Download - MasterClass August - FInal
Remember. You can contact the NetScaler Master Class Team by email [email protected]
NetScaler Master Class August 2012
This PDF slide deck contains slides with animation. It is recommended that the deck is viewed alongside the accompanying webinar recording located here: https://www1.gotomeeting.com/register/325602920
© 2012 Citrix
Who’s online today?
© 2012 Citrix
Top 10 Countries represented
USA
Russia
Turkey
Denmark
© 2012 Citrix
Top 10 Countries represented
The Netherlands Ireland Italy
© 2012 Citrix
Top 10 Countries represented
Germany France
© 2012 Citrix
Top 10 Countries represented
United Kingdom
© 2012 Citrix
• NetScaler 101 – NetScaler and Security: An introduction and reminder • Ronan O’Brien
• In the Spotlight – NetScaler Application Firewall • Lena Yaravaya
• What’s new – NetScaler Security eco-System • Prakash Sinha
• News and Views
Today’s running order
August, 2012
Security on NetScaler
NetScaler MasterClass
© 2012 Citrix
Core Security Features
• Layer 2 – Cloak your downed VServers - Respond to ARP based on VServer Health.
• Per Virtual IP Configuration. • Same logic and functionality
for ICMP.
ARP Response Layer 2
© 2012 Citrix
Core Security Features
• Layer 3 – non TCP • Limits for ICMP and UDP
packets per 10ms (NetscaleràSystemà SettingsàGlobal Sys Settings
ARP Response Layer 2
ICMP\UDP Limit Layer 3
© 2012 Citrix
Core Security Features
• Layer 3 – TCP
• Syn Flood Protection
• ACL
• Surge Protection
• DNS Security ARP Response
Layer 2
ICMP\UDP Limit
Layer 3
Syn Flood Attack Extended ACL
Surge Protection
DNS Security
© 2012 Citrix
• ACL's are oldest security and firewalling mechanism • Used to match each inbound packet and trigger action
• Source IP/Port • Destination IP/Port • TTL • SourceMAC • Protocol • VLAN • ICMP Type/Code
• ACL Logging can be configured for further Audit trails
Access Control List
© 2012 Citrix
ACLs
© 2012 Citrix
Core Security Features
• Upper Layers • Rewrite and URL Transform
can be used to mask internal URLs
• TLS Man in the Middle attack. • HTTP Cookie Encryption /
proxying & XML Encryption • SlowPost & Slowloris Attack
ARP Response Layer 2
ICMP\UDP Limit
Layer 3 Syn Flood Attack Extended ACL
Surge Protection
Upper Layers
SSL HTTP Rate Limit
Action Analytics SQL Responder
Authentication SSL FIPS
HTTP Responder HTTP Callout
App Firewall HTTP DOS
© 2012 Citrix
SYN Attack Protection
Client Server
SYN
SYN+ACK
ACK
GET
SYN Cookie
Resource Allocated
Protects against over 20 M SYN / Sec
© 2012 Citrix
HTTP DDoS Protection
Client Server
GET/POST
JS: Refresh
Refresh Request
DDoS Policy
DOSQ SQ
© 2012 Citrix
SSL Security SSL HTTP
SSL SSL
SSL_BRIDGE SSL_BRIDGE
SSL Offloading
SSL Backend Encryption
SSL Bridge
© 2012 Citrix
NetScaler - Optimized for 2048-bit RSA Keys
2048-bit RSA Key
http://www.verisign.com/ssl/ssl-information-center/express-renew-ssl-certificate/index.html
“You must submit a minimum 2048-bit CSR to qualify for Express Renewal.”
© 2012 Citrix
SSL Cert Renewals
• NetScaler can notify you of invalid certificates
• Notice notification when a certificate nears expiry
• CSRs for submission to certificate authorities can be generated on-box using a wizard.
• Hooks into Command Center.
