eG Monitoring
 

Measures reported by CtxNsSslTest

A Citrix® NetScaler® appliance configured for SSL acceleration transparently accelerates SSL transactions by offloading SSL processing from the server. To configure SSL offloading, you configure a virtual server to intercept and process SSL transactions, and send the decrypted traffic to the server (unless you configure end-to-end encryption, in which case the traffic is re-encrypted). Upon receiving the response from the server, the appliance completes the secure transaction with the client. From the client's perspective, the transaction seems to be directly with the server. A NetScaler configured for SSL acceleration also performs other configured functions, such as load balancing.

The CtxNsSslTest test reveals how efficiently the NetScaler performs SSL acceleration. The metrics reported by this test provide administrators with indepth insights into the SSL session load on the appliance and the nature of SSL transactions (eg., SSLv1, SSLv2, TLSv1, etc.) that were performed during these sessions, and promptly alerts them to to issues affecting SSL acceleration such as a high number of session reuse missies and failures in multiplexing. The measures made by this test are as follows:

Measurement Description Measurement Unit Interpretation
Ssl_cards_presents Indicates the number of SSL crypto cards currently present in this NetScaler device. Number A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites. When a secure transaction is initiated, the Web site's server sends its certificate, which has been provided by a certifying authority, to the client machine to verify the Web site's authenticity. After this exchange, a secret key is used to encrypt all data transferred between sender and receiver so that all personal and credit card information is protected. This process can severely overload a server resulting in fewer transactions processed per second, which means fewer sales. The server accelerator card takes over this process, thus reducing the load on the server. Server accelerator cards support a number of security protocols including Secure Sockets Layer (SSL) and Secure Electronic Transaction (SET).
Ssl_cards_up Indicates the number of SSL cards that are currently UP in this NetScaler device. Number A low value for this measure indicates that many SSL cards are currently Down.
Ssl_engine_status Indicates the status of the SSL engine.   The values reported by this measure and their numeric equivalents are as shown in the table:

Numeric value Measure Value
0 Down
1 Up

Note:

By default, this measure reports the above-mentioned Measure Values while indicating the status of the SSL engine. However, the graph of this measure will be represented using the corresponding numeric equivalents i.e., 0 or 1.

Ssl_sessions Indicates the number of current SSL sessions on this NetScaler device. Number This measure is a good indicator of the current SSL session load on the appliance.
Ssl_trans Indicates the number of SSL transactions performed on this NetScaler device during the last measurement period. Number For an SSL transaction to be initiated, and for successful completion of the SSL handshake, the server and the client should agree on an SSL protocol that both of them support. If the SSL protocol version supported by the client is not acceptable to the server, the server does not go ahead with the transaction, and an error message is displayed.
Sslv2_trans Indicates the number of SSLv2 transactions performed on this NetScaler device during the last measurement period. Number  
Sslv3_trans Indicates the number of SSLv3 transactions performed on this NetScaler device during the last measurement period. Number  
Tlsv1_trans Indicates the number of TLSv1 transactions on this NetScaler device during the last measurement period. Secs  
Fe_ssl_sessions Indicates the number of Front-end SSL sessions on this NetScaler device during the last measurement period. Number In certain deployments, you might be concerned about network vulnerabilities between the NetScaler appliance and the backend servers, or you might need complete end-to-end security and interaction with certain devices that can communicate only in clear text (for example, caching devices). In such cases, you can set up an HTTP virtual server that receives data from clients that connect to it at the front end and hands the data off to a secure service, which securely transfers the data to the web server. To implement this type of configuration, you configure an HTTP virtual server on the NetScaler and bind SSL based services to the virtual server. The NetScaler receives HTTP requests from the client on the configured HTTP virtual server, encrypts the data, and sends the encrypted data to the web servers in a secure SSL session.

This measure reports of the count of those SSL sessions that are front-ended by such virtual servers.

