Optimizing Web Application Delivery with Citrix NetScaler

October 30, 2017 | Author: Anonymous | Category: N/A
Share Embed


Short Description

Optimizing Web Application Delivery with Citrix® NetScaler® Johnson Mok Systems Engineer Citrix ......

Description

Optimizing Web Application Delivery with Citrix® NetScaler®

Johnson Mok Systems Engineer Citrix Systems, Inc.

Six Keys to Successful App Delivery Optimizing Web Application Delivery Citrix® NetScaler® Deliver Web Applications

Citrix Presentation Server™ Deliver Windows Applications

Users

Citrix EdgeSight™ Citrix WANScaler™ Monitor End User Experience

Accelerate Apps to Branch Users

Citrix Access Gateway™ Enable Secure Application Access

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Apps Citrix Desktop Server™ Deliver Desktops

2

Key Questions • Why do web applications need to be optimized? • What exactly is optimized delivery? • How can web applications be optimized?

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

3

Web Application Delivery Challenges Web Protocols Extremely “Chatty”

Remote Users Further Away from Apps

Apps Being Moved into Fewer Centralized Datacenters

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Increased Security Requirements

4

Optimizing Web Applications Accelerate Performance

Improve Efficiency © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Ensure Availability 5

Key Optimization Concepts

Time Transmit

Generate

Cost Transmit © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Generate 6

Accelerating End-User Performance

9 Advanced TCP Optimizations Application Users

9 Content Compression

Application Infrastructure

9 Differential Compression

Accelerates secure application delivery by up to 15x

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

7

Compressing Application Data Citrix® AppCompressTM

Why compress application data? ¾ Fewer round-trips to send the data resulting in ¾ Lower application response times

• Most web content not stored compressed • All modern browsers support GZIP compression • • •

Completely transparent to application users Compression decision based on client’s User-Agent header NetScaler policy is determined by User-Agent and MIME-Type

• Typical compression ratios vary from 3:1 to 5:1 • Compresses application data at 1300+ Mbps © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

8

Differential Content Compression Citrix® AppCompress ExtremeTM

Dynamically Generated Data

Dynamically Generated Data

End Users

Data Center Applications

On subsequent requests only changed data is sent Virtually instant response time for end users © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

9

Improving Server Efficiency

• SSL Acceleration Application Users

• TCP Buffering • TCP Multiplexing

Application Infrastructure

• Citrix AppCacheTM Static and Dynamic caching

Supports more users and more applications with minimal investment

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

10

SSL Acceleration • Specialized silicon accelerates all SSL operations • Supports ALL Layer 7 (HTTP) policies Confidentiality

• FIPS-140-2 Level 2 Compliant • Re-encryption for end-to-end security • High Performance • •

28800 TPS for 1024-bit RSA 3 Gbps RC4-MD5 for bulk encryption

Performance

• Benefits: • Server offload of compute-intensive operations • Reduces cost of yearly SSL certificate management

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

11

Caching Application Data Citrix AppCacheTM

Customers

Cached Copy Partners

Original Content

Mobile Users

Remote Employees

Additional Requests © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Initial Request 12

Dynamic Caching Real-world benefits

Before NetScaler

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

After NetScaler

13

TCP Connection Offload SYN SYN+ACK ACK GET

GET Data Data Data Data Data Data FIN ACK FIN ACK

Client

NetScaler © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Web Server 14

TCP Connection Multiplexing Application Requests

Client Server Connection

Client Connection

Web Server Application Requests

1.

NetScaler terminates connection

4.

NetScaler transmits client requests

2.

Client transmits requests

5.

Other clients follow same procedure

3.

NetScaler establishes server connection

6.

