Navigation
The older 13.0 version of Citrix ADM is detailed in a different post.
- Change Log
- Planning
- Import Appliance into vSphere
- Deployment Modes
- Add Instances
- Virtual Server Licensing
- Enable AppFlow / Insight / Analytics
- Enable Syslog on Instances
- nsroot and nsrecover Password
- Management Certificate
- System Configuration
- Email Notification Server
- Authentication
- Analytics (Insight) Thresholds and Alerts
- SSL Certificate Expiration Notification (SSL Dashboard)
- Email Alerts (SNMP Traps)
- Director Integration
- Use Citrix ADM – HDX Insight, Gateway Insight, Security Insight
- Troubleshooting
- Upgrade Citrix ADM
💡 = Recently Updated
Change Log
- 2023 Mar 13 – Director Integration – changed user to only have HDX Insight permissions (h/t Artur Ogloza)
- 2022 Jun 9 – ADM Agents – 13.1 build 24 adds Agent Unreachable notifications
- 2021 Nov 27 – updated screenshots for version 13.1
Planning
Why ADM?
The biggest change in ADM 13.1 is the restructured menu.
Citrix Application Delivery Management (ADM), formerly known as NetScaler Management and Analytics System (MAS), enables every Citrix ADC (formerly known as NetScaler) administrator to achieve the following:
- Alert notifications – Receive email alerts whenever something goes down. For example, if a Load Balancing service goes down, you can receive an email alert.
- ADM can email you for any SNMP trap produced by any ADC appliance.
- Automatically backup all Citrix ADC instances.
- ADM can even transfer the backups to an external system, which is then backed up by a normal backup tool.
- SSL Certificate Expiration – Alert you when SSL certificates are about to expire.
- Show you all SSL certificates across all ADC appliances.
- Configuration Record and Play – Use the Configuration Recorder to configure one ADC appliance, and then push out the same configuration changes to additional appliances. This is the easiest method of managing ADC appliances in multiple datacenters.
- AppFlow Reporting – Receive ICA AppFlow traffic from ADC and show it in graphs.
- Integrate ADM with Citrix Director so Help Desk can see the AppFlow data.
Everything listed above is completely free, so there’s no reason not to deploy ADM.
ADM Overview
For an overview of ADM, see Citrix’s YouTube video Citrix NetScaler MAS: Application visibility and control in the cloud.
Citrix Tech Zone Citrix Application Delivery Management (ADM) Overview Cheat Sheet
Cloud vs on-prem
ADM is available both on-premises and as a Cloud Service.
The Cloud version of ADM has many new features that are not availabile in the on-premises version of ADM. It seems like Citrix isn’t developing for the on-premises version any more.
For the Cloud Service, you import a ADM Agent appliance to an on-prem hypervisor, or deploy a ADM Agent to AWS or Azure. The ADM Agent is the proxy between the Cloud Service and the on-prem (or cloud hosted) Citrix ADC appliances. For more info on the ADM Cloud Service, see the following:
- Demo: Citrix NetScaler Management and Analytics Service – YouTube video
- Many ADM features are supported in the Cloud Service.
- The Cloud Service uses subscription licensing.
- Citrix Application Delivery Management Service at NetScaler Docs
- George Spiers NetScaler Management and Analytics Service
The rest of this article focuses on the on-premises version, but much of it also applies to the Cloud Service.
On-premises ADM Licensing:
- Instance management is free (unlimited). This includes Configuration Jobs, Instance Backups, Network Functions/Reporting. Basically everything in the Infrastructure node is free.
- Analytics and Application monitoring are free for up to 2 Virtual Servers (Load Balancing, Citrix Gateway, Content Switching, etc.).
- Beyond 2 Virtual Servers, licenses can be purchased in 100 Virtual Server packs. See Citrix Application Delivery Management (ADM) Licensing at NetScaler Docs.
- You can control assignment of licenses to Virtual Servers.
ADM version – The version/build of Citrix ADM must be the same or newer than the version/build of the Citrix ADC appliances being monitored. ADM 13.1 can monitor many ADC appliance versions including version 11.1, version 12.1, version 13.0, and version 13.1
HDX Insight
See CTX239748 for a list of HDX Insight Quality Improvements in Citrix Gateway 12.1 and newer. These include:
- NSAP protocol for reduced performance impact on ADC
- EDT support
HDX Insight Requirements (aka AppFlow Analytics for Citrix ICA traffic):
- Your ADC appliance must be running Advanced Edition or Premium Edition.
- ADC must be 10.1 or newer.
- HDX Insight works with the following Receivers:
- Receiver for Windows must be 3.4 or newer. Or upgrade to Citrix Workspace app.
- Receiver for Mac must be 11.8 or newer. Or upgrade to Citrix Workspace app.
- Receiver for Linux must be 13 or newer. Or upgrade to Citrix Workspace app.
- No mobile Receivers (iOS, Android). See the Citrix Receiver Feature Matrix for the latest details.
- For ICA Session Reliability with AppFlow: NetScaler 10.5 build 54 and newer.
- For ICA Session Reliability, AppFlow, and ADC High Availability: NetScaler 11.1 build 49 and newer.
- For EDT (UDP-based ICA), Citrix ADC must be 12.1 build 49 or newer.
- AppFlow statistics are only generated when ICA traffic flows through a Citrix Gateway. Internally, when a user clicks an icon from StoreFront, an ICA connection is established directly from Receiver to the VDA, thus bypassing the internal ADC. Here are some methods of getting ICA traffic to flow through an internal ADC:
- Implement Citrix Gateway ICA Proxy (SSL) internally.
- However, Single Sign-on (pass-through authentication) has special considerations for Citrix Gateway:
- In the newest Workspace app, you can set the client-side GPO setting to enable Single Sign-on through Gateway.
- Or, use SSL ICA Proxy without authenticating at Citrix Gateway, see CTX200129 – How to Force Connections through NetScaler Gateway Using Optimal Gateways Feature of StoreFront.
- However, Single Sign-on (pass-through authentication) has special considerations for Citrix Gateway:
- Route ICA traffic (TCP/UDP 1494 and TCP/UDP 2598) through a ADC SNIP, and ADC routes it to the VDAs.
- ADC 11 and newer can proxy ICA traffic through a SOCKS protocol Cache Redirection vServer.
