This document describes the enhancements, changes, fixed issues, and known issues provided in the enhancement releases of the Citrix® NetScaler® software.
Release version: Citrix® NetScaler® release 9.3.e build 60.3007.e
Replaces build: None
Release date: March 2013
Release notes version: 1.0
Language supported: English (US)
For more information, see Configuring NSVLAN.
The following SFP+ and SFP transceivers, and direct access cables, are supported:
Workaround: Configure an appropriate listen policy on the virtual server.
Release version: Citrix® NetScaler® release 9.3.e build 59.5003.e
Replaces build: None
Release date: December 2012
Release notes version: 1.0
Language supported: English (US)
Connection failover helps prevent disruption of access to applications deployed in a distributed environment. In a NetScaler High Availability (HA) setup, connection failover (or connection mirroring-CM) refers to keeping active an established TCP or UDP connection when a failover occurs.
In stateful failover, to maintain current information about the mirrored connections, the primary appliance sends messages to the secondary appliance. The secondary appliance maintains the data related to the packets but uses it only in the event of a failover. If a failover occurs, the new primary (old secondary) appliance starts using the stored data about the mirrored connections and accepting traffic.
Workaround: Configure an appropriate listen policy on the virtual server.
Release version: Citrix® NetScaler® release 9.3.e build 58.5014.e
Replaces build: None
Release date: December 2012
Release notes version: 1.0
Language supported: English (US)
If you set the new RSS Key Type parameter to SYMMETRIC, the RSS algorithm derives, at the hardware level, the same packet engine for the request and reply traffic of the same session.
This feature enables the NetScaler appliance to improve the traffic flow by speeding up traffic processing.
For more information, see the Optimizing Receive Side Scaling for Symmetric Flow section of the Advanced Configuration chapter of the Administration Guide.
Workaround: Configure an appropriate listen policy on the virtual server.
Release version: Citrix® NetScaler® release 9.3.e build 58.5009.e
Replaces build: None
Release date: November 2012
Release notes version: 1.0
Language supported: English (US)
In Layer 2 (L2) mode, a NetScaler instance acts as a learning bridge and forwards all packets for which it is not the destination. With L2 mode enabled, the instance can receive and forward packets for MAC addresses other than its own MAC address. However, if a user wants to enable L2 mode on a NetScaler instance running on an SDX appliance, the administrator must first allow L2 mode on that instance. If you allow L2 mode, you must take precautions to avoid bridging loops. For more information about these precautions, see the Citrix NetScaler SDX Administration Guide.
For a load balancing virtual server with L2 Conn enabled and l2connMethod parameter of the set l4 parameter command is set to Channel or Vlan or VlanChannel, a client MAC address change no longer causes the NetScaler appliance to create a new session entry. Instead, the appliance updates the existing session entry with the new MAC address. This update resolves issues (especially with MBF) that were caused by the appliance using the old session entry instead of the new one.
Workaround: Configure an appropriate listen policy on the virtual server.
Release version: Citrix® NetScaler® release 9.3.e build 58.5002.e
Replaces build: None
Release date: September 2012
Release notes version: 1.0
Language supported: English (US)
Issue ID 0257122: The close-notify parameter setting for an entity no longer has to be inherited from the global settings. You can set the close-notify parameter at the entity (virtual server, service, or service group) level. This enhancement provides the flexibility to set this parameter for one entity and unset it for another entity. However, make sure that you set this parameter at the global level. Otherwise, the setting at the entity level does not apply.
For more information, see Configuring Close-Notify.
Issue ID 0243576: The firewall load balancing feature allows you to load-balance traffic coming from another firewall in a multiple-firewall environment. Having firewall load balancing enabled on both the sides of NetScaler improves the traffic flow in both the egress and ingress direction and ensures faster processing of the traffic. By default, the traffic coming from a firewall is not load balanced on the other firewall across a NetScaler.
For more information, see Multiple-Firewall Environment.
Issue ID 0332990: In an HA configuration in non-INC mode, if route monitors fail on both the nodes, failover happens every 180 seconds till one of the nodes is able to reach all the routes monitored by the respective route monitors.
