, 595713, 596278, 596556, 596566, 598045, 599524, 600591, 604929]
  • If you update the certificate-key pair for a service group, the change is not reflected in the individual services that are bound to this service group. As a result, the old certificate-key pair continues to be used for negotiation in the SSL handshake.
    [# 554925]
  • If you downgrade the software on your NetScaler appliance that does not have a license to release 9.3 build 61.66 or earlier, some commands related to the default server certificate might not be saved in the running configuration. As a result, after restarting, secure access (HTTPS) to the appliance fails.
    [# 551603, 559154]
  • If you use the "add ssl certkey" command to add an encrypted .pfx file, the password is now encrypted and saved in the configuration file (ns.conf). In earlier releases, the password was not saved, so automatic execution of the add ssl certkey command failed when the appliance was restarted.
    [# 591167]
  • An incoming SSL record that spans more than 256 TCP packets and contains TCP header options causes memory corruption in the Cavium command buffer structure. As a result, the NetScaler appliance fails.
    [# 573904, 583295, 590222]
  • In some cases, when client authentication is enabled, incorrect data form a client leads to a memory leak on the NetScaler appliance. If a large number of clients send incorrect data, the appliance fails.
    [# 570754]
  • If you have configured optional client-certificate authentication and your policies target client certificate x509 extensions, such as auth keyid, a transaction with a client that doesn't have a certificate might cause the appliance to fail or to use stale values from a previous transaction.
    [# 593091]
  • If you have a large number of SSL services (greater than 3000) in the backend, CPU usage increases exponentially and the appliance fails.
    [# 581193]
  • Management CPU usage is high when you use the configuration utility's memory usage diagnostic tool (System > Diagnostics > Memory usage).).
    [# 586328]
  • When SPDY Protocol is enabled and SPDY Traffic is received on the NetScaler appliance, the TCP current clients counter goes to negative values and shows a very large value in the stat or the SNMP OID.
    [# 551562, 551786, 568554]
  • The upgrade wizard in the configuration utility puts the NetScaler software in the /var directory instead of the /var/nsinstall/<build id> directory.
    [# 586721]
  • In NetScaler Insight Center, and NetScaler VPX on ESX, the Vmtoolsd daemon fails during start up and creates a core dump in the directory /var/core. It does not affect normal VPX functionality. However, operations such as "Shut Down Guest" and "Restart Guest" from the vSphere client summary tab fail.
    [# 570166, 477094, 498384, 520519, 530951, 543554, 555689, 585809]
  • The NetScaler appliance might become unresponsive if it receives a retransmitted TCP jumbo frame that carries the TCP FIN flag.
    [# 571176]
  • After cleaning up an MPTCP session, the NetScaler appliance might not set the DATA_FIN flag in the TCP header of the data or acknowledgement packet if there is no subflow for sending the data.
    [# 553650]
  • For a NetScaler appliance with extended memory configured for Large Scale NAT (LSN) feature, after warm rebooting the appliance, when the appliance is added as secondary node to an appliance that does not have the extended memory configured for LSN, the secondary appliance becomes unresponsive.
    [# 593261]
  • In a high availability setup, if stateful connection failover is configured on a virtual server that has been serving traffic for some time, running the "clear config extended" command results in a warm restart on both the primary and secondary appliances. Unsetting connection failover on the virtual server results is a warm restart on only the secondary appliance.
    [# 575108, 581862]
  • On rebooting the NetScaler appliance, the timeout is not set to the value specified by the "set ns timeout" command.
    [# 587074]
  • The NetScaler appliance might become unresponsive if front end optimization (FEO) is enabled with the SSL and rewrite features.
    [# 583829]
  • If a server advertises a maximum segment size (MSS) greater than 1460 bytes, a TCP transaction might not generate a response after passing through the NetScaler appliance.
    [# 584079]
  • If you execute NTP commands, such as enable ntp sync and show ntp status, the NetScaler appliance might become unresponsive because of a memory leak.
    [# 529787, 546378, 574866, 581849]
  • If a NetScaler appliance that is sending auditlog messages over TCP (audit syslogaction specifies TCP as the transport protocol) has more than 200 million active sessions, the rate at which the syslogs are sent drops to 700 Kbps or lower, and the appliance consumes a high percentage of the CPU cycles.
    [# 580309]
  • In a network setup that includes both dynamic and deterministic types of clients, the first request from a deterministic client is not served if a dynamic client has sent a request.
    [# 576602]
  • After a failover occurs in a high availability configuration, some LSN static maps might become inactive on the new secondary node.
    Workaround: Delete the LSN static maps on the primary node and then add them again.
    [# 487318]
Web Interface on NetScaler (WIonNS)
  • WIonNS v1.7 does not work when WebFront is installed.
    Workaround: Upgrade to WIonNS v1.8.
    [# 577988]
Known Issues
The issues that exist in Build 63.16.
  • The NetScaler implementation of Kerberos does not fully implement the ktutil functionality. While this does not affect Kerberos authentication, it restricts some administrative tasks, such as the ability to merge keytab files.
    [# 551091]
  • The status of a LDAP server on the authentication dashboard of the NetScaler GUI, will be shown as UP, regardless of the actual status of the LDAP server, for the following combinations:
    - Security type is SSL and port is 389.
    - Security type is TLS or PLAINTEXT and port is 636.
    [# 567376, 567379]
  • When IBM Tivoli IdP is used for SAML authentication with NetScaler appliance as the service provider, there could be an issue with SAML assertion verification.
    [# 540396]
Admin Partitions
  • The IC memory once set for an admin partition, cannot be reduced. An appropriate error message is displayed.
    For example, if the IC memory of admin partition is 10 GB, you cannot reduce it to 8 GB. The memory limit can however be increased to a required value.
    [# 568106, 570578]
  • The GSLB configurations applied in the default partition can be viewed in admin partitions. This is not expected as user must not be able to view configurations that are defined in other partitions.
    [# 489512]
  • RPCSVR services cannot be configured in admin partitions.
    [# 498477]
  • After adding an admin partition, make sure you save the configurations on the default partition. Otherwise, the partition setup configurations will be lost on system reboot.
    [# 493668, 516396]
  • Admin partitions are not supported on FIPS appliances. However, owing to this issue, you can create admin partitions on FIPS appliances. You are advised against creating such partitions as they will not function properly.
    [# 517145]
  • Partition administrators cannot upload scriptable monitor scripts to a partition. This can only be done by NetScaler superusers. Also, scriptable monitors for an admin partition cannot be configured by using the GUI.
    [# 583756]
  • If NetScaler Insight Center does not get a connection closure update for a particular connection ID, and the ID is reused, the IP data of the previous connection may be displayed.
    [# 549679]
  • If you define an application in the CloudBridge application classifier that contains a colon (":") in the name, it is not exported correctly to the AppFlow collector.
    [# 561139]
AppFlow Insight
  • Hiding or displaying a URL, and some configuration changes might take longer than expected.
    [# 570896, 574278]
Application Firewall
  • Application firewall memory allocation failures might occur, when the integrated cache is also enabled and the memory usage limit for the cache parameter is set to a high value.
    [# 567119, 568260]
  • "Operation timed out" error is displayed in the CLI and the configuration utility while viewing learned rules. This error is only seen intermittently.
    [# 527190]
  • In NetScaler 9.3, if there is a standalone application firewall license, the user is able to bind a classic application firewall policy to the load balancing virtual server. However, in NetScaler 10.1, the design is changed. If the load balancing feature is not licensed, binding a classic application firewall policy to the load balancing virtual server now results in an error message.
    [# 510509]
  • If the server sends less data than the amount specified in the Content-length header, the NetScaler application firewall might send a 9845 response and reset the connection.
    [# 506653]
  • If a user request triggers an application firewall policy that is bound to the APPFW_BYPASS profile, the application firewall might fail to generate an SNMP alarm.
    [# 489691]
  • A POST request with an attached word document is silently blocked by the application firewall for a customized application.
    [# 530277]
  • In the configuration utility (GUI), selecting the "Remove All Learned Data" action in the application firewall Learned Rules section might not remove the learned data for some of the security checks for the profile.
    [# 549255]
  • When a user-defined application firewall signature object is updated by using the configuration utility, the enabled rules might get disabled and the configured actions in some signature rules might not be preserved.
    [# 561567]
  • The customer's application does not work when the application firewall is deployed to inspect the request for security check violations. When the application firewall forwards the request to the backend server, the server responds with a 403 HTTP error code, indicating that it cannot properly validate the CORBA session, and sends the page without the expected data in the form fields. The root cause is under investigation.
    Workaround: Turn off form field tagging and credit card checks.
    [# 511254]
  • The application firewall Graphical User Interface might display a warning when the Qualys signature file is uploaded to the NetScaler appliance. The transformation program that reads the input file is treating a warning message as an error.
    [# 547282]
  • The application firewall learning engine stops recommending new rules when the learning database grows to approximately 20-22 megabytes in size. The database size limit is applied on a per profile basis.
    [# 554591]
  • On a NetScaler appliance that has standalone application firewall license, when you bind a classic application firewall policy to a load balancing virtual server, an error message is displayed in the graphical user interface. The binding operation is successful. The error message is harmless and can be safely ignored.
    [# 522712]
  • When a NetScaler appliance is upgraded from a 10.1 build to a 10.5 build, the application firewall signature names are converted to all lowercase characters. If the name of the signature contains any uppercase character, the conversion affects the binding between profile and signature. Any attempt to modify either the profile or the signature object displays an error message in the configuration utility.
    [# 568705]
  • During an upgrade of a NetScaler appliance from version 10.0 to version 10.1 (build 121.1 or subsequent), the default JSON content type is not automatically configured. The default JSON content type is configured when version 10.1 (build 121.1) is installed on new hardware or in a new VPX instance. To check whether your appliance or instance has the correct default setting, log onto the NetScaler command line and type the following command:
    show appfw JSONContentType
    If the default content type is configured, the command output is similar to the following example:
    > show appfw JSONContentType
    1) JSONContenttypevalue: "^application/json$" IsRegex: REGEX
    If it is not, the screen shows only the following:
    > show appfw JSONContentType
    To add the default content type to the configuration, after upgrading to 10.1 (121.1), log onto the NetScaler command line, and then type the following commands to configure the default content type and verify the configuration:
    add appfw JSONContentType ^application/json$ -isRegex REGEX
    show appfw JSONContentType
    [# 430014]
  • The Graphical User Interface (GUI) for the NetScaler application firewall has significantly changed to provide enhanced user experience and remove browser plugin dependencies. The GUI steps in the current application firewall documents are in need of revision. Some of them do not match the new GUI display.
    [# 548432]
  • The StarURL Relaxation rule might not work if the regular expression contains two sets of groups (). The following example shows a relaxation rule with two groups, (nstimmy.deva|abcd) and (login|enter|logout). The PI engine is not able to parse such Regular Expressions.
    Example: ^https://(nstimmy.deva|abcd)\.citrite\.net/admin/(login|enter|logout)/$
    [# 578333]
  • When the application firewall signature has upper case or mixed case characters in the name, the configured profile bindings for such a signature are not displayed in the signatures pane in the configuration utility.
    [# 561845]
  • The application firewall CSRF Security check uses sessions. By default, there is a limit of 100,000 sessions per PE. If this limit is exceeded, the connection gets reset and the browser appears frozen.
    [# 579533]
  • The application firewall learning engine is not able to connect to the packet engine in certain circumstances. When this happens, the aslearn process does not start and the application firewall learning functionality stops working.
    [# 576713, 582879]
Cisco RISE Integration
  • Cisco RISE now supports the following commands:
    - show rise param
    - set rise param
    Following is the usage of the set rise param command:
    set rise param [-directMode ( ENABLED | DISABLED )] [-indirectMode ( ENABLED | DISABLED )]
    The show rise param command displays the current setting. For example,
    RISE-MPX-194-80> show rise param
    DirectMode: ENABLED IndirectMode: ENABLED
    [# 497410]
CloudBridge appliances
  • RADIUS/TACACS remote server auditing does not work.
    [# 529380]
  • When a node is removed from a L3 cluster, IPv6 SNIP addresses and routes are being erroneously cleared from the appliance. This behavior is seen only for IPv6 entities. IPv4 SNIPs and routes are not being removed from the appliance.
    [# 542693]
  • When WIonNS is deployed in a cluster setup, an error is thrown when you rename a service that points to the IP address of the cluster configuration coordinator.
    [# 583424]
  • When WIonNS is deployed in a cluster setup, if the service IP address is modified using the "set" command, the "show" command continues to display the previous IP address.
    [# 582805]
  • When WIonNS is deployed in a cluster setup, an error is thrown if you change the IP address of the WI service to point to the IP address of the cluster configuration coordinator.
    [# 582801]
  • When WIonNS is deployed in a cluster setup, if you add a service that points to the NSIP of a newly joined node, the command fails on the newly joined node but succeeds on the other cluster nodes.
    [# 584699]
  • When a cluster is connected to more than one upstream router:
    - When AS OVERRIDE is not configured on the upstream router, spare nodes will learn VIP routes from one of the routers, but they will be dropped as the path contains its own AS to prevent loop formation.
    - When AS OVERRIDE is configured on any upstream router for cluster neighbors, upstream router will change AS path in VIP to its own AS while sending updates to cluster neighbors. Spare nodes will not detect any loop and learnt VIP routes are advertised to other routers.
    Spare nodes will not advertise their configured VIP routes but there is no such restriction on BGP learnt routes.
    [# 547749]
  • When L2 mode and MBF is enabled in a cluster deployment, access to * 80 services can fail intermittently.
    [# 479899]
Command Line Interface
  • The NetScaler command line interface exits abruptly upon executing the "show dns addRec -format old" command.
    [# 512526, 527066, 545578]
  • When you use the Net::SSH::Perl library, and execute a command where an argument has a @ character, the NetScaler gives an error message indicating that the argument does not exist.
    For example, if you use the @ character in the tacacsSecret parameter of the following command:
    > set authentication tacacsAction TACACS-0101 -tacacsSecret Sl4make5f0rd@enc5
    Workaround: Use one of the following alternate approaches to execute the command:
    - Use Net::SSH::Perl library and include double quotes around the command when calling $ssh->cmd().
    - Use the Net::Telnet library.
    - Use the Net::SSH::Expect library.
    [# 346066]
Configuration Utility
  • The Surge protection feature cannot be configured in an admin partition. Since, surge protection parameters are part of the Change Global System Settings (System > Settings) dialog, when you try to update the global settings, the "Operation not supported" message is displayed.
    [# 498004]
  • The subnet mask does not appear after an IPv4 address in the network visualizer.
    [# 540927]
  • The bridge group and VLAN association is not displayed in the network visualizer.
    [# 542214]
  • You cannot upgrade to NetScaler 11 from the following builds by using the Upgrade Wizard of the NetScaler GUI:
    - All builds of NetScaler 9.3
    - All builds of NetScaler 10.1
    - Any build before Build 57.x of NetScaler 10.5
    Workaround: Use the command line interface to upgrade the NetScaler appliance.
    [# 563410]
  • In the network visualizer, if you click a tagged interface that is part of two or more VLANs, only the VLAN at the top of the list of bound VLANs is highlighted.
    [# 541011]
  • An interface does not appear as tagged or untagged in the network visualizer.
    [# 540980]
  • In the NetScaler configuration utility, the page at System> Network > IPs does not display the Type for LSN NATIPs, and the value shown for Traffic Domain is incorrect.
    Workaround: Run the sh nsip command to display the values in the command line interface.
    [# 505121]
  • If you click a VLAN in the network visualizer, details such as VLAN ID and bound interfaces are not displayed in a separate pane.
    [# 540943]
  • If the ACK on PUSH option is disabled in the default TCP profile, the NetScaler appliance might fail while downloading the static proximity database.
    [# 582102]
  • Initiating 280k SIP sessions with 40k subscribers might cause the NetScaler appliance to fail.
    [# 582459, 591247]
  • If you rename a server associated with a GSLB service and then run the sync gslb command, the GSLB configuration might not synchronize with the other GSLB sites.
