Skip to content
Go back

NetScaler ADC Hardening Best Practices Guide

3 min read 3 topics
Edit page

This document consolidates recommendations and best practices for securing and hardening a NetScaler ADC environment. The recommendations are based on official Citrix documentation, leading community guides, and established security protocols.


1. Management Plane Security

The management plane is the most sensitive target. Protecting it properly is critical.

Isolate the Management Network

Restrict Access to Management Interfaces

set ns ip <NSIP_ADDRESS> -gui SECUREONLY -restrictAccess ENABLED

User and Password Management

set system user nsroot -externalAuth DISABLED

Secure Management Protocols

Encrypt HA Communication

Secure the communication between HA nodes using a strong RPC password and encryption.

set rpcNode <PEER_NSIP_ADDRESS> -password <A_SECURE_RPC_PASSWORD> -secure YES

2. Data Plane Security

These settings affect the traffic passing through the Virtual Servers.

SSL/TLS Hardening

Protocols

Disable old and insecure protocols like SSLv3, TLS 1.0, and TLS 1.1 on all virtual servers.

set ssl vserver <VSERVER_NAME> -ssl3 DISABLED -tls1 DISABLED -tls11 DISABLED

Ciphers

Use a strong cipher group based on current recommendations (like ECDHE and GCM). Remove weak ciphers (RC4, 3DES, MD5).

Certificates

Use certificates with keys of at least 2048-bit length and a SHA256 signature. Replace the default appliance certificate.

HSTS (HTTP Strict Transport Security)

Enable HSTS to enforce the use of HTTPS on browsers.

Global HTTP Parameters

set ns httpparam -dropInvalReqs ENABLED
set ns param -cookieversion 1

Application Protections


3. Operational and Logging Security

Firmware Updates

Monitoring, Logging, and Alerting

Backup and Recovery

Configuration Hygiene

Post Actions

Continue exploring, share this post, or jump back to key sections.

Edit page