ACE Command Reference
ACE Command Reference
For the Cisco ACE Application Control Engine Module and Cisco ACE 4700 Series Application Control Engine Appliance Software Version A5(1.0) September 2011
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Command Reference, Cisco ACE Application Control Engine Copyright 2007-2011 Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
xxxi xxxi xxxii xxxii xxxv xxxvi
Audience
CHAPTER
CLI Commands
2-1
Exec Mode Commands 2-2 backup 2-3 capture 2-5 changeto 2-6 checkpoint 2-8 clear access-list 2-9 clear accounting log 2-10 clear acl-merge statistics 2-10 clear arp 2-11 clear buffer stats 2-12 clear capture 2-13 clear cde 2-14 clear cfgmgr internal history 2-14 clear conn 2-16 clear cores 2-17 clear crypto session-cache 2-19 clear dc 2-20 clear debug-logfile 2-20 clear fifo stats 2-21 clear ft 2-23 clear icmp statistics 2-24 clear interface 2-25 clear ip 2-26 clear ipv6 2-27 clear line 2-27 clear logging 2-29
iii
Contents
clear netio stats 2-29 clear np 2-31 clear ntp statistics 2-32 clear probe 2-32 clear processes log 2-34 clear rserver 2-34 clear rtcache 2-35 clear screen 2-37 clear serverfarm 2-37 clear service-policy 2-38 clear ssh 2-40 clear startup-config 2-41 clear stats 2-42 clear sticky database 2-44 clear syn-cookie 2-46 clear tcp statistics 2-46 clear telnet 2-47 clear udp statistics 2-48 clear user 2-48 clear vnet stats 2-49 clear xlate 2-51 clock set 2-53 compare 2-54 configure 2-55 copy capture 2-56 copy checkpoint 2-57 copy core: 2-59 copy disk0: 2-60 copy ftp: 2-62 copy image: 2-63 copy licenses 2-65 copy probe: 2-66 copy running-config 2-68 copy startup-config 2-69 copy sftp: 2-70 copy tftp: 2-72 crypto crlparams 2-73 crypto delete 2-74 crypto export 2-75 crypto generate csr 2-76
Command Reference, Cisco ACE Application Control Engine
iv
OL-25339-01
Contents
crypto generate key 2-77 crypto import 2-78 crypto verify 2-82 debug 2-83 delete 2-86 dir 2-87 dm 2-89 exit 2-90 format flash: 2-91 ft switchover 2-93 gunzip 2-94 invoke context 2-95 license 2-96 mkdir disk0: 2-97 move disk0: 2-98 np session 2-99 ping 2-101 reload 2-103 reprogram bootflash 2-104 restore 2-105 rmdir disk0: 2-107 setup 2-108 set dc 2-110 set sticky-ixp 2-111 show 2-112 show aaa 2-113 show access-list 2-114 show accounting log 2-115 show acl-merge 2-117 show action-list 2-118 show arp 2-119 show backup 2-121 show banner motd 2-122 show bootvar 2-123 show buffer 2-125 show capture 2-127 show cde 2-129 show cfgmgr 2-130 show checkpoint 2-132 show clock 2-134
Command Reference, Cisco ACE Application Control Engine OL-25339-01
Contents
show conn 2-135 show context 2-136 show copyright 2-137 show crypto 2-138 show dc 2-141 show debug 2-145 show domain 2-148 show download information 2-149 show eobc 2-150 show fifo 2-152 show file 2-153 show fragment 2-155 show ft 2-156 show hardware 2-158 show hyp 2-159 show icmp statistics 2-159 show interface 2-161 show inventory 2-163 show ip 2-164 show ipcp 2-167 show ipv6 2-168 show kalap udp load 2-170 show lcp event-history 2-172 show ldap-server 2-173 show license 2-174 show line 2-176 show logging 2-177 show login timeout 2-179 show nat-fabric 2-180 show netio 2-181 show nexus-device 2-182 show np 2-184 show ntp 2-188 show optimization-global 2-189 show parameter-map 2-190 show probe 2-191 show processes 2-192 show pvlans 2-193 show radius-server 2-194 show resource allocation 2-195
Command Reference, Cisco ACE Application Control Engine
vi
OL-25339-01
Contents
show resource internal 2-196 show resource usage 2-198 show restore 2-201 show role 2-203 show rserver 2-204 show running-config 2-206 show scp 2-208 show script 2-209 show security internal event-history 2-211 show serverfarm 2-212 show service-policy 2-214 show snmp 2-216 show ssh 2-218 show startup-config 2-220 show stats 2-221 show sticky cookie-insert group 2-223 show sticky database 2-224 show sticky hash 2-227 show conn sticky 2-228 show syn-cookie 2-229 show system 2-230 show tacacs-server 2-232 show tcp statistics 2-233 show tech-support 2-234 show telnet 2-235 show terminal 2-236 show udp statistics 2-237 show user-account 2-238 show users 2-239 show version 2-240 show vlans 2-242 show vm-controller 2-243 show vnet 2-244 show xlate 2-245 ssh 2-246 system internal 2-248 system watchdog 2-249 tac-pac 2-251 telnet 2-253 terminal 2-254
Command Reference, Cisco ACE Application Control Engine OL-25339-01
vii
Contents
traceroute 2-255 undebug all 2-256 untar disk0: 2-258 write 2-259 xml-show 2-260 Configuration Mode Commands 2-262 (config) aaa accounting default 2-263 (config) aaa authentication login 2-265 (config) aaa group server 2-266 (config) access-group 2-267 (config) access-list ethertype 2-270 (config) access-list extended 2-272 (config) access-list remark 2-281 (config) access-list resequence 2-282 (config) action-list type modify http 2-283 (config) action-list type optimization http 2-285 (config) arp 2-287 (config) banner 2-289 (config) boot system image: 2-290 (config) buffer threshold 2-292 (config) class-map 2-294 (config) clock timezone 2-297 (config) clock summer-time 2-300 (config) config-register 2-301 (config) context 2-303 (config) crypto authgroup 2-304 (config) crypto chaingroup 2-305 (config) crypto crl 2-306 (config) crypto crlparams 2-307 (config) crypto csr-params 2-309 (config) crypto ocspserver 2-310 (config) crypto rehandshake enabled 2-312 (config) domain 2-313 (config) end 2-314 (config) exit 2-314 (config) ft auto-sync 2-315 (config) ft connection-sync disable 2-317 (config) ft group 2-318 (config) ft interface vlan 2-320 (config) ft peer 2-321
Command Reference, Cisco ACE Application Control Engine
viii
OL-25339-01
Contents
(config) ft track host 2-322 (config) ft track hsrp 2-323 (config) ft track interface 2-324 (config) hostname 2-325 (config) hw-module 2-326 (config) interface 2-327 (config) ip dhcp relay 2-330 (config) ip domain-list 2-332 (config) ip domain-lookup 2-333 (config) ip domain-name 2-335 (config) ip name-server 2-337 (config) ip route 2-338 (config) ipv6 nd interval 2-340 (config) ipv6 nd learned-interval 2-341 (config) ipv6 nd retries 2-342 (config) ipv6 nd sync disable 2-343 (config) ipv6 nd sync-interval 2-344 (config) kalap udp 2-345 (config) ldap-server host 2-346 (config) ldap-server port 2-347 (config) ldap-server timeout 2-348 (config) line console 2-349 (config) line vty 2-350 (config) login timeout 2-352 (config) logging buffered 2-353 (config) logging console 2-355 (config) logging device-id 2-357 (config) logging enable 2-359 (config) logging facility 2-360 (config) logging fastpath 2-361 (config) logging history 2-362 (config) logging host 2-364 (config) logging message 2-366 (config) logging monitor 2-368 (config) logging persistent 2-369 (config) logging queue 2-370 (config) logging rate-limit 2-371 (config) logging standby 2-373 (config) logging supervisor 2-374 (config) logging timestamp 2-375
Command Reference, Cisco ACE Application Control Engine OL-25339-01
ix
Contents
(config) logging trap 2-376 (config) nexus-device 2-377 (config) ntp 2-379 (config) object-group 2-380 (config) optimize 2-382 (config) parameter-map type 2-382 (config) peer hostname 2-385 (config) peer shared-vlan-hostid 2-386 (config) policy-map 2-388 (config) probe 2-392 (config) radius-server attribute nas-ipaddr 2-395 (config) radius-server deadtime 2-396 (config) radius-server host 2-397 (config) radius-server key 2-400 (config) radius-server retransmit 2-401 (config) radius-server timeout 2-402 (config) regex compilation-timeout 2-403 (config) resource-class 2-404 (config) role 2-405 (config) rserver 2-406 (config) script file name 2-407 (config) serverfarm 2-408 (config) service-policy 2-409 (config) shared-vlan-hostid 2-411 (config) snmp-server community 2-412 (config) snmp-server contact 2-414 (config) snmp-server enable traps 2-415 (config) snmp-server engineid 2-418 (config) snmp-server host 2-420 (config) snmp-server location 2-421 (config) snmp-server trap link ietf 2-422 (config) snmp-server trap-source vlan 2-423 (config) snmp-server unmask-community 2-424 (config) snmp-server user 2-425 (config) ssh key 2-428 (config) ssh maxsessions 2-429 (config) ssl-proxy service 2-430 (config) static 2-431 (config) sticky http-content 2-433 (config) sticky http-cookie 2-434
Command Reference, Cisco ACE Application Control Engine
OL-25339-01
Contents
(config) sticky http-header 2-436 (config) sticky ip-netmask 2-438 (config) sticky layer4-payload 2-439 (config) sticky radius framed-ip 2-440 (config) sticky rtsp-header 2-441 (config) sticky sip-header 2-442 (config) switch-mode 2-443 (config) tacacs-server deadtime 2-445 (config) tacacs-server host 2-446 (config) tacacs-server key 2-448 (config) tacacs-server timeout 2-449 (config) telnet maxsessions 2-451 (config) timeout xlate 2-452 (config) udp 2-453 (config) username 2-454 (config) vm-controller 2-456 Action List Modify Configuration Mode Commands 2-457 (config-actlist-modify) description 2-458 (config-actlist-modify) header delete 2-459 (config-actlist-modify) header insert 2-461 (config-actlist-modify) header rewrite 2-462 (config-actlist-modify) ssl header-insert 2-464 (config-actlist-modify) ssl url rewrite location 2-473 Action List Optimization Configuration Mode Commands (config-actlist-optm) appscope 2-475 (config-actlist-optm) cache 2-476 (config-actlist-optm) delta 2-478 (config-actlist-optm) description 2-479 (config-actlist-optm) dynamic etag 2-480 (config-actlist-optm) flashforward 2-481 (config-actlist-optm) flashforward-object 2-481 Authentication Group Configuration Mode Commands (config-authgroup) cert 2-484 Chaingroup Configuration Mode Commands (config-chaingroup) cert 2-486
2-485 2-474
2-483
Class Map Configuration Mode Commands 2-488 (config-cmap) description 2-490 (config-cmap) match access-list 2-491 (config-cmap) match any 2-493
Command Reference, Cisco ACE Application Control Engine OL-25339-01
xi
Contents