    Workaround: Manually update the server name in the other GSLB sites.
    [# 511994]
Load Balancing
  • If a NetScaler appliance sending a DNSSEC negative response over UDP is not able to include the required records (for example, SOA, NSECs, and RRSIG records) in the Authority section, the appliance might send a truncated response in the wrong packet format.
    [# 540965]
  • A secure StoreFront monitor intermittently fails to sends probes.
    Workaround: If your deployment allows non-secure connections, use a non-secure StoreFront monitor.
    [# 559164, 582153]
  • IPV6 addresses are trimmed when data is retrieved from the packet engine because the prefix length variable is unset during the GET operation.
    [# 573463]
  • When displaying the results of the "show lb monitor" command, the numbering of the user-defined monitors restarts from 1 instead of continuing the numbering from the list of built-in monitors.
    [# 511222]
  • If the state of the IPv6 service on which a client's persistent session is running changes to out-of-service, the session might lose persistence before the client's transaction is completed.
    [# 571771]
NetScaler Gateway
  • Two NSC_AAAC cookies are seen when a request is sent by a Client to the VIP. The value is the same for both cookies. One cookie is for FQDN; the other cookie is for the domain.
    Two NSC_AAAC cookies are no longer seen after the version 11.0 beta.
    [# 540590, 539586]
  • Endpoint analysis (EPA) does not start a security scan on the user's device, and the VPN session does not launch with the proxy configured on a Chrome browser.
    [# 575527]
  • When authprofile and authentication are configured to enable load balancing, the NetScaler appliance displays the /VPN/ Index page when it should display the HTTP Error 401- unauthorized access message. This happens intermittently when forms authentication enabled load balancing is modified for 401 authentication.
    [# 575652]
  • When you navigate to Settings > Options > Account in an Outlook Web Access browser, the account information does not appear. This issue occurs on IE 10 and IE 11 browsers.
    [# 571714]
  • The NetScaler Gateway URL cannot be added to a Store with Receiver for Windows if only the SHA 384 cipher is enabled in the Receiver OS.
    [# 571340]
  • During VPN session removal, a crash occurs. It happens while detaching the VPN session policies, inherited from VPN virtual server, due to inconsistent data structures
    [# 559257, 568456]
  • If a user adds multiple personal bookmarks with the same URL or fileshare address, but each bookmark has a different name, then deleting one bookmark will delete all of bookmarks with the same address.
    [# 558903]
  • The NetScaler Gateway client plug-ins will not decouple immediately for previously installed clients after the 'Show VPN Plugin-in icon with Receiver' option is enabled. Users needs to exit the plugin process and restart to complete the decoupling.
    [# 558799]
  • When customizing a portal theme according to older processes, for example using the command "set vpn parameter -UITHEME CUSTOM" the administrator needs to copy the CSS files in the NetScaler shell. Because of the design changes for Portal customization in NetScaler Gateway 11.0, copying the CSS files is required. Complete the steps described in the documentation page at:
    The following changes to the steps are needed:
    After step 3,
    4) At command prompt, type "cd /var/netscaler/logon/themes/ "
    If you want to customize the Greenbubble theme, then
    "cp -r Greenbubble Custom"
    Or if you want to customize the Default theme, then
    "cp -r Default Custom"
    Now, you can make changes to files under "/var/netscaler/logon/themes/Custom"
    Make edits to css/base.css
    Copy custom logo to the /var/ns_gui_custom/ns_gui/vpn/media folder
    Make changes to labels in the files in resources/ directory. These correspond to different languages.
    Note: You can use WinSCP to transfer the files.
    If changes to html pages or javascript files are also needed, then edits in "/var/ns_gui_custom/ns_gui/" would be needed.
    After all changes are complete for the files in "/var/ns_gui_custom/ns_gui"
    At command prompt, type
    "tar -cvzf /var/ns_gui_custom/customtheme.tar.gz /var/ns_gui_custom/ns_gui/*"
    5. Use the configuration utility to switch to the custom theme.
    The previous Step 5 is not required in NetScaler Gateway 11.0. Once changes are made to one appliance, they propagate to all appliances in HA or cluster configurations.
    [# 556317]
  • Currently, the EULA feature in portal does not work for certificate authorization. It only works for authentication. EULA works fine in other scenarios.
    [# 556111]
  • Customized pages are not loaded successfully in Internet Explorer. This is a known limitation of the browser. To get the customized page in IE, open developer tools by pressing F12. Browse to the NetScaler Gateway URL, and access the customized WebFront site. Customized pages are successfully loaded in Chrome.
    [# 570161]
  • When configuring DTLS to be ON on an existing virtual server, unbind and rebind the SSL cert-key pair bound to the virtual server to connect with DTLS. If this is not done, the DTLS connection handshake between the client and the NetScaler Gateway appliance fails. After rebinding the SSL certkey pair, the handshake is accepted and the DTLS traffic goes through.
    [# 532891]
  • The pop-up messages for NetScaler Gateway Plug-in for Windows appear behind the active applications (such as browsers) on Windows 8.
    [# 511757]
  • Active user sessions GUI view shows Client IP as and Server IP as in the first row of each active user session.
    [# 447670, 504936, 521963, 571041, 585030, 586840]
  • A device crashed and rebooted. The cause is under investigation.
    [# 485780, 565487, 571924]
  • Once the Unified Gateway wizard completes, it does not enable the SSO for the session action, bound to the newly created VPN virtual server. Also, the NT Domain is not set. Manually, go to the session action and configure both, the SSO parameter and the NT Domain to achieve Single Sign-on.
    [# 582771]
  • Certificate based authentication fails for devices running Android versions before 5.0. This is applicable if only TLSv1.2 is enabled on server.
    [# 572098]
  • On Android 4.4.2.devices, after frequent network changes, the VPN session may disconnect. Until the device is rebooted, a new VPN session can not be established. Upgrading the Android version resolves the problem.
    [# 575105]
  • Android devices prior to version 5.0, SSL renegotiation fails when TLS1.2 is enabled.
    [# 574640]
  • A selected certificate does not get saved when SSL renegotiation with two-factor authentication is enabled. The certificate does get saved when certificate authentication is enabled.
    [# 574649]
  • After login is successful from browser, the VIP URL changes to "localvip:8080".
    [# 576221]
  • The Linux NetScaler Gateway client fails to launch its system tray icon after installation in Ubuntu 14.04.
    Root cause: Ubuntu has turned off whitelisting since version 13.10.
    Steps to fix:
    sudo apt-add-repository ppa:gurqn/systray-trusty
    sudo apt-get update
    sudo apt-get upgrade
    Then logoff and log in again.
    [# 528843]
  • The DNS resolution fails when connecting a VPN to NetScaler 11 using a MAC.
    [# 593624]
  • The NetScaler Gateway Client icon in Launchpad is not updated with the new client installation. Launchpad continues to show the previous Black Lock icon even though the new Blue Lock icon is shown elsewhere in the Finder. This happens because the Finder caches application icons and their aliases. As a result, the Launcher does not update the alias icon when the application's icon has been changed.
    Workaround - Clear the Finder's icon cache using following article's instructions: (requires reboot) OR modify the application aliias name in /Applications/Citrix by adding few spaces (minimum two).
    [# 573907]
  • During login, the icon present in the dock is changed to the previous version's icon. After the login process is finished, the icon changes to the new icon.
    Workaround: Quit the plugin and restart it. The new icon shows normally during the login process.
    [# 574428]
  • The NetScaler appliance is not able to connect a Mac computer to the VPN if only SSLv2 is enabled.
    [# 574149]
  • The default timeouts for Rewrite Processing and for Advanced Expression Regex Evaluation have changed from 1 millisecond to unlimited. This restores the default behavior from releases prior to 11.0. In addition, a -timeout optional parameter to the "set rewrite param" CLI command has been added. The time is in milliseconds - see the man page. A "set policy param -timeout <value>" command has been added to the CLI.
    [# 577016, 578214]
  • When set in the Authentication Profile of a load balancing virtual server that is behind a Unified Gateway, the Authentication Domain parameter will cause single sign-on to fail when the authentication is performed by a traffic manager in a different traffic domain.
    [# 574194]
  • Portal Customization: customization changes take a maximum of 120 seconds to reflect on the browser due to the Integrated Caching feature that polls for updated Gateway resources every 120 secs.
    [# 579923]
  • The Tomcat server fails intermittently after installing Web Front.
    [# 581469]
  • When Unified Gateway is deployed with seamless SSO enabled for virtual server authentication, then the authentication servers and policy realms bound at the authentication virtual server will be ignored. Instead, those authentication policies at Gateway are utilized for authentication. Authentication policies at the authentication virtual server are used when step-up authentication is configured using authentication profiles. Increasing the authentication profile's "authentication level" is the method used to step-up authentication.
    [# 540526]
  • In the EULA and native client, the French characters, '?' and '?', do not render properly.
    [# 571674]
  • When exiting Receiver for Windows, the NetScaler Gateway plug-in exits also even when icon decoupling is enabled.
    [# 566871]
  • When using the Smart Control configuration, the ICASESSIONTIMEOUT feature is always enabled. There is not an option to disable it.
    [# 572386]
  • If Pre-Auth EPA is configured and the EPA Plugin is installed, the NPAPI prompts a "Launch Application" on "f_ndisagent.html" before the VPN Plugin installation is started.
    [# 583435]
  • If you create a new password that does NOT meet the minimum requirements or use a recent password again.
    The error message States: Password Expired. Please Enter a new Password.
    The Expected error message should be the following: Could not update your password.
    The password must meet the length, complexity, and history requirements of the domain.
    This issue only occurs if there is more than one policy bound on the Gateway in cascading format. If one of the policies are removed, then the error message is correct.
    [# 588354]
  • The wizard does not support the creation of two Intranet Application type seamless SSO URLs using same LB with different site relative string.
    [# 576055]
  • When logging in from Chrome (with NPAPI disabled) and the plug-in is installed (old plugin that doesn?t know the new custom URL implementation) in the machine and is not running, you are prompted to Download instead of auto upgrade.
    [# 589387]
  • After setting a netprofile to the virtual server, unbind and rebind the SSL cert-key pair bound to the virtual server to connect with DTLS. If this is not done, the DTLS connection handshake between the client and the NetScaler Gateway appliance fails. After rebinding the SSL certkey pair, the handshake is accepted and the netprofile is honored.
    [# 555018]
  • The following EPA configuration is not supported on Linux NSGClient.
    add preauthenticationaction <name> ALLOW
    -defaultEPAGroup <string>
    -deletefiles <string>
    -killProcess <string>
    When the following command is configured on a NetScaler appliance, an empty CSEC string is sent to the client. As a result, browser plug-in or executable is terminated. "Error: Not a privileged User" is displayed and login is blocked.
    This issue is seen on 64-bit machine.
    [# 594241]
  • On the Unified Gateway Dashboard, the ICA sessions counter increases when a Full VPN session is established. Although the ICA sessions counter is not configured to collect ICA data, the ICA sessions counter increases.
    [# 573301]
  • DTLS is currently not supported as a Unified Gateway feature.
    [# 589807]
  • A seamless Single Sign-On (SSO) to the same URL domain fails when a plug-in is launched in native mode.
    [# 544325]
  • NetScaler users are authenticated and passed back to Storefront.? About 25% of the time the user receives the Cannot Complete Your Request response.? In the SF logs we see SSO failed because the credentials failed. Also, seen is the following message: Unknown User Name or Bad Password.? Pressing logon again works.? The NetScaler aaad.debug logs don't show any 401/403 errors.
    [# 596538]
  • Web applications do not show the complete name of the bookmark. The VPN URL supports 32 characters, but the portal homepage only supports 8~11 characters.
    [# 572731]
  • Client traffic can slow down if ALL of the following conditions are satisfied:
    - Single Sign-on (SSO) is ON.
    - HTTP POST request is involved which requires to do SSO.
    - NTLM authentication is needed to authenticate to back-end.
    - Transferring large payload (greater than 2 MB).
    - The back-end server is responding slow.
    This issue is unlikely to occur if ANY ONE of the following conditions is satisfied:
    - HTTP POST request Payload is in KBs.
    - Back-end authentication method is non-NTLM ( such as AGBasic, Form-based SSO, and KCD).
    - Non-HTTP POST request involved.
    - SSO is not involved or disabled.
    Workaround: Disable SSO for HTTP POST request.
    [# 592982]
  • On the Windows 10 system, if users log off from the NetScaler Gateway portal, the Windows VPN plugin crashes intermittently. As a workaround, users may use the VPN plugin's context menu for logging-out.
    [# 579788, 572866, 581274]
  • If Storefront has been configured as WIHome parameter, then accessing the Store Apps in Applications tab in the homepage over Full vpn mode with Windows does not work and an error message "Cannot complete your request" is returned.
    [# 575993]
  • If two-factor authentication is configured with client certificates and LDAP and if 'Deny SSL Renegotiation' is set to 'All', user connections fail. The 'Deny SSL Renegotiation' parameter must be set to 'No'.
    To configure Deny SSL Renegotiation
    1. In the configuration utility, on the Configuration tab, in the navigation pane, expand Traffic Management and then expand SSL.
    2. In the details pane, under Settings, click 'Change advanced SSL settings'.
    3. Select 'No' for 'Deny SSL Renegotiation' and then click OK.
    [# 480009]
NetScaler Insight Center
  • HDX Insight reports are not generated for Linux VDAs.
    [# 580138]
  • If you use the refresh button, it does not have any effect on the slider. Refresh operation does not have any affect on the time shown in the slider. Also, when you change tabs, it does not impact the slider. You can change the time by changing the time duration.
    [# 576469]
  • When Netscaler Gateway is deployed with CS vserver front-ending a vpn vserver, the VPN vserver needs to have a valid SSL certificate bound and needs to be UP in order to generate HDX Insight reports.
    [# 575748, 575713]
  • If you have configured the ICA session timeout value to a high value, say 10 minutes or more, and there is no traffic flow from the NetScaler appliances, neither the timeline chart nor the tabular chart displays any data. However, the Active sessions and Active Desktops columns display the data until the ICA session timeout occurs.
    [# 536056]
  • Any port other than 1494 and 2598, that needs to be considered as an ICA or CGP port, needs to be explicitly configured as a global ICA port to get the HDX Insight LAN user configuration working.
    [# 530702]
  • Geo report is only available for daily, weekly, and monthly reports for Web Insight.
    [# 556534]
  • Adding a new data node is now driven by Auto Registration. When a kernel is imported, it requests for input from user and does an auto registration with the Insight Server. This allows the Insight Deployment Manager GUI to display the same. Removing a datanode is not presently supported.
    [# 543632, 565706, 567628, 570264]
  • Insight Agent should only be added after configuring and deploying Insight DB Cluster.
    [# 570619]
  • If you set GUI access from HTTPS (the default) to HTTP, Insight Center and NITRO calls will fail to connect.
    Workaround: Select HTTPS as the GUI protocol.
    [# 555132]
  • If the ICA Rtt column is the column in extreme left of the session details table, the pop-up box gets cropped in display.
    [# 573089]
NetScaler SDX Appliance
  • In SDX systems, sometimes interface or channel binding to a VLAN fails. This happens only if the interface is down or one of the member interfaces of a channel is down.
    [# 474438, 493664]
  • If you configure Jumbo MTU with MTU greater than 1500 on an interface which is used by cluster nodes or instances on NetScaler SDX, the management service does not display any error and also the Jumbo MTU functionality does not work.
    [# 564207]
  • Changing interface Base MAC to a new MAC from the management service will not happen on 10G interface.
    [# 567834]
  • On adding many VPX instances, you may hit the default cache memory limit which could result in unexpected behavior.
    Workaround: Increase the default cache memory limit.
    [# 499311]
  • NetScaler cluster on SDX does not support Jumbo Frames.
    [# 507731]
  • On an SDX appliance, if a NetScaler instance is provisioned with more than 3.5 GB memory,
    the state of the interfaces might continuously change between UP and DOWN (flap) when the instance processes traffic.