Fe_sslv2_sessions Indicates the number of Front-end SSLv2 sessions on this NetScaler device during the last measurement period. Number  
Fe_sslv3_sessions Indicates the number of Front-end SSLv3 sessions on this NetScaler device during the last measurement period. Number  
Fe_tlsv1_sessions Indicates the number of TLSv1 sessions on this NetScaler device during the last measurement period. Number  
Fe_new_sessions Indicates the number of new Front-end SSL sessions on this NetScaler device during the last measurement period. Number  
Fe_reuse_misses Indicates the number of SSL session reuse misses on the NetScaler appliance since the last measurement period. Number For SSL transactions, establishing the initial SSL handshake requires CPU-intensive public key encryption operations. Most handshake operations are associated with the exchange of the SSL session key (client key exchange message). When a client session is idle for some time and is then resumed, the SSL handshake is typically conducted all over again. With session reuse enabled, session key exchange is avoided for session resumption requests received from the client. Session reuse is enabled on the NetScaler appliance by default. Enabling this feature reduces server load, improves response time, and increases the number of SSL transactions per second (TPS) that can be supported by the server.

A server therefore, is said to be performing at peak capacity if the value of the Fe_reuse_misses measure is low and the value of the Fe_resue_hits measure is high.

Fe_resue_hits Indicates the number of SSL session reuse hits on the NetScaler appliance since the last measurement period. Number
Fe_sslv1_client Indicates the number of client authentications performed through the Front-end SSLv2 transactions on this NetScaler device during the last measurement period. Number  
Fe_sslv3_client Indicates the number of client authentications performed through the Front-end SSLv3 transactions on this NetScaler device during the last measurement period. Number  
Fe_tlsv1_client Indicates the number of client authentications performed through the Front-end TLSv1 transactions on this NetScaler device during the last measurement period. Number  
Be_ssl_sessions Indicates the number of Back-end SSL sessions through which transactions were performed on the virtual server by this NetScaler device during the last measurement period. Number In certain deployments, you might be concerned about network vulnerabilities between the NetScaler appliance and the backend servers, or you might need complete end-to-end security and interaction with certain devices that can communicate only in clear text (for example, caching devices). In such cases, you can set up an HTTP virtual server that receives data from clients that connect to it at the front end and hands the data off to a secure service, which securely transfers the data to the web server. To implement this type of configuration, you configure an HTTP virtual server on the NetScaler and bind SSL based services to the virtual server. The NetScaler receives HTTP requests from the client on the configured HTTP virtual server, encrypts the data, and sends the encrypted data to the web servers in a secure SSL session.

This measure reports the count of those SSL sessions between the front-end HTTP virtual server and the backend web servers.

Be_sslv3_sessions Indicates the number of Back-end SSLv3 sessions through which transactions were performed on the virtual server by this NetScaler device during the last measurement period. Number  
Be_tlsv1_sessions Indicates the number of Back-end TLSv1 sessions through which transactions were performed on the virtual server by this NetScaler device during the last measurement period. Number  
Be_attempts Indicates the number of Back-end SSL session multiplexing attempts made by this NetScaler device to access the virtual servers during the last measurement period. Number You can configure the back-end SSL transactions so that the NetScaler appliance uses SSL session multiplexing to reuse existing SSL sessions with the back-end web servers, thus avoiding CPU-intensive key exchange (full handshake) operations. This reduces the overall number of SSL sessions on the server, and therefore accelerates the SSL transaction while maintaining end-to-end security.

This is why, a large number of Be_attempts_success is desired. On the other hand, too many Be_attempts_failures could imply that SSL sessions could not be reused. This in turn can result in increased full handshakes, probable session overloads on the backend web servers, and consequently, slower SSL transaction processing.

Be_attempts_success Indicates the number of Back-end SSL session multiplexing attempts that were successfully made by this NetScaler device during the last measurement period. Number
Be_attempts_failures Indicates the number of failed Back-end SSL session multiplexing attempts made by this NetScaler device during the last measurement period. Number
Be_sslv3_client Indicates the number of client authentications performed by the virtual server through SSLv3 sessions during the last measurement period. Number  
Be_tlsv1_client Indicates the number of client authentications performed by the virtual server through TLSv1 sessions during the last measurement period. Number  
Data_decrypted Indicates the amount of data decypted on this NetScaler device during the last measurement period. MB  
Data_encrypted Indicates the amount of data encrypted on this NetScaler device during the last measurement period. Number