(config-cmap) match anyv6 2-494 (config-cmap) match destination-address 2-495 (config-cmap) match port 2-497 (config-cmap) match port-v6 2-500 (config-cmap) match source-address 2-502 (config-cmap) match virtual-address 2-504 Class Map FTP Inspection Configuration Mode Commands (config-cmap-ftp-insp) description 2-508 (config-cmap-ftp-insp) match request-method 2-509 Class Map Generic Configuration Mode Commands 2-510 (config-cmap-generic) description 2-511 (config-cmap-generic) match class-map 2-513 (config-cmap-generic) match layer4-payload 2-514 (config-cmap-generic) match source-address 2-516 Class Map HTTP Inspection Configuration Mode Commands 2-517 (config-cmap-http-insp) description 2-519 (config-cmap-http-insp) match content 2-520 (config-cmap-http-insp) match content length 2-522 (config-cmap-http-insp) match cookie secondary 2-523 (config-cmap-http-insp) match header 2-524 (config-cmap-http-insp) match header length 2-528 (config-cmap-http-insp) match header mime-type 2-530 (config-cmap-http-insp) match port-misuse 2-533 (config-cmap-http-insp) match request-method 2-534 (config-cmap-http-insp) match transfer-encoding 2-535 (config-cmap-http-insp) match url 2-537 (config-cmap-http-insp) match url length 2-538 Class Map HTTP Load Balancing Configuration Mode Commands (config-cmap-http-lb) description 2-541 (config-cmap-http-lb) match class-map 2-542 (config-cmap-http-lb) match cipher 2-544 (config-cmap-http-lb) match http content 2-545 (config-cmap-http-lb) match http cookie 2-546 (config-cmap-http-lb) match http header 2-547 (config-cmap-http-lb) match http url 2-550 (config-cmap-http-lb) match source-address 2-552 Class Map Management Configuration Mode Commands (config-cmap-mgmt) description 2-554 (config-cmap-mgmt) match protocol 2-556
Command Reference, Cisco ACE Application Control Engine
2-507
2-539
2-553
xii
OL-25339-01
Contents
Class Map RADIUS Load Balancing Configuration Mode Commands (config-cmap-radius-lb) description 2-560 (config-cmap-radius-lb) match radius attribute 2-561 Class Map RTSP Load Balancing Configuration Mode Commands (config-cmap-rtsp-lb) description 2-564 (config-cmap-rtsp-lb) match class-map 2-565 (config-cmap-rtsp-lb) match rtsp header 2-566 (config-cmap-rtsp-lb) match rtsp url 2-567 (config-cmap-rtsp-lb) match source-address 2-570 Class Map SIP Inspection Configuration Mode Commands 2-571 (config-cmap-sip-insp) description 2-572 (config-cmap-sip-insp) match called-party 2-573 (config-cmap-sip-insp) match calling-party 2-575 (config-cmap-sip-insp) match content 2-577 (config-cmap-sip-insp) match im-subscriber 2-578 (config-cmap-sip-insp) match message-path 2-579 (config-cmap-sip-insp) match request-method 2-582 (config-cmap-sip-insp) match third-party registration 2-583 (config-cmap-sip-insp) match uri 2-585 Class Map SIP Load Balancing Configuration Mode Commands (config-cmap-sip-lb) description 2-588 (config-cmap-sip-lb) match class-map 2-589 (config-cmap-sip-lb) match sip header 2-590 (config-cmap-sip-lb) match source-address 2-593 Console Configuration Mode Commands (config-console) databits 2-596 (config-console) parity 2-597 (config-console) speed 2-598 (config-console) stopbits 2-599
2-595
2-558
2-562
2-586
Context Configuration Mode Commands 2-600 (config-context) allocate-interface 2-601 (config-context) description 2-603 (config-context) member 2-604 CSR Parameters Configuration Mode Commands 2-605 (config-csr-params) common-name 2-606 (config-csr-params) country 2-607 (config-csr-params) email 2-608 (config-csr-params) locality 2-609 (config-csr-params) organization-name 2-611
Command Reference, Cisco ACE Application Control Engine OL-25339-01
xiii
Contents
(config-csr-params) organization-unit 2-612 (config-csr-params) serial-number 2-613 (config-csr-params) state 2-614 DCI Configuration Mode Commands (config-dci) credentials 2-616 (config-dci) ip-address 2-617
2-615
2-618
FT Group Configuration Mode Commands 2-622 (config-ft-group) associate-context 2-623 (config-ft-group) inservice 2-624 (config-ft-group) peer 2-625 (config-ft-group) peer priority 2-626 (config-ft-group) preempt 2-627 (config-ft-group) priority 2-628 FT Interface Configuration Mode Commands (config-ft-intf) ip 2-630 (config-ft-intf) peer ip 2-632 (config-ft-intf) shutdown 2-633
2-629
FT Peer Configuration Mode Commands 2-634 (config-ft-peer) ft-interface vlan 2-635 (config-ft-peer) heartbeat 2-636 (config-ft-peer) query-interface 2-637 FT Track Host Configuration Mode Commands 2-638 (config-ft-track-host) peer priority 2-640 (config-ft-track-host) peer probe 2-641 (config-ft-track-host) peer track-host 2-643 (config-ft-track-host) priority 2-645 (config-ft-track-host) probe 2-646 (config-ft-track-host) track-host 2-647 FT Track HSRP Configuration Mode Commands 2-648 (config-ft-track-hsrp) peer priority 2-649 (config-ft-track-hsrp) peer track-hsrp 2-650 (config-ft-track-hsrp) priority 2-651 (config-ft-track-hsrp) track-hsrp 2-652 FT Track Interface Configuration Mode Commands 2-653 (config-ft-track-interface) peer priority 2-654 (config-ft-track-interface) peer track-interface vlan 2-655 (config-ft-track-interface) priority 2-656
Command Reference, Cisco ACE Application Control Engine
xiv
OL-25339-01
Contents
(config-ft-track-interface) track-interface vlan Interface Configuration Mode Commands 2-658 (config-if) access-group 2-660 (config-if) alias 2-661 (config-if) arp 2-663 (config-if) arp inspection 2-664 (config-if) bridge-group 2-666 (config-if) carrier-delay 2-667 (config-if) channel-group 2-668 (config-if) description 2-669 (config-if) duplex 2-670 (config-if) fragment chain 2-671 (config-if) fragment min-mtu 2-672 (config-if) fragment timeout 2-673 (config-if) ft-port vlan 2-674 (config-if) icmp-guard 2-675 (config-if) ip address 2-677 (config-if) ip df 2-680 (config-if) ip dhcp relay enable 2-681 (config-if) ip dhcp relay server 2-682 (config-if) ip options 2-683 (config-if) ip route inject vlan 2-684 (config-if) ip ttl minimum 2-685 (config-if) ip verify reverse-path 2-686 (config-if) ipv6 dhcp relay enable 2-687 (config-if) ipv6 dhcp relay fwd-interface 2-688 (config-if) ipv6 dhcp relay server 2-689 (config-if) ipv6 enable 2-691 (config-if) ipv6 extension-header 2-692 (config-if) ipv6 fragment chain 2-693 (config-if) ipv6 fragment min-mtu 2-694 (config-if) ipv6 fragment timeout 2-695 (config-if) ipv6 icmp-guard 2-696 (config-if) ipv6 mtu 2-698 (config-if) ipv6 nd dad-attempts 2-699 (config-if) ipv6 nd managed-config-flag 2-700 (config-if) ipv6 nd ns-interval 2-701 (config-if) ipv6 nd other-config-flag 2-702 (config-if) ipv6 nd prefix 2-703 (config-if) ipv6 nd ra hop-limit 2-705
2-657
xv
Contents
(config-if) ipv6 nd ra interval 2-706 (config-if) ipv6 nd ra lifetime 2-707 (config-if) ipv6 nd ra suppress 2-708 (config-if) ipv6 nd reachable-time 2-709 (config-if) ipv6 nd retransmission-time 2-710 (config-if) ipv6 neighbor 2-711 (config-if) ipv6 normalization 2-712 (config-if) ipv6 verify reverse-path 2-714 (config-if) mac-address autogenerate 2-715 (config-if) mac-sticky enable 2-716 (config-if) mtu 2-718 (config-if) nat-pool 2-719 (config-if) normalization 2-720 (config-if) normalization send-reset 2-722 (config-if) peer ip address 2-722 (config-if) port-channel load-balance 2-725 (config-if) qos trust cos 2-726 (config-if) remove-eth-pad 2-727 (config-if) service-policy input 2-728 (config-if) shutdown 2-729 (config-if) speed 2-731 (config-if) switchport access vlan 2-733 (config-if) switchport trunk allowed vlan 2-735 (config-if) switchport trunk native vlan 2-737 (config-if) syn-cookie 2-738 (config-if) udp 2-740 KAL-AP UDP Configuration Mode Commands (config-kalap-udp) ip address 2-743 LDAP Configuration Mode Commands 2-744 (config-ldap) attribute user-profile 2-745 (config-ldap) baseDN 2-747 (config-ldap) filter search-user 2-748 (config-ldap) server 2-749 Line Configuration Mode Commands 2-750 (config-line) session-limit 2-751 Object Group Configuration Mode Commands (config-objgrp-netw) description 2-753 (config-objgrp-netw) host 2-754 (config-objgrp-netw) ip_address 2-756
2-752 2-742
xvi
OL-25339-01
Contents
(config-objgrp-serv) description 2-758 (config-objgrp-serv) protocol 2-759 Optimize Configuration Mode Commands 2-767 (config-optimize) appscope-log 2-768 (config-optimize) concurrent-connections 2-769 (config-optimize) debug-level 2-770 Parameter Map Connection Configuration Mode Commands 2-772 (config-parammap-conn) description 2-774 (config-parammap-conn) exceed-mss 2-775 (config-parammap-conn) nagle 2-776 (config-parammap-conn) random-sequence-number 2-777 (config-parammap-conn) rate-limit 2-778 (config-parammap-conn) reserved-bits 2-779 (config-parammap-conn) set ip tos 2-780 (config-parammap-conn) set tcp ack-delay 2-781 (config-parammap-conn) set tcp buffer-share 2-782 (config-parammap-conn) set tcp mss 2-784 (config-parammap-conn) set tcp reassembly-timout 2-786 (config-parammap-conn) set tcp syn-retry 2-786 (config-parammap-conn) set tcp timeout 2-787 (config-parammap-conn) set tcp wan-optimization 2-788 (config-parammap-conn) set tcp window-scale 2-790 (config-parammap-conn) set timeout inactivity 2-791 (config-parammap-conn) slowstart 2-792 (config-parammap-conn) syn-data 2-793 (config-parammap-conn) tcp-options 2-794 (config-parammap-conn) urgent-flag 2-798 Parameter Map DNS Configuration Mode Commands (config-parammap-dns) description 2-800 (config-parammap-dns) timeout query 2-801
2-799
Parameter Map Generic Configuration Mode Commands 2-801 (config-parammap-generi) case-insensitive 2-803 (config-parammap-generi) description 2-804 (config-parammap-generi) set max-parse-length 2-805 Parameter Map HTTP Configuration Mode Commands 2-806 (config-parammap-http) case-insensitive 2-808 (config-parammap-http) cookie-error-ignore 2-809 (config-parammap-http) description 2-810 (config-parammap-http) compress 2-811
Command Reference, Cisco ACE Application Control Engine OL-25339-01
xvii
Contents