    [# 541222, 548301]
  • A channel that you bind or unbind to or from 10G interfaces might become unresponsive. In this case only one of the interfaces within the channel will be affected by a Tx unit hang. This results in the Channel becoming unrecoverable at the PF level and only appliance reboot can recover from this situation.
    [# 572537]
  • If you are upgrading NetScaler SDX 11.0 beta to NetScaler SDX 11.0 GA, then the information displayed on the screen is not proper. This does not affect the upgrade process.
    [# 572088]
NetScaler VPX Appliance
  • A NetScaler that is deployed on the Hyper-V may crash or unexpectedly reboot if it uses three or more virtual interfaces in the VPX instance.
    [# 467734, 469552, 471601, 476833, 484210, 489880, 587441, 595651]
  • In an active-active high availability configuration using Virtual Router Redundancy Protocol (VRRP) protocol, a ping to a virtual IP address (VIP) might fail from a node that is a backup node for this VIP address.
    [# 485260]
  • A TCP connection involved in INAT times out at 120 seconds, regardless of what global timeout value you set for TCP client and server connections. For example, the connection times out at 120 seconds even after you run the following command:
    set ns timeout -anyTcpClient 50 -anyTcpServer 50
    [# 569874]
  • A clear config operation does not remove VXLANS. The configuration utility and the CLI continue to show the VXLANs, but with incorrect IDs.
    [# 574734]
  • For an RNAT connection, the NetScaler appliance drops the first packet that the server sends to the client.
    [# 543171]
  • After the clear config operation, reconfiguring a VXLAN entity fails to retrieve the VXLAN SNMP counters.
    [# 572525, 574734]
  • If you configure an INAT rule with the useproxyport parameter disabled, connections to the server fail if the source port is in the reserve port range (0-1023).
    [# 550488]
  • RNAT source IP persistency is not supported on a virtual server configured for link load balancing.
    [# 546066]
  • Interfaces on NetScaler VPX appliances are not hot-pluggable, except on NetScaler VPX appliances running on Amazon AWS.
    Workaround: Shut down the NetScaler VPX appliances before adding or deleting the interfaces.
    [# 578198]
  • For a NetScaler MPX 115xx series appliance, the configuration utility and the command line interface do not display the type of small form-factor pluggable (SFP) transceivers for 10G interfaces.
    Workaround: Restart the appliance.
    [# 573559]
  • In an Openstack Environment, if a custom flavor with an Ephemeral Disk of Size of less than 8GB is used to a start a NetScaler VPX instance, the config drive is not attached to the instance.
    [# 578366]
  • If you add an NTP time server by specifying the server name (host name), and the ns.conf file is very large, the result is a race condition in which the NTP daemon (NTPD) is started before host name services are ready.
    Workaround: Do one of the following:
    -Restart the NTP daemon after starting the NetScaler appliance.
    -Add the NTP server by specifying the IP address of the server instead of specifying the host name.
    [# 573306]
  • In both, default or admin partitions, when trying to import a password-protected key file, you get an error indicating that the key file is invalid. This error occurs because the NetScaler cannot import such key files.
    [# 512334]
  • Even though the clientAuthUseBoundCAChain parameter can be enabled and disabled in the backend profile, it is supported only on the front end profile.
    [# 554782]
  • If importing a certificate-key file fails because of a wrong file, and you run the command again with the correct file, the operation fails and the following error message appears:
    "ERROR: Import failed. Another resource with the same name being processed"
    Workaround: Import the file with a different name.
    [# 526433]
  • Secure renegotiation using SSLv3 protocol fails on MPX-FIPS appliances running firmware version 2.2.
    [# 550788]
  • Even though TLS protocol versions 1.1 and 1.2 are not supported by firmware version 1.1, the protocols incorrectly appear as enabled by default on an SSL virtual server.
    Workaround: Disable TLS1.1/1.2 explicitly on the virtual server.
    [# 576274]
  • FIPS keys that are created on firmware version 2.2 are lost after you downgrade to firmware version 1.1.
    Workaround: Export the FIPS keys before you downgrade the firmware. Import the FIPS keys after the downgrade.
    [# 559796]
  • On an MPX-FIPS platform running firmware version 2.2, if you have configured SSL services at the back end, an attempt to download a file fails if its size is greater than 16KB.
    [# 578464, 582280]
  • If you try to add a certificate bundle with the complete path to a certificate-bundle file, an error message appears. For example,
    > add ssl certkey bundle -cert /nsconfig/ssl/bundle3.pem -key /nsconfig/ssl/bundle3.pem -bundle YES
    ERROR: Processing of certificate bundle file failed.
    Workaround: Specify only the file name. For example,
    > add ssl certkey bundle -cert bundle3.pem -key /nsconfig/ssl/bundle3.pem -bundle YES
    [# 481878, 521933]
  • Server Name Indication (SNI) is not supported on a DTLS virtual server. However, if you enable SNI on a DTLS virtual server, an appropriate error message does not appear.
    [# 572429]
  • FTP connections through a TCP wildcard virtual server on the NetScaler appliance might fail for one of the following reasons:
    - A mismatch in TCP parameters is preventing the appliance from reusing the probe connection.
    - The server is sending data before the client-side TCP connection is established.
    [# 545858]
  • If the HTML injection feature is enabled, the NetScaler appliance injects JavaScript into responses sent to clients. If a subsequent request from one of the clients is generated from the JavaScript, the appliance responds with a 404 error.
    [# 518272]
  • The initial client connection on the NetScaler appliance might fail if a wildcard virtual server is configured and the useProxyPort option is disabled globally on the appliance.
    [# 542776, 571357]
  • In rare circumstances, the VPX instance can dump kernel core after a warm restart.
    [# 559176]
  • Syslog messages generated by user action are logged as error messages instead of informational messages.
    [# 538212]
  • In a Large Scale NAT deployment, the NetScaler appliance does not generate and send an ICMP error message to the subscriber in the event of a port allocation failure.
    [# 540162]
  • For a DS-Lite configuration with more than 90 million sessions, the NetScaler appliance might fail if you remove LSN pools.
    [# 580597]
  • An RTSP request might be logged on two different Syslog servers.
    [# 581086]
  • In the output of the "show lsn sipalgcall -callid" command, the port value of the SIP control channel is incorrect.
    [# 574257]
  • SIP registration might fail, if authentication is enabled in the SIP proxy server.
    [# 579797]
  • If the provisional response to a SIP REGISTER message does not contain an expiry value, the NetScaler appliance drops the message.
    [# 574725]
  • With a large number of active subscribers, and a high traffic rate for SIP over TCP, the NetScaler appliance can fail during ALG processing.
    [# 582464]
  • Where there are over 140K SIP calls over UDP, the NetScaler appliance can fail during ALG processing.
    [# 574303, 582451]
WAN Insight
  • NetScaler Insight Center takes two minutes to display the current connection details on the dashboard.
    [# 536696]
  • NetScaler Insight Center displays the latency value between two hops as 0 ms, though the minimum latency value is 1 ms.
    [# 553536]
  • CSV report exports elements that are present in the GUI. Additional elements like Client IP and Branch IP in the application node are denoted as or " " as these are not present in GUI.
    [# 547380]
  • If you upgrade NetScaler Insight Center appliance to release 10.5 build 55.8xxx.e, the compression ratio values will be displayed as -NA-.
    [# 554960]
  • On the NetScaler Insight Center dashboard, the latency values displayed on the graph and the network topology diagram might not match due to time synchronization issues.
    [# 533063]
Web Interface on NetScaler (WIonNS)
  • Since the install wi package command takes more than usual time to complete, it is not possible to return the status from other nodes. Hence it is required that all the WI related packages, that is, JRE+WI be present on system on the same path for all the nodes.
    [# 507753]
  • In a cluster environment, vPath encapsulation may fail when MAC based forwarding is enabled.
    [# 580137]
What's New in Previous NetScaler 11.0 Releases
The enhancements and changes that were available in NetScaler 11.0 releases prior to Build 63.16. The build number provided below the issue description indicates the build in which this enhancement or change was provided.
  • Including Additional Attributes in SAML IdP Assertion
    When used as a SAML IdP (identity provider), the NetScaler appliance can now be configured to send 16 additional attributes in addition to the NameId attribute. These attributes must be extracted from the appropriate authentication server. For each of them, you can specify the name, the expression, the format, and a friendly name.
    These attributes must be specified in the SAML IdP profile as follows:
    From the CLI:
    > set authentication samlIdPProfile <name> [-Attribute1 <string> -Attribute1Expr <string> [-Attribute1FriendlyName <string>] [-Attribute1Format ( URI | Basic )]] [-Attribute2 <string> -Attribute2Expr <string> [-Attribute2FriendlyName <string>] [-Attribute2Format ( URI | Basic )]]
    For example, the following command adds the attribute "MyName":
    > add authentication samlIdPProfile ns-saml-idp -samlSPCertName nssp -samlIdPCertName nssp -assertionConsumerServiceURL "" -Attribute1 MyName -Attribute1Expr -Attribute1FriendlyName Username -Attribute1Format URI
    From the GUI:
    Navigate to the screen where you configure the SAML IdP profile, and specify the additional attributes as required.
    [From Build 55.20] [# 460680, 504703]
  • Supporting Encrypted Assertions on SAML SP
    When used as a SAML SP (service provider), the NetScaler appliance can now decrypt the encrypted tokens that it receives from the a SAML IdP. No configuration is required on the NetScaler.
    [From Build 55.20] [# 291693]
  • Using Cookies to Track SAML Sessions
    In a deployment where a NetScaler appliance is configured as a SAML IdP (identity provider) for multiple SAML SPs (service provider), the appliance allows a user to access multiple SPs without explicitly authenticating every time.The appliance creates a session cookie for the first authentication and every subsequent request uses this cookie for authentication.
    [From Build 55.20] [# 503882]
  • The configuration of a AAA-TM virtual server in the NetScaler GUI is simplified for ease of configuring the required authentication mechanism.
    [From Build 55.20] [# 524386]
  • The output of "show ns ip" now also includes the aaadnatIp address.
    [From Build 55.20] [# 472912]
  • Using 401-based Authentication to Log on to a SAML IdP
    When used as a SAML IdP (identity provider), the NetScaler appliance now allows logon using the following 401-based authentication mechanisms: Negotiate, NTLM, and Certificate.
    [From Build 55.20] [# 496725, 508689]
  • Using Certificates to Log on to a SAML IdP
    When used as a SAML IdP (identity provider), the NetScaler appliance now allows logon using certificates.
    [From Build 55.20] [# 512125]
  • Logging Errors in NetScaler Log Files
    The NetScaler appliance now stores AAA authentication logs.
    - Errors and warnings are logged in the /var/nslog/ns.log file
    - Information and debug level logs are logged in the /var/log/nsvpn.log file.
    [From Build 55.20] [# 482228, 479557]
  • Support for Redirect Binding for SAML SP
    When used as a SAML SP (service provider), in addition to POST bindings, the NetScaler appliance now supports redirect bindings. In redirect bindings, SAML assertions are in the URL, as against POST bindings where the assertions are in the POST body.
    Using the CLI:
    > add authentication samlAction <name> . . . [-samlBinding ( REDIRECT | POST )]
    [From Build 55.20] [# 493220, 462777, 493224]
  • Fallback to NTLM Authentication
    When the NetScaler appliance is configured for Negotiate authentication and sends a 401 Negotiate response to client, if client is not able to reach domain controller or is not domain joined, then it automatically falls back to NTLM authentication and the client starts NTLM handshake. The NetScaler appliance is able to verify the credentials presented as part of NTLM authentication.
    This feature allows user logins locally or remotely.
    [From Build 55.20] [# 509829]
  • Fallback from Certificate to Other Authentication Mechanisms
    When authentication is configured to be done by using certificates and then followed by LDAP or other authentication mechanisms, the following behavior holds true:
    - In previous releases: If certificate authentication fails (or was skipped), the other authentication mechanism is not processed.
    - From this release onwards: Even if certificate authentication is not done, the other authentication mechanism is processed.
    [From Build 55.20] [# 550946]
  • The NetScaler appliance now supports the SiteMinder SAML SP.
    [From Build 55.20] [# 488077]
  • Using the SHA256 Algorithm to Sign SAML IdP Assertions
    When used as a SAML IdP (identity provider), the NetScaler appliance can now be configured to digitally sign assertions by using the SHA256 algorithm. Additionally, you can configure the appliance to accept only digitally signed requests from the SAML SP (service provider).
    These configurations must be specified in the SAML IdP profile as follows:
    From the CLI:
    > set authentication samlIdPProfile <name> [-rejectUnsignedRequests ( ON | OFF )] [-signatureAlg ( RSA-SHA1 | RSA-SHA256 )] [-digestMethod ( SHA1 | SHA256 )]
    From the GUI:
    Navigate to the screen where you configure the SAML IdP profile, and specify the corresponding parameters.
    [From Build 55.20] [# 474977]
  • OAuth/OpenID-Connect Mechanisms for AAA-TM
    The NetScaler AAA-TM feature now supports OAuth and OpenID-Connect mechanisms for authenticating and authorizing users to applications that are hosted on applications such as Google, Facebook, and Twitter.
    Note: OAuth on NetScaler is currently qualified only for Google applications.
    A major advantage is that user's information is not sent to the hosted applications and therefore the risk of identity theft is considerably reduced.
    In the NetScaler implementation, the application to be accessed is represented by the AAA-TM virtual server. So, to configure OAuth, an action must be configured and associated with a AAA-TM policy which is then associated with a AAA-TM virtual server. The configuration to define a OAuth action is as follows:
    > add authentication OAuthAction <name> -authorizationEndpoint <URL> -tokenEndpoint <URL> [-idtokenDecryptEndpoint <URL>] -clientID <string> -clientSecret <string> [-defaultAuthenticationGroup <string>] [-Attribute1 <string>] [-Attribute2 <string>] [-Attribute3 <string>] ....
    - Refer to the man page for information on the parameters.
    - Attributes (1 to 16) are attributes that can be extracted in OAuth response. Currently, these are not evaluated. They are added for future reference.
    [From Build 55.20] [# 491920]
  • Encrypting SAML IdP Assertion
    When used as a SAML IdP (identity provider), the NetScaler appliance can now be configured to encrypt the assertions by using the public key of the SAML SP (service provider).
    - Make sure the SAML SP certificate is specified.
    - For enhanced security, it is recommended that you encrypt assertions that contain sensitive information.
    This configuration must be specified on the SAML IdP profile as follows:
    On the CLI:
    > set authentication samlIdPProfile <name> [-encryptAssertion ( ON | OFF )] [-encryptionAlgorithm <encryptionAlgorithm>]
    On the GUI:
    Navigate to the screen where you configure the SAML IdP profile and specify the corresponding parameters.
    [From Build 55.20] [# 482185]
  • Multi-Factor (nFactor) Authentication
    The NetScaler appliance now supports a new approach to configuring multi-factor authentication. With this approach, you can configure any number of authentication factors. You can also customize the login form as required.
    In NetScaler terminology, this feature is called "nFactor Authentication." For more information, see
    [From Build 62.10] [# 482250, 451913, 549966]
Admin Partitions
  • Configuring Integrated Caching on a Partitioned NetScaler
    Integrated caching (IC) can now be configured for admin partitions. After defining the IC memory on the default partition, the superuser can configure the IC memory on each admin partition such that the total IC memory allocated to all admin partitions does not exceed the IC memory defined on the default partition. The memory that is not configured for the admin partitions remains available for the default partition.
    For example, if a NetScaler appliance with two admin partitions has 10 GB of IC memory allocated to the default partition, and IC memory allocation for the two admin partitions is as follows:
    - Partition1: 4 GB
    - Partition2: 3 GB
    Then, the default partition has 10 - (4 + 3) = 3 GB of IC memory available for use.
    Note: If all IC memory is used by the admin partitions, no IC memory is available for the default partition.