Multiple client requests are transmitted across common server connection

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

15

Improving Server Utilization Real-world Benefits

Load on Servers Before NetScaler Load on Servers After NetScaler

Free up Web Application Servers to do More with Less

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

16

Ensuring Application Availability

• Layer 4 Load Balancing Application Users

• Layer 7 Content Switching

Application Infrastructure

• DDoS Attack Protection • Surge Protection

Guarantees maximum application availability

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

17

Layer 4 Load Balancing TCP and UDP Client Requests

Maintaining User Sessions

Distributing Traffic

Monitoring Server Health and Availability

• Source IP

• Least Connections

• Cookie

• Lowest Response Time

• TCP Connection

• SSL Session ID

• Least Bandwidth

• HTTPS Connection

• Server-ID in URL Query

• Round Robin

• Customer Server-ID

• Hash-based

• Extended Content Verification

• Rule based

• Many more… © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

• Scriptable Health Checks 18

What Is Layer 7 Load Balancing? • Recall TCP Offload identifies individual HTTP requests

• A HTTP request has several components • A URL (e.g., http://www.foo.com/content.html) • A Cookie • Client Information (e.g., browser type, etc.)

• Load Balancing decisions can be based on HTTP! • Direct requests to groups of servers based on their URL • Keep users that have logged into an application going to the same server

• Used to send specific URLs to specific servers • E.g., All requests to app.cgi goes to server1, app2.cgi go to server2, etc. © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

19

Layer 7 Content Switching HTTP Requests

Application Users Client

Request Method

Attributes

Application

URL Infrastructure Requests

• Device Type

• Get

• Domain

• Language

• Post

• Wildcard URL

• Cookie • Browser Capability © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

20

Denial of Service (DoS) Attacks Successful DoS attacks can overwhelm servers and • Impair application performance • Deny legitimate application access

• Consume bandwidth (some types)

DoS Attacks are common and easy to generate • Packet Floods • SYN Floods • GET Floods • SSL Floods

Challenge: How to distinguish legitimate application users from malicious clients? © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

21

Defense: SYN Cookies • SYN cookies introduced in September 1996 by D.J. Bernstein •

He pointed out that this protection could be implemented with no changes to the TCP/IP protocol (http://cr.yp.to/syncookies.html)

• The basic idea was to use cryptographic techniques to provide an entry ticket of sorts for new connections 1. When a connection request was made, a SYN cookie would be formulated and sent back to the requestor 2. The information in this SYN cookie would be used in the final acknowledgement to prove that the client was legitimate, and to allocate resources for that connection

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

22

Resource Allocation • NetScaler never makes any resource allocation for a connection until the client has fully completed the threeway TCP/IP handshake • Fundamentally important for withstanding massive floods of SYN packets • By refusing to allocate any resources whatsoever until a connection is completed, NetScaler avoids any server resource limitation issues during these attacks

• NetScaler never causes any resources on a server to be allocated to a connection until the client has sent a valid request • Ensures that the server is only handling fully completed and legitimate clients

• Server never knows about client until valid request has been made

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

23

HTTP DOS Attack: GET Flood • GET DoS Attack • • • •

User creates valid TCP connections Sends surges of HTTP GET requests Server now busy serving malicious clients Genuine clients suffer

• HTTP DOS Attack Client Attributes • Thin/Lightweight • Distributed across unsuspecting hosts • No response parsing capabilities • Not a browser



Objective • Distinguish between real and malicious clients • Drop the malicious clients and serve the real ones.

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

24

NetScaler GET Flood Protection Client request

Client executes Javascript

t-cookie e s / w t ip Javascr Request re-issued with cook ie

Reque

st to se rver

ponse Server res

e sent to Respons

Legitimate Client

client

Citrix NetScaler

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Web Server 25

NetScaler and DDoS • NetScaler’s core packet engine is extremely fast

• Large scale attacks can be handled • 475,000 GETs/sec for ILOVEYOU • 2 Million SYN/sec (approx. 1.3Gbps throughput) • 1.6 Million DNS queries/sec

• CPU Utilization scales linearly with attack • No interference with other functionality

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

26

Traffic Surges: Attack or Legitimate

• The “Super Bowl commercial” scenario: • Large flood of new connections arrives • Could be DOS attack or legitimate traffic

• Unprotected servers will choke • New connections unable to complete • Existing connections time out

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

27

Surge Queue • Keep at most n requests outstanding to the server • Most LB devices will have a “max” at which requests are dropped