(config-parammap-http) header modify per-request 2-813 (config-parammap-http) length-exceed 2-815 (config-parammap-http) parsing non-strict 2-816 (config-parammap-http) persistence-rebalance 2-817 (config-parammap-http) server-conn reuse 2-819 (config-parammap-http) set content-maxparse-length 2-820 (config-parammap-http) set header-maxparse-length 2-822 (config-parammap-http) set secondary-cookie-delimiters 2-823 (config-parammap-http) set secondary-cookie-start 2-824 Parameter Map Optimization Configuration Mode Commands 2-825 (config-parammap-optmz) appscope optimize-rate-percent 2-826 (config-parammap-optmz) basefile anonymous-level 2-827 (config-parammap-optmz) cache key-modifier 2-828 (config-parammap-optmz) cache parameter 2-831 (config-parammap-optmz) cache ttl 2-833 (config-parammap-optmz) cache-policy request 2-834 (config-parammap-optmz) cache-policy response 2-835 (config-parammap-optmz) canonical-url 2-836 (config-parammap-optmz) clientscript-default 2-837 (config-parammap-optmz) description 2-838 (config-parammap-optmz) delta 2-839 (config-parammap-optmz) expires-setting 2-841 (config-parammap-optmz) extract meta 2-842 (config-parammap-optmz) flashforward refresh-policy 2-843 (config-parammap-optmz) ignore-server-content 2-844 (config-parammap-optmz) parameter-summary parameter-value-limit (config-parammap-optmz) post-content-buffer-limit 2-846 (config-parammap-optmz) rebase 2-847 (config-parammap-optmz) request-grouping-string 2-848 (config-parammap-optmz) server-header 2-849 (config-parammap-optmz) server-load 2-850 (config-parammap-optmz) utf8 threshold 2-852 Parameter Map RTSP Configuration Mode Commands 2-852 (config-parammap-rtsp) case-insensitive 2-854 (config-parammap-rtsp) description 2-855 (config-parammap-rtsp) set header-maxparse-length 2-856 Parameter Map SCCP Configuration Mode Commands 2-857 (config-parammap-skinny) description 2-859 (config-parammap-skinny) enforce-registration 2-860
2-845
xviii
OL-25339-01
Contents
(config-parammap-skinny) message-id max 2-861 (config-parammap-skinny) sccp-prefix-len 2-862 Parameter Map SIP Configuration Mode Commands 2-863 (config-parammap-sip) description 2-865 (config-parammap-sip) im 2-865 (config-parammap-sip) max-forward-validation 2-866 (config-parammap-sip) software-version 2-867 (config-parammap-sip) strict-header-validation 2-868 (config-parammap-sip) timeout 2-870 (config-parammap-sip) uri-non-sip 2-871 Parameter Map SSL Configuration Mode Commands 2-872 (config-parammap-ssl) authentication-failure 2-873 (config-parammap-ssl) cdp-errors ignore 2-876 (config-parammap-ssl) cipher 2-877 (config-parammap-ssl) close-protocol 2-879 (config-parammap-ssl) description 2-880 (config-parammap-ssl) expired-crl reject 2-881 (config-parammap-ssl) purpose-check disabled 2-882 (config-parammap-ssl) queue-delay timeout 2-883 (config-parammap-ssl) rehandshake enabled 2-884 (config-parammap-ssl) session-cache timeout 2-885 (config-parammap-ssl) version 2-887 Policy Map Configuration Mode Commands (config-pmap) class 2-890 (config-pmap) description 2-891
2-888
Policy Map Class Configuration Mode Commands 2-892 (config-pmap-c) appl-parameter dns advanced-options 2-893 (config-pmap-c) appl-parameter generic advanced-options 2-894 (config-pmap-c) appl-parameter http advanced-options 2-895 (config-pmap-c) appl-parameter rtsp advanced-options 2-896 (config-pmap-c) appl-parameter sip advanced-options 2-897 (config-pmap-c) appl-parameter skinny advanced-options 2-898 (config-pmap-c) connection advanced-options 2-899 (config-pmap-c) inspect 2-900 (config-pmap-c) kal-ap primary-oos 2-904 (config-pmap-c) kal-ap-tag 2-906 (config-pmap-c) loadbalance policy 2-907 (config-pmap-c) loadbalance vip advertise 2-908 (config-pmap-c) loadbalance vip icmp-reply 2-909
xix
Contents
(config-pmap-c) loadbalance vip inservice 2-910 (config-pmap-c) loadbalance vip udp-fast-age 2-911 (config-pmap-c) nat dynamic 2-912 (config-pmap-c) nat static 2-913 (config-pmap-c) ssl-proxy 2-916 Policy Map FTP Inspection Configuration Mode Commands (config-pmap-ftp-ins) class 2-919 (config-pmap-ftp-ins) description 2-920 (config-pmap-ftp-ins) match request-method 2-921
2-917
Policy Map FTP Inspection Class Configuration Mode Commands (config-pmap-ftp-ins-c) deny 2-923 (config-pmap-ftp-ins-c) mask-reply 2-924 Policy Map FTP Inspection Match Configuration Mode Commands (config-pmap-ftp-ins-m) deny 2-926 (config-pmap-ftp-ins-m) mask-reply 2-927
2-922
2-924
Policy Map Inspection HTTP Configuration Mode Commands 2-927 (config-pmap-ins-http) class 2-929 (config-pmap-ins-http) description 2-931 (config-pmap-ins-http) match content 2-932 (config-pmap-ins-http) match content length 2-934 (config-pmap-ins-http) match content-type-verification 2-935 (config-pmap-ins-http) match cookie secondary 2-936 (config-pmap-ins-http) match header 2-939 (config-pmap-ins-http) match header length 2-942 (config-pmap-ins-http) match header mime-type 2-944 (config-pmap-ins-http) match port-misuse 2-947 (config-pmap-ins-http) match request-method 2-948 (config-pmap-ins-http) match strict-http 2-950 (config-pmap-ins-http) match transfer-encoding 2-952 (config-pmap-ins-http) match url 2-953 (config-pmap-ins-http) match url length 2-955 Policy Map Inspection HTTP Class Configuration Mode Commands (config-pmap-ins-http-c) passthrough log 2-957 (config-pmap-ins-http-c) permit 2-958 (config-pmap-ins-http-c) reset 2-959 Policy Map Inspection HTTP Match Configuration Mode Commands (config-pmap-ins-http-m) passthrough log 2-961 (config-pmap-ins-http-m) permit 2-962 (config-pmap-ins-http-m) reset 2-963
Command Reference, Cisco ACE Application Control Engine
2-956
2-959
xx
OL-25339-01
Contents
Policy Map Inspection SIP Configuration Mode Commands 2-964 (config-pmap-ins-sip) class 2-966 (config-pmap-ins-sip) description 2-967 (config-pmap-ins-sip) match called-party 2-968 (config-pmap-ins-sip) match calling-party 2-969 (config-pmap-ins-sip) match content 2-970 (config-pmap-ins-sip) match im-subscriber 2-972 (config-pmap-ins-sip) match message-path 2-973 (config-pmap-ins-sip) match request-method 2-974 (config-pmap-ins-sip) match third-party registration 2-976 (config-pmap-ins-sip) match uri 2-978 Policy Map Inspection SIP Class Configuration Mode Commands (config-pmap-ins-sip-c) drop 2-980 (config-pmap-ins-sip-c) log 2-980 (config-pmap-ins-sip-c) permit 2-981 (config-pmap-ins-sip-c) reset 2-982 Policy Map Inspection SIP Match Configuration Mode Commands (config-pmap-ins-sip-m) drop 2-984 (config-pmap-ins-sip-m) permit 2-985 (config-pmap-ins-sip-m) reset 2-986 Policy Map Inspection Skinny Configuration Mode Commands (config-pmap-ins-skinny) description 2-988 (config-pmap-ins-skinny) match message-id 2-989
2-979
2-983
2-986
Policy Map Inspection Skinny Match Configuration Mode Commands (config-pmap-ins-skinny-m) reset 2-991 Policy Map Load Balancing Generic Configuration Mode Commands (config-pmap-lb-generic) class 2-994 (config-pmap-lb-generic) description 2-996 (config-pmap-lb-generic) match layer4-payload 2-997 (config-pmap-lb-generic) match source-address 2-998
2-990
2-992
Policy Map Load Balancing Generic Class Configuration Mode Commands (config-pmap-lb-generic-c) drop 2-1000 (config-pmap-lb-generic-c) forward 2-1001 (config-pmap-lb-generic-c) serverfarm 2-1002 (config-pmap-lb-generic-c) set ip tos 2-1003 (config-pmap-lb-generic-c) sticky-serverfarm 2-1004 Policy Map Load Balancing Generic Match Configuration Mode Commands (config-pmap-lb-generic-m) drop 2-1006 (config-pmap-lb-generic-m) forward 2-1006
2-999
2-1004
xxi
Contents
(config-pmap-lb-generic-m) serverfarm 2-1007 (config-pmap-lb-generic-m) set ip tos 2-1009 (config-pmap-lb-generic-m) sticky-serverfarm 2-1010 Policy Map Load Balancing HTTP Configuration Mode Commands (config-pmap-lb) class 2-1012 (config-pmap-lb) description 2-1013 (config-pmap-lb) match cipher 2-1014 (config-pmap-lb) match http content 2-1016 (config-pmap-lb) match http cookie 2-1017 (config-pmap-lb) match http header 2-1019 (config-pmap-lb) match http url 2-1023 (config-pmap-lb) match source-address 2-1024
2-1011
Policy Map Load Balancing HTTP Class Configuration Mode Commands (config-pmap-lb-c) action 2-1026 (config-pmap-lb-c) compress 2-1027 (config-pmap-lb-c) drop 2-1029 (config-pmap-lb-c) forward 2-1030 (config-pmap-lb-c) insert-http 2-1031 (config-pmap-lb-c) nat dynamic 2-1032 (config-pmap-lb-c) serverfarm 2-1033 (config-pmap-lb-c) set ip tos 2-1035 (config-pmap-lb-c) ssl-proxy client 2-1036 (config-pmap-lb-c) sticky-serverfarm 2-1037 Policy Map Load Balancing HTTP Match Configuration Mode Commands (config-pmap-lb-m) action 2-1038 (config-pmap-lb-m) compress 2-1040 (config-pmap-lb-m) drop 2-1041 (config-pmap-lb-m) forward 2-1043 (config-pmap-lb-m) insert-http 2-1044 (config-pmap-lb-m) serverfarm 2-1045 (config-pmap-lb-m) set ip tos 2-1046 (config-pmap-lb-m) ssl-proxy client 2-1047 (config-pmap-lb-m) sticky-serverfarm 2-1048 Policy Map Load Balancing RADIUS Configuration Mode Commands (config-pmap-lb-radius) class 2-1051 (config-pmap-lb-radius) description 2-1053 (config-pmap-lb-radius) match radius attribute 2-1054
2-1025
2-1038
2-1049
Policy Map Load Balancing RADIUS Class Configuration Mode Commands (config-pmap-lb-radius-c) drop 2-1056
Command Reference, Cisco ACE Application Control Engine
2-1055
xxii
OL-25339-01
Contents
(config-pmap-lb-radius-c) forward 2-1057 (config-pmap-lb-radius-c) serverfarm 2-1058 (config-pmap-lb-radius-c) set ip tos 2-1059 (config-pmap-lb-radius-c) sticky-serverfarm 2-1060 Policy Map Load Balancing RADIUS Match Configuration Mode Commands (config-pmap-lb-radius-m) drop 2-1062 (config-pmap-lb-radius-m) forward 2-1063 (config-pmap-lb-radius-m) serverfarm 2-1064 (config-pmap-lb-radius-m) set ip tos 2-1065 (config-pmap-lb-radius-m) sticky-serverfarm 2-1066 Policy Map Load Balancing RDP Configuration Mode Commands (config-pmap-lb-rdp) class 2-1068 (config-pmap-lb-rdp) description 2-1069
2-1066 2-1060
