Software Secure Workload
Activity Configure

Workflow

  • First, the user must verify that the Netscaler REST API endpoint is reachable from the Secure Workload cluster.

  • For TaaS or in cases, where the Netscaler appliance is not directly reachable, the user must configure a Secure Connector tunnel to provide connectivity.

  • Create an external orchestrator with type Citrix Netscaler.

  • Depending on the delta interval value it might take up to 60 seconds (default delta interval) for the first full snapshot of Netscaler virtual servers to complete. Thereafter the generated labels can be used to create Secure Workload scopes and enforcement policies.

  • Enforce policies from Secure Workload to deploy Netscaler ACL rules.