- Advantages: no need to authenticate at Citrix Gateway, and no routing changes. See Citrix Blog Post Gathering HDX Insight Analytics for LAN Users with NetScaler Using SOCKS for more information.
- NetScaler Docs Enabling HDX Insight Data Collection details additional ICA routing/proxy considerations – Transparent Mode, Citrix Gateway Single-Hop and Double-Hop, LAN User Mode (ADC as SOCKS Proxy), CloudBridge, Multi-Hop (ADC and CloudBridge with connection chaining)
- Implement Citrix Gateway ICA Proxy (SSL) internally.
- A new Receiver / Workspace app Virtual Channel named NetScaler App Experience or NSAP can dramatically reduce the CPU needed on the ADC to process AppFlow. Details at Citrix Blog Post HDX Insight 2.0. NSAP requires the following:
- VDA 7.17 or newer, including VDA 1903. VDA 7.15 (LTSR) does not include the NSAP functionality.
- Workspace app or Receiver 4.10 and newer.
- ADC 12.0 build 57.24 or newer, including ADC 12.1, ADC 13, and ADC 13.1
- For ICA round trip time calculations, in a Citrix Policy, enable the following settings:
- ICA > End User Monitoring > ICA Round Trip Calculation
- ICA > End User Monitoring > ICA Round Trip Calculation Interval
- ICA > End User Monitoring > ICA Round Trip Calculation for Idle Connections
- Citrix CTX215130 HDX Insight Diagnostics and Troubleshooting Guide contains the following contents:
- Introduction
- Prerequisites for Configuring HDX Insight
- Troubleshooting
- Issues Related to ICA parsing
- Error Counter details
- Checklist before Contacting Citrix Technical Support
- Information to collect before Contacting Citrix Technical support
- Known Issues
Citrix CTX204274 How ICA RTT is calculated on NetScaler Insight: ICA RTT constitutes the actual application delay. ICA_RTT = 1 + 2 + 3 + 4 +5 +6:
- Client OS introduced delay
- Client to NS introduced network delay (Wan Latency)
- NS introduced delay in processing client to NS traffic (Client Side Device Latency)
- NS introduced delay in processing NS to Server (XA/XD) traffic (Server Side Device Latency)
- NS to Server network delay (DC Latency)
- Server (XA/XD) OS introduced delay (Host Delay)
Multi-Datacenter Deployment Architecture
In a main datacenter, import two Citrix ADM appliances into the same subnet and configure them as an HA pair with a Floating IP address.
- Documentation at Configure high availability deployment at NetScaler Docs and will be detailed later in this article.
In a DR datacenter, import a DR node Citrix ADM appliance, and configure it to replicate with the main datacenter.
- Note: DR node requires a Floating IP, which requires ADM HA to be configured in the main datacenter.
- Documentation at Configure disaster recovery for high availability at NetScaler Docs and will be detailed later in this article.
For Citrix ADC appliances in additional datacenters, import two ADM Agent appliances into each datacenter. Remote ADC instances are discovered and managed through remote ADM agents.
- The virtual appliance for ADM Agent is different than the normal ADM appliance.
- Documentation at Configure on-prem agents for multisite deployment at NetScaler Docs and will be detailed later in this post.
Import ADM Appliance
If you are upgrading an existing ADM or MAS, skip to the Upgrade section.
There are two different ADM appliances:
- ADM appliance for the main datacenter, including High Availability, and for the DR node.
- ADM Agent appliance for remote datacenters
To import a ADM Appliance into vSphere, do the following:
- Download Citrix ADM Image for ESX.
- The download page for ADM has two different images: one called ADM Image, and one called ADM Agent Image. The first image should be the non-agent image.
- Extract the downloaded .zip file for the non-agent image (MAS-ESX-13.1).
- In vSphere Web Client, right-click a cluster, and click Deploy OVF Template.
- In the Select an OVF Template page, select Local file and browse to the Citrix ADM .ovf files. If .ova file is available, then only select the one .ova file. Otherwise, select all three files (.ovf, .mf, and .vmdk). Click Next.
- In the Select name and folder page, enter a name for the virtual machine, and select an inventory folder. Then click Next.
- In the Select a resource page, select a cluster or resource pool, and click Next.
- In the Review details page, click Next.
- In the Select storage page, select a datastore. Due to high IOPS requirement, SSD is recommended.
- Change the virtual disk format to Thin Provision. Click Next.
- In the Select networks page, choose a valid port group, and click Finish.
- In the Ready to Complete page, click Finish.
Appliance Hardware Configuration
- Before powering on the appliance, you can review its hardware specs. Right-click the ADM virtual machine and click Edit Settings.
- Review the specs. NetScaler Docs Citrix ADM on VMware ESXi recommends 8 vCPUs and 32 GB RAM.
- You can add a second hard disk at this time.
- NetScaler Docs Attach an additional disk to Citrix ADM says that an additional disk must be added before initial deployment.
- Use the ADM storage calculator to determine the recommended size of the disk. Ask your Citrix Partner for the tool.
- The new disk must be larger than 120 GB.
- The new disk can be larger than 2 TB.
- The new disk can be grown later, and
/mps/DiskPartitionTool.py
can resize the partition, but only up to 2 TB. If you need more than 2 TB, the initial disk should be larger than 2 TB.
- Power on the Virtual Machine.
Appliance IP Address Configuration
- Open the console of the virtual machine.
- Configure IP address information.
- Enter 7 when done.
Second Disk
- SSH to the appliance and login as nsrecover/nsroot.
- Enter
/mps/DiskPartitionTool.py
- The Disk Partition Tool is documented at Attach an additional disk to Citrix ADM at NetScaler Docs.
- Enter
info
to see that there are no existing partitions on the second disk.
- Enter
create
to create partitions on the second disk. A reboot is required.
- During the reboot, the database is moved to the second disk.
- After the reboot, the Disk Partition Tool info command shows the partition on the second disk.
- If you need to increase the size of the disk, reboot the ADM appliance so it detects the larger size. Then use the Disk Partition Tool
resize
command.
Deployment Modes
HA Pair in the Main Datacenter
First Node:
- SSH to the first node and login as nsrecover/nsroot.
- Enter deployment_type.py.
- Enter 1 for Citrix ADM Server.
- Enter no when prompted for Citrix ADM Standalone deployment.
- For the First Server Node prompt, enter yes.
- Enter yes to Restart the system.
