Scenario: Based on a discussion between a Citrix Architect and a team of Workspacelab members, the MPX Logical layout for Workspacelab has been created across three (3) sites.
They captured the following requirements during the design discussion held for a Citrix ADC design project:
All three (3) Workspacelab sites (DC NDR and DR) will have similar Citrix ADC configurations and design
Both external and internal Citrix ADC MPX appliances will have Global Server Load Balancing (GSLB) configured and deployed in Active/Passive mode
GSLB should resolve both A and AAA DNS queries.
In the GSLB deployment the NDR site will act as backup for the DC site, whereas the DR site will act as backup for the NDR site
When the external Citrix ADC replies to DNS traffic coming in through Cisco Firepower IPS the replies should be sent back through the same path
On the internal Citrix ADC. both front-end VIP and back-end SNIP will be part of the same subnet
USIP is configured on the DMZ Citrix ADC appliances
The external Citrix ADC will act as default gateway for back-end servers.
All three (3) sites (DC, NDR, and DR) will have two (2) links to the Internet from different service providers configured in Active/Standby mode
Which design decision must the architect make to meet the design requirements above?
Scenario: A Citrix Architect needs to deploy Single Sign-on form-based authentication through Citrix ADC for Outlook Web Access (OWA) 2013 for the users of the domain workspacelab com The Single Sign-on (SSO) must be performed based on sAMAccountName.
Which SSO action can the architect use to meet this requirement?
add tm formSSOAction OWA_Form_SSO_SSOPro -actionURL '/owa/auth.owa' -userField username -passwdField password -ssoSuccessRule 'http.RES.SET_COOKIE.COOKIE(\'cadata\').VALUE(\'cadata\').LENGTH.GT(70' -responsesize 15000 -submitMethod POST
Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria.
The issue was isolated to several endpoint analysis (EPA) scan settings.
Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings.
Which setting is preventing the security requirements of the organization from being met?