© 2012 Citrix
TLS-Reneg MITM Attack Protection
• Man in the Middle Attack
• Prevented by cryptographically binding renegotiation handshakes to the enclosing TLS cryptographic parameters
• Transport Layer Security (TLS) Renegotiation Indication Extension 5746
© 2012 Citrix
Responder
GET /secure/index.asp
Respondwith: 200 OK
HTTP.REQ.URL.CONTAINS(“secure”)
Redirect: 302 Found
RESET DROP
• First module any incoming request hits on NetScaler
• Can internally invoke Rate Limiting and Callout objects
© 2012 Citrix #CitrixSummit
DataStream - Responder
22
• Allows NetScaler to respond to a MySQL or MS-SQL Request without any
input from the back end servers.
drop database imdb;
select * from imdb.actors;
Drop Not Allowed through VServer!
© 2012 Citrix #CitrixSummit
Drop Invalid HTTP requests & Slow* Protections
23
• Drop Invalid Requests
• Custom
Actions
© 2012 Citrix
Slowloris Attack
Attack Client
Attack Client sends few bytes of Header before idle Client timeout keeping the connection always opened.
Idle timeout reached
Legitimate Client
© 2012 Citrix
SlowPost Attack
Attack Client
Attack Client sends Header completely but POST body in few bytes before idle Client timeout keeping the connection always opened
Idle timeout reached Legitimate Client
Header
POST Body
© 2012 Citrix
Authentication
?
© 2012 Citrix
Authentication types (Dual Auth Supported)
27
• (S)LDAP (includes Microsoft Active Directory, Novell NDS) • Radius • TACACS • Certificate • Kerberos • SAML (New in NetScaler 10!) • Local
© 2012 Citrix
Authorisation
28
• Two key elements – WHO has access to WHAT. • Two outcomes – Allow & Deny • Who = Authenticated User ᵒ Authorisation Policies MUST be bound to Users or Groups
• What = granular, easily defined object e.g. ᵒ IP address ᵒ HTTP URL ᵒ Group etc..
© 2012 Citrix
10.90.41.25 [30/Apr/2012:13:07:15 +0200] "GET /config/aaauser?count=yes HTTP/1.1" 200 105 "http://10.90.196.150/menu/neo" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.162 Safari/535.19“ 10.90.41.25 [30/Apr/2012:13:07:16 +0200] "GET /views/applets/guiquickloader.jar HTTP/1.1" 304 - "-" "Mozilla/4.0 (Windows 7 6.1) Java/1.6.0_29“ 10.90.41.25 [30/Apr/2012:13:07:17 +0200] "GET /views/applets/gui_images.jar HTTP/1.1" 304 - "-" "Mozilla/4.0 (Windows7 6.1) Java/1.6.0_29“ 10.90.41.25 [30/Apr/2012:13:07:17 +0200] "GET /nsip?filter=type:SNIP&count=yes HTTP/1.1" 200 103 "http://10.90.196.150/menu/neo" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko)
Accounting
29
• Records who, when & from where • SYSLOG server (open standard format). ᵒ NetScaler’s own syslog server ᵒ Syslog server outside the appliance ᵒ Command Center
• There is also the NSLOG format which is NetScaler proprietary
Work better. Live better.
Citrix NetScaler Web Application Firewall NS WAF Overview and Update
© 2012 Citrix
Problem
Session Layer Transport Layer
: :
Network AppFW
Solution
No Apps protection WAF Protection 86% of the attacks are attacks to the applications
© 2012 Citrix
DDos SSL/VPN SSL WAF XML FW AAA SSO Reporting
• 4th Gen Web App Firewall
• Fastest App Firewall (12 Gbps)
• Best Price-Performance
NetScaler MPX and VPX
• First to implement learning (Teros)
• First to implement positive security
• Fine-grained policy driven
Convergence of Application Security Functions
© 2012 Citrix
Logical Deployment
Citrix Application Firewall (in the DMZ)
Application Infrastructure
Network Firewall
Internet Network Firewall
Logical Deployment
Trusted Network
Interfaces connected to different networks
Untrusted Network
© 2012 Citrix
Hybrid Security Model
• Signatures for known attacks ᵒ Easy deployment, Quick PoC ᵒ Checks request headers (URL, cookies, etc) and body (form fields) ᵒ Integrates with scanning tools ᵒ Wizard to ease configuration
• Mix-and-match with positive security ᵒ Defense against zero-day attacks ᵒ Defense against custom attacks ᵒ Strongest security posture
© 2012 Citrix
Signatures
© 2012 Citrix
Signature Maintenance/Updates
• Based on SNORT • Partnership with SourceFire to
provide signatures • Can be updated without changing
build • Open format for signature files • Signature versioning • Automatic identification of “new”
signatures
© 2012 Citrix
• NetScaler provides SNORT signatures converted into NetScaler native format
• Import into NetScaler
• Click and choose which application rules apply and whether to block or log
• Deploy
How Does It Work – SNORT® signatures?