Second Node:
- Import another ADM appliance to the same subnet and configure an IP address.
- Latency to the HA node must not exceed 10 ms.
- The HA nodes must be on the same subnet.
- If you added a second disk to the first ADM appliance, then you must add the same size second disk to the second ADM appliance.
- Configure the new node’s IP address.
- SSH to the second appliance, login as nsrecover/nsroot, and run the Disk Partition tool.
- SSH to the second appliance, login as nsrecover/nsroot, and run deployment_type.py.
- Enter 1 for Citrix ADM Server.
- Enter no when prompted for Citrix ADM Standalone deployment.
- Enter no when prompted is this is First Server Node.
- Enter the IP address of the first ADM node.
- Enter the nsroot password of the first node. The default password is nsroot.
- Enter a new Floating IP address.
- Enter yes to restart the system.
Get Started:
- Log into the first ADM appliance as nsroot/nsroot.
- Logging in to Citrix ADM might show you the Get Started wizard. If you don’t see this wizard, then skip to the next section.
- In the Add Citrix ADC Instances page, you can Add Instance now, or just click Next and add instances later.
- In the Customer Identity page, you can login to Citrix Cloud, configure data sharing, or click Skip to do it later.
- In the System Notifications page, you can configure Email notifications now, or click Skip and do it later.
- In the Done page, click Finish.
Deploy HA Configuration:
- After both appliances are fully booted, point your browser to the first appliance’s IP address and login as nsroot/nsroot. It will take several minutes after booting before the ADM appliance is ready.
- The top of the screen has some banners.
- If you want to make any network changes (e.g., DNS servers) to either node, then you must make those changes before you deploy the HA pair. Move your mouse over the left menu, expand Settings and click Administration.
- On the right, click IP Address, Second NIC, Host Name and Proxy Server.
- Enter an Alternate DNS and then click Save.
- Click the back arrow to go back.
- Enter an Alternate DNS and then click Save.
- Move your mouse to the left side of the screen, expand Settings, and then click Deployment.
- In the top right, click Deploy.
- Click Yes to reboot.
- It takes around 10 minutes to restart.
- After deployment, you can now use the Floating IP to manage the appliance pair.
- Logging in might show you the Get Started wizard. Proceed through the wizard as described in the previous section.
- Move your mouse to the left menu, expand Settings, and click Deployment.
- The Settings > Deployment page should show both nodes as UP and syncing.
Afterwards, you can manage High Availability.
- Settings> Deployment lets you see the HA nodes.
- You can Force Failover from here. Note: HA failover only occurs after three minutes of no heartbeats.
- On the top right is a HA Settings button that lets you change the Floating IP.
DR Node
Requirements for the DR node:
- The main datacenter must have an HA pair of ADM appliances. Standalone in the main datacenter is not supported.
- Latency from the main datacenter HA pair to the DR node must not exceed 200 ms.
- Ports 5454 and 22 open between the ADM nodes.
To configure a DR node:
- Import another ADM appliance into a remote datacenter and configure an IP address.
- If you added a second disk to the main datacenter ADM appliances, then you must add the same size second disk to the DR ADM appliance.
- After configuring the new nodes’ IP address, SSH to the DR appliance and login as nsrecover/nsroot.
- Enter deployment_type.py.
- Enter 2 for Remote Disaster Recovery Node.
- Enter the Floating IP address of the HA pair in the main datacenter.
- Enter the nsroot password, which is nsroot by default.
- The DR node registers with the ADM HA Pair.
- You can change the password of the DR node by running the following command:
./mps/change_freebsd_password.sh <username> <password>
- Point your browser to the Floating IP Address and login.
- Go to Settings > Administration.
- On the right, in the right column, click Disaster Recovery Settings.
- The Registered Recovery Node should already be filled in. Click Deploy DR Node.
- Click Yes to enable DR.
- A System Backup is performed and replicated to the DR appliance. Click Close when done.
- The status of the DR node is displayed. You can click the Refresh icon on the top right to update the display.
- There’s a Sync DR Node button in case it gets out of sync.
- Disaster Recovery is not automatic. See the manual DR procedure at NetScaler Docs. Docs also shows how to fail back.
/mps/scripts/pgsql/pgsql_restore_remote_backup.sh
ADM Agents
ADM Agents help ADM discover and manage instances on the other side of a high latency WAN link.
The virtual appliance for ADM Agent is different than the normal ADM appliance.
- Download the ADM Agent from the main ADM download page. On the ADM download page for a particular build, scroll down the page to find the ADM Agent images.
- Extract the downloaded .zip file.
- Import the .ova to vSphere. You can import the single .ova file, or you can import the .ovf file plus the .mf file and the .vmdk file.
- Edit the settings of the virtual machine to see the allocated CPU and Memory.
- There’s no need to add a disk to the Agent.
- Power on the ADM Agent virtual machine.
- At the virtual machine’s console, configure an IP address.
- Login as nsrecover/nsroot.
- Run
/mps/register_agent_onprem.py
- Enter the floating IP address of the main ADM HA Pair. Enter nsroot credentials for ADM. Enter a new password for ADM Agent.
- The Agent will be registered, and services restarted.
- To change the nsrecover password on ADM Agents, putty (SSH) to the ADM Agent appliance, login as nsrecover and then run the script at /mps/change_agent_system_password.py. Or you can change the password in the ADM interface at Infrastructure > Agents.
- Login to the ADM Floating IP.
- Go to Infrastructure > Instances > Agents.
- On the right, select the ADM Agent, and then click Attach Site.
- In the Site drop-down, if you don’t see your site, then you can click the Add button to create a new site.
- Enter a name and other location information.
- Make sure you enter the coordinates. Google can find coordinates for various locations. If Longitude is West, then the value is negative.
- Click Create when done.
- Click Save to attach the Site to the Agent. Any ADC instance discovered through this Agent will be attached to the configured Site.
- For Agent HA, import two ADM Agents into your hypervisor and attach both Agents to the same Site.
- You can change the nsrecover password from the ADM GUI.
- ADM 13.1 build 24 and newer have a Settings button on the top-right of the Agents page where you can enable Notifications when an ADM Agent is unreachable.
ADM Appliance Maintenance
- Shutdown or Reboot – From CTX220000 How to reboot or shutdown NetScaler MAS using CLI: when using the ADM CLI, do not use the reboot command since it will cause data corruption. Instead, run shutdown -r now.