Policy Map Load Balancing RDP Class Configuration Mode Commands (config-pmap-lb-rdp-c) drop 2-1071 (config-pmap-lb-rdp-c) forward 2-1072 (config-pmap-lb-rdp-c) serverfarm 2-1073 (config-pmap-lb-rdp-c) set ip tos 2-1074 (config-pmap-lb-rdp-c) sticky-serverfarm 2-1075 Policy Map Load Balancing RTSP Configuration Mode Commands (config-pmap-lb-rtsp) class 2-1078 (config-pmap-lb-rtsp) description 2-1079 (config-pmap-lb-rtsp) match rtsp header 2-1080 (config-pmap-lb-rtsp) match rtsp source-address 2-1082 (config-pmap-lb-rtsp) match rtsp url 2-1083
2-1069
2-1076
Policy Map Load Balancing RTSP Class Configuration Mode Commands (config-pmap-lb-rtsp-c) drop 2-1085 (config-pmap-lb-rtsp-c) forward 2-1086 (config-pmap-lb-rtsp-c) serverfarm 2-1087 (config-pmap-lb-rtsp-c) set ip tos 2-1088 (config-pmap-lb-rtsp-c) sticky-serverfarm 2-1089 Policy Map Load Balancing RTSP Match Configuration Mode Commands (config-pmap-lb-rtsp-m) drop 2-1091 (config-pmap-lb-rtsp-m) forward 2-1092 (config-pmap-lb-rtsp-m) serverfarm 2-1093 (config-pmap-lb-rtsp-m) set ip tos 2-1094 (config-pmap-lb-rtsp-m) sticky-serverfarm 2-1095 Policy Map Load Balancing SIP Configuration Mode Commands (config-pmap-lb-sip) class 2-1097
2-1095
2-1084
2-1090
xxiii
Contents
(config-pmap-lb-sip) description 2-1099 (config-pmap-lb-sip) match sip header 2-1100 (config-pmap-lb-sip) match source-address 2-1101 Policy Map Load Balancing SIP Class Configuration Mode Commands (config-pmap-lb-sip-c) drop 2-1103 (config-pmap-lb-sip-c) forward 2-1104 (config-pmap-lb-sip-c) serverfarm 2-1105 (config-pmap-lb-sip-c) set ip tos 2-1106 (config-pmap-lb-sip-c) sticky-serverfarm 2-1107 Policy Map Load Balancing SIP Match Configuration Mode Commands (config-pmap-lb-sip-m) drop 2-1109 (config-pmap-lb-sip-m) forward 2-1110 (config-pmap-lb-sip-m) serverfarm 2-1111 (config-pmap-lb-sip-m) set ip tos 2-1112 (config-pmap-lb-sip-m) sticky-serverfarm 2-1113 Policy Map Management Configuration Mode Commands (config-pmap-mgmt) class 2-1115 (config-pmap-mgmt) description 2-1117
2-1113 2-1102
2-1108
Policy Map Management Class Configuration Mode Commands (config-pmap-mgmt-c) deny 2-1118 (config-pmap-mgmt-c) permit 2-1119 Policy Map Optimization Configuration Mode Commands (config-pmap-optmz) class 2-1121 (config-pmap-optmz) description 2-1122 (config-pmap-optmz) match http cookie 2-1123 (config-pmap-optmz) match http header 2-1124 (config-pmap-optmz) match http url 2-1127
2-1119
2-1117
Policy Map Optimization Class Configuration Mode Commands (config-pmap-optmz-c) action 2-1128 Policy Map Optimization Match Configuration Mode Commands (config-pmap-optmz-m) action 2-1130 Probe Configuration Mode Commands 2-1132 (config-probe-probe_type) append-port-hosttag 2-1135 (config-probe-probe_type) community 2-1137 (config-probe-probe_type) connection term 2-1138 (config-probe-probe_type) credentials 2-1139 (config-probe-probe_type) description 2-1140 (config-probe-probe_type) domain 2-1142 (config-probe-probe_type) expect address 2-1143
Command Reference, Cisco ACE Application Control Engine
2-1128
2-1129
xxiv
OL-25339-01
Contents
(config-probe-probe_type) expect regex 2-1145 (config-probe-probe_type) expect status 2-1147 (config-probe-probe_type) faildetect 2-1148 (config-probe-probe_type) hash 2-1149 (config-probe-probe_type) header 2-1150 (config-probe-probe_type) interval 2-1153 (config-probe-probe_type) ip address 2-1154 (config-probe-probe_type) nas ip address 2-1156 (config-probe-probe_type) oid 2-1157 (config-probe-probe_type) open 2-1159 (config-probe-probe_type) passdetect 2-1160 (config-probe-probe_type) port 2-1162 (config-probe-probe_type) receive 2-1164 (config-probe-probe_type) request command 2-1165 (config-probe-probe_type) request method 2-1166 (config-probe-probe_type) script 2-1167 (config-probe-probe_type) send-data 2-1168 (config-probe-probe_type) ssl cipher 2-1169 (config-probe-probe_type) ssl version 2-1171 (config-probe-probe_type) version 2-1171 (config-probe-sip-udp) rport enable 2-1173 Probe SNMP OID Configuration Mode Commands 2-1174 (config-probe-snmp-oid) threshold 2-1176 (config-probe-snmp-oid) type absolute max 2-1178 (config-probe-snmp-oid) weight 2-1180 Probe VM Configuration Mode Commands 2-1181 (config-probe-vm) interval 2-1182 (config-probe-vm) load 2-1183 (config-probe-vm) vm-controller 2-1185 RADIUS Configuration Mode Commands (config-radius) deadtime 2-1188 (config-radius) server 2-1189
2-1186
Real Server Host Configuration Mode Commands (config-rserver-host) conn-limit 2-1191 (config-rserver-host) description 2-1193 (config-rserver-host) fail-on-all 2-1194 (config-rserver-host) inservice 2-1195 (config-rserver-host) ip address 2-1196 (config-rserver-host) probe 2-1198
2-1190
xxv
Contents
(config-rserver-host) rate-limit 2-1199 (config-rserver-host) weight 2-1201 Real Server Redirect Configuration Mode Commands 2-1202 (config-rserver-redir) conn-limit 2-1204 (config-rserver-redir) description 2-1206 (config-rserver-redir) inservice 2-1207 (config-rserver-redir) probe 2-1208 (config-rserver-redir) rate-limit 2-1209 (config-rserver-redir) webhost-redirection 2-1210 Resource Configuration Mode Commands 2-1212 (config-resource) limit-resource 2-1213 Role Configuration Mode Commands 2-1216 (config-role) description 2-1217 (config-role) rule 2-1218 Server Farm Host Configuration Mode Commands 2-1221 (config-sfarm-host) description 2-1223 (config-sfarm-host) dws 2-1224 (config-sfarm-host) failaction 2-1225 (config-sfarm-host) fail-on-all 2-1228 (config-sfarm-host) inband-health check 2-1230 (config-sfarm-host) partial-threshold 2-1233 (config-sfarm-host) predictor 2-1234 (config-sfarm-host) probe 2-1240 (config-sfarm-host) retcode 2-1242 (config-sfarm-host) rserver 2-1244 (config-sfarm-host) transparent 2-1245 Serverfarm Host Predictor Configuration Mode Commands 2-1246 (config-sfarm-host-predictor) autoadjust 2-1248 (config-sfarm-host-predictor) weight connection 2-1250 Server Farm Host Real Server Configuration Mode Commands (config-sfarm-host-rs) backup-rserver 2-1253 (config-sfarm-host-rs) conn-limit 2-1254 (config-sfarm-host-rs) cookie-string 2-1255 (config-sfarm-host-rs) description 2-1257 (config-sfarm-host-rs) fail-on-all 2-1258 (config-sfarm-host-rs) inservice 2-1260 (config-sfarm-host-rs) probe 2-1262 (config-sfarm-host-rs) rate-limit 2-1263 (config-sfarm-host-rs) weight 2-1264
Command Reference, Cisco ACE Application Control Engine
2-1251
xxvi
OL-25339-01
Contents
Server Farm Redirect Configuration Mode Commands (config-sfarm-redirect) description 2-1267 (config-sfarm-redirect) failaction 2-1268 (config-sfarm-redirect) predictor 2-1270 (config-sfarm-redirect) probe 2-1276 (config-sfarm-redirect) rserver 2-1277
2-1265
Serverfarm Redirect Predictor Configuration Mode Commands 2-1279 (config-sfarm-redirect-predictor) autoadjust 2-1281 (config-sfarm-redirect-predictor) weight connection 2-1283 Server Farm Redirect Real Server Configuration Mode Commands (config-sfarm-redirect-rs) backup-rserver 2-1286 (config-sfarm-redirect-rs) conn-limit 2-1287 (config-sfarm-redirect-rs) inservice 2-1288 (config-sfarm-host-rs) probe 2-1290 (config-sfarm-redirect-rs) rate-limit 2-1291 (config-sfarm-redirect-rs) weight 2-1292 SSL Proxy Configuration Mode Commands 2-1294 (config-ssl-proxy) authgroup 2-1295 (config-ssl-proxy) cert 2-1297 (config-ssl-proxy) chaingroup 2-1299 (config-ssl-proxy) crl 2-1300 (config-ssl-proxy) key 2-1302 (config-ssl-proxy) ocspserver 2-1304 (config-ssl-proxy) revcheckprio 2-1306 (config-ssl-proxy) ssl advanced-options 2-1308 Sticky HTTP Cookie Configuration Mode Commands 2-1309 (config-sticky-cookie) cookie insert 2-1310 (config-sticky-cookie) cookie 2-1311 (config-sticky-cookie) cookie secondary 2-1312 (config-sticky-cookie) replicate sticky 2-1313 (config-sticky-cookie) serverfarm 2-1314 (config-sticky-cookie) static cookie-value 2-1315 (config-sticky-cookie) timeout 2-1316 Sticky HTTP Content Configuration Mode Commands (config-sticky-content) content 2-1318 (config-sticky-content) replicate sticky 2-1320 (config-sticky-content) serverfarm 2-1321 (config-sticky-content) static content 2-1323 (config-sticky-content) timeout 2-1324
2-1317 2-1284
xxvii
Contents
Sticky HTTP Header Configuration Mode Commands 2-1325 (config-sticky-header) header 2-1327 (config-sticky-header) replicate sticky 2-1329 (config-sticky-header) serverfarm 2-1330 (config-sticky-header) static header-value 2-1332 (config-sticky-header) timeout 2-1333 Sticky IP Configuration Mode Commands 2-1334 (config-sticky-ip) replicate sticky 2-1336 (config-sticky-ip) serverfarm 2-1337 (config-sticky-ip) static client source 2-1338 (config-sticky-ip) timeout 2-1341 Sticky Layer 4 Payload Configuration Mode Commands 2-1342 (config-sticky-l4payloa) layer4-payload 2-1344 (config-sticky-l4payloa) replicate sticky 2-1346 (config-sticky-l4payloa) response sticky 2-1347 (config-sticky-l4payloa) serverfarm 2-1348 (config-sticky-l4payloa) static layer4-payload 2-1349 (config-sticky-l4payloa) timeout 2-1350 Sticky RADIUS Configuration Mode Commands 2-1351 (config-sticky-radius) replicate sticky 2-1353 (config-sticky-radius) serverfarm 2-1354 (config-sticky-radius) timeout 2-1355 Sticky RTSP Header Configuration Mode Commands 2-1356 (config-sticky-header) header 2-1358 (config-sticky-header) replicate sticky 2-1360 (config-sticky-header) serverfarm 2-1361 (config-sticky-header) static header-value 2-1362 (config-sticky-header) timeout 2-1363 Sticky SIP Header Configuration Mode Commands 2-1364 (config-sticky-header) replicate sticky 2-1366 (config-sticky-header) serverfarm 2-1367 (config-sticky-header) static header-value 2-1368 (config-sticky-header) timeout 2-1369 TACACS+ Configuration Mode Commands (config-tacacs+) deadtime 2-1372 (config-tacacs+) server 2-1374
2-1371
VM Configuration Mode Commands 2-1376 (config-vm) credentials 2-1377 (config-vm) url 2-1378
Command Reference, Cisco ACE Application Control Engine
xxviii
OL-25339-01
Contents
xxix
Contents
xxx
OL-25339-01
Preface
This guide provides the command-line interface (CLI) information of the following products:
Cisco ACE Application Control Engine Module (ACE module) in the Catalyst 6500 series switch or Cisco 7600 series router, hereinafter referred to as the switch or router, respectively Cisco ACE 4700 Series Application Control Engine Appliance (ACE appliance)
The information in this guide applies to both the ACE module and the ACE appliance unless otherwise noted. This information includes the following:
How to use the CLI. The CLI commands, including syntax, options, and related commands. Audience How to Use This Guide Related Documentation Symbols and Conventions Obtaining Documentation, Obtaining Support, and Security Guidelines
Audience
This guide is intended for the following trained and qualified service personnel who are responsible for configuring the ACE:
xxxi
Preface
Provides detailed information for the following types of CLI commands for the ACE:
Commands that you can enter after you log in to the ACE. Configuration mode commands that allow you to access global configuration mode and its subset of modes after you log in to the ACE.
Related Documentation
In addition to this document, the ACE documentation set includes the following: Document Title Administration Guide, Cisco ACE Application Control Engine Description Describes how to perform the following administration tasks on the ACE:
Setting up the ACE Establishing remote access Managing software licenses Configuring class maps and policy maps Managing the ACE software Configuring SNMP Configuring redundancy Configuring the XML interface Upgrading the ACE software
Application Acceleration and Optimization Guide, Cisco ACE 4700 Series Application Control Engine Appliance
(ACE appliance only) Describes how to configure the web optimization features of the ACE appliance. This guide also provides an overview and description of those features.
Cisco Application Control Engine Provides examples of common configurations for load (ACE) Configuration Examples Wiki balancing, security, SSL, routing and bridging, virtualization, and so on. Cisco Application Control Engine (ACE) Troubleshooting Wiki Command Reference, Cisco ACE Application Control Engine Describes the procedures and methodology in wiki format to troubleshoot the most common problems that you may encounter during the operation of your ACE. Provides an alphabetical list and descriptions of all CLI commands by mode, including syntax, options, and related commands.
xxxii
OL-25339-01
Preface
Document Title CSM-to-ACE Conversion Tool Guide, Cisco ACE Application Control Engine Module
Description (ACE module only) Describes how to use the CSM-to-ACE module conversion tool to migrate Cisco Content Switching Module (CSM) running- or startup-configuration files to the ACE.
CSS-to-ACE Conversion Tool Guide, Describes how to use the CSS-to-ACE conversion tool to Cisco ACE Application Control migrate Cisco Content Services Switches (CSS) Engine running-configuration or startup-configuration files to the ACE. Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance (ACE appliance only) Describes how to use the Device Manager GUI, which resides in flash memory on the ACE appliance, to provide a browser-based interface for configuring and managing the appliance.
Getting Started Guide, Cisco ACE (ACE module only) Describes how to perform the initial setup Application Control Engine Module and configuration tasks for the ACE module. Getting Started Guide, Cisco ACE 4700 Series Application Control Engine Appliance (ACE appliance only) Describes how to use the ACE appliance Device Manager GUI and CLI to perform the initial setup and configuration tasks.
Hardware Installation Guide, Cisco (ACE appliance only) Provides information for installing the ACE 4710 Application Control ACE appliance. Engine Appliance Installation Note, Cisco ACE Application Control Engine ACE30 Module Regulatory Compliance and Safety Information, Cisco ACE 4710 Application Control Engine Appliance Release Note, Cisco ACE 4700 Series Application Control Engine Appliance (ACE module only) Provides information for installing the ACE module into the Catalyst 6500 series switch or a Cisco 7600 series router. (ACE appliance only) Regulatory compliance and safety information for the ACE appliance.
(ACE appliance only) Provides information about operating considerations, caveats, and command-line interface (CLI) commands for the ACE appliance.
Release Note, Cisco ACE (ACE module only) Provides information about operating Application Control Engine Module considerations, caveats, and command-line interface (CLI) commands for the ACE module. Routing and Bridging Guide, Cisco ACE Application Control Engine Describes how to perform the following routing and bridging tasks on the ACE:
(ACE appliance only) Ethernet ports VLAN interfaces IPv6, including transitioning IPv4 networks to IPv6, IPv6 header format, IPv6 addressing, and suported protocols. Routing Bridging Dynamic Host Configuration Protocol (DHCP)
xxxiii
Preface
Description Describes how to perform the following ACE security configuration tasks:
Security access control lists (ACLs) User authentication and accounting using a Terminal Access Controller Access Control System Plus (TACACS+), Remote Authentication Dial-In User Service (RADIUS), or Lightweight Directory Access Protocol (LDAP) server Application protocol and HTTP deep packet inspection TCP/IP normalization and termination parameters Network Translation (NAT)
Describes how to configure the following server load-balancing features on the ACE:
Real servers and server farms Class maps and policy maps to load balance traffic to real servers in server farms Server health monitoring (probes) Stickiness Dynamic workload scaling (DWS) Firewall load balancing TCL scripts
Describes how to configure the following Secure Sockets Layer (SSL) features on the ACE:
SSL certificates and keys SSL initiation SSL termination End-to-end SSL
System Message Guide, Cisco ACE Application Control Engine Upgrade/Downgrade Guide, Cisco ACE 4700 Series Application Control Engine Appliance User Guide, Cisco Application Networking Manager Virtualization Guide, Cisco ACE Application Control Engine
Describes how to configure system message logging on the ACE. This guide also lists and describes the system log (syslog) messages generated by the ACE. (ACE appliance only) Describes how to perform an ACE appliance software upgrade or downgrade. Describes how to use Cisco Application Networking Manager (ANM), a networking management application for monitoring and configuring network devices, including the ACE. Describes how to operate your ACE in a single context or in multiple contexts.
xxxiv
OL-25339-01
Preface
Description Commands, command options, and keywords are in boldface. Bold text also indicates a command in a paragraph. Arguments for which you supply values are in italics. Italic text also indicates the first occurrence of a new term, book title, emphasized text. Encloses required arguments and keywords. Encloses optional arguments and keywords. Required alternative keywords are grouped in braces and separated by vertical bars. Optional alternative keywords are grouped in brackets and separated by vertical bars. A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.
font font
Terminal sessions and information the system displays are in screen font. Information you must enter in a command line is in boldface screen font. Arguments for which you supply values are in italic screen font. The symbol ^ represents the key labeled Controlfor example, the key combination ^D in a screen display means hold down the Control key while you press the D key. Nonprinting characters, such as passwords are in angle brackets.
boldface screen
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication. Cautions use the following conventions:
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. For additional information about CLI syntax formatting, see Chapter 1, Using the Command-Line Interface.
xxxv
Preface
xxxvi
OL-25339-01
CH A P T E R
CLI Commands
This chapter provides detailed information for the following types of CLI commands for the ACE:
Commands that you can enter after you log in to the ACE. Configuration mode commands that allow you to access configuration mode and its subset of modes after you log in to the ACE. The syntax of the command Any related commands, when appropriate
1-1
CLI Commands
1-2
OL-25339-01
Chapter 1
backup
To backup the configuration files and dependent files in a context or in all contexts, use the backup command. backup [all] [pass-phrase text_string] [exclude component]
Syntax Description
all
(Optional) Specifies that the ACE should back up the configuration files and dependencies in all contexts. You can specify this keyword only in the Admin context. (Optional) Specifies the components that you do not wish to back up.You can enter any of the following components in any order separated by a comma if you enter more than one:
exclude component
checkpointsExcludes all checkpoints ssl-filesExcludes SSL certificate files and key files
pass-phrase text_string
(Optional) Passphrase that you specify to encrypt the backed up SSL keys. Enter the passphrase as an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. You must enter the pass-phrase keyword before the exclude keyword. If you enter a passphrase and then exclude the SSL files from the archive, the ACE does not use the passphrase.
Command Modes
Command History
A2(3.0)
A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The backup command has the following configuration guidelines and limitations:
Use the Admin context for an ACE-wide backup and the corresponding context for a user context backup. When you back up the running-configuration file, the ACE uses the output of the show running-configuration command as the basis for the archive file. The ACE backs up only exportable certificates and keys. License files are backed up only when you back up the Admin context.