© 2012 Citrix
Integrates with Scanner tools –> NetScaler and Cenzic integration
Protected website
Run periodic scans
Import Vulnerability file into NetScaler
© 2012 Citrix
Positive Security Model
© 2012 Citrix
Vulnerable Websites
Copyright WASC, White Hat Security
© 2012 Citrix
Cross-site Scripting (XSS) Attacks Attacking trust relationships
Cross-Site Scripting: Inserting a malicious script that compromises the trust relationship between a user and a Web application, resulting in sending an attacker confidential information that can be used to steal that user’s identity.
Innocent user downloads script and executes 2
Hacker posts <malicious script> to vulnerable Web application
1
3
Script captures credential info and sends to hacker
© 2012 Citrix
SQL Injection Attacks
SQL Injection Attacks: Sending SQL commands to a Web application that when passed to databases execute and allow hacker to gain access or change customer and sensitive information.
SQL Injection Attack
http://shop/index.asp?category=books' or ‘1=1
Accessing databases via Web applications
© 2012 Citrix
Cookie Poisoning defense prevents identity theft and session hijacking
Client returns cookie to server
Web server sends client cookie
Application Firewall verifies that cookies have not been modified by client
© 2012 Citrix
HTML Form Field Protection
Client completes and returns form
Application sends form to client
Protect applications by blocking malicious and illegal input parameters
For each user session AppFw ensures that: 1. Each field is returned 2. No fields were added by client 3. Read-only and hidden fields are unaltered 4. Data in drop-down list or radio button field conforms 5. Max length of form fields is adhered to
© 2012 Citrix
2 User visits blog.net in
another browser window
Blog.net
User logs in and creates session with web application
1
Cross Site Request Forgery Attacks
Blog.net makes request to application using user’s
session credentials 3
CSRF Denial of Service Scan Tool Integration
© 2012 Citrix
Business Object Protection Modules
Financial Theft Prevention
Prevent the inadvertent disclosure of customer or corporate data
Configurable Protections
Credit Card Numbers
Customer-defined Data Objects
Mastercard 5168701720999598 5487106695039822 5374247346295037 5229226821960783 5120772245608565 5418244166026814 5214846392378060 5593219822414122 5302495774841718 5141463445796112 VISA 4532804852500010 4328380488186126 4532740912246923 4716318594729561 4916022347049263 4929693453925879 4916392627322353 4485495924283904 4532203936162055 4916164014266109
Mastercard XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX VISA XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXX
Server: Msg 547, Level 16, State 1, Procedure error_demo_sp, Line 2 UPDATE statement conflicted with COLUMN FOREIGN KEY constraint 'fk7_acc_cur'. The conflict occurred in database 'bos_sommar', table 'currencies', column 'curcode'. The statement has been terminated.
© 2012 Citrix
• XML Security • Threat Protection • Content Validation • Data Leak Prevention • Reporting and Monitoring
• Secures all flavors of XML Applications (not just SOAP)
• Single devices for XML, HTML and Web 2.0 applications security
• Check types are categories as HTML, XML or Common
• Block, Log and Statistics can be enable for all checks.
Integrated HTML and XML Security
© 2012 Citrix
Auditing
• Full administrative audit trail ᵒ All management operations logged
• Full user activity audit trail ᵒ All session activity ᵒ All network flows
• All system events logged • Support for external logging servers
© 2012 Citrix
• Rule Recommendation Engine in learning mode
Manageability and Ease of Use - Learning
© 2012 Citrix
Manageability/Ease of Use – Rule Visualizer
© 2012 Citrix
Reporting Dashboard of top AppFirewall information – for quick security summary Ability to create custom reports for specific violations, client IPs, profiles etc.