    [From Build 55.20] [# 481444, 484618]
  • Getting NetScaler Trace for Specific Partitions
    You can now generate the NetScaler trace for a specific admin partition. To do so, you must access that admin partition and run the "nstrace" operation. The trace files for the admin partition will be stored in the /var/partitions/<partitionName>/nstrace/ directory.
    [From Build 55.20] [# 496937, 515294]
  • Scriptable monitors can now be configured on the admin partitions that are available on a NetScaler appliance.
    [From Build 55.20] [# 535494]
  • Setting L2 and L3 parameters in Admin Partitions
    On a partitioned NetScaler appliance, the scope of updating the L2 and L3 parameters is as follows:
    - For L2 parameters that are set by using the "set L2Param" command, the following parameters can be updated only from the default partition, and their values are applicable to all the admin partitions: maxBridgeCollision, bdgSetting, garpOnVridIntf, garpReply, proxyArp, resetInterfaceOnHAfailover, and skip_proxying_bsd_traffic. The other L2 parameters can be updated in specific admin partitions, and their values are local to those partitions.
    - For L3 parameters that are set by using the "set L3Param" command, all parameters can be updated in specific admin partitions, and their values are local to those partitions. Similarly, the values that are updated in the default partition are applicable only to the default partition.
    [From Build 55.20] [# 513564]
  • Getting Web Logs for Specific Partitions/Users
    Using the NetScaler Web Logging (NSWL) client, the NetScaler can now retrieve the web logs for all the partitions with which the logged in user is associated. To view the partition for each log entry, customize the log format to include the %P option. You can then filter the logs to view the logs for a specific partition.
    [From Build 55.20] [# 534986]
  • Supporting Dynamic Routing in Admin Partitions
    While dynamic routing (OSPF, RIP, BGP, ISIS, BGP+) is by default enabled on the default partition, in an admin partition, it must be enabled by using the following command:
    > set L3Param -dynamicRouting ENABLED
    Note: A maximum of 63 partitions can run dynamic routing (62 admin partitions and 1 default partition).
    [From Build 55.20] [# 514848]
  • Partition Specific Load Balancing Parameters
    When you update load balancing parameters in an admin partition, the updates now apply to that partition only. You can have different load balancing parameter settings in different partitions.
    - In previous releases, any updates to these parameters were applied across all partitions, regardless of the partition in which the changes were made.
    - These parameters are set in the CLI by using the "set lb parameter" command or in the GUI by navigating to Traffic Management > Load Balancing.
    [From Build 62.10] [# 563004]
Application Firewall
  • The NetScaler application firewall offers SQL/XSS security check protections to detect and block possible attacks against the applications. You now have much tighter security control when configuring SQL/XSS protections. Instead of deploying relaxation rules that completely bypass the security check inspection for a field, you now have an option to relax a specific subset of violation patterns. You can continue to inspect the relaxed field in the incoming requests to detect and block the rest of the SQL/XSS violation patterns. The commands used in relaxations and learning now have optional parameters for value type and value expression. You can specify whether the value expression is a regular expression or a literal string.
    Command Line Interface:
    bind appfw profile <name> -SQLInjection <String> [isNameRegex (REGEX | NOTREGEX)] <formActionURL> [-location <location>] [-valueType (Keyword| SpecialString|Wildchar) [<valueExpression>][-isValueRegex (REGEX | NOTREGEX) ]]
    unbind appfw profile <name> -SQLInjection <String><formActionURL> [-location <location>][-valueType (Keyword|SpecialString|Wildchar) [<valueExpression>]]
    bind appfw profile <name> -crossSiteScripting <String> [isNameRegex (REGEX | NOTREGEX)] <formActionURL> [-location <location>] [-valueType (Tag| Attribute|Pattern) [<valueExpression>][-isValueRegex (REGEX | NOTREGEX) ]]
    unbind appfw profile <name> -crossSiteScripting <String> <formActionURL> [-location <location>] [-valueType (Tag|Attribute|Pattern) [<valueExpression>]]
    [From Build 55.20] [# 450324, 483683]
  • The NetScaler application firewall module offers data leak prevention and supports credit card protection. It can examines the credit card numbers in the response and takes the specified action if a match is found. In some scenarios, it might be desirable to exclude a specific set of numbers from the credit card security check inspection. For example, server responses for some internet applications might include a string of digits that is not a credit card number but matches the pattern of a credit card number. These responses can trigger false positives and therefore get blocked by the application firewall's Credit Card security check. The application firewall now offers the ability to learn and deploy relaxations for the credit card numbers. The credit card relaxation rule provides the flexibility to exclude a specific string of numbers from the safe commerce check without compromising credit card security. These numbers are not examined in the responses even if the credit card check is ON.
    Examples of CLI Commands:
    1. Bind the credit card number to profile:
    bind appfw profile <profile-name> -creditCardNumber <any number/regex> "<url>"
    2. Unbind credit card number from profile:
    unbind appfw profile <profile-name> -creditCardNumber <credit card number> "<url>"
    3. Log: Enable Logging of credit card Numbers
    add appfw profile <profilename> - doSecureCreditCardLogging <ON/OFF>
    set appfw profile <profilename> - doSecureCreditCardLogging <ON/OFF>
    4. Learn:
    show appfw learningdata <profilename> creditCardNumber
    rm appfw learningdata <profilename> -creditcardNumber <credit card number> "<url>"
    export appfw learningdata <profilename> creditCardNumber
    [From Build 55.20] [# 383298]
  • All application firewall graphical user interface (GUI) dialog boxes, including the ones for signatures, visualizer, and syslog viewer, are now completely free from any java dependencies and show a significant improvement in the overall performance. The HTML based GUI dialogues have been re-organized for enhanced user experience and intuitive workflow of information. Instead appearing in of pop-up dialog boxes with tabs, the information is now displayed as an in-line expansion. You can expand all the configuration sections and scroll up and down for a comprehensive view.
    [From Build 55.20] [# 506157]
  • The field format rules specify the inputs that are allowed in the target form fields. You can also limit the minimum and the maximum allowed length for the inputs. The application firewall learning engine monitors the traffic and provides field format recommendations based on the observed values. If the initial field format learned rules are based on a small sample of data, a few non typical values might possibly result in a recommendation that is too lenient for the target field. Updates to the application firewall have now decoupled violations and learning for the field formats. The firewall learns the field formats regardless of the violations. The learning engine monitors and evaluates all the incoming new data points to recommend new rules. This allows fine tuning the configuration to specify optimal input formats with adequate min/max range values. If a rule has already been deployed for a field/URL combination, the GUI allows the user to update the field format. A dialog box asks for confirmation to replace the existing rule. If you are using the command line interface, you have to explicitly unbind the previous binding and then bind the new rule.
    [From Build 55.20] [# 450326, 483677, 513927]
  • The application firewall is fully supported in striped, partially striped, or spotted configurations. The two main advantages of striped and partially striped virtual server support in cluster configurations are the following:
    - Session failover support: Striped and partially striped virtual server configurations support session failover. The advanced application firewall security features, such as Start URL Closure and the Form Field Consistency check, maintain and use sessions during transaction processing. In ordinary high availability configurations, or in spotted cluster configurations, when the node that is processing the application firewall traffic fails, all the session information is lost and the user has to reestablish the session. In striped virtual server configurations, user sessions are replicated across multiple nodes. If a node goes down, a node running the replica becomes the owner. Session information is maintained without any visible impact to the user.
    - Scalability: Any node in the cluster can process the traffic. Multiple nodes of the cluster can process the incoming requests served by the striped virtual server. This improves the application firewall's ability to handle multiple simultaneous requests, thereby improving the overall performance.
    Security checks and signature protections can be deployed without the need for any additional cluster-specific application firewall configuration. You just do the usual application firewall configuration on the configuration coordinator (CCO) node for propagation to all the nodes.
    Cluster details are available at
    [From Build 55.20] [# 408831, 403780]
  • All application firewall graphical user interface (GUI) dialog boxes, including the ones for signatures, visualizer, and syslog viewer, are now completely free from any java dependencies and show a significant improvement in the overall performance. The HTML based GUI dialogues have been re-organized for enhanced user experience and intuitive workflow of information. Instead appearing in of pop-up dialog boxes with tabs, the information is now displayed as an in-line expansion. You can expand all the configuration sections and scroll up and down for a comprehensive view.
    [From Build 55.20] [# 520048]
  • Geolocation, which identifies the geographic location from which requests originate, can help you configure the application firewall for the optimal level of security. For example, if an excessively large number of requests are received from a specific area, it is easy to determine whether they are being sent by users or a rogue machine. The application firewall offers you the convenience of using the built-in NetScaler database or any other geolocation based database to identify the source of origin of coordinated attacks launched from a country. This information can be quite useful for enforcing the optimal level of security for your application to block malicious requests originating from a specific geographical region. Geolocation logging uses the Common Event Format (CEF).
    To use Geolocation Logging
    1. Enable CEFLogging and GeoLocationLogging.
    >set appfw settings GeoLocationLogging ON CEFLogging ON
    2. Specify the database
    >add locationfile /var/netscaler/inbuilt_db/Citrix_Netscaler_InBuilt_GeoIP_DB.csv
    add locationfile <path to database file>
    [From Build 55.20] [# 483703]
Cache Redirection
  • Support for default syntax expressions
    You can now use default syntax expressions in cache redirection policies. The NetScaler appliance provides built-in cache redirection policies based on default syntax expressions, or you can create custom cache redirection policies to handle typical cache requests. In addition to the same types of evaluations done by classic cache redirection policies, the default syntax policies enable you to analyze more data (for example, the body of an HTTP request) and to configure more operations in the policy rule (for example, directing requests to either cache or origin server).
    [From Build 55.20] [# 490297, 495915, 536986, 536992, 537010, 537014, 538269]
CloudBridge Connector
  • Support for IPv6 Traffic through IPV4 Tunnels
    The NetScaler appliance now supports transferring IPv6 traffic through a IPV4 GRE tunnel. This feature can be used for enabling communication between Isolated IPv6 networks without upgrading the IPv4 infrastructure between them.
    For configuring this feature, you associate an PBR6 rule with the configured IPv4 GRE tunnel through which you want the NetScaler to send and receive IPv6 traffic. The source IPv6 address and destination IPv6 address parameters of the PBR6 rule specify the IPv6 networks whose traffic is to traverse the IPv4 GRE tunnel.
    [From Build 55.20] [# 497414]
  • Cluster to Include Nodes from Different Networks (L3 Cluster)
    You can now create a cluster that includes nodes from different networks. To configure a cluster over L3, you must add the nodes of different networks to different nodegroups. For more information, see
    You can transition an existing L2 cluster to an L3 cluster. For instructions, see
    [From Build 55.20] [# 374289, 317257]
  • Disabling Steering on the Cluster Backplane
    By default, a NetScaler cluster steers traffic over the cluster backplane, from the flow receiver node to the flow processor node. You can disable steering so that the process becomes local to the flow receiver and thereby ensure that the flow receiver also becomes the flow processor. Such a configuration can come in handy when you have a high latency link.
    Note: This configuration is applicable only for striped virtual servers.
    Steering can be disabled at the global NetScaler level or at the individual virtual server level. The global configuration takes precedence over the virtual server setting.
    - At the global level, steering can be disabled for all striped virtual servers. It is configured at cluster instance level. Traffic meant for any striped virtual server will not be steered on cluster backplane. The command is:
    > add cluster instance <clId> -processLocal ENABLED
    - At a virtual server level, you can disable steering for a specific striped virtual server. It is configured on a striped virtual server. Traffic meant for that virtual server will not be steered on cluster backplane. The command is:
    > add lb vserver <name> <serviceType> -processLocal ENABLED
    For more information, see
    [From Build 55.20] [# 539136]
  • Nodegroup for Datacenter Redundancy
    A cluster nodegroup can now be configured to provide datacenter redundancy. In this use case, nodegroups are created by logically grouping the cluster nodes. You must create active and spare nodegroups. When the active nodegroup goes down, the spare nodegroup which has the highest priority (the lower priority number) is made active and it starts serving traffic.
    For more information, see
    [From Build 55.20] [# 495019]
  • Reduce Backplane Steering for Spotted and Partially-striped Virtual Serves when Using ECMP
    With the Equal Cost Multiple Path (ECMP) mechanism, virtual server IP addresses are advertised by all active cluster nodes. This means that traffic can be received by any cluster node, which then steers the traffic to the node that must process the traffic. While there are no hassles in this approach, there can be a lot of redundant steering in case of spotted and partially striped virtual servers. Therefore, from NetScaler 11 onwards, spotted and partially striped virtual server IP addresses are advertised only by the owner nodes. This reduces the redundant steering.
    You can override this default behavior, by entering the following command in the VTYSH shell:
    ns(config)# ns spotted-vip-adv all-nodes
    [From Build 55.20] [# 317706]
  • Link Redundancy based on Minimum Throughput
    In a dynamic cluster link aggregation (LA) deployment that has link redundancy enabled, you can configure the cluster to select the partner channel or interface on the basis of its throughput. To do this, configure a threshold throughput on the channel or interface as follows:
    > set channel CLA/1 -linkRedundancy ON -lrMinThroughput <positive_integer>
    The throughput of the partner channels is checked against the configured threshold throughput. The partner channel that satisfies the threshold throughput is selected in FIFO manner. If none of the partner channel meets the threshold, or if threshold throughput is not configured, the partner channel with the maximum number of links is selected.
    [From Build 55.20] [# 508993]
  • Routing in a L3 Cluster
    In a L3 cluster, different nodegroups can have different VLANs and subnets associated with them. This can result in a VLAN getting exposed only in some nodes. Therefore, you can now configure dynamic routing on a VLAN to expose the VLAN to ZebOS even when there are no IP addresses with dynamic routing that are bound to it. The command to configure this is:
    > add/set vlan <id> -dynamicRouting (ENABLED | DISABLED)
    - This option is also available for VXLAN and BridgeGroups.
    - This configuration can also be used for L2 clusters.
    [From Build 55.20] [# 531868]
  • Routing on Striped SNIP addresses
    You can now run dynamic routing on a striped SNIP address in a NetScaler cluster. The routes advertised by the cluster have the striped SNIP as the next hop. There is just one adjacency with the cluster. Internally, the cluster picks one of the active nodes as the routing leader. When the current routing leader goes down, the routing ownership moves to an active node.
    - Striped SNIP addresses are useful mainly for cluster LA (link aggregation) deployments. They can also be used for ECMP, but the multipath routing functionality is unavailable.
    - Striped SNIP addresses can also be used in asymmetrical topologies.
    - Routing on striped SNIPs and routing on spotted SNIPs can coexist in a cluster.
    To specify leader node configurations, in the VTYSH shell, use the "owner-node leader" command.
    [From Build 55.20] [# 329439]
  • BridgeGroups are now supported in a NetScaler cluster deployment.
    [From Build 55.20] [# 494991]
  • Web Interface on NetScaler (WIonNS) Support on a Cluster
    WIonNS can now be configured on a NetScaler cluster deployment. To use WIonNS on a cluster, you must do the following:
    1. Make sure that the Java package and the WI package are installed in the same directory on all the cluster nodes.
    2. Create a load balancing virtual server that has persistency configured.
    3. Create services with IP addresses as the NSIP address of each of the cluster nodes that you want to serve WI traffic.
    4. Bind the services to the load balancing virtual server.
    Note: If you are using WIonNS over a VPN connection, make sure that the load balancing virtual server is set as WIHOME.
    [From Build 62.10] [# 498295, 489463]
  • FTP Load Balancing Support on a Cluster
    FTP load balancing is now supported in a NetScaler cluster deployment.
    [From Build 62.10] [# 513612]
  • Enable or disable negative caching of DNS records
    The NetScaler appliance supports caching of negative responses for a domain. You can enable or disable negative caching from the command line, by setting cacheNegativeResponses with the set dns parameter command, or in the configuration utility, in the Configure DNS Parameters dialog box.
    Note: You can enable or disable negative caching independent of global caching. By default, negative caching is enabled.