1-3
CLI Commands
Use a passphrase to back up SSL keys in encrypted form. Remember the passphrase or write it down and store it in a safe location. When you restore the encrypted keys, you must enter the passphrase to decrypt the keys. If you use a passphrase when you back up the SSL keys, the ACE encrypts the keys with AES-256 encryption using OpenSSL software. If you imported SSL certificates or keys with a crypto passphrase, you must use the pass-phrase option to encrypt the crypto passphrase when you back up these files. Only probe scripts that reside in disk0: need to be backed up. The prepackaged probe scripts in the probe: directory are always available. When you perform a backup, the ACE automatically identifies and backs up the scripts in disk0: that are required by the configuration. The ACE does not resolve any other dependencies required by the configuration during a backup except for scripts that reside in disk0:. For example, if you configured SSL certificates in an SSL proxy in the running-configuration file, but you later deleted the certificates, the backup proceeds as if the certificates still existed. To perform a backup or a restore operation, you must have the admin RBAC feature in your user role.
Examples
Related Commands
1-4
OL-25339-01
Chapter 1
capture
To enable the context packet capture function for packet sniffing and network fault isolation, use the capture command. As part of the packet capture process, you specify whether to capture packets from all interfaces or an individual VLAN interface. capture buffer_name {{all | {interface vlan number}} access-list name [bufsize buf_size [circular-buffer]]} | remove | start | stop
Syntax Description
buffer_name
Name of the packet capture buffer. The buffer_name argument associates the packet capture with a name. Specify an unquoted text string with no spaces from 1 to 80 alphanumeric characters. Specifies that packets from all input interfaces are captured. Specifies a particular input interface from which to capture packets. Specifies the VLAN identifier associated with the interface.
access-list name Selects packets to capture based on a specific access list. A packet must pass the access list filters before the packet is stored in the capture buffer. Specify a previously created access list identifier. Enter an unquoted text string with a maximum of 64 characters.
Note
Ensure that the access list is for an input interface; input is considered with regards to the direction of the session that you wish to capture. If you configure the packet capture on the output interface, the ACE will fail to match any packets.
bufsize buf_size (Optional) Specifies the buffer size, in kilobytes (KB), used to store the packet capture. The range is from 1 to 5000 KB. circular-buffer remove start (Optional) Enables the packet capture buffer to overwrite itself, starting from the beginning, when the buffer is full. Clears the packet capture configuration. Starts the packet capture function and displays the messages on the session console as the ACE receives the packets. The CLI prompt returns and you can type other commands at the same time that the ACE is capturing packets. To stop the capture process, use the stop option. The packet capture function automatically stops when the buffer is full unless you enable the circular buffer function. Stops the packet capture process after a brief delay.
stop
Command Modes
Command History
Modification This command was introduced. The buffer size was limited to 5000 KB. The stop option was introduced.
1-5
CLI Commands
Modification This command was introduced. The stop option was introduced.
A1(7) A3(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The packet capture function enables access control lists (ACLs) to control which packets are captured by the ACE on the input interface. If the ACLs are selecting an excessive amount of traffic for the packet capture operation, the ACE will see a heavy load, which can cause a degradation in performance. We recommend that you avoid using the packet capture function when high network performance is critical. To capture packets for both IPv6 and IPv4 in the same buffer, configure the capture command twice: once with an IPv6 ACL and once with an IPv4 ACL. Under high traffic conditions, you may observe up to 64 packets printing on the console after you enter the stop keyword. These additional messages can occur because the packets were in transit or buffered before you entered the stop keyword. The capture packet function works on an individual context basis. The ACE traces only the packets that belong to the context where you execute the capture command. You can use the context ID, which is passed with the packet, to isolate packets that belong to a specific context. To trace the packets for a single specific context, use the changeto command and enter the capture command for the new context. The ACE does not automatically save the packet capture in a configuration file. To copy the capture buffer information as a file in flash memory, use the copy capture command.
Examples
Related Commands
changeto
To move from one context on the ACE to another context, use the changeto command. changeto context_name
Syntax Description
context_name
1-6
OL-25339-01
Chapter 1
Command Modes
Command History
Modification This command was introduced. You can apply the changeto feature to a rule for a user-defined role.
3.0(0)A1(2) A2(1.3)
Modification This command was introduced. You can apply the changeto feature to a rule for a user-defined role.
A1(7) A3(2.2)
Usage Guidelines
This command requires the changeto feature in your user role, and as found in all of the predefined user roles. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Only users authorized in the admin context or configured with the changeto feature can use the changeto command to navigate between the various contexts. Context administrators without the changeto feature, who have access to multiple contexts, must explicitly log in to the other contexts to which they have access. The command prompt indicates the context that you are currently in (see the following example). The predefined user role that is enforced after you enter the changeto command is that of the Admin context and not that of the non-Admin context. You cannot add, modify, or delete objects in a custom domain after you change to a non-Admin context.
If you originally had access to the default-domain in the Admin context prior to moving to a non-Admin context, the ACE allows you to configure any object in the non-Admin context. If you originally had access to a custom domain in the Admin context prior to moving to a non-Admin context, any created objects in the non-Admin context will be added to the default-domain. However, an error message will appear when you attempt to modify existing objects in the non-Admin context.
User-defined roles configured with the changeto feature retain their privileges when accessing different contexts.
Examples
Related Commands
1-7
CLI Commands
checkpoint
To create or modify a checkpoint (snapshot) of the running configuration, use the checkpoint command. checkpoint {create | delete | rollback} name
Syntax Description
Creates a new checkpoint with the value of name. Deletes the existing checkpoint with the value of name. Reverts back to the checkpoint with the value of name. Name of a new or existing checkpoint. Enter a text string from 1 to 50 alphanumeric characters (no spaces).
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If the running-configuration file has the no ft auto-sync command configured and the checkpoint has the ft auto-sync command configured, a checkpoint rollback will fail with the following message:
Warning : 'no ft auto-sync' & 'ft auto-sync' conflict detected - Rollback will fail Failing Scenario - running config has 'no ft auto-sync' / checkpoint has 'ft auto-sync'
Examples
Related Commands
1-8
OL-25339-01
Chapter 1
clear access-list
To clear access control list (ACL) statistics, use the clear access-list command. clear access-list name
Syntax Description
name
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-9
CLI Commands
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
Syntax Description
Command Modes
1-10
OL-25339-01
Chapter 1
Command History
A4(1.0)
A3(2.5)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear arp
To clear the Address Resolution Protocol (ARP) entries in the ARP table or statistics with ARP processes, use the clear arp command. clear arp [no-refresh | {statistics [vlan number] [interface_name]}]
Syntax Description
no-refresh
(Optional) Removes the learned ARP entries from the ARP table without refreshing the ARP entries.
statistics [vlan number] (Optional) Clears ARP statistics counters globally or for the specified VLAN, vlan number. [interface_name] (Optional, ACE appliance only) Clears ARP statistics counters globally or for the specified interface, interface_name.
Command Modes
Command History
Modification This command was introduced. This command was revised with the vlan option.
3.0(0)A1(2) A2(1.0)
1-11
CLI Commands
Modification This command was introduced. This command was revised with the vlan option.
A1(7) A3(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you enter the clear arp command with no option, it clears all learned ARP entries and then refreshes the ARP entries.
Examples
To clear the ARP learned entries and then refresh the ARP entries, enter:
host1/Admin# clear arp
Related Commands
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
1-12
OL-25339-01
Chapter 1
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show buffer
clear capture
To clear an existing capture buffer, use the clear capture command. clear capture name
Syntax Description
name
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the dir command to view the capture files that you copied to the disk0: file system using the copy capture command.
Examples
Related Commands
1-13
CLI Commands
clear cde
(ACE module only) To clear the classification and distribution engine (CDE) statistics and interrupt counts, use the clear cde command. clear cde {interrupt | stats}
Syntax Description
interrupt stats
Command Modes
Command History
Usage Guidelines
This command requires the Admin role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show cde
Syntax Description
1-14
OL-25339-01
Chapter 1
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show cfgmgr
1-15
CLI Commands
clear conn
To clear a connection that passes through, terminates, or originates with the ACE, use the clear conn command. clear conn [all | flow {prot_number | icmp | tcp | udp {source_ip | source_port | dest_ip | dest_port}} | id number np number | rserver name [port_number] serverfarm sfarm_name]
Syntax Description
all flow prot_number icmp tcp udp source_ip source_port dest_ip dest_port id number np number rserver name port_number serverfarm sfarm_name
(Optional) Clears all connections that go through the ACE, originate with the ACE, or terminate with the ACE. (Optional) Clears the connection that matches the specified flow descriptor. Protocol number of the flow. Specifies the flow types using ICMP. Specifies the flow types using TCP. Specifies the flow types using UDP. Source IP address of the flow. Source port of the flow. Destination IP address of the flow. Destination port of the flow. (Optional) Clears the connection with the specified connection ID number as displayed in the output of the show conn command. Clears all the connections to the specified network processor with the specified connection ID. (Optional) Clears all connections to the specified real server. (Optional) Port number associated with the specified real server. Enter an integer from 1 to 65535. (Optional) Clears all connections to the specified real server associated with this server farm.
Command Modes
Command History
Modification This command was introduced. This command was revised. Modification This command was introduced. This command was revised.
3.0(0)A1(2) A2(1.0)
ACE Appliance Release
A1(7) A3(1.0)
1-16
OL-25339-01
Chapter 1
Usage Guidelines
This command requires the loadbalance, inspect, NAT, connection, or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear only the connections that go through the ACE (flows that pass through the ACE between the originating network host and the terminating network host), use the clear conn command without any keywords. When you do not include any keywords, the connections that terminate or originate with the ACE are not cleared.
Examples
Related Commands
show conn
clear cores
To clear all of the core dumps stored in the core: file system, use the clear cores command. clear cores
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Note
The ACE creates a core dump when it experiences a fatal error. Core dump information is for Cisco Technical Assistance Center (TAC) use only. We recommend that you contact TAC for assistance in interpreting the information in the core dump. To view the list of core files in the core: file system, use the dir core: command. To save a copy of a core dump to a remote server before clearing it, use the copy capture command.
1-17
CLI Commands
To delete a specific core dump file from the core: file system, use the delete core: command.
Examples
Related Commands
1-18
OL-25339-01
Chapter 1
Syntax Description
all
(Optional) Clears the session cache information for all contexts. This option is available in the Admin context only.
Command Modes
Exec Admin and user context. The all option is available in the Admin context only.
Command History
A2(1.0)
A3(1.0)
Usage Guidelines
Examples
Related Commands
1-19
CLI Commands
clear dc
(ACE module only) To clear the daughter card interrupt and register statistics on the ACE module, use the clear dc command. clear dc dc_number {controller {interrupts | stats} | interrupt}
Syntax Description
Number of the daughter card (1 or 2). Specifies the daughter card controller. Clears the specified daughter card controller interrupt statistics. Clears the specified daughter card cumulative controller statistics. Clears the specified daughter card interrupt count.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role in the Admin context. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear the daughter card 1 controller interrupt statistics, enter:
host1/Admin# clear dc 1 controller interrupts
Related Commands
set dc show dc
clear debug-logfile
To remove a debug log file, use the clear debug-logfile command. clear debug-logfile filename
Syntax Description
filename
Command Modes
1-20
OL-25339-01
Chapter 1
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE debug commands are intended for use by trained Cisco personnel only. Entering these commands may cause unexpected results. Do not attempt to use these commands without guidance from Cisco support personnel.