© 2012 Citrix
Visibility and Reporting with Splunk for NetScaler
• Splunk App for NetScaler
• Available at SplunkBase • http://www.splunkbase.com/apps/All/4.x/
Add-On/app:Splunk+for+Citrix+NetScaler
• Case Study: FreshDirect • http://www.splunk.com/view/case-study-
fresh-direct/SP-CAAACDB
© 2012 Citrix
Full PCI v1.2 compliance report
• Analyze App Firewall configuration against PCI-DSS requirements • Executive summary of Application Firewall configuration
© 2012 Citrix
Demo - Prevent Web Application Attacks with Citrix NetScaler Application Firewall
AppFw and Cenzic Integration - http://support.citrix.com/article/CTX133285 AppFw and Qualys Integration - http://support.citrix.com/article/CTX133269
© 2012 Citrix
Application Attack Demonstration
• Against any web site without written permission by a corporate officer
• Across a corporate network • Across a public network
These Attacks Are Illegal
To avoid going to jail never run these attacks:
© 2012 Citrix
NetScaler Technology Partnership Update Prakash Sinha July 2012
© 2012 Citrix
VA / Scanning
SIEM
Network Infrastructure
Identity Management
Log Management
Network Monitoring
• Improves security of Citrix NetScaler
• Integration with leading technology vendors improves security time to protect • Reduces Web App Firewall Proof of
Concept (PoC) and time-to-deployment • SIEM integration improves compliance,
reporting, and monitoring in the Enterprise
• Provides enhanced security through technology partners
Expanding Mindshare with Ecosystem Partners
a access
t threat
Anti Virus
URL Filtering
Certificate Mgmt
Secure Browsing
© 2012 Citrix
• Provides “net new” security through tech partners
• Integration with leading vendors reduces insecure time • App Scan integration reduces Proof
of Concept (PoC) and time-to-deployment
• SIEM integration improves compliance, reporting, and monitoring in the enterprise
• Network Monitoring, Scalability and Virtualization creates differentiation
NetScaler Technology Ecosystem Partners
Security Events
Network Infra
Antivirus/URL Filter
App Visibility
Intrusion Detection
Identity Mgmt
Penetration Testing
Browser Security
Certificate Mgmt
a access
t threat
Integration with Application Scanning & Penetration Testing Tools
© 2012 Citrix
Website is now protected
Web App Security with Cenzic and NetScaler Run periodic scans to keep website secure
Import into NetScaler Application Firewall
Web vulnerability scan results from Cenzic
© 2012 Citrix
How Does It Work?
• Vulnerabilities are found during a Cenzic Hailstorm software or SaaS security scans
• Development team logs into Cenzic Hailstorm and/or receives vulnerability report with details
• Remediation process begins • Export Cenzic Hailstorm vulnerability report to a
NetScaler Application Firewall • The XML file of scan results is imported into NetScaler
Application Firewall • The imported, Cenzic-generated rules are then bound
to the NetScaler Application Firewall profile
• Quick protection against Cenzic Hailstorm identified application vulnerabilities. No additional configuration and learning is required
Certificate Lifecycle Management
© 2012 Citrix
• Enable rapid migration from 1024 bit keys to 2048 across the IT infrastructure • Venafi has the certificate inventory • Venafi provide automated replacement of
keys • Venafi can enforce 2048 policies / compliance
• Improve performance by offloading SSL certificates to NetScaler devices • Expand NetScaler platforms to enable 2048
compliance without degrading performance • Venafi integration with NetScaler enables
automated deployment of certs to NetScaler from other systems
Certificate Management on NetScaler with Venafi
Reporting, Analysis, &
Mgmt
6 Automated Provisionin
g
Network Discovery 1
Validation
2
Monitoring &
Alerting
3
4
5 Enrollment (to CAs)
© 2012 Citrix
• Venafi discovers certificates in your network
• Venafi validates inventory daily
• Venafi monitors for & reports on inventory expirations, policy violations
• Venafi acts as the intermediary to manage the enrollments, approvals and issuances of certificates
• Venafi automatically issues, uploads and binds new certificates in the Citrix NetScaler
• Venafi regularly rotates certificates, providing increased security agility
How Does it Work?