    [From Build 55.20] [# 391254]
  • Support for DNS Logging
    You can now configure a NetScaler appliance to log DNS requests and responses. The logs are in SYSLOG format. You can use these logs to:
    - Audit the DNS responses to the client
    - Audit DNS clients
    - Detect and prevent DNS attacks
    - Troubleshoot
    [From Build 55.20] [# 419632, 561291]
  • Rewrite and responder support for DNS
    The rewrite and responder features now support DNS. You can now configure rewrite and responder functionalities to modify DNS requests and responses as you would for HTTP or TCP requests and responses.
    [From Build 55.20] [# 405769]
  • Support for binding a single Virtual Server as a backup for multiple GSLB Virtual servers
    In a GSLB site deployment, you can now bind a single virtual server as a backup virtual server for multiple GSLB virtual servers in the deployment.
    [From Build 55.20] [# 373061]
HDX Insight
  • HDX Insight now supports displaying of Appflow records from Netscaler cluster.
    [From Build 62.10] [# 525758]
Load Balancing
  • If you configure cookie persistence and custom cookie on a virtual server, and later change the name or IP address of the virtual server, persistence is not honored.
    [From Build 55.20] [# 524079, 559022]
  • If you have set the persistence type to COOKIEINSERT, you can now encrypt the cookie in addition to any existing SSL encryption by using the NetScaler command line and configuration utility.
    At the NetScaler command prompt, type:
    set lb parameter -useSecuredPersistenceCookie Enabled-cookiePassphrase test
    In the configuration utility, navigate to Traffic Management > Load Balancing > Change Load Balancing Parameters and select Use Secured Persistence Cookie and Cookie Passphrase and enter a passphrase.
    [From Build 55.20] [# 347108, 323325, 348588]
  • IPv6 Support for HTTP based User Monitors
    You can now use IPv6 addresses in the following monitors:
    - USER
    - SMTP
    - NNTP
    - LDAP
    - SNMP
    - POP3
    - APPC
    Note: The monitor for MySQL does not support IPv6 addresses.
    [From Build 55.20] [# 510111]
  • Automatic Restart of the Internal Dispatcher
    In earlier releases, if the internal dispatcher failed, the services that used scriptable monitors also went down and the appliance had to be restarted. From release 11, if the internal dispatcher fails, the pitboss process restarts it. As a result, you no longer have to restart the appliance. For information about user monitors, see
    [From Build 55.20] [# 368128]
  • The following global timeouts has been introduced for TCP sessions on a NetScaler appliance related to RNAT rules, forwarding sessions, or load balancing configuration of type ANY:
    * Any TCP Client. Global idle timeout, in seconds, for TCP client connections. Client timeout set for an entity overrides the global timeout setting.
    * Any TCP Server. Global idle timeout, in seconds, for TCP server connections. Server timeout set for an entity overrides the global timeout setting.
    These timeout can be set either from the NetScaler command line (set ns timeout command) or from the configuration utility (System > Settings > Change Timeout Values page).
    Note: For applying these timeouts to a virtual server or service of type ANY, set these timeouts before adding the virtual server or the service.
    [From Build 55.20] [# 507701]
  • New Trap for Spillover
    If you have configured spillover on a virtual server and also configured a trap listener on the appliance, an SNMP trap is now sent to the trap listener when the virtual server experiences spillover. The trap message displays the name of the virtual server that experienced the spillover, the spillover method, the spillover threshold, and the current spillover value. If the spillover is policy based, the rule causing it appears in the Spillover Threshold field. If the virtual server is DOWN or disabled, the status message "vserver not up" appears in the trap message.
    [From Build 55.20] [# 486268, 475400]
  • Setting the Maintenance State for your Server with Minimal Interruption
    You can now set the maintenance state for your server with minimal interruption and without changing any configuration on the NetScaler appliance. In the maintenance state, the server continues to accept persistent client connections while new connections are load balanced among the active servers. On the NetScaler appliance, configure a transition out of service (TROFS)-enabled monitor and bind it to a service representing the server. Specify a trofsCode or trofsString in the monitor. Upon receipt of a matching code or string from the server in response to a monitor probe, the appliance places the service in the TROFS state. During this time, it continues to honor persistent client connections.
    To avoid disrupting established sessions, you can place a service in the TROFS state by doing one of the following:
    - Adding a TROFS code or string to the monitor: Configure the server to send a specific code or string in response to a monitor probe.
    - Explicitly disable the service and:
    - Set a delay (in seconds).
    - Enable graceful shut down.
    Adding a TROFS Code or String
    Note: This enhancement is not applicable to GSLB services.
    From release 11, if you bind only one monitor to a service, and the monitor is a TROFS-enabled monitor, it can place the service in the TROFS state on the basis of the server's response to a monitor probe. This response is compared with the value in the trofsCode parameter for an HTTP monitor or the trofsString parameter for an HTTP-ECV or TCP-ECV monitor. If the code matches, the service is placed in the TROFS state. In this state, it continues to honor the persistent connections.
    If multiple monitors are bound to a service, the effective state of the service is calculated on the basis of the state of all the monitors that are bound to the service. Upon receiving a TROFS response, the state of the TROFS-enabled monitor is considered as UP for the purpose of this calculation. For more information about how a NetScaler appliance designates a service as UP, see
    - You can bind multiple monitors to a service, but only one monitor must be TROFS-enabled.
    - You can convert a TROFS-enabled monitor to a monitor that is not TROFS-enabled, but not vice versa.
    [From Build 55.20] [# 408103]
  • Support for Secure LDAP Monitor
    You can now monitor LDAP services over SSL. To monitor the LDAP services over SSL, use the built-in LDAP monitor or create a user monitor and enable the "secure" option.
    [From Build 55.20] [# 418061, 556530]
NetScaler Gateway
  • The Portal Customization options have been expanded to allow end-to-end customization of the VPN user portal. Administrators can apply themes to their VPN portal design or use them as a foundation for their own customization or branding. An option to present VPN users an End User License Agreement (EULA) has also been added to the portal design. Portal themes and EULAs can be bound to a VPN virtual server or specified as global VPN parameters.
    [From Build 55.20] [# 489467]
  • NetScaler Gateway now has an Android client plug-in that supports full VPN capabilities. The plug-in supports Android versions 4.1 and later.
    [From Build 55.20] [# 520483]
  • The WebFront enhancement supports the transparent SSO feature when accessed from the Citrix Receiver. WebFront optimizes packet flow and improves performance for users accessing StoreFront through Gateway using Citrix Receivers. Data transferred over WAN is reduced by 41%.
    [From Build 55.20] [# 497625]
  • Plug-in Icon Decoupling from Citrix Receiver
    The desktop client plug-ins icons can now be configured to operate independently from Native Citrix Receiver clients. Settings to manage Receiver integration with the NetScaler Gateway Plug-ins can be configured globally and within session policies.
    [From Build 55.20] [# 406312]
  • Automatic session timeout can be enabled for ICA connections as a VPN parameter. Enabling this parameter forces active ICA connections to time out when a VPN session closes.
    [From Build 55.20] [# 358672, 527884]
  • This enhancement adds support to disable Autoupdate for NetScaler Gateway Endpoint Analysis and VPN plug-in.
    [From Build 55.20] [# 236620]
  • Support for Common Gateway Protocol (CGP) over WebSockets
    NetScaler Gateway virtual servers have improved intelligence for handling CGP traffic destined for the common CGP port, 2598, over WebSockets. This enhancement allows Receiver for HTML5 user sessions through NetScaler Gateway to support Session Reliability.
    [From Build 55.20] [# 519899]
  • NetScaler with Unified Gateway
    This feature extends NetScaler Gateway connectivity with access to any web application through a single URL, along with seamless single sign-on and sign-off. Single URL access can be configured for:
    - Internal organizational web applications
    - Software as a Service applications, including SAML based single sign-on when available
    - Outlook Web Access and SharePoint as clientless applications
    - Load balanced applications served through NetScaler load balancing virtual servers
    - XenApp and XenDesktop published resources.
    The feature can be configured and managed with the Unified Gateway wizard in the NetScaler configuration utility.
    [From Build 55.20] [# 519875]
  • NetScaler Gateway now has a full iOS VPN client plug-in. The plug-in is supported on iOS 7 and later releases.
    [From Build 55.20] [# 587571]
  • The SmartControl feature allows administrators to apply access policies for various XenApp and XenDesktop attributes through NetScaler Gateway without the need for identical policy duplication on the XenApp or XenDesktop servers.
    [From Build 55.20] [# 525947]
  • NetScaler now uses SPNEGO encapsulation on Kerberos tickets that are sent to backend web applications and servers.
    [From Build 55.20] [# 404899]
  • This enhancement adds support for cross-domain Kerberos constrained delegation when both the user and the service realm have a two-way shortcut trust. That is, if the user and service belong to different domains/realms, constrained delegation fails. However, if a user logs on with a user name and password, Kerberos Single Sign-On works for cross-domain access, because the NetScaler Gateway appliance does Kerberos impersonation with the user password. NetScaler Gateway currently does not otherwise support cross-domain constrained delegation.
    [From Build 55.20] [# 444387]
  • SharePoint 2013 and Outlook Web Access 2013 are supported with clientless VPN access mode.
    [From Build 55.20] [# 494995]
  • Striped Cluster for NetScaler Gateway in ICA Proxy Mode
    This feature allows administrators to deploy NetScaler Gateway with XenApp and XenDesktop in a striped style cluster where all nodes in the cluster serve traffic. Administrators can use existing Gateway configurations and scale seamlessly in a cluster deployment without having to restrict the VPN configuration to a single node.
    Note that this feature is limited to ICA Proxy basic mode virtual servers and does not support SmartAccess.
    [From Build 55.20] [# 490329, 503332]
  • NetScaler Gateway now has a full Linux VPN client plug-in. The plug-in is supported on Ubuntu 12.04 and 14.04 distributions.
    [From Build 55.20] [# 495767]
  • WebFront is an alternative integration point for XenApp and XenDesktop deployments served by StoreFront. Resident on NetScaler, WebFront uses caching and packet flow optimization in the distribution of user stores. These techniques improve end user experience for Receiver for Web users and speeds up single sign-on for native Receiver users. In the NetScaler configuration utility, the WebFront feature is on the Configuration tab at System --> WebFront.
    [From Build 55.20] [# 497619]
  • The Unified Gateway Wizard for XenDesktop/Xenapp Application creates wrong configurations with the Storefront option. The client launches the Java plug-in instead of Win/Mac/iOS/Android plug-in.
    [From Build 55.20] [# 576275]
  • NetScaler Gateway now supports the new UDP-based Framehawk virtual channel.
    [From Build 62.10] [# 587560]
  • NetScaler Gateway now supports Windows 10.
    [From Build 62.10] [# 579428]
NetScaler Insight Center
  • You can configure NetScaler Insight Center to display the geo maps for a particular geographical location or LAN by specifying the private IP range (start and end IP address) for the location.
    [From Build 55.20] [# 502478]
  • Hop Diagram Support
    The HDX Insight reports now support hop diagrams, which provide complete details about the client, NetScaler ADC, and server in an active session.
    To display the hop diagram, on the dashboard tab, navigate to HDX Insight > Users >, click on a user name and, in the Current Application Sessions table, click on the session diagram icon.
    [From Build 55.20] [# 443824]
  • NetScaler Insight Center now supports monitoring NetScaler appliances deployed in LAN user mode. The dashboard now displays the following user access types, depending on the NetScaler deployment:
    - Remote user: User connected to XenApp or XenDesktop server through a NetScaler Gateway.
    - Transparent mode user: User connected to XenApp or XenDesktop server directly, with no intervening virtual server.
    - LAN user: Internal user connected to XenApp or XenDesktop server directly, without configuring the routing rules on a NetScaler ADC.
    [From Build 55.20] [# 490147, 482900]
  • After an ICA connection is established between a client and a NetScaler Gateway appliance, errors or old receiver or server versions, can prevent the appliance from exporting the AppFlow records to NetScaler Insight Center.
    In such cases, the NetScaler Insight Center dashboard now displays the reasons for which the NetScaler appliance does not export the AppFlow records.
    [From Build 55.20] [# 504954]
  • The WAN Insight feature of NetScaler Insight Center gives CloudBridge administrators an easy way to monitor the accelerated and unaccelarted WAN traffic that flows through CloudBridge datacenter and CloudBridge branch appliances, and it provides end-to-end visibility that includes client-specific data, application-specific data, and branch- specific data. With the ability to identify and monitor all the applications, clients, and branches on the network, you can effectively deal with the issues that degrade performance.
    [From Build 55.20] [# 430882]
  • You can now increase the storage space of NetScaler Insight Center to 512 GB.
    [From Build 55.20] [# 425761, 553254]
  • Exporting Reports
    You can now save the Web Insight reports or HDX Insight reports in PDF, JPEG, PNG , or CSV format on your local computer. You can also schedule the export of the reports to specified email addresses at various intervals.
    For more information, see
    [From Build 55.20] [# 320860]
  • The NetScaler Insight Center configuration utility now displays the progress of the upgrade process.
    [From Build 55.20] [# 519788, 522021]
  • Multi-Hop support for NetScaler Insight Center enables Insight Center to detect which Citrix appliances a connection passes through (CloudBridge, NetScaler, NetScaler Gateway), and in which order, for improved reporting.
    [From Build 55.20] [# 383172]
  • Insight Deployment Management
    You can now improve the processing power of and increase storage space in your NetScaler Insight Center deployment by adding agents, connectors, and databases. An agent processes HTTP traffic and sends the data to the connectors that distribute this data across databases. You can add multiple agents, connectors, and databases to scale your deployment. In this deployment, you can also the decide the number of resources you have to allocate and determine the elements you need in the database architecture, on the basis of the number of HTTP requests per second, number of ICA sessions, and number of active WAN connections.
    [From Build 55.20] [# 404919]
  • You can now configure a DNS server when you set up NetScaler Insight Center. Configuring a DNS server helps resolve the host name of a server into its IP address.
    For example, while creating an email server, you now have an option to specify the server name of the server rather than the IP address.
    [From Build 55.20] [# 514612]
  • You can now configure NetScaler Insight Center to display the reports in your local time or GMT time.
    [From Build 55.20] [# 491073]
  • You can now identify the root cause of a terminated ICA session by viewing the session termination reason on the HDX Insight node. Along with the termination reason, it also displays the session TCP metrics such as ICA RTT and WAN Latency.
    [From Build 55.20] [# 488279]
NetScaler SDX Appliance
  • Initiate Virtual-NMI
    The Initiate Virtual-NMI generates a core dump of a VPX instance. Initiating a virtual NMI is useful when your NetScaler instance has stopped responding. To generate a virtual NMI, click on Configuration > Diagnostics. Click Initiate NMI under Non-Maskable Interrupt.
    [From Build 55.20] [# 475027]
  • Partial Licensing
    You can now partially allocate licenses as required for your deployment. For example, if your license file contains ten licenses, but your current requirement is for only six licenses, you can allocate six licenses now, and allocate additional licenses later. You cannot allocate more than the total number of licenses present in your license file.
    [From Build 55.20] [# 519771]
  • Support for SNMP MIB Configuration
    NetScaler SDX appliance now supports SNMP MIB configuration. You can configure SNMP MIB from Management Service by navigating to Configuration > System > SNMP > Settings > Configure SNMP MIB
    [From Build 55.20] [# 523926]
  • Appliance Reboot Progress Status
    NetScaler SDX Appliance now displays the reboot progress. This helps in keeping the user informed about the various stages of the appliance reboot.
    [From Build 55.20] [# 454093]
  • In the Management Service, the user interface for licensing the NetScaler SDX appliances is now identical to the user interface for licensing the NetScaler MPX and NetScaler VPX appliances.
    [From Build 55.20] [# 479628, 517234]
  • Management service now provides support for SNMP v3 traps in addition to the already existing support for SNMP v2 traps. SNMP v3 provides better administration and security capabilities through better encryption, authentication and data integrity mechanisms.
    [From Build 55.20] [# 431687]
  • Setup Wizard
    You can use the Setup Wizard to complete all the first time configurations in a single flow. You can use the wizard to assign various management network IP addresses, configure system settings, change the default admin password, manage and update licenses.
