This article describes how to configure NetScaler Application Firewall Signatures protection, based on vulnerability scan result of QualysGuard.
To configure NetScaler Application Firewall Signatures protection, complete the following procedure:
Run a discovery scan with Qualys Web Application Scanner.
Complete the following procedure to run a vulnerability scan with Qualys Web Application Scanner and retrieve the scan results in XML format:
Select Web Application Scanning.
Select the Scans tab.
From the list select the vulnerability scan for the application and select View.
Select Scan Details and copy the scan ID.
Using the scan ID, setup a CURL http call to retrieve the XML file from the Web Application Scanning:
curl -u "USER:PASS" -X "GET" https://qualysapi.qualys.com/qps/rest/2.0/download/was/wasscan/[scan ID]Expand the Application Firewall node in the NetScaler configuration utility.
Select the Signatures node.
Click Add to create new signature rules set.
Activate the External Format tab, in the Add Signatures Object window.
Enable the Allow Duplicates check box.
Select Qualys for the Built-in XSLT field.
Click Browse and select the saved xml file with Qualys Guard vulnerability scan result.
Click Add.
- If you did not save the .xml file on the local file, then select Import From URL option, and type the URL to the file.
- If a URL is reported for two or more types of vulnerabilities, and if Allow Duplicates option is not enabled, then the Signature rule is created only for first type of vulnerability and second vulnerability is skipped.In the next window provide signatures object name and set Enable, Block, Log, or Stats to the objects, as shown in the following screen shot:
Click OK to confirm.
Expand the Application Firewall node > Profiles node > Firewall node.
Open an Application Firewall profile.
Note: Use an existing profile or create a profile.
Activate the Settings tab.
Select the created signatures, as shown in the following screen shot:
Add an Application Firewall policy and bind it to the profile.
Note: In this example, expression is set as true to send all the network traffic to the Application Firewall.
Bind the profile at a global level or to specific virtual server.
Expand the Application Firewall node > Policies node > Application Firewall Policies node.
Select Policy Manager.
Add the policy under Default Global.
Citrix TV contains the following video for this article:
http://www.citrix.com/tv/#videos/5875
Duration: 0:48 minutes
Note: This video requires the Adobe Flash player plug-in for the Web browser.
CTX112930 - Citrix Application Firewall Guide