9. Transfer certificate and private key
10. Associate certificate with virtual server
6. Submit CSR 7. Retrieve Cert
3. Approve Key Gen
1. Configure Netscaler in Director
2. Configure Cert 8. Approve
Installation (for each Netscaler)
4. Generate Key Pair/CSR 5. Store encrypted in DB
Token-less and Risk-based One-Time Password (OTP)
© 2012 Citrix
• Solution Components • Citrix NetScaler - Version 9.2 or later • Identity Provider such as Active Directory or equivalent
LDAP based system • RSA Adaptive Authentication Server for secondary
authentication of users based on behavioral and other inputs
• How does the integration work? • User attempts to access a system protected by Adaptive
Authentication • User's activity is analyzed by the RSA Risk Engine and is
assigned a Risk Score • RSA Policy Manager determines Risk using behavioral
analysis
• User is directed to "Step-Up Authentication"
RSA Adaptive Authentication with Citrix NetScaler
© 2012 Citrix
SecureMatrix GSB Integration with NetScaler
Single Sign On
© 2012 Citrix 71
SAML Consumer with SecureAuth • Reference win at Carolinas Healthcare
System (CHS) against Juniper SSL/VPN
• CHS chose SecureAuth for SSO/SAML Provider use case
• Requested support for “SAML Consumer” in NetScaler/AGEE
• Delivered by Citrix Consulting
• Product support in NetScaler 10
Intrusion Detection and Intrusion Protection (IDS/IPS)
© 2012 Citrix
• Two modes of deployment • Off of span port • Inline mode
• Solution Components • Citrix NetScaler front-ending web applications & sites • Sourcefire 3D Sensor • Sourcefire Defense Center
• How does it work? • Sourcefire 3D Sensor detects an attack • Sourcefire Defense Center creates an ACL policy and
sends it to Citrix NetScaler through the NetScaler API • Citrix NetScaler applies the policy and blocks the attack
How Does IDS/IPS Integration Work?
© 2012 Citrix
• Import signatures into NetScaler • Signatures updates available from Citrix
NetScaler product update site approximately every 6 weeks
• Click and choose which application rules to apply
• Choose whether to block or log
• Deploy
How Does SNORT Signature Integration Work?
Anti Virus and URL Filtering
© 2012 Citrix
• Integrated with Trend Micro IWS Virtual Appliance (IWSVA)
• Customer win at Government of Alberta, Canada
• Whitepaper written by Trend Micro
Integration with Anti-Virus, URL Filtering
NetScaler VPX deployment as forward proxy load balancing outbound user traffic across multiple InterScan Web Security appliances.
NetScaler deployed as reverse proxy switching inbound file uploads across multiple Trend Micro Inter Scan Web appliances
© 2012 Citrix
How Does It Work?
NetScaler deployed as reverse proxy switching inbound file uploads across multiple Trend Micro Inter Scan Web appliances
Security Information & Event Management (SIEM)
© 2012 Citrix
• Correlate NetScaler events with SIM/SEM Tools – address Compliance and Visibility requirements for NERC, FISMA, PCI, HIPAA, IT Governance etc
• NetScaler now a supported data source with RSA enVision • RSA enVision Event Sources
• ArcSight ESM integration available
• ArcSight and RSA in Citrix Ready program • Collateral at Citrix Cloud Solution Compliance Partners
• NitroSecurity (McAfee) integration is now available
Security Event Management with ArcSight and RSA
Visibility & Reporting
© 2012 Citrix
Visibility and Reporting with Splunk for NetScaler
• Splunk App for NetScaler available as of Aug 2010
• Available at SplunkBase • Splunk App for NetScaler
• Case Study: FreshDirect • Fresh Direct Case Study
© 2012 Citrix
• Who’s accessing my application resources?
• Are my apps aligned with my users?
• How can I get clear operational visibility?
• How do I monitor and ensure SLAs are met?
