Summary

In this all-important chapter we looked at the authentication capabilities of the NetScaler. We covered the protocols that enterprises use most commonly and examined the packet flows involved, the deployment options, and troubleshooting techniques for each.

In the next chapter we will look at Networking and High Availability issues.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset