This article describes how to configure TLS session ticket extension by using the NetScaler GUI.
Note: This feature is introduced in release 11.1 build 51.21.
An SSL handshake is a CPU-intensive operation. If session reuse is enabled, the server/client key exchange operation is skipped for existing clients. They are allowed to resume their sessions. This improves the response time and increases the number of SSL transactions per second that a server can support. However, the server must store details of each session state, which consumes memory and is difficult to share among multiple servers if requests are load balanced across servers.
NetScaler appliances support the SessionTicket TLS extension. Use of this extension indicates that the session details are stored on the client instead of on the server. The client must indicate that it supports this mechanism by including the session ticket TLS extension in the client Hello message. For new clients, this extension is empty. The server sends a new session ticket in the NewSessionTicket handshake message. The session ticket is encrypted with a key known only to the server. If a server cannot issue a new ticket at this time, it completes a regular handshake.
sessionTicketLifeTime - Specify a time, in seconds, after which the session ticket expires and a new SSL handshake must be initiated.
Default value: 300
Minimum value: 0
Maximum value: 172800
To enable TLS session ticket extension by using the NetScaler GUI:
Navigate to System > Profiles. Select SSL Profiles.
Click Add.
Specify a Name for the profile.
Select Session ticket.
Optionally, specify Session Ticket Lifetime (secs).
Click OK.