- Static Route – If you need to add a static route to Citrix ADM, then see CTX223282 How to Add a Static Route on NetScaler MAS.
- ADM Database Cleanup Tool – Run
/mps/mas_recovery/mas_recovery.py
. For details, see Recover inaccessible Citrix ADM servers at NetScaler Docs.
Add Instances
Citrix ADM must discover Citrix ADC instances before they can be managed. NetScaler Docs How Citrix ADM discovers instances.
- Point your browser to the Citrix ADM Floating IP address and login as nsroot/nsroot.
Before adding more instances, ADM needs to know the nsroot password for the new instances. You create Admin Profiles to specify the nsroot passwords.
- To edit, or create new Admin Profiles, move your mouse to the left menu, then go to Infrastructure > Instances > Citrix ADC.
- On the right, open the menu named Select Action, and click Profiles.
- Click the Add button to create an Admin Profile.
- In the top half, give the Profile a name and enter the password for the instance’s nsroot account. Create a separate Admin Profile for each unique nsroot password.
- In the bottom, make up some SNMP settings. You can do SNMP v3.
- Click Create when done.
To add instances:
- Move your mouse to the left, expand Infrastrucutre, expand Instances, and click Citrix ADC.
- On the right, select a tab (e.g. MPX), and then click Add.
- The Add instance screen is the same as shown during the getting started wizard. To authenticate to the ADC using nsroot, select an existing Profile or create a new one. If you have Sites or Agents, you can select one. Select a Site so it’s shown correctly on the world map. Click OK when done.
Tags:
- You can assign Tags to instances. See How to create tags and assign to instances at NetScaler Docs.
- You can then search instances based on the Tags.
Instance Authentication from ADM
By default, when you click the blue link for one of the instances, ADM will do single sign-on to the instance using nsroot credentials. This is probably a security risk, or certainly an auditing risk.
To prevent ADM from doing single sign-on to instances:
- In ADM, go to Settings > Administration.
- On the right, click System, Time zone, Allowed URLs and Message of the day.
- In the Basic Settings page, check the box next to Prompt Credentials for Instance Login and click Save.
Citrix ADC SDX
- At Infrastructure > Instances > Citrix ADC, on the SDX tab, you can click Add to discover a SDX appliance plus all VPXs on that SDX appliance. You don’t have to discover the VPXs separately.
- In the Add Citrix ADC SDX page, click the Add button next to the Profile Name drop-down to create an SDX profile. Note: SDX profiles are different than VPX profiles.
- Enter the credentials for the SDX SVM Management Service.
- For Citrix ADC Profile, select an admin profile that has nsroot credentials for the VPX instances. After the SDX’s VPX instances are discovered, ADM uses this ADC Profile to login to each VPX. If you don’t have a VPX Admin Profile in your drop-down list, click the Add button. Note: You can only select one ADC Profile. If each VPX instance has different nsroot credentials, you can fix it after SDX discovery has been performed. The ADC Profile is different than the SDX Profile.
- Back in the Configure ADC SDX Profile page, enter a new Community string for the SDX SVM. This appears to be SNMP v2 only.
- If you need the communication to be http instead of https, then you can uncheck the box for Use global settings for SDX communication.
- Click Create when done.
- Back in the Add Citrix ADC SDX page, select a Site, and optionally an Agent.
- Click OK to start discovery.
- After discovery is complete, switch to the VPX tab. You should automatically see the VPX instances.
- To specify the nsroot credentials for a VPX, right-click the VPX, and click Edit.
- In the Modify Citrix ADC VPX page, either select an existing Profile Name, or click the Add button to create a new one. Click OK when done. It should start rediscovery automatically.
- In the Modify Citrix ADC VPX page, either select an existing Profile Name, or click the Add button to create a new one. Click OK when done. It should start rediscovery automatically.
- After fixing the nsroot credentials, right-click the VPX instance, and click Configure SNMP. ADM will configure the VPX to send SNMP Traps to ADM.
Instance management
- REST API proxy – Citrix ADM can function as a REST API proxy server for its managed instances. Instead of sending API requests directly to the managed instances, REST API clients can send the API requests to Citrix ADM. See Citrix CTX228449 Citrix ADM as an API Proxy Server
- Citrix Application Delivery Management PowerShell Module by Kenny Baldwin provides a Invoke-ADMNitro cmdlet to send Nitro commands to instances through ADM.
- Citrix ADC VPX Check-In/Check-Out Licensing – You can allocate VPX licenses to Citrix ADC instances on demand from Citrix ADM. The Licenses are stored and managed by Citrix ADM, which has a licensing framework that provides scalable and automated license provisioning. A Citrix ADC VPX instance can check out the license from the Citrix ADM when a Citrix ADC VPX instance is provisioned, or check back in its license to Citrix ADM when an instance is removed or destroyed. See Citrix CTX228451 Citrix ADC VPX check-in and check-out licensing
Licenses
Virtual Server License Packs
Without Virtual Server licenses, you can enable analytics features a limited number of Virtual Servers. On-premises ADM comes with 30 free licenses. Cloud ADM comes with 2 free licenses. You can install additional licenses in 100 Virtual Server packs. More info at Licensing at NetScaler Docs.
- On the left menu, go to Infrastructure > Pooled Licensing.
- On the right, notice the Host ID. You will need this ID when allocating licenses at https://www.citrix.com/account.
- At https://www.citrix.com/account, allocate your Citrix ADM licenses to this Host ID.
- Then use the Browse button to upload the allocated license file.
- Click Finish after uploading the license file to apply it.
- The License Expiry Information section shows you the number of installed licenses and when they expire.
- You can use the Notification Settings section at the bottom of the page to email you when licenses are almost fully consumed or about to expire.
- Check the box next to Email and select a distribution list. If you don’t have an Email server setup yet, click the Add button to create one.
- Click Save when done.
Allocate licenses to Virtual Servers
ADM tries to automatically allocate all licenses to ADC Virtual Servers in the order the Virtual Servers are discovered. If you don’t have enough licenses for every Virtual Server that ADM discovers, then you can manually unassign an automatically-allocated ADM Virtual Server license and reassign the license to a different Virtual Server.
- Go to Settings > ADM Licensing & Analytics Config to see the number of currently installed (Entitled) licenses, and the number of Licensed virtual servers.
- By default, Auto Licensed Virtual Servers is enabled. If you disable this setting, then the Configure License button appears.
- Click the Configure License button.
- The top right shows you the number of licensed vs Entitled Virtual Servers.
- You can sort the Virtual Servers list by Type. Or use the search box to filter the list of Virtual Servers.
- The Licensed column shows you the Virtual Servers that are licensed. You can select a Licensed Virtual Server and Unlicense it.
- Select a Virtual Server you want to license, and then click the License button.
- You can also Enable Analytics from here.
All licensed Virtual Servers are shown on the Applications > Dashboard page.
Enable AppFlow / Insight / Analytics
Citrix ADC 12.1 and newer have an additional port TCP 5563 from ADC SNIP to ADM for Metrics Collector.
You can only enable Analytics (i.e. AppFlow) on Virtual Servers that are licensed.
- Go to Infrastructure > Instances > Citrix ADC.
- On the right, switch to one of the instance type tabs (e.g. VPX).
- Select an instance, open the Select Action menu, and click Configure Analytics.
- Select one or more Virtual Servers. If they are not licensed, then click the License button.
- After licensing, select one or more Virtual Servers and then click the button labelled Enable Analytics.
- Different options are available for different types of Virtual Servers.
- For Citrix Gateways, you want HDX Insight. Gateway Insight provides AAA and EPA info for the Gateway.
- Expand Advanced Options and select Citrix Gateway.
- Expand Advanced Options and select Citrix Gateway.
- For HTTP Load Balancing Virtual Servers, you want Web Insight. If you are licensed for ADC Premium Edition, then you can also enable WAF Security Violations for Web App Firewall and Bot Protection monitoring.
- For analytics on HTTP Virtual Servers, expand Advanced and click Enable X-Forwarded-For.
- For analytics on HTTP Virtual Servers, expand Advanced and click Enable X-Forwarded-For.
- Click OK to enable AppFlow on the Virtual Servers.
- Click Close when configuration is complete.
- Enable Analytics on more Virtual Servers.
- Login to the Citrix ADC (not ADM), and go to System > Settings.
- On the right, click Configure Modes.
- If you are using LogStream, then make sure ULFD is checked. Click OK.
enable mode ulfd
- On the right, click Change Global System Settings.
- Scroll down to ICA port(s) and add 1494 and 2598 to the list. Click OK. (Source = Citrix Discussions)
set ns param -icaPort 1494 2598
- On the right, click Change HTTP Parameters.
- At the top, add 80 and 443 to the Http Ports list. Click OK. (Source = Citrix Discussions)
set ns param -httpPort 80 443
- By default, with AppFlow enabled, if an ADC High Availability pair fails over, then all Citrix connections will drop and users must reconnect manually. Citrix ADC has a feature to replicate Session Reliability state between both HA nodes.
- From Session Reliability on Citrix ADC High Availability Pair at NetScaler Docs: Enabling this feature will result in increased bandwidth consumption, which is due to ICA compression being turned off by the feature, and the extra traffic between the primary and secondary nodes to keep them in sync.
- On ADC, go to System > Settings.
- On the right, in the Settings section, click Change ICA Parameters.
- Check the box next to Session Reliability on HA Failover, and click OK.
- At System > AppFlow > Collectors, you can see if the Collector (ADM) is up or not.
- When AppFlow is enabled on a Gateway vServer, an AppFlow policy is bound to the twice to the Gateway: once for Request Policies (i.e. HTTP), and once for ICA Request Policies. You might want to verify that these bindings are actually configured.
- On the ADM appliance, AppFlow for ICA (HDX Insight) information can be viewed under the Gateway > HDX Insight node.
- Web Insight for HTTP Virtual Servers is under Applications > Web Insight. WAF Violations is under Security.
Enable Syslog on Instance
ADM can configure ADC instances to send Syslog to ADM. Note: this will increase disk space consumption on the ADM appliances.
- Go to Infrastructure > Instances > Citrix ADC.
- On the right, select one of the tabs containing your ADC instance.
- On the right, select an instance, open the Select Action drop-down, and click Configure Syslog.
- At the top, check the Enable box.
- The Log Level should already be set to Custom with some boxes selected. Feel free to check other boxes while keeping in mind the disk space requirements.
- Click OK.
ADM nsroot Password
Changing ADM’s nsroot password also changes ADM’s nsrecover password.
- In ADM , go to Settings > Users & Roles.
- On the right, on the tab named Users, select the nsroot account, and click Edit.
- Check the box next to Change Password and enter a new password.
- You can also specify a session timeout by checking the box next to Configure Session Timeout.
- Click OK.
ADM Management Certificate
- The certificate to upload must already be in PEM format. If you have a .pfx, you must first convert it to PEM (Base64 certificate and key files). You can use a ADC’s Import PKCS#12 feature to convert the .pfx to PEM, and then download the converted certificate from the ADC appliance.
- On any Citrix ADC, go to Traffic Management > SSL.
- On the right, click Import PKCS#12.
- Enter a name for a new file that will contain the PEM certificate and PEM key.
- Browse to the .pfx file and enter the password.
- You can optionally encrypt the PEM key by selecting an Encoding Format and entering an encryption key.
- Click OK.
- To download the PEM file, go to Manage Certificates / Keys / CSRs.
- Scroll to the bottom of the list, right-click the new file, and click Download.
- Back in ADM, go to Settings > Administration.
- On the right, in the SSL Settings section, click Install SSL Certificate.
- Click Choose File to browse to the PEM format certificate and key files. If the PEM certificate and PEM key are in the same file, then browse to the same file for both fields.
- If the keyfile is encrypted, enter the password.
- Click OK.
- Click Yes to reboot the system.
- To force users to use https when accessing the ADM management page, go to Settings > Administration.
- On the right, click System, Time zone, Allowed URLs and Message of the day.
- On the Basic Settings page, check the box next to Secure Access Only and click Save.
System Configuration
- Go to Settings > Administration.
- On the right, click System, Time zone, Allowed URLs and Message of the day.
- Check the box next to Enable Session Timeout, and specify a value.
- By default, at Infrastructure > Instances > Citrix ADC , if you click a blue IP address link, ADM does single sign on to the instance using the nsroot credentials. If you want to force ADM users to login using non-nsroot credentials, then in check the bottom box for Prompt Credentials for Instance Login.
- Click Save.
- On the left, click the Message of the day tab.