Examples
Related Commands
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-21
CLI Commands
This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show fifo
1-22
OL-25339-01
Chapter 1
clear ft
To clear the various fault-tolerant (FT) statistics, use the clear ft command. clear ft {all | ha-stats | hb-stats | history {cfg_cntlr | ha_dp_mgr | ha_mgr} | track-stats [all]}
Syntax Description
Clears all redundancy statistics, including all TL, heartbeat, and tracking counters. Clears all transport layer-related counters that the ACE displays as part of the show ft peer detail command output. Clears all heartbeat-related statistics. When you enter this command for the first time, the ACE sets the heartbeat statistics counters to zero and stores a copy of the latest statistics locally. From that point on, when you enter the show ft hb-stats command, the ACE displays the difference between the statistics that are stored locally and the current statistics. Clears the redundancy history statistics. Clears tracking-related statistics for the Admin FT group only, a user context FT group only, or for all FT groups that are configured in the ACE.
history track-stats
Command Modes
Command History
Modification This command was introduced. This command was extensively revised. This version of software introduced the all, ha-stats, hb-stats, history, and track-stats keywords, and removed the original stats keyword.
3.0(0)A1(2) A2(1.0)
Modification This command was introduced. This command was extensively revised. This version of software introduced the all, ha-stats, hb-stats, history, and track-stats keywords, and removed the original stats keyword.
A1(7) A3(1.0)
Usage Guidelines
This command requires the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show ft
1-23
CLI Commands
(config) ft auto-sync (config) ft group (config) ft interface vlan (config) ft peer (config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-24
OL-25339-01
Chapter 1
clear interface
To clear the interface statistics, use the clear interface command. clear interface [bvi number | vlan number | gigabitEthernet slot_number/port_number]
Syntax Description
(Optional) Clears the statistics for the specified Bridge Group Virtual Interface (BVI). (Optional) Clears the statistics for the specified VLAN.
gigabitEthernet (Optional, ACE appliance only) Clears the statistics for the specified Gigabit slot_number/ Ethernet slot and port. port_number The slot_number represents the physical slot on the ACE containing the Ethernet ports. This selection is always 1.
The port_number represents the physical Ethernet port on the ACE. Valid selections are 1 through 4.
Command Modes
Exec BVI and VLANAdmin and user contexts (ACE appliance only) Ethernet data portAdmin context only
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. In addition, the Ethernet data port interface command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear all of the interface statistics, enter the clear interface command without using the optional VLAN and BVI keywords.
Examples
1-25
CLI Commands
Related Commands
clear ip
To clear the IP and Dynamic Host Configuration Protocol (DHCP) relay statistics, use the clear ip command. clear ip [dhcp relay statistics | statistics]
Syntax Description
(Optional) Clears all of the DHCP relay statistics. (Optional) Clears all of the statistics associated with IP normalization, fragmentation, and reassembly.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the DHCP feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear the IP and DHCP relay statistics, execute the clear ip command without using the optional keywords.
Examples
Related Commands
show ip
1-26
OL-25339-01
Chapter 1
clear ipv6
To clear the Dynamic Host Configuration Protocol (DHCP) relay and neighbor discovery statistics, use the clear ipv6 command. clear ipv6 {dhcp relay statistics | {neighbors [no-refresh | vlan vlan_id ipv6_address [no-refresh] | ipv6_address [no-refresh]]}}
Syntax Description
Clears all the DHCPv6 relay statistics. Clears all the statistics associated with neighbor discovery. (Optional) The ACE deletes the neighbor information from the cache and does not perform a refresh (Optional) Deletes the neighbor information associated with the specified VLAN interface (Optional) Deletes the neighbor information associated with the specified IPv6 address.
Command Modes
Command History
A5(1.0)
Usage Guidelines
This command requires the DHCP feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show ipv6
clear line
To close a specified virtual terminal (VTY) session, use the clear line command. clear line vty_name
1-27
CLI Commands
Syntax Description
vty_name
Name of a VTY session. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-28
OL-25339-01
Chapter 1
clear logging
To clear information stored in the logging buffer, use the clear logging command. clear logging [disabled | rate-limit]
Syntax Description
disabled rate-limit
(Optional) Clears the logging buffer of disabled messages. (Optional) Clears the logging buffer of rate-limit configuration messages.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear all of the information stored in the logging buffer, enter the clear logging command without using either of the optional keywords.
Examples
Related Commands
Syntax Description
1-29
CLI Commands
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show netio
1-30
OL-25339-01
Chapter 1
clear np
To clear the network processor interrupt error statistics that appear when you enter the show np number interrupts command, use the clear np command. clear np number interrupts
Syntax Description
number interrupts
Specifies the number of the network processor whose interrupt statistics you want to clear. Enter an integer from 1 to 4. Clears the interrupt statistics. of the network processor that you specify.
Command Modes
Command History
Release A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show np
1-31
CLI Commands
Syntax Description
Clears all peer statistics. Clears the I/O statistics. Clears the local statistics. Clears the memory statistics.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) ntp
clear probe
To clear the probe statistics displayed through the show probe command, use the clear probe command. clear probe name
Syntax Description
name
Command Modes
1-32
OL-25339-01
Chapter 1
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-33
CLI Commands
Syntax Description
all pid id
Clears all statistics for the processes logs. Specifies the processes log to clear.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the list of process identifiers assigned to each of the processes running on the ACE, use the show processes command.
Examples
Related Commands
show processes
clear rserver
To clear the real server statistics of all instances of a particular real server regardless of the server farms that it is associated with, use the clear rserver command. clear rserver name
Syntax Description
name
1-34
OL-25339-01
Chapter 1
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the rserver feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you have redundancy configured, then you need to explicitly clear real-server statistics on both the active and the standby ACEs. Clearing statistics on the active ACE only will leave the standby ACEs statistics at the old values.
Examples
Related Commands
clear rtcache
To clear the route cache, use the clear rtcache command. clear rtcache
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
1-35
CLI Commands
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-36
OL-25339-01
Chapter 1
clear screen
To clear the display screen, use the clear screen command. clear screen
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear serverfarm
To clear the statistics for all real servers in a specific server farm, use the clear serverfarm command. clear serverfarm name [inband | predictor | retcode]
Syntax Description
name inband
Name of an existing server farm. (Optional) Resets the inband health monitoring Total failure counters for the specified server farm, as displayed by the show serverfarm name inband command.
1-37
CLI Commands
predictor
(Optional) Resets the average bandwidth field for each real server in the specified server farm, as displayed by the show serverfarm name detail command. (Optional) Clears the return-code statistics for the server farm.
retcode
Command Modes
Command History
Modification This command was introduced. This command was revised. The predictor option was added. The inband option was added. Modification This command was introduced. This command was revised. The predictor option was added. The inband option was added.
Usage Guidelines
This command requires the serverfarm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear service-policy
To clear the service policy statistics, use the clear service-policy command. clear service-policy policy_name
Syntax Description
policy_name
1-38
OL-25339-01
Chapter 1
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show service-policy
1-39
CLI Commands
clear ssh
To clear a Secure Shell (SSH) session or clear the public keys of all SSH hosts, use the clear ssh command. clear ssh {session_id | hosts}
Syntax Description
session_id hosts
Identifier of the SSH session to clear, terminating the session. Clears the public keys of all trusted SSH hosts. This keyword is available to all users in all contexts.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To obtain the specific SSH session ID value, use the show ssh session-info command.
Examples
Related Commands
clear telnet show ssh (config) ssh key (config) ssh maxsessions
1-40
OL-25339-01
Chapter 1
clear startup-config
To clear the startup configuration of the current context, use the clear startup-config command. clear startup-config
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Clearing the startup configuration does not affect the context running-configuration. The clear startup-config command does not remove license files or crypto files (certs and keys) from the ACE. To remove license files, see the license uninstall command. To remove crypto files, see the crypto delete command. To clear the startup configuration, you can also use the write erase command. Before you clear a startup configuration, we recommend that you back up your current startup configuration to a file on a remote server using the copy startup-config command. Once you clear the startup configuration, you can perform one of the following processes to recover a copy of an existing configuration:
Use the copy running-config startup-config command to copy the contents of the running configuration to the startup configuration. Upload a backup of a previously saved startup-configuration file from a remote server using the copy startup-config command.
Examples
Related Commands
1-41
CLI Commands
clear stats
To clear the statistical information stored in the ACE buffer, use the clear stats command. clear stats {all | connection | {crypto [client | server [alert | authentication | cipher | termination]]} | http | inspect | kalap | loadbalance [radius | rdp | rtsp | sip] | optimization | probe | resource-usage | sticky}
Syntax Description
all connection crypto client server alert authentication cipher termination http inspect kalap loadbalance radius rdp rtsp sip optimization probe resource-usage sticky
Clears all statistical information in a context. The all keyword also clears the resource usage counters. Clears connection statistical information. Clears TLS and SSL statistics from the context. If you do not enter the client or server option, the ACE clears both the client and server statistics. (Optional) Clears the complete TLS and SSL client statistics for the current context. (Optional) Clears the complete TLS and SSL server statistics for the current context. (Optional) Clears the back-end SSL alert statistics. (Optional) Clears the back-end SSL authentication statistics. (Optional) Clears the back-end SSL cipher statistics. (Optional) Clears the back-end SSL termination statistics. Clears HTTP statistical information. Clears HTTP inspect statistical information. Clears the global server load-balancing (GSLB) statistics. Clears load-balancing statistical information. (Optional) Clears Remote Authentication Dial-In User Service (RADIUS) load-balancing statistical information. (Optional) Clears Reliable Datagram Protocol (RDP) load-balancing statistical information. (Optional) Clears Real-Time Streaming Protocol (RTSP) load-balancing statistical information. (Optional) Clears Session Initiation Protocol (SIP) load-balancing statistical information. (ACE appliance only) Clears HTTP optimization statistics Clears probe statistical information. Clears resource usage-related context statistics Clears sticky statistical information.
Command Modes
1-42
OL-25339-01
Chapter 1
Command History
Modification This command was introduced. The crypto keyword and client | server [alert | authentication | cipher | termination] options were added.
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. The resource-usage keyword was added. The crypto keyword and client | server [alert | authentication | cipher | termination] options were added.
Usage Guidelines
This command requires the loadbalance, inspect, NAT, connection, sticky, or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you have redundancy configured, then you need to explicitly clear sticky statistics on both the active and the standby ACEs. Clearing statistics on the active ACE only will leave the standby ACEs statistics at the old values.
Examples
Related Commands
show stats
1-43
CLI Commands
Syntax Description
active-conn-cou Clears the sticky database entries within the specified connection count range. nt min value1 max value2 all group name Clears all dynamic sticky database entries in a context. Clears all dynamic sticky database entries for the specified sticky group.
time-to-expire Clears the sticky database entries within the specified time to expire range. min value3 max value4 type {hash-key value5 | http-cookie value6 | ip-netmask {both {source ip_address1 destination ip_address2} | destination ip_address3 | source ip_address4}} Clears sticky database entries for one of the following sticky group types:
hash-key value http-cookie value ip-netmask {both {source ip_address2 destination ip_address3} |
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-44
OL-25339-01
Chapter 1
This command does not clear static sticky database entries. To clear static sticky database entries, use the no form of the appropriate sticky configuration mode command. For example, enter (config-sticky-cookie) static cookie-value or (config-sticky-header) static header-value .
