CitrixNetScaler SafeNetHSM IntegrationGuide
CitrixNetScaler SafeNetHSM IntegrationGuide
Appliance
Integration Guide
All information herein is either public information or is the property of and owned solely by Gemalto and/or its
subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual
property protection in connection with such information.
Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under
any intellectual and/or industrial property rights of or concerning any of Gemalto’s information.
This document can be used for informational, non-commercial, internal and personal use only provided that:
• The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in
all copies.
• This document shall not be posted on any publicly accessible network computer or broadcast in any media
and no modification of any part of this document shall be made.
Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities.
The information contained in this document is provided “AS IS” without any warranty of any kind. Unless
otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information
contained herein.
The document could include technical inaccuracies or typographical errors. Changes are periodically added to
the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the
specifications data, information, and the like described herein, at any time.
Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein,
including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In
no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential
damages or any damages whatsoever including but not limited to damages resulting from loss of use, data,
profits, revenues, or customers, arising out of or in connection with the use or performance of information
contained in this document.
Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not
incur, and disclaims, any liability in this respect. Even if each product is compliant with current security
standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to
the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall
Gemalto be held liable for any third party actions and in particular in case of any successful attack against
systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security
for direct, indirect, incidental or consequential damages that result from any use of its products. It is further
stressed that independent testing and verification by the person using the product is particularly encouraged,
especially in any application in which defective, incorrect or insecure functioning could result in damage to
persons or property, denial of service or loss of privacy.
© 2016 Gemalto. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of
Gemalto and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks,
whether registered or not in specific countries, are the property of their respective owners.
Contents
Preface .................................................................................................................................. 4
Scope .............................................................................................................................................................. 4
Gemalto Rebranding ....................................................................................................................................... 4
Document Conventions .................................................................................................................................. 4
Command Syntax and Typeface Conventions ......................................................................................... 5
Support Contacts ...................................................................................................................................... 6
1 Introduction ...................................................................................................................... 7
Overview ......................................................................................................................................................... 7
3rd party Application Details ............................................................................................................................ 8
Supported Platforms ....................................................................................................................................... 8
Citrix NetScaler Virtual Appliance Setup .................................................................................................. 8
Prerequisites ................................................................................................................................................... 9
2 Integrating Citrix NetScaler Virtual Appliance with SafeNet Network HSM .................... 11
Configure SafeNet Network HSM with Citrix NetScaler ............................................................................... 11
Generate Key on SafeNet Network HSM ............................................................................................... 11
Add Key and Certificate on Citrix NetScaler .......................................................................................... 12
Load Balancing Virtual Server and Service on NetScaler...................................................................... 12
Preface
This document covers the necessary information to install, configure, and integrate Citrix NetScaler Virtual
Appliance with SafeNet Luna Hardware Security Module.
Scope
This document provides the necessary steps to install, configure, and integrate Citrix NetScaler Virtual
Appliance with SafeNet Luna Hardware Security Module. A SafeNet network HSM is designed to protect critical
cryptographic keys and to accelerate sensitive cryptographic operations across a wide range of security
applications.
Gemalto Rebranding
In early 2015, Gemalto completed its acquisition of SafeNet, Inc. As part of the process of rationalizing the
product portfolios between the two organizations, the Luna name has been removed from the SafeNet HSM
product line, with the SafeNet name being retained. As a result, the product names for SafeNet HSMs have
changed as follows:
NOTE: These branding changes apply to the documentation only. The SafeNet
HSM software and utilities continue to use the old names.
Document Conventions
This section provides information on the conventions used in this template.
Notes
Notes are used to alert you to important or helpful information. These elements use the following format:
Cautions
Cautions are used to alert you to important information that may help prevent unexpected results or data loss.
These elements use the following format:
CAUTION: Exercise caution. Caution alerts contain important information that may
help prevent unexpected results or data loss.
Warnings
Warnings are used to alert you to the potential for catastrophic data loss or personal injury. These elements use
the following format:
WARNING: Be extremely careful and obey all safety and security measures. In
this situation you might do something that could result in catastrophic data loss or
personal injury.
italic The italic attribute is used for emphasis or to indicate a related document. (See the
Installation Guide for more information.)
Support Contacts
If you encounter a problem while installing, registering or operating this product, please make sure that you have
read the documentation. If you cannot resolve the issue, contact your supplier or Gemalto Customer Support.
Gemalto Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is
governed by the support plan arrangements made between Gemalto and your organization. Please consult this
support plan for further information about your entitlements, including the hours when telephone support is
available to you.