- On the right, check the box next to Enable Message.
- Enter a message, and then click Save.
- Click the back arrow when done.
- When you login to ADM, you’ll be shown the message.
- Check the box next to Enable Session Timeout, and specify a value.
- Settings > Administration > Configure SSL Settings lets you disable TLS 1 and TLS 1.1.
- On the right, click the Protocol Settings section in the Edit Settings section on the right side of the screen.
- On the left, uncheck TLSv1 and TLSv1.1. Then click OK.
- Click Yes when asked to confirm the restart.
- On the right, click the Protocol Settings section in the Edit Settings section on the right side of the screen.
Prune Settings
- At Settings > Administration, on the right, in the left column, is System and Instance Data Pruning.
- System Pruning defaults to deleting System Events, Audit Logs, and Task Logs after 15 days. System events are generated by the ADM appliance, which is different than Instance events (SNMP traps) that are generated by ADC appliances.
- If you change anything on these pages, click the Save button before switching to a different tab/node/page.
- ADM can initiate a purge automatically as the database starts to get full.
- To see the current database disk usage, go to Settings > Performance and wait a few seconds.
- Instance Events page controls when instance SNMP traps are pruned, which defaults to 40 days.
- If you are sending Syslog from instances to ADM, then Instance Syslog page controls when the log entries are purged.
Backup Settings
- In Settings > Administration, in the middle column, under Backup, click Configure System and Instance backup.
- System Backup Settings defines how many ADM backups you want to keep. These are ADM backups, not ADC backups.
- There’s an option for External Transfer.
- ADM System backups (not Instance Backups) are at Settings > Backup Files.
- There’s an option for External Transfer.
- The Instance page lets you configure how often the instances are backed up.
- You probably want to increase the number of instance backups, or decrease the backup interval. The backups are quite small (e.g. 700 KB).
- There is an option to perform a backup whenever the ADC configuration is saved.
- The Enable External Transfer checkbox lets you transfer the backups to an external system so it can be backed up by your backup tool.
- Instance backups can be found at Infratructure > Instances > Citrix ADC. Right-click an instance, and click Backup/Restore.
- You can Restore a backup, Download the backup, or Transfer it to an external system.
- You probably want to increase the number of instance backups, or decrease the backup interval. The backups are quite small (e.g. 700 KB).
Analytics Settings
- There are more settings at Settings > Analytics Settings.
- ICA Session Timeout can be configured by clicking the link.
- If ADM doesn’t receive AppFlow records for a session, it will consider that session has got terminated in ADC and stops monitoring that session further. The time for which ADM needs to wait before considering a session terminated is ICA session timeout. This is configurable in ADM, by default it is set to 15 minutes. (source = Citrix Discussions)
- If ADM doesn’t receive AppFlow records for a session, it will consider that session has got terminated in ADC and stops monitoring that session further. The time for which ADM needs to wait before considering a session terminated is ICA session timeout. This is configurable in ADM, by default it is set to 15 minutes. (source = Citrix Discussions)
- You can configure how the App Score (Application Dashboard) is calculated.
- Settings > Analytics Settings > Data Persistence lets you configure how long Analytics data is retained. Adjusting these values could dramatically increase disk space consumption. See CTX224238 How Do I Increase Granularity of Data Points Stored on NetScaler MAS Analytics?.
- To see the current database disk usage, go to Settings > Performance and wait a few seconds.
- To see the current database disk usage, go to Settings > Performance and wait a few seconds.
NTP Servers
- On the left, click Settings > Administration.
- On the right, click NTP Servers.
- Click Add.
- Enter an NTP server, and click Create.
- After adding NTP servers, click the NTP Synchronization button.
- Check the box next to Enable NTP Synchronization, and click OK.
- Click Yes to restart.
Syslog
This is for syslog entries generated by ADM server, and not for syslog entries generated by the instances.
- Go to Settings > ADM Audit Log Messages > Syslog Servers.
- On the right, click Add.
- Enter the syslog server IP address, and select Log Levels. Click Create.
- You can click Syslog Parameters to change the timezone and date format.
Email Notification Server
- Go to Settings > Notifications.
- On the right, on the Email tab, click the button named Email Servers.
- Click Add.
- Enter the SMTP Email server address, and click Create.
- Click Add.
- In the breadcrumb, click Notifications.
- On the right, on the Email tab, and click Add.
- Enter information for a destination distribution list, and click Create.
- Enter information for a destination distribution list, and click Create.
- You can highlight a Distribution List and click the Test button.
- On the left, click Settings > Administration.
- On the right, click Change Event Notification and Digest.
- Move notification categories (e.g. UserLogin) to the right.
- Check the box next to Send Email. Select a notification distribution list. Then click Save.
Authentication
- Go to Settings > Authentication.
- On the right, switch to the tab named LDAP.
- Click Add.
- This is configured identically to ADC.
- Enter a Load Balancing VIP for LDAP.
- Change the Security Type to SSL, and Port to 636. Scroll down.
- Enter the Base DN in LDAP format.
- Enter the bind account credentials.
- Check the box for Enable Change Password.
- Click Retrieve Attributes, and scroll down.
- For Server Logon Attribute, select sAMAccountName.
- For Group Attribute, select memberOf.
- For Sub Attribute Name, select cn.
- To prevent unauthorized users from logging in, configure a Search Filter. Scroll down.
- If desired, configure Nested Group Extraction.
- Click Create.
- On the left, go to Settings > Users & Roles.
- On the right, click the tab named Groups.
- On the right, click Add.
- Enter the case sensitive name of your Citrix ADC Admins AD group.
- Move the admin Role to the right.
- The Configure User Session Timeout checkbox lets you configure a session timeout.
- Click Next.
- On the Authorization Settings page, if you are delegating limited permissions, you can uncheck these boxes and delegate specific entities.
- All DNS Domain Names (GSLB) is an option for Stylebooks in ADM 12.1 build 49 and newer.
- Click Create Group.
- In the Assign Users page, click Finish. Group membership comes from LDAP, so there’s no need to add local users.
- On the top right, click the button named Settings.
- If desired, check the box next to Enable User Lockout, and configure the maximum logon attempts. Click OK.
- If desired, check the box next to Enable User Lockout, and configure the maximum logon attempts. Click OK.
- On the left, go to Settings > Authentication.
- On the top right, click the button named Settings.