    You can also use this wizard to modify the network configuration details that you provided for the NetScaler SDX appliance during initial configuration.
    To access the wizard, navigate to Configuration > System, under Setup Appliance, click Setup Wizard.
    [From Build 55.20] [# 498284]
  • Management service now provides support for XenServer 6.5.
    [From Build 55.20] [# 538641]
  • NetScaler SDX supports cluster with three tuple notation.
    [From Build 55.20] [# 470894]
  • When you use the NetScaler provisioning wizard, the option to upload the XVA file has been added to the wizard. To use the XVA file to create a NetScaler instance, you need to first upload the XVA file.
    [From Build 55.20] [# 476695]
  • Syslog Viewer
    Syslog Viewer helps you in searching through the syslog messages based on various filters. You can narrow your search based on module like API, CLI, CONFIG, EVENT etc. You can further choose the type of message that you want to search through, like, ALERT, CRITICAL etc. Syslog Viewer also provides the option to search through regular expression or based on case sensitive text
    [From Build 55.20] [# 478512]
  • If you create channels on SDX and use these channels in VPXs and then take a backup of the appliance to restore either the complete appliance or selected instances, then channels are not restored and instances may fail.
    [From Build 55.20] [# 432899, 435206]
  • Default time zone
    The default timezone when management service creates NetScaler instances is the NTP timezone. When this default timezone is modified using the management service, then the update is synchronized across the NetScaler instances
    [From Build 55.20] [# 451866, 492929]
  • Retrieve LDAP Server Attributes
    When you configure an LDAP server and provide the IP address of the LDAP server, the management service automatically fetches the attributes like Server Logon Name Attribute, Search Filter, Group Attribute, Sub Attribute Name. This helps in reducing the error during filling these details for LDAP configuration.
    [From Build 55.20] [# 491661]
  • Options to disable and enable TLSv1, TLSv1.1, and TLSv1.2 has been added in the Management Service. To enable or disable TLS, navigate to Configuration > System. In the System Settings group, click on Change SSL Settings link.
    [From Build 55.20] [# 540347]
  • Clean Install
    You can use the clean install feature to downgrade the software version of a NetScaler SDX appliance without losing the IP addresses or passwords. Clean install is different than factory reset in the manner that you can choose the SDX version to which you want to downgrade the appliance.
    To perform a clean install, navigate to Configuration > System > System Administration. In the System Administration Group, click Appliance Reset and follow the prompts.
    [From Build 62.10] [# 519772]
  • MAC Address Wildcard Mask for Extended ACLs
    A new wildcard mask parameter for extended ACLs and ACL6s can be used with the source MAC address parameter to define a range of MAC addresses to match against the source MAC address of incoming packets.
    MAC Address Wildcard Mask for PBRs
    A new wildcard mask parameter for PBRs and PBR6s can be used with the source MAC address parameter to define a range of MAC addresses to match against the source MAC address of outgoing packets.
    [From Build 55.20] [# 391630]
  • Specifying a VLAN in a Static ARP Entry
    In a static ARP entry, you can specify the VLAN through which the destination device is accessible. This feature is useful when the interface specified in the static ARP entry is part of multiple tagged VLANs and the destination is accessible through one of the VLANs. The NetScaler appliance includes the specified VLAN ID in the outgoing packets matching the static ARP entry. If you don't specify a VLAN ID in an ARP entry, and the specified interface is part of multiple tagged VLANs, the appliance assigns the interface's native VLAN to the ARP entry.
    For example, say NetScaler interface 1/2 is part of native VLAN 2 and of tagged VLANs 3 and 4, and you add a static ARP entry for network device A, which is part of VLAN 3 and is accessible through interface 1/2. You must specify VLAN 3 in the ARP entry for network device A. The NetScaler appliance then includes tagged VLAN 3 in all the packets destined to network device A, and sends them from interface 1/2.
    If you don't specify a VLAN ID, the NetScaler appliance assigns native VLAN 2 for the ARP entry. Packets destined to device A are dropped in the network path, because they do not specify tagged VLAN 3, which is the VLAN for device A.
    [From Build 55.20] [# 520355]
  • Configuring Communication Intervals for an Active-Active Deployment
    In an active-active deployment, all NetScaler nodes use the Virtual Router Redundancy Protocol (VRRP) to advertise their master VIP addresses and the corresponding priorities in VRRP advertisement packets (hello messages) at regular intervals.
    VRRP uses the following communication intervals:
    * Hello Interval‚€”Interval between successive VRRP hello messages that a node sends, for all of its active (master) VIP addresses, to the other nodes of the VRRP deployment. For a VIP address, nodes on which the VIP address is in the inactive state use the hello messages as verification that the master VIP address is still UP.
    * Dead Interval‚€”Time after which a node of a backup VIP address considers the state of the master VIP address to be DOWN if VRRP hello messages are not received from the node that has the master VIP address. After the dead interval, the backup VIP address takes over and becomes the master VIP address.
    You can change these intervals to a desired value on each node. They apply to all VIP addresses on that node.
    [From Build 55.20] [# 512843]
  • OSPFv3 Authentication
    For ensuring the integrity, data origin authentication, and data confidentiality of OSPFv3 packets, OSPFv3 authentication must be configured on OSPFv3 peers.
    The NetScaler appliance supports OSPFv3 authentication and is partially compliant with RFC 4552. OSPFv3 authentication is based on the two IPSec protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP). The NetScaler supports only the AH protocol for OSPFv3 authentication.
    OSPFv3 authentication use manually defined IPSec Security Associations (SAs) between the OSPFv3 peers and does not rely on IKE protocol for forming dynamic SAs. Manual SAs define the security parameter Index (SPI) values, algorithms, and keys to be used between the peers. Manual SAs require no negotiation between the peers; therefore, same SA must be defined on both the peers.
    You can configure OSPFv3 authentication on a VLAN or for an OSPFv3 area. When you configure for a VLAN, the settings are applied to all the interfaces that are member of the VLAN. When you configure OSPFv3 authentication for an OSPF area, the settings are applied to all the VLANs in that area. The settings are in turn applied to all the interfaces that are members of these VLANs. These settings do not apply to member VLANs on which you have configured OSPFv3 authentication directly.
    [From Build 55.20] [# 471703]
  • Jumbo Frames Support for NetScaler VPX Appliances
    NetScaler VPX appliances now support receiving and transmitting jumbo frames containing up to 9216 bytes of IP data. Jumbo frames can transfer large files more efficiently than is possible with the standard IP MTU size of 1500 bytes.
    A NetScaler appliance can use jumbo frames in the following deployment scenarios:
    - Jumbo to Jumbo. The appliance receives data as jumbo frames and sends it as jumbo frames.
    - Non-Jumbo to Jumbo. The appliance receives data as regular frames and sends it as jumbo frames.
    - Jumbo to Non-Jumbo. The appliance receives data as jumbo frames and sends it as regular frames.
    Jumbo Frames support is available on NetScaler VPX appliances running on the following virtualization platforms:
    - VMware ESX (Note that NetScaler VPX appliances running on VMware ESX support receiving and transmitting jumbo frames containing up to only 9000 bytes of IP data.)
    - Linux-KVM
    For configuring Jumbo Frames on a NetScaler VPX appliance, you must:
    - Set the MTU of the interface or channel of the VPX appliance to a value in the range 1501-9216. Use the NetScaler command line interface or the configuration utility of the VPX appliance to set the MTU size.
    - Set the same MTU size on the corresponding physical interfaces of the virtualization host by using its management applications.
    [From Build 55.20] [# 464830, 478103, 485905]
  • The NetScaler appliance supports sending static IPv6 routes through a VXLAN. You can enable the NetScaler appliance to send an IPv6 route through either a VXLAN or a VLAN. A VXLAN parameter is added to the static IPv6 route command set.
    [From Build 55.20] [# 472443]
  • Support of IPv6 Dynamic Routing Protocols on VXLANs
    The NetScaler appliance supports IPv6 dynamic routing protocols for VXLANs. You can configure various IPv6 Dynamic Routing protocols (for example, OSPFv3, RIPng, BGP) on VXLANs from the VTYSH command line. An option IPv6 Dynamic Routing Protocol has been added to VXLAN command set for enabling or disabling IPv6 dynamic routing protocols on a VXLAN. After enabling IPv6 dynamic routing protocols on a VXLAN, processes related to the IPv6 dynamic routing protocols are required to be started on the VXLAN by using the VTYSH command line.
    [From Build 55.20] [# 472432]
  • Changing the Priority of a VIP Address Automatically in an Active-Active Deployment
    To ensure that a backup VIP address takes over as the master VIP before the node of the current master VIP address goes down completely, you can configure a node to change the priority of a VIP address on the basis of the states of the interfaces on that node. For example, the node reduces the priority of a VIP address when the state of an interface changes to DOWN, and increases the priority when the state of the interface changes to UP. This feature is configured on each node. It applies to the specified VIP addresses on the node.
    To configure this feature on a node, you set the Reduced Priority (trackifNumPriority) parameter, and then associate the interfaces whose state is to be tracked for changing the priority of the VIP address. When any associated interface's state changes to DOWN or UP, the node reduces or increases the priority of the VIP address by the configured Reduced Priority (trackifNumPriority) value.
    [From Build 55.20] [# 512848]
  • GRE Payload Options in a GRE IP Tunnel
    For a configured GRE IP tunnel, the NetScaler appliance encapsulates the entire Layer 2 packet, including the Ethernet header and the VLAN header (dot1q VLAN tag). IP GRE tunnels between NetScaler appliances and some 3rd party devices might not be stable, because these 3rd party devices are not programmed to process some or the Layer 2 packet headers.
    To configure a stable IP GRE tunnel between a NetScaler appliance and a 3rd party device, you can use a new parameter with the GRE IP tunnel command set. You can set the GRE payload parameter to do one of the following before the packet is sent through the GRE tunnel:
    - Carry the Ethernet header but drop the VLAN header
    - Drop the Ethernet header as well as the VLAN header
    - Carry the Ethernet header as well the VLAN header
    [From Build 55.20] [# 518397]
  • Client Source Port for Server Side Connections¬ related to INAT and RNAT Rules
    The NetScaler appliance, for INAT and RNAT rules, now supports using client port as the source port for server side connections. A parameter Use Proxy Port has been added to the INAT and RNAT command set. When¬ Use Proxy Port is disabled¬ for an INAT rule or a RNAT rule, the NetScaler appliance retains the source port of the client's request¬ for the server side connection. When the option is enabled (default), the NetScaler appliance uses a random port as the source port for the server side connection.¬ ¬ 
    You must disable this¬ parameter¬ for proper functioning of certain protocols that require¬ a specific¬ source port in the request packet.
    [From Build 55.20] [# 399821]
  • As-Override Support in Border Gateway Protocol
    As a part of BGP loop prevention functionality, if a router receives a BGP packet containing the router's Autonomous System Number (ASN) in the Autonomous Systems (AS) path, the router drops the packet. The assumption is that the packet originated from the router and has reached the place from where it originated.
    If an enterprise has several sites with a same ASN, BGP loop prevention causes the sites with an identical ASN to not get linked by another ASN. Routing updates (BGP packets) are dropped when another site receives them.
    To solve this issue, BGP AS-Override functionality has been added to the ZebOS BGP routing module of the NetScaler.
    With AS-Override enabled for a peer device, when the NetScaler appliance receives a BGP packet for forwarding to the peer, and the ASN of the packet matches that of the peer, the appliance replaces the ASN of the BGP packet with its own ASN number before forwarding the packet.
    [From Build 55.20] [# 503566]
  • Logging HTTP Header Information
    The NetScaler appliance can now log header information of HTTP requests related to an LSN configuration. The following header information of an HTTP request packet can be logged:
    - URL that the HTTP request is destined to.
    - HTTP Method specified in the HTTP request.
    - HTTP version used in the HTTP request.
    - IP address of the subscriber that sent the HTTP request.
    An HTTP header log profile is a collection of HTTP header attributes (for example, URL and HTTP method) that can be enabled or disabled for logging. The HTTP header log profile is then bound to an LSN group. The NetScaler appliance then logs HTTP header attributes, which are enabled in the bound HTTP header log profile for logging, of any HTTP requests related to the LSN group.
    An HTTP header log profile can be bound to multiple LSN groups but an LSN group can have only one HTTP header log profile.
    [From Build 55.20] [# 496835]
  • Layer 2 PBR Support for Forwarding Sessions
    In earlier releases, Layer 2 information (for example, destination MAC address, source VLAN, and Interface ID) about packets related to forwarding sessions were ignored during a PBR lookup. In other words, any packet related to a forwarding session was not considered for matching against a PBR having Layer 2 parameters as its condition.
    Now, layer 2 information about a packet related to a forwarding session is matched against layer 2 parameters in the configured PBRs.
    This feature is useful in a scenario where packets related to a forwarding session must be processed by another device before being sent to their destination.
    Following are the benefits of this support:
    - Instead of defining new PBRs that are based on Layer 3 parameters, you can use existing PBRs based on Layer 2 parameters for sending the packets related to forwarding sessions to the desired next hop device.
    - In a deployment that includes NetScaler appliances and optimization devices (for example, Citrix ByteMobile and Citrix CloudBridge appliances), PBRs based on Layer 2 parameters can be very handy compared to other, complex configuration for identifying the forwarding session related packets for PBR processing.
    - Identifying forwarding session related Ingress packets for sending them to the optimization device.
    - Identifying egress packets, which also matched a forwarding session rule, from the optimization device for sending the packets to the desired next hop device.
    [From Build 55.20] [# 484458]
  • Redundant Interface Sets
    A redundant interface set is a set of interfaces in which one interface is active and the others are on standby. If the active interface fails, one of the standby interfaces takes over and becomes active.
    Following are the main benefits of using redundant interface sets:
    - The back-up links between the NetScaler appliance and a peer device ensure connection reliability.
    - Unlike link redundancy using LACP, no configuration is required on the peer device for a redundant interface set. To the peer device, a redundant interface set appears as individual interfaces, not as a set or collection.
    - In a high availability (HA) configuration, redundant interface sets can minimize the number the HA failovers.
    A redundant interface set is specified in LR/X notation, where X can range from 1 to 4. For example, LR/1.
    [From Build 55.20] [# 355237, 186503, 249551]
  • Blocking Traffic on Internal Ports
    The NetScaler appliance does not block traffic that matches an ACL rule if the traffic is destined to the appliance's NSIP address, or one of its SNIP addresses, and a port in the 3008-3011 range.
    This behavior is now specified by the default setting of the new Implicit ACL Allow (implicitACLAllow) parameter (of the L3 param command). You can disable this parameter if you want to block traffic to ports in the 3008-3011 range. An appliance in a high availability configuration makes an exception for its partner (primary or secondary) node. It does not block traffic from that node.
    To disable or enable this parameter by using the command line interface
    At the command prompt, type:
    > set l3param -implicitACLAllow [ENABLED|DISABLED]
    Note: The parameter implicitACLAllow is enabled by default.
    > set l3param -implicitACLAllow DISABLED
    [From Build 55.20] [# 529317]
  • Support for WebP image format in Front End Optimization (FEO)
    The front end optimization feature now supports the conversion of GIF, JPEG, and PNG images to WEBP format as part of the image optimization functionality.
    [From Build 55.20] [# 509338]
  • Media classification support on the NetScaler appliance
    You can now monitor and display the statistics of the media traffic going through the NetScaler appliance.
    [From Build 55.20] [# 493103]
  • Support for JPEG-XR image format in Front End Optimization (FEO)
    The front end optimization feature now supports the conversion of GIF, JPEG, TIFF, and PNG images to JPEG-XR format as part of the image optimization functionality.
    [From Build 55.20] [# 504044]
  • Support for New Hardware Platforms
    The MPX 25100T and MPX 25160T platforms are now supported in this release. For more information about these platforms, see
    [From Build 55.20] [# 486703, 495591, 552218]
  • Transaction Scope Variables
    Transaction scope variables are added to variables feature. You can now use transaction scope variables to specify separate instances with values for each transaction processed by the NetScaler appliance. Transaction variables are useful for passing information from one phase of the transaction to another. For example, you can use a transaction variable to pass information about the request onto the response processing.