• During a surge of traffic, the requests are queued

• Results: • This protects servers from “Death Spirals” • Maintains throughput (weather.com during hurricanes) • Keeps requests from being dropped under load • Users never see “Service Unavailable” messages © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

28

NetScaler Surge Protection

Time

Time

Responses Per Second Server Connections Client Connections

Responses Per Second Server Connections Client Connections Surge Queue

Before NetScaler

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

After NetScaler

29

Global Server Load Balancing For Disaster Recovery

Site 1

Client Site 3

Site 2

9 9 9

Distributes traffic among multiple sites Reduces application latency Provides remote access disaster recovery © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

30

Citrix NetScaler System Architecture

SSL VPN

**

Future Functionality

Denial of Service

AppCompress Extreme™

AppCompress MP™

AppCompress™

AppCache™

SSL Acceleration

Content Filtering

Application Security

Application Optimization

Global Server Load Balancing

Content Switching

Load Balancing

Application Availability

Functional Modules

Application Networking Module Interface AppExpert™ Policy Engine

NetScaler OS ™ Availability

Optimization

Core Platform Security

Request Switching™ High-Speed Packet Processing Engine

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

31

Citrix NetScaler Command Center Centralized Management 9 9 9 9 9 9

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

Device Discovery Fault Management Configuration Auditing Performance Security

32

AppExpert Policy Engine • Simple policy creation

• No programming or scripting required!

• Common framework for all traffic management functionality

• No performance degradation © 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

33

Independent Test Results 47X (0.3 sec)

Standard Web Page with moderate changes

Standard Web Page with no changes

22X

Enterprise Application Report Query

(0.7 sec)

8X

7X

(2 sec)

1X

4X

4X

(4 sec)

(4 sec)

1X

(16 sec) No Acceleration

1X

(16 sec) AppCompress HTTP Extreme Compression

Source: The Tolly Group (June 2005)

No Acceleration

(2 sec)

(14 sec) AppCompress HTTP Extreme Compression

No Acceleration

AppCompress HTTP Extreme Compression

Test Applications: Google (web), Oracle (enterprise)

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

34

Citrix Application Delivery Infrastructure

Application Visibility

Application Security

Application Delivery

Any Network

Users

Apps

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

35

Citrix NetScaler Appliance Family

7000

9000

10000

12000

1U

2U

2U

2U

1

2

2

2

Processor

Single

Single

Single

Dual

Memory

1 GB

2GB

4GB

4GB

Qty. 6 - 10/100 AND Qty. 2 - 10/100/1000

Qty. 4 - 10/100/1000 OR Qty. 4 – GB Fiber

Qty. 4 - 10/100/1000 OR Qty. 4 – GBit Fiber

Qty. 8 – GBit SFP Fiber OR Copper

System Throughput

600 Mbps

3 Gbps

4.8 Gbps

5.5 Gbps

HTTP Compression Throughput

150 Mbps

400 Mbps

555 Mbps

1.3 Gbps

HTTP Requests per Second

50K

125K

250K

275K

SSL Encrypted Throughput

150 Mbps

500 Mbps

760 Mbps

3 Gbps

SSL Transactions per Second

4400 Max.

4400

8800

Size Power Supplies

Network Interface Support

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

28,000+

36

Proven in the World’s Most Mission-Critical Environments

75% Of Internet Users

4,000 Enterprise Deployments

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

37

#1 in Technology #1 in Customer Satisfaction 76%

224 sec

15x

#1

Faster Application Response Time

Customer Satisfaction 36% 23%

13.8 sec

Before NetScaler

After NetScaler

NetScaler

Source: TCS Consulting Services, Performance Analysis of Oracle E-Business Applications, 2005

Cisco

F5

Source: Frost & Sullivan, 2005, Percentage of customers who gave vendor perfect 5-of-5 rating for overall customer satisfaction

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

38

© 2007 Citrix Systems, Inc.—All rights reserved, Citrix Company Confidential

39

View more...

Comments

Copyright © 2017 PDFSECRET Inc.