Now, for a node, you can limit the number of failovers for a given interval by setting the Maximum Number of Flips and Maximum Flip Time parameters. When the limit is reached, further failovers do not happen and the node is assigned as primary even if any route monitor fails on that node. These parameters settings are set independently on each node and therefore are neither propagated nor synchronized.
For more information, see Limiting Failovers Caused by Route Monitors in non-INC mode.
Workaround: Configure an appropriate listen policy on the virtual server.
Release version: Citrix® NetScaler® release 9.3.e build 57.5003.e
Replaces build: None
Release date: August 2012
Release notes version: 1.0
Language supported: English (US)
> add appflow collector <col_name> -IPAddress <IP_addr> [-netprofile {netprofile_name}]
Release version: Citrix® NetScaler® release 9.3.e build 56.5007.e
Replaces build: None
Release date: June 2012
Release notes version: 1.0
Language supported: English (US)
Release version: Citrix® NetScaler® release 9.3.e build 56.5006.e
Replaces build: None
Release date: June 2012
Release notes version: 1.0
Language supported: English (US)
Description: TLSv1 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
Description: TLSv1 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
Description: TLSv1 Kx=DH Au=DSS Enc=AES(256) Mac=SHA1
Description: TLSv1 Kx=DH Au=DSS Enc=AES(128) Mac=SHA1
Description: TLSv1 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
Description: TLSv1 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
Description: TLSv1 Kx=DH Au=None Enc=AES(128) Mac=SHA1
Description: TLSv1 Kx=DH Au=None Enc=AES(256) Mac=SHA1
To put the logout action into effect, associate it with a policy and bind the policy to Global or an appropriate bind point.
From the Monitoring tab of the Command Center client, you can now enable or disable services bound to a service group that was created by using server names instead of IP addresses.
Release version: Citrix® NetScaler® release 9.3.e build 54.4006.e
Replaces build: None
Release date: April 2012
Readme version: 2.0
Language supported: English (US)
You can specify a persistence parameter in the "clear lb persistentSessions" command to clear the persistence session associated with only that parameter. Following is the command synopsis for clearing the session associated with a specific persistence parameter: clear lb persistentSessions [<vServer> [-persistenceParam <string>]] In the command, "persistenceParam" is the persistence parameter whose session you want to clear. For more information about clearing persistence sessions, see "Clearing Persistence Sessions" in the "Load Balancing" chapter of the Citrix NetScaler Traffic Management Guide for release 9.3.e.
When a service is loaded or is otherwise unavailable, service to clients is degraded. To work around this situation, you might have to configure the NetScaler appliance to temporarily forward to other services the requests that would otherwise be included in the persistence session that is associated with the overloaded service. In other words, you might have to override the persistence setting that is configured for the load balancing virtual server until the service returns to a state in which it can accept requests. You can achieve this functionality by binding a load monitor to the virtual server and setting the “skippersistency” parameter for the virtual server. For more information about overriding persistence for an overloaded service, see “Overriding Persistence Settings for Overloaded Services” in the “Load Balancing” chapter of the Citrix NetScaler Traffic Management Guide for release 9.3.e.
You can now configure your NetScaler SDX appliance to synchronize its local clock with a Network Time Protocol (NTP) server. As a result, the clock on the SDX appliance has the same date and time settings as the other servers on your network. The clock synchronization configuration does not change if the appliance is restarted, upgraded, or downgraded. However, the configuration does not get propagated to the secondary NetScaler instance in a high availability setup.
You can now replace the default certificate that is shipped with the NetScaler SDX appliance with your own certificate. Installing an SSL certificate terminates all current client connections with the Management Service, so you have to log back on to the Management Service for any additional configuration tasks.
Logging on to the Management Service on a NetScaler SDX Appliance gives you direct access to the NetScaler instances that are provisioned on the appliance, if you upgrade the Management Service and the NetScaler instances to this build. After providing your user credentials to log on to the Management Service, you do not have to provide the user credentials again for logging on to an instance. By default, the Timeout value is set to 30 minutes and the configuration tab opens in a new browser window.
You can now upgrade to the latest version of the XenServer software. The upgrade process can take up to 20 minutes. Before upgrading the software, upload the ISO image files to the appliance. For more information, see the NetScaler SDX Administration Guide at http://support.citrix.com/article/CTX130065.
