18 Citrix NetScaler Policy Configuration and Reference Guide
Bind Points and Order of Evaluation
For an advanced policy to take effect, you must ensure that the policy is invoked
at some point during processing. To do so, you associate the policy with a bind
point. The collection of policies that is bound to a bind point is known as a policy
bank.
Following are the bind points that the NetScaler evaluates, listed in the typical
order of evaluation:
1. Request-time override. When a request flows through a feature, the
NetScaler first evaluates request-time override policies for the feature.
2. Request-time Load Balancing virtual server. If policy evaluation cannot
be completed after all the request-time override policies have been
evaluated, the NetScaler processes request-time policies for load balancing
virtual servers.
3. Request-time Content Switching virtual server. If policy evaluation
cannot be completed after all the request-time policies for load balancing
virtual servers have been evaluated, the NetScaler processes request-time
policies for content switching virtual servers.
4. Request-time default. If policy evaluation cannot be completed after all
request-time, virtual server-specific policies have been evaluated, the
NetScaler processes request-time default policies.
5. Response-time override. At response time, the NetScaler starts with
policies that are bound to the response-time override bind point.
6. Response-time Load Balancing virtual server. If policy evaluation
cannot be completed after all response-time override policies have been
evaluated, the NetScaler process the response-time policies for load
balancing virtual servers.
7. Response-time Content Switching virtual server. If policy evaluation
cannot be completed after all policies have been evaluated for load
Access Gateway
(clientless VPN
functions only)
VPN server Clientless Access
policies VPN Global
•VPN server To determine how the
Access Gateway performs
authentication,
authorization, auditing, and
other functions, and to
define rewrite rules for
general Web access using
the Access Gateway.
Feature-Specific Bindings for Advanced Policies
Feature Name Virtual Servers
Configured in the
Feature
Policies
Configured in the
Feature
Bind Points
Configured for the
Policies
Use of Advanced Policies in
the Feature