In this all-important chapter we looked at the authentication capabilities of the NetScaler. We covered the protocols that enterprises use most commonly and examined the packet flows involved, the deployment options, and troubleshooting techniques for each.
In the next chapter we will look at Networking and High Availability issues.
3.144.9.172