- Change the Server Type to EXTERNAL, and click Insert.
- Select the LDAP server you created, and click OK.
- Make sure Enable fallback local authentication is checked, and click OK.
Analytics Thresholds
- Go to Settings > Analytics Settings > Thresholds.
- On the right, click Add.
- Enter a name.
- Use the Traffic Type drop-down to select HDX, WEB, SECURITY, or APPANALYTICS.
- Use the Entity drop-down to select a category of alerts. What you choose here determines what’s available as Metrics when you click Add Rule.
- Click Add Rule to select a metric and threshold.
- With HDX as the Traffic Type, to add multiple rules for multiple Entity types, simply change the Entity drop-down before adding a new rule.
- If the Traffic Type is HDX, and the Entity drop-down is set to Users, on the bottom in the Configure Geo Details section, you can restrict the rule so it only fires for users for a specific geographical location.
- In the Notification Settings section, check the box to Enable Threshold.
- Check the box to Notify through Email, and select an existing Email Distribution List.
- Click Create.
Private IP Blocks
You can define Geo locations for internal subnets.
- Go to Settings > Analytics Settings > IP Blocks.
- On the right, click Add.
- In the Create IP Blocks page:
- Enter a name for the subnet.
- Enter the starting and ending IP address.
- Select a Geo Location (Country, Region, City). As you change the fields, the coordinates are automatically filled in.
- Click Create.
SSL Certificate Expiration Notification
SSL Dashboard can notify you when certificates will expire soon.
- In the ADM menu, expand Infrastructure, and click SSL Dashboard.
- On the top right, click the button named Settings.
- In the Certificate is expiring in (days) field, enter the number of days before expiration that you want to receive a notification. The default is 30 days.
- Check one of the boxes (e.g. Email) below How would you like to be notified.
- Select a notification profile (e.g. Mail Profile) or Add one.
- Click Save and Exit, or click Next to see more SSL Dashboard settings.
Instance Email Alerts (SNMP Traps)
You can receive email alerts whenever a ADC appliance sends a critical SNMP trap.
- On the left, go to Infrastructure > Events > Rules.
- On the right, click Add.
- Give the rule a name.
- Move Severity filters (e.g. Major, Critical) to the right by clicking the plus icon next to each Severity.
- While scrolling down, you can configure additional alert filters. Leaving them blank will alert you for all categories, objects, and instances.
- On the bottom of the page, in the Event Rule Actions section, click Add Action.
- In the Add Event Action page:
- Select an Action Type (e.g. Send e-mail Action).
- Select the recipients (or click the Add button to add recipients).
- Optionally, enter a Subject and/or Message.
- If you enter a Subject, you can check Prefix severity, category, and failure object information to the custom email subject.
- Emails can be repeated by selecting Repeat Email Notification until the event is cleared.
- Select an Action Type (e.g. Send e-mail Action).
- Click OK.
- Then click Create to finish creting the event rule.
- See the Event Management section at All how to articles at NetScaler Docs.
Events Digest
ADM can email you a daily digest (PDF format) of system and instance events
To enable the daily digest:
- Go to Settings > Administration.
- On the right, click Configure Event Notification and Digest.
- Switch to the Event Digest page.
- Uncheck the box next to Disable Event Digest.
- Configure the other settings as desired, and click OK.
Director Integration
Integrating Citrix ADM with Director adds Network tabs to Director’s Trends and Session Details views. Citrix Blog Post Configure Director with Netscaler Management & Analytics System (MAS)
Requirements:
- Citrix Virtual Apps and Desktops (CVAD) must be licensed for Premium Edition (formerly known as Platinum Edition). This is only required for the Director integration. Without Premium, you can still access the HDX Insight data by visiting the Citrix ADM web site instead of from Director.
- Director must be 7.11 or newer for Citrix ADM support.
To link Citrix Director with Citrix ADM:
- On the Director server, run C:\inetpub\wwwroot\Director\tools\DirectorConfig.exe /confignetscaler.
- Enter credentials for a user that only has HDX Insight permissions.
- If HTTPS Connection (recommended), the Citrix ADM certificate must be valid and trusted by both the Director Server and the Director user’s browser.
- Enter 1 for Citrix ADM (aka MAS).
- Do this on both Director servers.
Use Citrix ADM
Infrastructure
Everything under the Infrastructure node is free.
Infrastructure Analytics – there’s an Infrastructure Analytics node under the Infrastructure node. For details, see Infrastructure Analytics at NetScaler Docs.
- On the top right, the gear icon above the table shows the Settings Panel.
- The tab named Score Thresholds lets you adjust how Infrastructure Analytics scores instance CPU, Memory, Disk, etc.
- The Notifications tab lets you be notified when score thresholds are crossed.
- You can click the Circle Pack button to change to the Circle Pack view.
At Infrastructure > Instances > Citrix ADC, select an instance and view its Dashboard.
- The Instance Dashboard has tabs.
Backups are available by selecting an instance and clicking Backup/Restore.
Infrastructure > Network Reporting lets you create Dashboards where you can view Instance performance data.
Infrastructure > Network Reporting has a Thresholds button that lets you create thresholds when counters cross a threshold. For example, you might want a notification when Throughput gets close to the licensed limit.
At the bottom of the threshold are Notification Settings.
Configuration Record and Play
Use ADM to record a configuration change on one instance, and push the change to other instances.
- Go to Infrastructure > Configuration > Configuration Jobs.
- On the right, click Create Job.
- Give the job a name.
- Change the Configuration Source drop-down to Record and Play.
- Change the Source Instance drop-down to the instance you want to record.
- Click Record.
- You might have to allow pop-ups in your browser.
- ADM opens the instance GUI. Make changes as desired.
- When done, go back to ADM, and click Stop.
- ADM retrieves the changed config.
- On the left, you’ll see the changed commands. Drag them to the right.
- On the right, you can change instance-specific values to variables by simply highlighting the values. This allows you to change the values for each instance you push this config to.
- Proceed through the rest of the Configuration Job wizard like normal. You’ll select instances, specify variable values for each instance, and schedule the job.
Dave Brett Automating Your Netscaler 11.1 Vserver Config Using Netscaler Management and Analytics System uses a Configuration Job to deploy StoreFront load balancing configuration to an instance.
Analytics and Applications
This functionality requires Virtual Server licenses, which can come from your built-in 30 free licenses.