    [From Build 55.20] [# 444109]
  • Policy extensions support on NetScaler appliance
    The NetScaler appliance now supports policy extensions, which you can use to add customized functions to default syntax policy expressions. An extension function can accept text, double, Boolean or number values as input, perform a computation, and produce a text, double, Boolean or number result.
    [From Build 55.20] [# 248822]
  • Support for Additional Ciphers on a DTLS Virtual Server
    EDH, DHE, ADH, EXP, and ECDHE ciphers are now supported on a DTLS virtual server.
    [From Build 55.20] [# 508440, 483391]
  • Stricter Control on Client Certificate Validation
    You can configure the SSL virtual server to accept only client certificates that are signed by a CA certificate bound to the virtual server. To do so, enable the ClientAuthUseBoundCAChain setting in the SSL profile bound to the virtual server.
    For more information, see
    [From Build 55.20] [# 533241]
  • Changes to the Default Cipher Suite
    If user-defined ciphers or cipher groups are not bound to an SSL virtual server, the DEFAULT cipher group is used for cipher selection at the front end and the ALL cipher group is used for cipher selection at the back end. In this release, the predefined cipher suites, such as DEFAULT and ALL, are modified to give strong ciphers a higher priority. For example, earlier RC4-MD5 was given a higher priority but it is deprioritized in the new list because it is a weak cipher.
    [From Build 55.20] [# 226713, 258311, 384491]
  • Support for TLS Protocol Version 1.1 and 1.2 on the front end on the NetScaler VPX and SDX Appliances
    The NetScaler VPX appliance now supports TLS protocol versions 1.1 and 1.2 on the front end. On an SDX appliance, TLSv1.1/1.2 are supported on the front end even if an SSL chip is not assigned to the VPX instance.
    [From Build 55.20] [# 424463, 481970]
  • Support for Displaying the Hex Code of a CIpher
    The show ciphersuite command now displays the IETF standard hexadecimal code of the cipher. It is helpful in debugging, because a hex code is unique to a cipher but the cipher name might differ on the NetScaler appliance, OpenSSL, and Wireshark.
    At the NetScaler command line, type:
    show ciphersuite
    In the configuration utility, navigate to Traffic Management > SSL > Cipher Groups.
    [From Build 55.20] [# 491286]
  • Support for Checking the Subject Alternative Name in addition to the Common Name in a Server Certificate
    If you configure a common name on an SSL service or service group for server certificate authentication, the subject alternative name (SAN), if specified, is matched in addition to the common name. Therefore, if the common name does not match, the name that you specify is compared to the values in the SAN field in the certificate. If it matches one of those values, the handshake is successful. Note that in the SAN field, only DNS names are matched.
    [From Build 55.20] [# 439161]
  • 2048-bit Default Certificates on the NetScaler Appliance
    With this release, the default certificate on a NetScaler appliance is 2048-bits. In earlier builds, the default certificate was 512-bits or 1024-bits. After upgrading to release 11.0, you must delete all your old certificate-key pairs starting with "ns-", and then restart the appliance to automatically generate a 2048-bit default certificate.
    [From Build 55.20] [# 451441, 405363, 458905, 465280, 540467, 551603, 559154]
  • New SNMP OIDs for SSL transactions per second
    The following SNMP OIDs have been added to the display the SSL transactions per second:
    NS-ROOT-MIB::sslTotTransactionsRate.0 = Gauge32: 0
    NS-ROOT-MIB::sslTotSSLv2TransactionsRate.0 = Gauge32: 0
    NS-ROOT-MIB::sslTotSSLv3TransactionsRate.0 = Gauge32: 0
    NS-ROOT-MIB::sslTotTLSv1TransactionsRate.0 = Gauge32: 0
    [From Build 55.20] [# 449923]
  • Support for ECDHE Ciphers at the Back End
    The NetScaler appliance now supports the following ECDHE ciphers at the back end:
    Note: This feature is available only for NetScaler MPX platforms.
    [From Build 55.20] [# 523464]
  • DH Key Performance Optimization
    DH key generation is optimized on a VPX appliance by adding a new parameter dhKeyExpSizeLimit. You can set this parameter on an SSL virtual server or on an SSL profile and bind the profile to the SSL virtual server. The key generation is optimized as defined by NIST in Additionally, the minimum DH count is set to zero. As a result, you can now generate a DH key for each transaction as opposed to a minimum of 500 transactions earlier. This helps to achieve perfect forward secrecy (PFS).
    [From Build 55.20] [# 498162, 512637]
  • Support for TLS_FALLBACK_SCSV signaling cipher suite value
    The NetScaler appliance now supports the TLS_FALLBACK_SCSV signaling cipher suite value. The presence of this SCSV extension in the Client Hello indicates that the client is retrying to connect to the server by using a lower SSL version, after its previous attempt to communicate with a higher version failed. Therefore, if the server finds this extension in Client Hello and also finds that the client is proposing a version that is lower than the maximum version supported by the server, it is a likely indication of a "man in the middle attack." The server drops these handshakes.
    For more information, see
    [From Build 55.20] [# 509666, 573528]
  • Support for TLS Protocol Version 1.1 and 1.2 on the backend on the NetScaler MPX, MPX-FIPS, and SDX Appliances
    The NetScaler MPX appliance now supports TLS protocol versions 1.1 and 1.2 on the backend. MPX-FIPS appliances running firmware version 2.2 also support TLSv1.1/1.2 on the backend. On an SDX appliance, TLSv1.1/1.2 is supported on the backend only if an SSL chip is assigned to the VPX instance.
    [From Build 55.20] [# 494082, 566364]
  • Support for Auto-Detection of the Certificate-Key Pair Format
    The NetScaler software has been enhanced to automatically detect the format of the certificate-key pair. To do so, the format of the certificate and key file should be the same. If you specify the format in the inform parameter, it is ignored by the software. Supported formats are PEM, DER, and PFX.
    [From Build 55.20] [# 209047, 432330, 481660]
  • Support for SNI with a SAN Extension Certificate
    The NetScaler appliance now supports SNI with a SAN extension certificate. During handshake initiation, the host name provided by the client is first compared to the common name and then to the subject alternative name. If the name matches, the corresponding certificate is presented to the client.
    [From Build 55.20] [# 250573]
  • Support for Thales nShield(R) HSM
    All NetScaler MPX, SDX, and VPX appliances except the MPX 9700/10500/12500/15500 appliances now support the Thales nShield(R) Connect external Hardware Security Module (HSM). With a Thales HSM, the keys are securely stored as application key tokens on a remote file server and can be reconstituted only inside the Thales HSM. Thales HSMs comply with FIPS 140-2 Level 3 specifications.
    Thales integration with the ADC is supported for TLS versions 1.0, 1.1, and 1.2.
    For more information about support for Thales nShield(R) HSM, see
    [From Build 62.10] [# 440351, 477544]
  • The NetScaler introduces a new role called sysadmin. A sysadmin is lower than a superuser is terms of access allowed on the appliance. A sysadmin user can perform all NetScaler operations with the following exceptions: no access to the NetScaler shell, cannot perform user configurations, cannot perform partition configurations, and some other configurations as stated in the sysadmin command policy.
    [From Build 55.20] [# 548516]
  • Maintaining minimum number of reuse pool connections in HTTP Profiles
    You can now specify the minimum number of reuse pool connections to be opened from the NetScaler appliance to a particular server. This setting helps in optimal memory utilization and reduces the number of idle connections to the server.
    [From Build 55.20] [# 397478]
  • The NetScaler Web Logging (NSWL) client logs a hyphen (-) instead of a user name when %u is specified in the log format.
    [From Build 55.20] [# 238440, 239481, 247372, 422873]
  • Showtechsupport utility enhancement
    If your NetScaler appliance has Internet connectivity, you can now directly upload the newly generated collector archive to the Citrix technical support server from the appliance.
    [From Build 55.20] [# 480797]
  • Support for FACK on TCP profiles
    The TCP profiles on a NetScaler appliance now support forward acknowledgement (FACK). FACK avoids TCP congestion by explicitly measuring the total number of data bytes outstanding in the network, and helping the sender (either a NetScaler ADC or a client) control the amount of data injected into the network during retransmission timeouts.
    [From Build 55.20] [# 439130]
  • NTP Version Update
    In NetScaler release 11, the NTP version has been updated from 4.2.6p3 to 4.2.8p2.
    If you upgrade your NetScaler appliance from any earlier release to release 11, the NTP configuration is automatically upgraded with additional security policies. For more information about configuring an NTP server, see
    [From Build 55.20] [# 440375, 440591]
  • The NetScaler appliance fails intermittently when trace is started in 'RX' mode.
    [From Build 55.20] [# 576067]
  • Call home support for NetScaler VPX models
    Call home support has been added to NetScaler VPX models 1000 and higher.
    [From Build 55.20] [# 311620]
  • User configurable congestion window for TCP profile
    You can now set the maximum congestion window size for a TCP profile on the NetScaler appliance.
    [From Build 55.20] [# 248711]
  • During the execution of the "" script (from shell) or the "start nstrace" command (from CLI), when the trace file is rolled over, some packets might not be available in the trace. The number of packets that will be dropped from the trace is directly proportional to the traffic rate.
    [From Build 55.20] [# 480258, 494482, 523853]
  • Support for milliseconds, microseconds, and nanoseconds in Time Format Definition table
    You can now configure NetScaler web logging clients to capture transaction times in milliseconds, microseconds, and nanoseconds for logging on the NetScaler appliance.
    [From Build 55.20] [# 505840, 505377]
  • One Perl script to support both call home and regular uploads
    The script used to upload collector archives to Citrix servers is now packaged as part of the official NetScaler build ( However, using this script directly is not recommended. Instead, use the -upload option in showtechsupport utility to upload the archives.
    [From Build 55.20] [# 525332]
  • Support for HTTP/2 on the NetScaler Appliance
    The NetScaler appliance supports HTTP/2 connections with clients supporting HTTP/2 protocol.
    [From Build 55.20] [# 490096, 505747]
  • The NetScaler appliance generates SNMP clear alarm traps for successful cases of haVersionMismatch, haNoHeartbeats, haBadSecState, haSyncFailure, and haPropFailure error events in an HA configuration.
    [From Build 55.20] [# 368832]
  • Provide Internet Access to a Large Number of Private IPv4 Subscribers of a Telecom Service Provider (Large Scale NAT)
    The Internet's phenomenal growth has resulted in a shortage of public IPv4 addresses. Large Scale NAT (LSN/CGNAT) provides a solution to this issue, maximizing the use of available public IPv4 addresses by sharing a few public IPv4 addresses among a large pool of Internet users. LSN translates private IPv4 addresses into public IPv4 addresses. It includes network address and port translation methods to aggregate many private IP addresses into fewer public IPv4 addresses. LSN is designed to handle NAT on a large scale.
    The NetScaler supports LSN and is compliant with RFC 6888, 5382, 5508, and 4787. The NetScaler LSN feature is very useful for Internet Service Providers (ISPs) and carriers providing millions of translations to support a large number of users (subscribers) and at very high throughput. The LSN architecture of an ISP using Citrix products consists of subscribers (Internet users) in private address spaces accessing the Internet through a NetScaler appliance deployed in ISP's core network.
    The following lists some of the LSN features supported on a NetScaler appliance:
    * ALGs: Support of application Layer Gateway (ALG) for SIP, PPTP, RTSP, FTP, ICMP, and TFTP protocols.
    * Deterministic/ Fixed NAT: Support for pre-allocation of block of ports to subscribers for minimizing logging.
    * Mapping: Support of Endpoint-independent mapping (EIM), Address-dependent mapping ( ADM), and Address-Port dependent mapping.
    * Filtering: Support of Endpoint-independent filtering (EIF), Address-dependent filtering, and Address-Port-dependent filtering.
    * Quotas: Configurable limits on number of ports and sessions per subscriber.
    * Static Mapping: Support of manually defining an LSN mapping.
    * Hairpin Flow: Support for communication between subscribers or internal hosts using public IP addresses.
    * LSN Clients: Support for specifying or identifying subscribers for LSN NAT by using IPv4 addresses and extended ACL rules.
    * Logging: Support for logging LSN session for law enforcement. In addition, the following are also supported for logging:
    ** Reliable SYSLOG: Support of sending SYSLOG messages over TCP to external log servers for a more reliable transport mechanism.
    ** Load balancing of Log Servers. Support for load balancing of external log servers for preventing storage of redundant log messages.
    ** Minimal Logging: Deterministic LSN configurations or Dynamic LSN configurations with port block significantly reduces the LSN log volume.
    For more information about the Large Scale NAT feature, see
    [From Build 62.10] [# 316909]
  • Subscriber-Aware Traffic Steering
    Traffic steering is directing subscriber traffic from one point to another based on subscriber information. When a subscriber connects to the network, the packet gateway associates an IP address with the subscriber and forwards the data packet to the NetScaler appliance. The appliance communicates with the PCRF server over the Gx interface to get the policy information. Based on the policy information, the appliance performs one of the following actions:
    - Forwards the data packet to another set of services
    - Drops the packet
    - Performs LSN if configured on the appliance
    For more information about subscriber-aware traffic steering, see
    [From Build 62.10] [# 402473]
  • Provide Internet Access to IPv4 Subscribers Through the IPv6 Core Network of a Telecom Service Provider (Dual-Stack Lite)
    Because of the shortage of IPv4 addresses, and the advantages of IPv6 over IPv4, many ISPs have started transitioning to IPv6 infrastructure. But during this transitioning, ISPs must continue to support IPv4 along with IPv6 because most of the public Internet still uses only IPv4, and many subscribers do not support IPv6.
    Dual-Stack Lite (DS-Lite) is an IPv6 transition solution for ISPs with IPv6 infrastructure to connect their IPv4 subscribers to the Internet. DS-Lite uses IPv6 tunneling to send a subscriber's IPv4 packet over a tunnel on the IPv6 access network to the ISP. The IPv6 packet is de capsulated to recover the subscriber's IPv4 packet and is then sent to the Internet after NAT address and port translation other LSN related processing. The response packets traverse through the same path to the subscriber.
    The NetScaler appliance implements the AFTR component of a DS-Lite deployment and is compliant with RFC 6333.
    For more information about the DS-Lite feature, see
    [From Build 62.10] [# 407162]
  • Support for Gx Interface
    The NetScaler appliance can now dynamically receive the subscriber information over a Gx interface. The appliance communicates with the PCRF server over the Gx interface, receives the subscriber information, and uses this information to direct the flow of traffic. The PCRF server can send updates over this interface at any point during the subscriber session.
    For more information about Gx interface, see
    [From Build 62.10] [# 402469]
  • Support for RADIUS Accounting Message
    The NetScaler appliance can now dynamically receive the subscriber information through a RADIUS accounting message. It receives the subscriber IP address and MSISDN and uses this information to retrieve the subscriber rules from the PCRF server.
    For more information about RADIUS Accounting Message, see
    [From Build 62.10] [# 526981]
  • Subscriber-Aware Service Chaining
    Service chaining is determining the set of services through which the outbound traffic from a subscriber must pass before going to the Internet. Multiple services, such as antivirus services, parental control services, firewalls, and web filter, are running in a Telco network. Different subscribers have different plans and each plan has specific services associated with it. The decision to direct a subscriber's request to a service is based on the subscriber information. Instead of sending all the traffic to all the services, the NetScaler appliance intelligently routes all requests from a subscriber to a specific set of services on the basis of the policy defined for that subscriber. The appliance receives the subscriber information from the PCRF over a Gx interface.
    For more information about subscriber-aware service chaining, see
    [From Build 62.10] [# 561747]
  • Provide Visibility into SLA Reports
    An ISP often purchases international bandwidth from upstream ISPs, who then become layer 2 ISPs. To provide the redundancy required for reliable service to its customers, the purchasing ISP negotiates Service Level Agreements with multiple layer 2 ISPs. The SLAs stipulate a penalty in the event that the layer 2 ISP fails to maintain a specified level of service.
