Configure SSL offloading with other TCP protocols
In addition to the secure HTTP (HTTPS) protocol, Citrix ADC appliances support SSL acceleration for other TCP-based secure protocols. However, only simple requests and response-based TCP application protocols are supported. Applications such as FTPS, that insert the server’s IP address and port information in their payloads, are not currently supported.
Note: The STARTTLS feature for SMTP is currently not supported.
The appliance supports SSL acceleration for Other TCP protocols with and without end-to-end encryption.
To configure SSL offloading with Other TCP protocols, create a virtual server of type SSL_TCP, bind a certificate-key pair and TCP based services to the virtual server, and configure SSL actions and policies based on the type of traffic expected and the acceleration to be provided.
Follow the instructions in SSL offloading, but create an SSL_TCP virtual server instead of an SSL virtual server, and configure TCP services instead of HTTP services.
SSL_TCP based offloading with end-to-end encryption
To configure SSL_TCP-based offloading with end-to-end encryption, both the virtual server that intercepts secure traffic and the services that it forwards the traffic to must be of type SSL_TCP.
Configure SSL_TCP-based offloading as described in Configure SSL offloading with end-to-end encryption, but create an SSL_TCP virtual server instead of an SSL virtual server.
Backend encryption for TCP based data
Some deployments might require the Citrix ADC appliance to encrypt TCP data received as clear text and send the data securely to the back end servers.
To provide SSL acceleration with back-end encryption for clear text TCP traffic arriving from the client, create a TCP based virtual server and bind it to SSL_TCP based services.
To configure end-to-end encryption for TCP-based data, follow the procedure described in Configure SSL acceleration with HTTP on the front-end and SSL on the back-end, but create a TCP virtual server instead of an HTTP virtual server.