Address Gemalto
4690 Millennium Drive
Belcamp, Maryland 21017, USA
Phone US 1-800-545-6608
International 1-410-931-7520
1
Introduction
Overview
A non-FIPS NetScaler appliance stores the server’s private key on the hard disk. On a FIPS appliance, the key
is stored in a cryptographic module known as a hardware security module (HSM). Storing a key in the HSM
protects it from physical and software attacks. In addition, the keys are encrypted with special FIPS approved
ciphers.
Only the NetScaler MPX 9700/10500/12500/15500 FIPS appliances support a FIPS card. Support for FIPS is
not available on other MPX appliances, or on the SDX and VPX appliances. This limitation is addressed by
supporting a SafeNet network HSM on all NetScaler MPX, SDX, and VPX appliances except the MPX
9700/10500/12500/15500 FIPS appliances.
A SafeNet Network HSM is designed to protect critical cryptographic keys and to accelerate sensitive
cryptographic operations across a wide range of security applications.
This Integration guide outlines the integration steps for Citrix VPX appliances, but the same integration steps are
supported on the MPX and SDX appliances noted previously.
NOTE: You require a VPX Citrix License for Load Balancing feature.
Supported Platforms
NOTE: SafeNet Luna Client 6.0.0 provided with Citrix build does not work in
HA mode with Citrix Virtual Appliance.
NOTE: This integration has been also tested using two Citrix NetScaler
Virtual appliances in HA mode with SafeNet Luna HSM.
• Access the Citrix NetScaler WebGUI through the IP address that was configured during deployment. For
example: <http://IP-Address>
Prerequisites
Refer to the SafeNet Network HSM documentation for installation steps and details regarding configuring and
setting up the box. Before you get started, ensure the following:
• SafeNet Network HSM appliance and a secure admin password.
• SafeNet Network HSM, and a hostname, suitable for your network.
• SafeNet Network HSM parameters are set to work with your network.
• Initialize the SafeNet Network HSM appliance.
• Copy the corresponding NetScaler build (build-11.1-47.14_nc.tgz) on the NetScaler Virtual Appliance.
• Untar the build and execute the installns script (./installns)
This build installs the SafeNet client setup and directory structure. (/var/safenet/safenet/lunaclient/bin/)
• When you load the NetScaler build by using the installns script, the safenet_dirs.tar file is copied into the
/var/ directory. If no“/var/safenet/” directory is present, the installns script creates a “safenet” directory in the
/var/ directory.
• Configure the NTLS between SafeNet Luna HSM client and HSM.After the “/var/safenet/” directory is
created, perform the following tasks:
a. Change directory to /var/safenet/config/ and run the “safenet_config” script. At the shell prompt, type:
cd /var/safenet/config
sh safenet_config
This script copies the “Chrystoki.conf” file into the /etc/ directory. It also generates a symbolic link
“libCryptoki2_64.so” in the “/usr/lib/” directory.
• Create and transfer a certificate and key between the SafeNet Luna HSM Client and the SafeNet HSM. In
order to communicate securely, the Client and the HSM must exchange certificates. Create a certificate and
key on the SafeNet HSM Client and then transfer it to the HSM. Copy the HSM certificate to the Client.
a. Change directory to /var/safenet/safenet/lunaclient/bin.
./vtl createCert –n <ip address of NetScaler>
The above steps update the “/etc/Chrystoki.conf” configuration file. This file is deleted when the ADC is
started. Copy the configuration to the default configuration file, which is used when an ADC is restarted.
• Configure automatic start of the gateway daemon at boot time.
touch /var/safenet/safenet_is_enrolled
2
Integrating Citrix NetScaler Virtual
Appliance with SafeNet Network HSM
3. Click Create to add the server. The added server displays in the list.
Add Service
Open the NetScaler GUI using the IP Address For example < http://10.164.74.121>
1. Traverse to Traffic Management->Load Balancing->Services
We have deployed IBM WebSphere and used the snoop application to test the integration.
In the server field add the IP of the machine where your application is already running. Select the Protocol
and port as shown in Screen shot.
4. The Services page displays. The State of the Service should be UP.
Virtual Server
Open the NetScaler GUI using the IP Address < http://10.164.74.121>
1. Traverse to Traffic Management->Load Balancing->Virtual Servers
2. Click Add.
3. Enter the details of the Virtual Server. Select the Protocol as SSL and then click OK.
4. The Virtual Server should be created in list with State as Down. Click No Load Balancing Virtual Service
Binding.
After Successful Binding of Certificate and service the state of Virtual Server Should be UP.
Now access the application over https using the IP of the virtual server on port 443.
For Example: https://10.164.74.140/snoop