| addsslaction |
Use this method to creates a new SSL action. An SSL action defines SSL settings that you can apply to the selected requests. You associate an action with one or more policies. Data in client connection requests or responses is compared to a rule (expression) specified in the policy, and the action is applied to connections that match the rule. |
Syntax |
Parameters |
name |
Name for the SSL action. Must begin with an ASCII alphanumeric or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters. Cannot be changed after the action is created.
The following requirement applies only to the Citrix ADC CLI:
If the name includes one or more spaces, enclose the name in double or single quotation marks (for example, "my action" or 'my action'). This is mandatory parameter. |
clientauth |
Perform client certificate authentication. |
clientcertverification |
Client certificate verification is mandatory or optional. Default value = CERT_MANDATORY. |
ssllogprofile |
The name of the ssllogprofile. |
clientcert |
Insert the entire client certificate into the HTTP header of the request being sent to the web server. The certificate is inserted in ASCII (PEM) format. |
certheader |
Name of the header into which to insert the client certificate. |
clientcertserialnumber |
Insert the entire client serial number into the HTTP header of the request being sent to the web server. |
certserialheader |
Name of the header into which to insert the client serial number. |
clientcertsubject |
Insert the client certificate subject, also known as the distinguished name (DN), into the HTTP header of the request being sent to the web server. |
certsubjectheader |
Name of the header into which to insert the client certificate subject. |
clientcerthash |
Insert the certificate's signature into the HTTP header of the request being sent to the web server. The signature is the value extracted directly from the X.509 certificate signature field. All X.509 certificates contain a signature field. |
certhashheader |
Name of the header into which to insert the client certificate signature (hash). |
clientcertfingerprint |
Insert the certificate's fingerprint into the HTTP header of the request being sent to the web server. The fingerprint is derived by computing the specified hash value (SHA256, for example) of the DER-encoding of the client certificate. |
certfingerprintheader |
Name of the header into which to insert the client certificate fingerprint. |
certfingerprintdigest |
Digest algorithm used to compute the fingerprint of the client certificate. |
clientcertissuer |
Insert the certificate issuer details into the HTTP header of the request being sent to the web server. |
certissuerheader |
Name of the header into which to insert the client certificate issuer details. |
sessionid |
Insert the SSL session ID into the HTTP header of the request being sent to the web server. Every SSL connection that the client and the Citrix ADC share has a unique ID that identifies the specific connection. |
sessionidheader |
Name of the header into which to insert the Session ID. |
cipher |
Insert the cipher suite that the client and the Citrix ADC negotiated for the SSL session into the HTTP header of the request being sent to the web server. The appliance inserts the cipher-suite name, SSL protocol, export or non-export string, and cipher strength bit, depending on the type of browser connecting to the SSL virtual server or service (for example, Cipher-Suite: RC4- MD5 SSLv3 Non-Export 128-bit). |
cipherheader |
Name of the header into which to insert the name of the cipher suite. |
clientcertnotbefore |
Insert the date from which the certificate is valid into the HTTP header of the request being sent to the web server. Every certificate is configured with the date and time from which it is valid. |
certnotbeforeheader |
Name of the header into which to insert the date and time from which the certificate is valid. |
clientcertnotafter |
Insert the date of expiry of the certificate into the HTTP header of the request being sent to the web server. Every certificate is configured with the date and time at which the certificate expires. |
certnotafterheader |
Name of the header into which to insert the certificate's expiry date. |
owasupport |
If the appliance is in front of an Outlook Web Access (OWA) server, insert a special header field, FRONT-END-HTTPS: ON, into the HTTP requests going to the OWA server. This header communicates to the server that the transaction is HTTPS and not HTTP. |
forward |
This action takes an argument a vserver name, to this vserver one will be able to forward all the packets. |
cacertgrpname |
This action will allow to pick CA(s) from the specific CA group, to verify the client certificate. |
ocspstapling |
This option is used to enable ocspStapling parameter for the SSL connection. |
ocspcertvalidation |
This option is used to check the revocation status of client/server certificate in SSL handshake using OCSP. |
ocspcache |
Enable cache of OCSP response. Caching of response received from the OCSP responder enables faster response to the client and reduces the load on the OCSP responder. Default value = DISABLED. |
Return Value |
Returns simpleResult |
See Also |