Release version: Citrix® NetScaler® release 9.3.e build 53.5006.e
Replaces build: None
Release date: December 2011
Readme version: 1.0
Language supported: English (US)
For more information, see the Cloud Bridge chapter of the Citrix NetScaler Networking Guide, available at http://support.citrix.com/article/CTX130085.
For more information, see the man page for the 'stat IPSEC counters' command.
For more information, see the "Configuring Route Monitors" section in the High Availability chapter of the Citrix NetScaler Networking Guide, available at http://support.citrix.com/article/CTX130085.
For more information, see the "Configuring ARP Response Suppression for Virtual IP addresses (VIPs)" section in the IP Addressing chapter of the Citrix NetScaler Networking Guide, available at http://support.citrix.com/article/CTX130085.
For more information, see the "Binding an NetScaler Owned IP address to an Interface" section in the Interface chapter of the Citrix NetScaler Networking Guide, available at http://support.citrix.com/article/CTX130085.
Release version: Citrix® NetScaler® release 9.3.e build 51.5006.e
Replaces build: None
Release date: September 2011
Readme version: 1.0
Language supported: English (US)
With the sessionless Field Consistency Check feature, the application firewall does not store web forms in memory. Instead, it adds a hidden form field named as_ffc_field to each form before forwarding it to the client. When the client submits the form, the application firewall extracts as_ffc_field and compares it to the remaining form to establish field consistency.
By default, sessionless Field Consistency is disabled. The following CLI commands configure sessionless Field Consistency:
add appfw profile <name> -sessionlessFieldConsistency (ON|OFF|postOnly)
set appfw profile <name> -sessionlessFieldConsistency (ON|OFF|postOnly)
You can now configure the NetScaler appliance not to respond to a ping message if the virtual server is DOWN. This option is available for load balancing, content switching, cache redirection, and VPN virtual servers. It can be set at the IP-address level or the virtual-server level. By default, the appliance responds to a ping message even if one or more virtual servers are DOWN. The option functions as described below:
This option can be set on an IP address only if it is a VIP address.
CLI commands:
set ip <IPAddress> -icmpresponse (NONE | ONE_VSERVER | ALL_VSERVERS | VSVR_CNTRLD)
set lb vserver <name> -icmpVsrResponse (PASSIVE | ACTIVE)
You can replace lb with cs, cr or vpn.
GUI:
Create/Configure IP dialog box: The ICMP Response dropdown list
Create/Configure Virtual Server>>Advanced tab: The ICMP VServer Response dropdown list
SSL and TLS renegotiations are vulnerable to an MITM attack that injects its own content as a prefix to a TLS connection. A new option addresses this vulnerability. If you specify NONSECURE as the value of the denySSLReneg parameter in the "set ssl parameter" command, any nonsecure renegotiations are denied. For more information about this attack, see RFC 5746. For more information about setting this parameter, see "Configuring Advanced SSL Settings" in the "SSL Offload and Acceleration" chapter of the Citrix NetScaler Traffic Management Guide at http://support.citrix.com/article/CTX130084.
You can now configure a rule to define persistence criteria for load balancing virtual servers of type TCP and SSL_TCP. The persistence criteria can be based on TCP/IP protocol data, Layer 2 data, TCP options, and TCP payloads (even if the protocol that is encapsulated in the TCP payload is not HTTP). In the "add lb vserver" or "set lb vserver" CLI command, set the "persistenceType" parameter to "RULE," and then configure a rule for the rule parameter. You can define rules to configure persistence based on source and destination ports, source and destination IP addresses and IP octets, source and destination MAC addresses, VLAN IDs, payload content, and so on. Following are examples of expressions that you can use to define persistence criteria:
Following is an example of a command that you can use to configure rule based persistence based on the destination IP address in the client request: add lb vserver mylbvserver SSL_TCP 192.0.2.0 443 -persistenceType RULE -rule CLIENT.IP.DST.
You cannot set the "resRule" parameter for load balancing virtual servers of type TCP or SSL_TCP.
For more information, see the "Load Balancing" chapter of the Citrix NetScaler Traffic Management Guide at http://support.citrix.com/article/CTX130084, which includes a section titled "Configuring Persistence Based on User-Defined Rules." The chapter also has a "Use Cases" section, in which "Configuring Rule Based Persistence Based on a Name-Value Pair in a TCP Byte Stream" describes how to configure rule based persistence for servers that communicate Financial Information eXchange (FIX) protocol data over TCP.
