Jump to content
Welcome to our new Citrix community!
  • DDoS & Bot Mitigation Service for your Applications with Citrix Managed Services


    Guest
    • Validation Status: Work In Progress
      Summary: CWAAP and CADS integrated solution for DDoS, WAF and BOT protection for your applications deployed in hybrid cloud environments
      Has Video?: No

    Citrix Application Delivery and Security (CADS) Service  
     

    Citrix ADS Service, a new SaaS from Citrix, radically simplifies application delivery and security and accelerates IT modernization by bringing is Intent based configuration, automated self-healing and internet awareness to hybrid multi-cloud deployments (more info).  

    Citrix ADS service will improve and simplify your secure app delivery and ensure compliance by deploying infrastructure in your public cloud data center. We can enhance this service offering further by leveraging the Citrix Web Application and API Protection Service’s (CWAAP) DDoS Mitigation Service to make the solution secure and protected from denial-of-service. 
     

    image.png.b0669efa2c62a91d1a205cb574cbbe7d.png 
     

    CWAAP Provisioning:  
     

    The Citrix Web App and API Protection (CWAAP) service is comprised of two components, CWAAP DDoS Protection DNS Redirect Always-On and CWAAP WAF/Bot. The DNS redirect service is used to direct your traffic to the CWAAP infrastructure and protect against volumetric DDoS attacks while the CWAAP service will manage the logging, blocking and violation reporting of your application traffic.  

    In order to provision the DDoS services, you must have pre-deployed your application infrastructure in your public cloud data center. This could comprise of applications delivered through Citrix Managed or Self-Managed or both services. To deliver your application on your public cloud with CADS service, follow the guide here. Figure1 depicts the solution’s architecture. User traffic is filtered by CWAAP. Your application is protected from harmful attacks and only legitimate user traffic reaches your NetScaler’s and optimal application server is chosen for content delivery.  

    image.png.3945651118eb1e91dd0af40fd5bcc47e.png 

    Figure1: Architecture for CWAAP and CADS integration for end to end application security 


    Steps to Integrate CADS service Application with CWAAP 
     

    1. Your application FQDN, mysecureapp.adservicedemo.com in the following example is mapped to the public autogenerated FQDN of CADS service endpoint.  Here we see the CNAME mapping in AWS route 53 service, this could be an entry in any other DNS provider.   

    image.png.a727390359a1efb725483c94bbeecd1d.png 

    image.png.bed14376c3c1a6549c86c37d98ec57ee.png 

    1. Now you need to configure your CWAAP to serve your application traffic and protect it from DDoS and Bots.  

    CWAAP is configured and managed through a flexible SaaS portal. The CWAAP service portal, accessible through a browser, enables security admins to configure attack protections, monitor attack activity through a dashboard, or report on events.  

    Under Configuration -> Assets -> Create Asset  

    Specify the Service config, Frontend SSL, Port 443. Backends is the Auto-generated address as shown in Step 1. You need to upload your SSL certificate for the domain mysecureapp.adsservicedemo.com and enable Force Backend SNI with SNI common name mapping to you application FQDN. 

    image.thumb.png.acedae38f21d42c2f36fe42db520d334.png 

    1. In your DNS provider (Route 53 here) change the CNAME entry for the application FQDN to map to the CWAAP Asset IP address (156.154.117.59) 

    image.png.86cf2f75e3c8186da631b232747776fb.png 

    1.  CWAAP Bot policies and custom rules are configurable through the SaaS portal. 

    1.  Bot Profile – Protections and Signatures 

    Bot Signatures: All default signatures are enabled. 

    image.png.b5098d839578996cf53340388d1b868c.png 

    IP Reputation: IP Reputation was configured in Log only mode for all malicious IPs. 

    image.png.005c83998ae5c2aa3043290af4600e53.png 

    1. All information about Bot violations has been presented in the interactive Bot Dashboard – where you can see, what is targeted – from Host, IP, URL standpoint, and you can do mouseover for longer URLs, and GEO distribution of the attacks – origin in this case. 

    image.png.bfcf9fce8332cbbe15e0e327ec1a88cc.png 


    User Feedback

    Recommended Comments

    There are no comments to display.



    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now

×
×
  • Create New...