Application Visibility - AppFlow on NetScaler
© 2012 Citrix
Application Visibility and Log Mgmt Partners
© 2012 Citrix
• Cenzic scans supported by NetScaler
• Three products bundled and packaged together by SoftChoice
• Sold by SoftChoice along with consulting as a “Web Security Solution”
Channel Solution Example: SoftChoice
© 2012 Citrix
News and Views
86
© 2012 Citrix
NetScaler Repeater Scalability…
• http://blogs.citrix.com/2012/07/13/branch-repeater-on-hyper-v/
© 2012 Citrix
NetScaler command Center MPX
• http://blogs.citrix.com/2012/07/13/netscaler-command-center-mpx-%E2%80%93-a-complete-solution-in-a-box/
88
© 2012 Citrix
AAA revisited
• http://blogs.citrix.com/2012/07/30/aaa-what-it-means-to-you/
89
© 2012 Citrix
GSLB – hierarchical approach
• http://blogs.citrix.com/2012/07/27/netscaler-gslb-parent-child-sites/
90
© 2012 Citrix
NetScaler 10 and keep-alives
• http://blogs.citrix.com/2012/07/26/netscaler-10-keep-alive-value-add-to-the-tcp-stack-with-profiles/
91
© 2012 Citrix
CAC/SIPR tokens and NetScaler
• http://blogs.citrix.com/2012/07/20/cac-or-sipr-token-on-netscaleragee/
92
© 2012 Citrix
NetScaler SAML and CG
• http://blogs.citrix.com/2012/07/19/workin-it-with-netscaler-saml-and-cloud-gateway/
93
© 2012 Citrix
NetScaler and TFTP
• http://blogs.citrix.com/2012/07/19/load-balancing-tftp-with-netscaler/
94
© 2012 Citrix
Tagged and Untagged traffic and NetScaler HA
• http://blogs.citrix.com/2012/07/19/netscaler-ha-managing-tagged-versus-untagged-traffic/
95
© 2012 Citrix
• “Impressive and relevant book on Application Security”
• “If you haven't thought about security yet - this is the book for you”
• “A great book for those new to web security”
Competition
© 2012 Citrix
• Wednesday September 5
• 2pm UK time
• Agenda • NetScaler "101" – NetScaler projects: Beginning to end • "In the Spotlight" – NetScaler Implementation: A case study from Citrix Consulting Services
• What’s new – NetScaler product hardware update • Register today – https://www1.gotomeeting.com/register/521747929
Master Class: September
Work better. Live better.
98
© 2012 Citrix
• September 2011 Master Class recording here: • https://www1.gotomeeting.com/register/124944433
• October 2011 Master Class recording here: • https://www1.gotomeeting.com/register/907493912
• November 2011 Master Class recording here: • https://www1.gotomeeting.com/register/294761545
• December 2011 Master Class recording here: • https://www1.gotomeeting.com/register/586128016
Back issues of Master Class (recordings)
© 2012 Citrix
• February 2012 Master Class recording here: • https://www1.gotomeeting.com/register/811363848
• March 2012 Master Class recording here: • https://www1.gotomeeting.com/register/939423792
• April 2012 Master Class recording here: • https://www1.gotomeeting.com/register/276970321
• May 2012 Master Class recording here: • https://www1.gotomeeting.com/register/125653712
Back issues of Master Class (recordings)
© 2012 Citrix
• June 2012 Master Class recording here: • https://www1.gotomeeting.com/register/665543696
• July 2012 Master Class recording here: • https://www1.gotomee0ng.com/register/625884512
• August 2012 Master Class recording here: • https://www1.gotomeeting.com/register/325602920
Back issues of Master Class (recordings)
© 2012 Citrix
• September slides here: • https://citrix.sharefile.com/d-s5fdba69fbf44df49
• October slides here: • https://citrix.sharefile.com/d-s489bf4162504deb8
• November slides here: • https://citrix.sharefile.com/d-s20dc77787bd46a68
• December slides here: • https://citrix.sharefile.com/d-s8ad080afc1f49d99
Back issues of Master Class (slides)
© 2012 Citrix
• February slides here: • https://citrix.sharefile.com/d-s39b8bc07da7493d9
• March slides here: • https://citrix.sharefile.com/d-s7d8999b053d404d9
• April slides here: • https://citrix.sharefile.com/d-s6210f76d272418d8
• May slides here: • https://citrix.sharefile.com/d-s3b6fca7101e4bda8
Back issues of Master Class (slides)
© 2012 Citrix
• June slides here: • https://citrix.sharefile.com/d-s5bed85db98f40238
• July slides here: • https://citrix.sharefile.com/d-sa17f2229f9b40ae9
Back issues of Master Class (slides)
Work better. Live better.
105