Release version: Citrix® NetScaler® release 9.3.e build 50.3002.e
Replaces build: None
Release date: August 2011
Readme version: 1.0
Language supported: English (US)
When you run the 'show cs vserver' command, you can now view the content switching policies associated with the virtual server in the order of the priority of the policies rather than by the chronological order in which they are bound.
This enhancement can help you know the order in which the content switching polices are applied and, therefore, understand how client requests are routed. The configuration utility also shows the content switching policies in the order of their priority.
For more information, see the "Viewing the Properties of Content Switching Virtual Servers" section in the Content Switching chapter of the Citrix NetScaler Traffic Management Guide, available at http://support.citrix.com/article/CTX128670.
You can now enable a NetScaler appliance to forward all the ICMP fragments of an ICMP echo request, destined to a network device, and the ICMP fragments of the corresponding echo response.
One example of the usefulness of this enhancement involves a NetScaler appliance and a Windows 2000 Server.
The Windows 2000 server sends an ICMP request of size 2048 for slow link detection. The NetScaler appliance successfully forwards the ICMP fragments of the ICMP request to the destination network device, and the ICMP fragments of the ICMP response from the network device to the Windows 2000 server.
If you want to flush the surge queue of a service, service group, or a load balancing or content switching virtual server, now you do not need to disable the NetScaler entity. With this enhancement, you can manage the traffic in surge conditions without affecting the existing traffic.
Options are added to the command line interface and configuration utility to flush a surge queue. Flushing a surge queue does not affect the existing connections. Only the requests present in the surge queue get deleted. For those requests, the client has to make a fresh request.
When you flush the surge queue of a virtual server, the surge queues of all the services and service groups bound to it are flushed. When you flush the surge queue of a service group, surge queues of all its members are flushed. You can flush the surge queue of one or more members of a service group without flushing the surge queues of all its members. You can flush the surge queue of a specific service.
In the configuration utility, when you select an entity the 'Flush Surge Queue' option is available in the action pane. In the command line interface 'flush ns surgeQ' option is added with necessary options.
For more information, see the "Flushing the Surge Queue" section in the Load Balancing chapter of the Citrix NetScaler Traffic Management Guide, available at http://support.citrix.com/article/CTX128670.
Release version: Citrix® NetScaler® release 9.3.e build 49.5001.e
Replaces build: None
Release date: June 2011
Readme version: 1.0
Language supported: English (US)
You can now create a rule that creates an entry, called a forwarding session entry, on the NetScaler appliance for traffic that originates from a particular network and is forwarded by the appliance. Such a rule is useful in cases where the NetScaler appliance forwards a client request to a server and the response from the server needs to traverse back through the same path as the client request. For more information, see the "Configuring Forwarding Session Rule" section in the Citrix NetScaler Networking Guide, available at http://support.citrix.com/article/CTX130085.
You can specify an IP address to be used by the NetScaler appliance as the source IP address for communication with the physical servers and peer devices. You can create IP sets, which are sets of IP addresses. You can create net profiles, which have an IP address or an IP Set, and bind a net profile to a service, service group, load balancing virtual server, or monitor. The appliance uses the IP address specified in the net profile as the source IP address. For more information, see the "Using a Specified Source IP for Backend Communication" section in the in the Citrix NetScaler Traffic Management Guide, available at http://support.citrix.com/article/CTX130084.
Release version: Citrix® NetScaler® release 9.3.e build 48.6002.e
Replaces build: None
Release date: June 2011
Readme version: 1.0
Language supported: English (US)
When adding or modifying a service, you can now specify a string as a server ID. The string can have up to 47 characters and contain alphanumeric characters and dashes.
In the command line interface use the -customServerId <string> parameter instead of -serverId <positive integer>, which is being deprecated.
Example: set service SE_WEB_SVR1 -customServerId 4324-7658-fer9-4324.
For more information, in Citrix eDocs, see NetScaler > NetScaler 9.3 > Load Balancing > Customizing a Load Balancing Configuration > Persistence and Persistence Connections > Custom Server ID Persistence.