Customer has bound a HIGH Cipher Group to the SSL VIP. This Cipher Group which exists by default on the NetScaler does not have "TLS_RSA_WITH_3DES_EDE_CBC_SHA" present in that group, however the NetScaler is sending this Cipher Suite in the Server Hello as seen in Wireshark trace.
Note: According to RFC6176 from Internet Engineering Task Force (ITEF), TLS servers must not support SSLv2. The NetScaler appliance does not support SSLv2 from release 12.1.
This is an expected behavior.
The reason that we see the cipher "SSL3-DES-CBC3-SHA" on the NetScaler (HIGH cipher group) as "TLS_RSA_WITH_3DES_EDE_CBC_SHA" in Wireshark, is due to the fact this cipher supports both SSLv3 and TLS higher protocols. This naming convention was used to represent which minimum SSL protocol this cipher is supported with, in this case its SSLv3. Also, we do not go by the name of ciphers but rather their hexcode advertised as per TLS RFC which is 0x0a for this cipher.
So the particular cipher highlighted in Yellow below actually supports both SSLv3 and TLS higher protocols including what Wireshark is displaying as - TLS_RSA_WITH_3DES_EDE_CBC_SHA.