ADC

Scenario: standalone instance

这个场景展示了如何deploy a Citrix ADC VPX standalone EC2 instance in AWS by using the AWS GUI. Create a standalone VPX instance with three NICs. The instance, which is configured as a load balancing virtual server, communicates with back-end servers (the server farm). For this configuration, set up the required communication routes between the instance and the back-end servers, and between the instance and the external hosts on the public internet.

For more details about the procedure for deploying a VPX instance, seeDeploy a Citrix ADC VPX standalone instance on AWS.

AWS standalone scenario

Create three NICs. Each NIC can be configured with a pair of IP addresses (public and private). The NICs serve the following purposes.

NIC Purpose Associated with
eth0 Serves management traffic (NSIP) A public IP address and a private IP address
eth1 Serves client-side traffic (VIP) A public IP address and a private IP address
eth2 Communicates with back-end servers (SNIP) A public IP address (Private IP address not mandatory)

Step 1: Create a VPC.

  1. Log on to the AWS web console and navigate toNetworking & Content Delivery>VPC. ClickStart VPC Wizard.

  2. SelectVPC with a Single Public Subnetand clickSelect.

  3. Set the IP CIDR Block to 10.0.0.0/16, for this scenario.

  4. Give a name for the VPC.

  5. Set the public subnet to 10.0.0.0/24. (This is the management network).

  6. Select an availability zone.

  7. Give a name for the subnet.

  8. Click CreateVPC.

Create VPC for scenario

Step 2: Create extra subnets.

  1. Open the Amazon VPC console athttps://console.aws.amazon.com/vpc/.

  2. In the navigation pane, choose Subnets, Create Subnet after you enter the following details.

    • 子网名称标签:提供一个名称。
    • VPC: Choose the VPC for which you’re creating the subnet.
    • Availability Zone: Choose the availability zone in which you created the VPC in step 1.
    • IPv4 CIDR block: Specify an IPv4 CIDR block for your subnet. For this scenario, choose 10.0.1.0/24.

    Create subnet for scenario

  3. Repeat the steps to create one more subnet for back-end servers.

    Extra subnet for scenario

Step 3: Create a route table.

  1. Open the Amazon VPC console athttps://console.aws.amazon.com/vpc/.

  2. In the navigation pane, chooseRoute Tables>Create Route Table.

  3. In the Create Route Table window, add a name and select the VPC that you created in step 1.

  4. ClickYes, Create.

    Create route table for scenario

    The route table is assigned to all the subnets that you created for this VPC, so that routing of traffic from an instance in one subnet can reach an instance in another subnet.

  5. Click Subnet Associations, and then click Edit.

  6. Click the management and client subnet and click Save. This creates a route table for internet traffic only.

    Associate route table for scenario

  7. ClickRoutes > Edit > Add another route.

  8. In the Destination field add 0.0.0.0/0, and click the Target field to select igw- the Internet Gateway that the VPC Wizard created automatically.

  9. Click Save.

    Add gateway for scenario

  10. Follow the steps to create a route table for server-side traffic.

Step 4: Create a Citrix ADC VPX instance.

  1. Log on the AWS management console and clickEC2underCompute.

  2. Click AWS Marketplace. In the Search AWS Marketplace bar, type Citrix ADC VPX and press Enter. The available Citrix ADC VPX editions are displayed.

  3. ClickSelectto choose the desired Citrix ADC VPX edition. The EC2 instance wizard starts.

  4. In theChoose Instance Typepage, selectm4. Xlarge(recommended) and clickNext: Configure Instance Details.

  5. In the Configure Instance Details page, select the following, and then click Next: Add Storage.

    • Number of instances: 1
    • Network: the VPC that created in Step 1
    • Subnet: the management subnet
    • Auto-assign Public IP: Enable

    Configure instance for scenario

  6. In the Add Storage page, select the default option, and click Next: Add Tags.

  7. In the Add Tags page, add a name for the instance, and click Next: Configure Security Group.

  8. In the Configure Security Group page, select the default option (which is generated by AWS Marketplace and is based on recommended settings by Citrix Systems) and then clickReview and Launch > Launch.

  9. You are prompted to select an existing key pair or create and new key pair. From the Select a key pair drop-down list, select the key pair that you created as a prerequisite (See the Prerequisite section.)

  10. Check the box to acknowledge the key pair and click Launch Instances.

    Add keypair for scenario

Launch Instance Wizard displays the Launch Status, and the instance appears in the list of instances when it is fully launched.

The check instance, go the AWS console click EC2 > Running Instances. Select the instance and add a name. Make sure the Instance State is running and Status Checks is complete.

Step 5: Create and attach more network interfaces.

When you created the VPC, only one network interface associated with it. Now add two more network interfaces to the VPC, for the VIP and SNIP.

  1. Open the Amazon EC2 console athttps://console.aws.amazon.com/ec2/.

  2. In the navigation pane, choose Network Interfaces.

  3. Choose Create Network Interface.

  4. For Description, enter a descriptive name.

  5. For Subnet, select the subnet that you created previously for the VIP.

  6. For Private IP, leave the default option.

  7. For Security groups, select the group.

  8. ClickYes, Create.

    Create NIC

  9. After the network interface is created, add a name to the interface.

  10. Repeat the steps to create a network interface for server-side traffic.

Attach the network interfaces:

  1. In the navigation pane, choose Network Interfaces.

  2. Select the network interface and choose Attach.

  3. In the Attach Network Interface dialog box, select the instance and choose Attach.

    Attach NIC

Step 6: Attach an elastic IP to the NSIP.

  1. From the AWS management console, go toNETWORK & SECURITY > Elastic IPs.

  2. Check for available free EIP to attach. If none, clickAllocate new address.

  3. Select the newly allocated IP address and chooseActions > Associate address.

  4. Click theNetwork interface单选按钮。

  5. From the Network interface drop-down list, select the management NIC.

  6. From thePrivate IPdrop-down menu, select the AWS-generated IP address.

  7. Select theReassociationcheck box.

  8. ClickAssociate.

Attach EIP

Access the VPX instance:

After you’ve configured a standalone Citrix ADC VPX instance with three NICs, log on to the VPX instance to complete the Citrix ADC-side configuration. Use of the following options:

  • GUI: Type the public IP of the management NIC in the browser. Log on by usingnsrootas the user name and the instance ID (i-0c1ffe1d987817522) as the password.

Note

On your first logon, you are prompted to change the password for security reasons. After changing the password, you must save the configuration. If the configuration is not saved and the instance restarts, you must log on with the default password. Change the password again at the prompt and save the configuration.

  • SSH: Open an SSH client and type:

ssh -i \ ns root@\

To find the public DNS, click the instance, and clickConnect.

Related information:

Scenario: standalone instance