    NetScaler Insight Center and the NetScaler cache redirection feature can now be used to monitor the traffic flowing through the NetScaler appliances and calculate SLA breaches. The NetScaler cache redirection feature helps save bandwidth over international links. NetScaler Insight Center works with the NetScaler cache redirection feature to calculate, and provide visibility into, the percentage of bandwidth saved and any breaches of the SLA. ISP administrators are alerted whenever there is a breach for response time, hit rate/sec, or bandwidth.
    For a specific domain, NetScaler calculates the following SLA breaches and forwards the data to NetScaler Insight Center:
    * SLA Breach. A breach that occurs when a metric (response time, hits, or bandwidth) crosses the defined threshold value. For example, SLA breach is considered if the response time for a specific domain crosses 100 ms.
    * SLA Breach Duration. Time period in which a SLA breach lasted. For example, SLA Breach Duration is considered 5 mins, if the response time for a domain is greater than 100 ms consistently for 5 mins.
    * Breached Request Percentage. Percentage of requests whose response time is not within the minimum response time and maximum response time range. For example, if you configure this value as 10%, then among 100 requests, the response time of 10 requests are not within the minimum response time and maximum response time.
    NetScaler Insight Center then calculates the following SLA breaches:
    * SLA Breach Frequency- SLA Breach Frequency is the defined as the number of times the SLA breach occurs for the SLA Breach Duration. For example, SLA Breach Frequency is considered 1, if the response time for a domain is greater than 100 ms consistently for 5 mins.
    All of these metrics are calculated for a SLA group, which contains a list of domains defined by the ISP administrator.
    [From Build 62.10] [# 495288, 501269, 501277, 501278, 501279, 501280]
Fixed Issues in Previous NetScaler 11.0 Releases
The issues that were addressed in NetScaler 11.0 releases prior to Build 63.16. The build number provided below the issue description indicates the build in which this issue was addressed.
Application Firewall
  • After processing a request that consists of multiple headers of the same type, a subsequent request might invoke a 302 response due to the way the application firewall stores the information regarding the parsed headers. With this fix, the variable which stores the information regarding the headers is reinitialized accurately prior to processing the next request.
    [From Build 62.10] [# 580564]
  • If, when processing a form for response-side security check inspection, the application firewall resets a connection, the partially parsed form is not freed. The result is a memory leak. With this fix, the memory allocated to the partially parsed forms is freed when a connection is reset.
    [From Build 62.10] [# 572637, 581520]
  • In a cluster setup, for active FTP, the server cannot initiate a data connection from a random port.
    [From Build 62.10] [# 559230, 571042]
  • In a NetScaler cluster, a "sh nslogaction" command that is issued from the NSIP address of a cluster node, goes into an infinite loop. The issue is not observed when the command is issued from the cluster IP address.
    [From Build 62.10] [# 574333, 573645]
  • You cannot add LB routes in a link load balancing setup that is deployed on a cluster.
    [From Build 62.10] [# 574717]
Configuration Utility
  • The operation to download the nstrace file from the configuration utility fails.
    [From Build 62.10] [# 571814, 581955]
  • You cannot configure the service path AVP by using the configuration utility.
    Workaround: Use the NetScaler command line to configure the service path AVP. At the command prompt, type:
    set subscriber gxinterface -servicepathAVP 1001 1005
    [From Build 62.10] [# 576603]
NetScaler Gateway
  • When logging into NetScaler 11.0 using a clientless VPN, SharePoint 2013 does not load correctly. The SharePoint folders are not accessible.
    [From Build 62.10] [# 580737]
  • When Netscaler Gateway is configured in a Striped cluster, and a force cluster sync operation is done on a NON CCO node, subsequent access can cause the NetScaler Gateway appliance to crash.
    [From Build 62.10] [# 576522]
  • When a VPN works as a SAML SP in a two-factor case, and if the Get /vpn/index after /cgi/samlauth comes to the same core, NetScaler resends the SAML Auth request.
    Intermittent issues appear in multi-core systems. It works normally if both requests go to different cores.
    [From Build 62.10] [# 576414]
  • Some Unified Gateway traffic management session do not terminate at VPN logout.
    [From Build 62.10] [# 575512, 575521]
  • When the maxAAAUsers parameter is UNSET on a VPN virtual server, NetScaler Gateway does not update the value to previously set value. Due to this, numbers of users allowed on a vpn virtual server cannot be increased by applying an UNSET operation. Administrators need to configure a SET operation as a workaround.
    For example, if the administrator configures 10 as the maxAAAUsers value, then issues a SET operation for 5, if he issues another UNSET, the number of allowed users does not go back to 10 users.
    [From Build 62.10] [# 576063]
  • If a StoreFront application is created using the Unified Gateway Wizard, the configuration of the following session actions need to be updated.
    If a configured wihome ends with "web", then update the wihome.
    For example, if wihome is "/citrix/storeweb
    set vpnsessionAction AC_WB_<UG_IPADDRESS> -wihome ‚€œ/citrix/storeweb‚€
    set vpnsessionAction AC_OS_<UG_IPADDRESS> -wihome ‚€œ/citrix/storeweb‚€
    Also, initiate the following commands before to update the "client choices" and "transparent" interception options.
    set vpnsessionAction AC_WB_<UG_IPADDRESS> -clientchoices ON ‚€“transparentinterception ON
    set vpnsessionAction AC_OS_<UG_IPADDRESS> -clientchoices OFF ‚€“transparentinterception OFF
    These steps must be manually performed using the CLI or the NeScaler configuration utility.
    1. Using the configuration utility, navigate to "NetScaler Gateway -> Policies -> Session -> Session Profiles and edit the relevant profile.
    2. Navigate to "Published Application Tab" and update the "Web Interface Address" field ( this corresponds to the wihome setting mentioned above ).
    3. Go to the "Client Experience" tab and then click to the "General" tab and update client choices as mentioned above for the corresponding actions.
    4. On the "Client Experience" tab set the "plugin type" field as "Windows/ MAC OS X" for the relevant profiles as mentioned above.
    [From Build 62.10] [# 576101, 576304]
  • Applications configured with SAML or NetScaler self-authentication, on a Unified Gateway portal, return the following 403 error message : Not a privileged user.
    [From Build 62.10] [# 574949, 575938]
  • When the HTTP/2 Protocol is used to access the VPN with external authentication, the transaction will not go through. Ensure HTTP/2 is disabled in nshttp_default_strict_profile.
    [From Build 62.10] [# 574742]
  • In a Chrome browser, the home page is sometimes blank. Refreshing the page resolves the issue.
    [From Build 62.10] [# 574173]
  • The Unified Gateway Wizard for XenDesktop/Xenapp Application creates wrong configurations with the Storefront option. The client launches the Java plug-in instead of Win/Mac/iOS/Android plug-in.
    [From Build 62.10] [# 576275]
  • The Locale settings have been moved out of the Look and Feel section. Now, we have 2 separate sections :
    - Section 1 is for settings the attributes related to the Look and Feel of portal pages.
    - Section 2 is for choosing a locale.
    Users can choose a locale to edit labels/texts for portal pages.
    [From Build 62.10] [# 571754]
  • App/VDA launch via HTML5 receiver fails when using Firefox.
    [From Build 62.10] [# 570690]
  • When accessing SharePoint 2007 through Clientless VPN, the VPN session terminates, and some URL requests are not rewritten in Clientless VPN mode.
    [From Build 62.10] [# 567887]
  • EULA feature: The EULA on a fresh HyperV image issues an error. It works fine for upgraded builds. Workaround is
    1) Go to NetScaler shell
    2) type the command: # perl /var/netscaler/logon/themes/EULA/
    Now an EULA can be configured using the Management GUI.
    [From Build 62.10] [# 564048]
  • In a double hop setup, when SSL relay is enabled for XenApp and XenDesktop, the XenApp or XenDesktop resource launch fails. The builds affected: 10.1-118.X to 10.5-55.8.
    [From Build 62.10] [# 550877]
  • If NetScaler Gateway is used to access SSL backend resources over Clientless VPN (CVPN) or SecureBrowse mode using a forward proxy, then in the event that client/browser is very slow in sending POST requests to gateway, the request times out.
    [From Build 62.10] [# 557909]
  • Clearing the configuration does not remove the Themes directory from the NetScaler appliance‚€™s drive. If you want to remove this directory, use the shell to delete it from the following path:
    To remove just the EULA-string nodes, delete them from the following path:
    [From Build 62.10] [# 549128]
  • If you create a la portal theme, avoid using a name with spaces. Use an underscore instead of a space.
    [From Build 62.10] [# 548269]
  • An unintentional automatic Linux exit happens under the following conditions:
    * The NetScaler appliance is configured for dual, certificate authentication and LDAP authentication.
    * The subject field of the client certificate doesn't contain an email attribute value.
    [From Build 62.10] [# 571281]
  • The plug-in crashes when VPN logout is performed from browser.
    This would cause the logout page to not load in browser which directs user to login page.
    Work around:
    Manually type NSG URL in browser to login again.
    [From Build 62.10] [# 576215]
  • Applicable only for Mac VPN clients
    Chrome is phasing out NPAPI support. From Chrome version 42+ all NPAPI plugins will appear as if they are not installed. This will affect all existing customers. Affected customers will see a download prompt even though the VPN plugin is installed.
    Workaround: Google has announced that Chrome will stop supporting NPAPI completely in version 45.
    Until then, you can enable NPAPI as follows:
    1) In the Chrome URL bar, type:
    2) Enable the "Enable NPAPI" option.
    3) Restart Chrome.
    For more information about NPAPI deprecation, see
    [From Build 62.10] [# 572447, 574353, 575609]
  • When launching applications through NetScaler Gateway, which has an AppFlow policy bound with the type of OTHERTCP_REQUEST, the Gateway can fail. This failure is not seen if the AppFlow policy is bound with the type ICA_REQUEST.
    [From Build 62.10] [# 582075]
  • When going to NetScaler Gateway > Policies > Content Switching, the breadcrumb shows Traffic Mgmt > Content Switching > Policies. The breadcrumb appears to be incorrect.
    [From Build 62.10] [# 572614]
  • The Total AAA Session Graph always shows 5 sessions active; even when, there are no active AAA sessions.
    [From Build 62.10] [# 573304]
  • The Expression editor is missing the following new policy expressions: ICA.SERVER.IP, ICA.SERVER.IPV6, ICA.SERVER.PORT.
    [From Build 62.10] [# 575468]
  • An error message is issued when a user tries to bind a CS policy to the VPN virtual server (CS-AG feature). The CS policy points to a VPN virtual server (Unified-Gateway feature). This is an expected behavior. The error message was improved to convey that it is an expected behavior.
    [From Build 62.10] [# 572889]
  • An internet connection is required for publisher verification for the NetScaler Gateway plug-in for Windows. If not connected to the internet when downloading the plug-in from the NetScaler Gateway, the error 'Publisher AGEE_setup.exe couldn't be verified' occurs.
    [From Build 62.10] [# 553463, 558963]
NetScaler Insight Center
  • Media Classification Support for Insight Center
    Web Insight supports content and media type classification reports. Viewing these features are optional similar to the existing HTTP header fields User Agents, Operating Systems, Request Methods etc. You can enable or disable these features from the Configuration section. For media classification and httpContentType Appflow parameter, you must first enable Appflow on virtual server from Insight center configuration.
    Insight Center's Web Insight dash board reports the following Media types:
    1) Uncategorized
    2) FLV F4V Audio
    3) FLV F4V Video
    4) MP4 M4V Audio
    5) MP4 M4V Video
    6) GP 3G2 Video
    7) ADTS Audio
    8) APPLE Video
    9) MICROSOFT Video
    10) AAC Audio
    12) APPLE PLAYLIST Video
    13) MP3 Audio
    14) Unknown
    [From Build 62.10] [# 558890]
  • The NetScaler Insight Center appliance might fail and not respond, when you add, update, or delete the private IP address block that is used for geo location.
    [From Build 62.10] [# 576477, 581927]
  • If there are more than 25 records to display in the skip flow window, then only 25 records are displayed as the window does not provide support for pagination.
    [From Build 62.10] [# 576471]
  • The NetScaler Insight Center appliance throws an error when modifying the name of a threshold record. To fix this issue, the name field has been made read-only.
    [From Build 62.10] [# 573550]
  • An exported report displays the time duration as "custom" irrespective of the time duration selected in the report.
    [From Build 62.10] [# 577426]
NetScaler SDX Appliance
  • If you are running a NetScaler SDX 11.0 beta version and upgrade to NetScaler 11.0, then some components may not be upgraded. This does not cause any malfunction in the running of the system. However, the upgrade is incomplete.
    Workaround: Reset your appliance to factory defaults and upgrade to the latest 10.5 or 10.1 version and then upgrade the appliance to NetScaler SDX 11.0
    [From Build 62.10] [# 576100]
  • If a 10G interface is a part of the LACP channel, it might incorrectly report stalling of transmission (Tx) on VPX.
    Workaround: Reset the 10G interface using the management service.
    [From Build 62.10] [# 564451, 564743]
  • After interface reset from management service, L2 mode will stop working for the 10G interface.
    Workaround: Disable and re-enable L2 mode from SVM for the VPX.
    [From Build 62.10] [# 564871]
  • You cannot change only the SSLReneg setting from the "Change SSL Settings" option in the configuration utility.
    [From Build 62.10] [# 572485]
  • Duplicate address detection might fail for a global IPv6 address.
    [From Build 62.10] [# 560243]
  • ICMPv6 requests with a payload greater than 1232 bytes (fragmented ICMPv6 requests) from a nondefault NetScaler admin partition might not succeed.
    [From Build 62.10] [# 506332]
  • An ACL6 rule might not get evaluated if you set the operator option to NEQ (!=) for source and destination IPv6 addresses.
    [From Build 62.10] [# 573516]
  • High availability (HA) synchronization fails if the NetScaler IP (NSIP) addresses of the nodes in the HA configuration are IPv6 addresses.
    [From Build 62.10] [# 573935]
  • A PBR6 rule might not get evaluated if you set the operator option to NEQ (!=) for source and destination IPv6 addresses.
    [From Build 62.10] [# 575906]
  • NetScaler VPX instances, running on SDX 22040/22060/22080/22100/22120 and SDX 24100/24150 appliances, fail to start after you upgrade to the NetScaler SDX release 11 single bundle image. Starting the NetScaler instances manually also fails.
    Workaround: Delete the VPX instances and provision them again by using the Management Service.
    [From Build 62.10] [# 569291]
  • The NetScaler appliance fails to respond when a blocking log action is configured with a responder action.
    [From Build 62.10] [# 574458, 574593]
  • On a NetScaler MPX appliance, AES-GCM/SHA2 ciphers are supported only on the front end SSL entities.
    [From Build 62.10] [# 575001]
  • You cannot enable TLSv1.1/1.2 on a front end SSL service after explicitly disabling it.
    [From Build 62.10] [# 574589]
  • The NetScaler appliance fails intermittently when trace is started in 'RX' mode.
    [From Build 62.10] [# 576067]
  • The option to set the transport type has been removed from the SET and UNSET operations. You can specify the transport type while adding a Syslog action. In a Syslog action, by default the transport type is set as UDP.
    Note: Once you have set the transport type in a Syslog action, you cannot change the transport type.
    [From Build 62.10] [# 580890]
Web Interface on NetScaler (WIonNS)
  • After upgrading to nswi-1.8.tgz, existing WI sites are not accessible till you remove the sites and then add them back.
    [From Build 62.10] [# 576883]
Release history
For details of a specific release, refer to the corresponding release notes.

© 1999-2015 Citrix Systems, Inc. All rights reserved. | Terms of use.
Useful links

On this page

Points to Note (1)
What's New? (4)
Fixed Issues (79)
Known Issues (166)
What's New in Previous 11.0 Builds (160)
Fixed Issues in Previous 11.0 Builds (55)