The AppFlow Analysis tools (e.g., HDX Insight) are located under the Applications, Security, and Gateway nodes. See Viewing HDX Insight Reports and Metrics at NetScaler Docs.
Applications > Dashboard automatically includes all licensed Virtual Servers.
- On the top right, click Manage Apps to add a custom group of Virtual Servers together into an application. The grouped Virtual Servers are removed from the Others list.
- Click New Application.
- Back in the App Dashboard, you can then click any Application’s box to view stats.
- For Custom Applications, it combines stats about all of the vServers in that Custom Application.
- There are buttons at the top the page to view more info about the application.
Applications > Configurations > StyleBooks lets you use StyleBooks to create new ADC configurations.
There are built-in Enterprise StyleBooks for Exchange, SharePoint, Oracle, ADFS, etc. Or you can create your own StyleBook and use it to create ADC configurations. For details, see StyleBooks at NetScaler Docs.
The Applications Node has quite a bit of functionality. See Application Analytics and Management at NetScaler Docs for details.
Link:
- Citrix ADM How-to Articles at NetScaler Docs.
HDX Insight
HDX Insight Dashboard displays ICA session details including the following:
- WAN Latency
- DC Latency
- RTT (round trip time)
- Retransmits
- Application Launch Duration
- Client Type/Version
- Bandwidth
- Licenses in use
Citrix CTX215130 HDX Insight Diagnostics and Troubleshooting Guide contains the following contents:
- Introduction
- Prerequisites for Configuring HDX Insight
- Troubleshooting
- Issues Related to ICA parsing
- Error Counter details
- Checklist before Contacting Citrix Technical Support
- Information to collect before Contacting Citrix Technical support
- Known Issues
Gateway Insight
In the Gateway node is Gateway Insight.
This feature displays the following details:
- Gateway connection failures due to failed EPA scans, failed authentication, failed SSON, or failed application launches.
- Bandwidth and Bytes Consumed for ICA and other applications accessed through Gateway.
- Number of users
- Session Modes (clientless, VPN, ICA)
- Client Operating Systems
- Client Browsers
More details at Gateway Insight at NetScaler Docs.
Security Dashboard
The Security Dashboard uses data from Application Firewall to display Threat Index (criticality of attack), Safety Index (how securely ADC is configured), and Actionable Information. More info at Application Security Dashboard at NetScaler Docs.
Troubleshooting
Citrix CTX215130 HDX Insight Diagnostics and Troubleshooting Guide: Syslog messages; Error counters; Troubleshooting checklist, Logs
Citrix CTX224502 Frequently Asked Questions During NetScaler MAS Troubleshooting
Upgrade Citrix ADM
Licensing – ADM 13.1 build 21.50 and newer restrict the free Analytics licenses to 2 Virtual Servers instead of the previously allowed 30 free Virtual Servers.
- If you are upgrading from MAS 12.0 build 56 and older, you must upgrade to MAS 12.0 build 57.24 before you can upgrade to ADM 12.1. Then upgrade from ADM 12.1 to ADM 13.1. (Source = Before you upgrade at NetScaler Docs)
- If you are running ADM 13.0, then Citrix recommends upgrading to ADM 13.0 build 61.48 before you upgrade to ADM 13.1.
- Download the latest Citrix Application Delivery Management (ADM) Upgrade Package. You want the ADM Upgrade Package, not the ADM image. It’s around halfway down the page.
- Login to Citrix ADM Floating IP or Active Node. Upgrading the Active Node automatically upgrades the Passive Node.
- Go to Settings > Deployment and make sure both nodes are online and replicating.
- Go to Settings > Administration.
- On the right, in the far-right column, click Upgrade Citrix ADM.
- Browse to the build-mas-13.1…tgz Upgrade Package and click OK. The file name starts with build-mas-13.1 (not masagent).
- Click Upgrade.
- Click Yes to reboot the appliance.
- After it says that ADM upgrade completed, login.
- The new firmware version can be seen by clicking your username in the top right corner.
Upgrade Disaster Recovery Node
After you upgrade the HA pair in the primary datacenter, you can upgrade the DR node.
- Use WinSCP or similar to connect to the DR node using the nsrecover credentials.
- On the ADM DR node, navigate to /var/mps/mps_images.
- Create a new Directory with the same name as the 13.1 build number. Then double-click the new directory to open it.
- Upload the file named build-mas-13.1-##.##.tgz to the version-specific directory. This is the regular ADM upgrade file with a name starting with build-mas-13.1. It’s not the Agent upgrade file.
- SSH (Putty) to the DR node and login as nsrecover.
- Enter the following. Replace the # with the version number.
cd /var/mps/mps_images/13.1-##.## tar xvzf build-mas-13.1-##.##.tgz
- Then enter the following. The appliance will reboot automatically.
./installmas
- After the reboot, the file /var/mps/log/install_state…
- …shows you the installed version.
Upgrade ADM Agents
After you upgrade the ADM HA pair in the primary datacenter, and after you upgrade the DR node, you can then upgrade the ADM Agents.
- From the ADM 13.1 download page, at the bottom of the page, download the ADM Agent Upgrade Package. This Agent Upgrade file is different than the regular ADM upgrade file. And it is different than the files to deploy a new Agent. Find it at the bottom of the downloads page.
- Use WinSCP or similar to connect to the ADM Agent using the nsrecover credentials.
- On the ADM Agent, navigate to /var/mps/mps_images.
- Create a new Directory with the same name as the 13.1 build number. Then double-click the new directory to open it.
- Upload the file named build-masagent-13.1-##.##.tgz to the version-specific directory. This is the ADM Agent upgrade file, and not the regular ADM upgrade file.
- SSH (Putty) to the ADM Agent and login as nsrecover.
- Enter the following. Replace the # with the version number.
cd /var/mps/mps_images/13.1-##.## tar xvzf build-masagent-13.1-##.##.tgz
- Then enter the following. The appliance will reboot automatically.
./installmasagent
- After the reboot, the file /var/mps/log/install_state…
- …shows you the installed version.
- Repeat for any additional ADM Agents.
- If you login to ADM and go to Infrastucture > Instances > Agents…
- …you should see the new Version. It will take several minutes for the version number to update.
- ADM 13.1 build 24 and newer have a Settings button on the top-right of the Agents page where you can enable Notifications when an ADM Agent is unreachable.