Examples
To clear all dynamic sticky database entries in the Admin context, enter:
host1/Admin# clear sticky database all
Related Commands
1-45
CLI Commands
clear syn-cookie
To clear the SYN cookie statistics, use the clear syn-cookie command. To clear SYN cookie statistics for all VLANs that are configured in the current context, enter the command with no arguments. clear syn-cookie [vlan number]
Syntax Description
vlan number
(Optional) Instructs the ACE to clear SYN cookie statistics for the specified interface. Enter an integer from 2 to 2024.
Command Modes
Command History
A2(1.0)
A3(1.0)
Usage Guidelines
Examples
Related Commands
show syn-cookie
Syntax Description
Command Modes
1-46
OL-25339-01
Chapter 1
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear telnet
To clear a Telnet session, use the clear telnet command. clear telnet session_id
Syntax Description
session_id
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To obtain the specific Telnet session identification number, use the show telnet command.
Examples
To clear the Telnet session with the identification number of 236, enter:
Command Reference, Cisco ACE Application Control Engine
OL-25339-01
1-47
CLI Commands
Related Commands
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear user
To clear a user session, use the clear user command. clear user name
1-48
OL-25339-01
Chapter 1
Syntax Description
name
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the list of users that are currently logged in to the ACE, use the show users command.
Examples
Related Commands
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
1-49
CLI Commands
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
show vnet
1-50
OL-25339-01
Chapter 1
clear xlate
To clear the global address to the local address mapping information based on the global address, global port, local address, local port, interface address as global address, and NAT type, use the clear xlate command. clear xlate [{global | local} start_ip [end_ip [netmask netmask]]] [{gport | lport} start_port [end_port]] [interface vlan number] [state static] [portmap]
Syntax Description
global local start_ip end_ip netmask netmask gport lport start_port end_port state static portmap
(Optional) Clears the active translation by the global IP address. (Optional) Clears the active translation by the local IP address. Global or local IP address or the first IP address in a range of addresses. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). (Optional) Last IP address in a global or local range of IP addresses. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). (Optional) Specifies the network mask for global or local IP addresses. Enter a mask in dotted-decimal notation (for example, 255.255.255.0). (Optional) Clears active translations by the global port. (Optional) Clears active translations by the local port. Global or local port number. (Optional) Last port number in a global or local range of ports. (Optional) Clears active translations by the state. (Optional) Clears active translations by the port map.
interface vlan number (Optional) Clears active translations by the VLAN number.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you enter this command, the ACE releases sessions that are using the translations (Xlates). If you configure redundancy, then you need to explicitly clear Xlates on both the active and the standby ACEs. Clearing Xlates on the active ACE does not clear Xlates in the standby ACE.
1-51
CLI Commands
Examples
Related Commands
show xlate
1-52
OL-25339-01
Chapter 1
clock set
(ACE appliance only) To set the time and the date for an ACE, use the clock set command in Exec mode. clock set hh:mm:ss DD MONTH YYYY
Syntax Description
hh:mm:ss
Current time to which the ACE clock is being reset. Specify one or two digits for the hour, minutes, and seconds. Current date to which the ACE clock is being reset. Specify the full name of the month, one or two digits for the day, and four digits for the year. The following month names are recognized:
DD MONTH YYYY
January February March April May June July August September October November December
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you enter this command, the ACE displays the current configured date and time. If you want to use the Network Time Protocol (NTP) to automatically synchronize the ACE system clock to an authoritative time server (such as a radio clock or an atomic clock), see Chapter 1, Setting Up the ACE, in the Administration Guide, Cisco ACE Application Control Engine. In this case, the NTP time server automatically sets the ACE system clock.
1-53
CLI Commands
If you previously configured NTP on an ACE, the ACE prevents you from using the clock set command and displays an error message. To manually set the ACE system clock, remove the NTP peer and NTP server from the configuration before setting the clock on an ACE.
Examples
For example, to specify a time of 1:38:30 and a date of October 7, 2008, enter:
host1/Admin# clock set 01:38:30 7 Oct 2008 Wed Oct 7 01:38:30 PST 2008
Related Commands
compare
To compare an existing checkpoint with the running-configuration file, use the compare command. compare checkpoint_name
Syntax Description
checkpoint_name
Specifies the name of an existing checkpoint. The compare function defaults to comparing the specified checkpoint with the running-config.
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If the checkpoint configuration is the same as the running-config, the output of this command is:
Checkpoint config is same as running config
If the checkpoint configuration is different from the running-config, the output will be the difference between the two configurations.
Examples
To compare the CHECKPOINT_1 checkpoint with the running-config, enter the following command:
host1/Admin# compare CHECKPOINT_1
1-54
OL-25339-01
Chapter 1
Related Commands
configure
To change from the Exec mode to the configuration mode, use the configure command. configure [terminal]
Syntax Description
terminal
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires one or more features assigned to your user role, such as the AAA, interface, or fault-tolerant features. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To return to the Exec mode from the configuration mode, use the exit command. To execute an Exec mode command from any of the configuration modes, use the do version of the command.
Examples
Related Commands
exit
1-55
CLI Commands
copy capture
To copy an existing context packet capture buffer as the source file in the ACE compact flash to another file system, use the copy capture command. copy capture capture_name disk0: [path/]destination_name
Syntax Description
capture_name
Name of the packet capture buffer on the disk0: file system. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies that the buffer is copied to the disk0: file system.
disk0:
[path/]destination_name Destination path (optional) and name for the packet capture buffer. Specify a text string from 1 to 80 alphanumeric characters. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you copy a capture file to a remote server, you can use the delete disk0:filename command to delete the file from the ACE and free memory.
Examples
To copy the packet capture buffer to a file in disk0: called MYCAPTURE1, enter:
host1/Admin# copy capture CAPTURE1 disk0:MYCAPTURE1
Related Commands
1-56
OL-25339-01
Chapter 1
copy checkpoint
To copy a checkpoint file to a remote server, use the copy checkpoint command. copy checkpoint:filename disk0:[path/]filename | image:image_name | startup-config | {ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
filename disk0:[path/]filename
Filename of the checkpoint file residing on the ACE in flash memory. Specifies that the file destination is the disk0: directory of the current context and the filename for the checkpoint. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies that the file destination is an image in the image: directory. Specifies that the destination file is the startup-configuration file. Specifies the File Transfer Protocol (FTP) network server and optional renamed checkpoint file.
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP) network server and optional renamed checkpoint file. tftp://server[:port]/path[/filename] Specifies the Trivial File Transfer Protocol (TFTP) network server and optional renamed checkpoint file.
Command Modes
Command History
A2(1.6)
A4(1.0)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command.
1-57
CLI Commands
Copies the file to the root directory of the destination file system if you do not provide the path information.
Examples
To copy a checkpoint file from the ACE to a remote FTP server, enter:
host1/Admin# copy checkpoint:CHECKPOINT1.txt ftp://192.168.1.2 Enter the destination filename[]? [CHECKPOINT1.txt] Enter username[]? user1 Enter the file transfer mode[bin/ascii]: [bin] Password: Passive mode on. Hash mark printing on (1024 bytes/hash mark).
Note
The bin (binary) file transfer mode is intended for transferring compiled files (executables). The ascii file transfer mode is intended for transferring text files, such as config files. The default selection of bin should be sufficient in all cases when copying files to a remote FTP server.
Related Commands
1-58
OL-25339-01
Chapter 1
copy core:
To copy a core file to a remote server, use the copy core: command. copy core:filename disk0:[path/]filename | {ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
filename1
Filename of the core dump residing on the ACE in flash memory. Use the dir core: command to view the core dump files available in the core: file system. Specifies that the file destination is the disk0: directory of the current context and the filename for the core. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies the File Transfer Protocol (FTP) network server and optional renamed core dump.
disk0:[path/]filename2
ftp://server/path[/filename]
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP) network server and optional renamed core dump. tftp://server[:port]/path[/filename] Specifies the Trivial File Transfer Protocol (TFTP) network server and optional renamed core dump.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the list of available core files, use the dir core: command. Copy the complete filename (for example, 0x401_vsh_log.25256.tar.gz) into the copy core: command. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
1-59
CLI Commands
Examples
To copy a core file from the ACE to a remote FTP server, enter:
host1/Admin# copy core:np0_crash.txt ftp://192.168.1.2 Enter the destination filename[]? [np0_crash.txt] Enter username[]? user1 Enter the file transfer mode[bin/ascii]: [bin] Password: Passive mode on. Hash mark printing on (1024 bytes/hash mark).
Note
The bin (binary) file transfer mode is intended for transferring compiled files (executables). The ascii file transfer mode is intended for transferring text files, such as config files. The default selection of bin should be sufficient in all cases when copying files to a remote FTP server.
Related Commands
dir
copy disk0:
To copy a file from one directory in the disk0: file system of flash memory to another directory in disk0: or a network server, use the copy disk0: command. copy disk0:[path/]filename1 {disk0:[path/]filename2 | ftp://server/path[/filename] | image:image_filename | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename] | running-config | startup-config}
Syntax Description
disk0:[path/]filename1
Specifies the name of the file to copy in the disk0: file system. Use the dir disk0: command to view the files available in disk0:. If you do not provide the optional path, the ACE copies the file from the root directory on the disk0: file system. Specifies that the file destination is the disk0: directory of the current context and the filename for the core. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies the File Transfer Protocol (FTP) network server and optional renamed file. Specifies the image: filesystem and the image filename.
disk0:[path/]filename2
ftp://server/path[/filename] image:image_filename
sftp://[username@]server/path[/filename] Specifies the Secure File Transfer Protocol (SFTP) network server and optional renamed file. ftp://server[:port]/path[/filename] running-config startup-config Specifies the Trivial File Transfer Protocol (TFTP) network server and optional renamed file. Specifies to replace the running-configuration file that currently resides on the ACE in volatile memory. Specifies to replace the startup-configuration file that currently resides on the ACE in flash memory.
1-60
OL-25339-01
Chapter 1
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
Examples
To copy the file called SAMPLEFILE to the MYSTORAGE directory in flash memory, enter:
host1/Admin# copy disk0:samplefile disk0:MYSTORAGE/SAMPLEFILE
Related Commands
dir
1-61
CLI Commands
copy ftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote File Transfer Protocol (FTP) server to a location on the ACE, use the copy ftp: command. copy ftp://server/path[/filename] {disk0:[path/]filename | image:[image_name] | running-config | startup-config}
Syntax Description
ftp://server/path[/filename] disk0:[path/]filename
Specifies the FTP network server and optional file to copy. Specifies that the file destination is the disk0: directory of the current context and the filename. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies to copy a system software image to flash memory. Use the boot system command in configuration mode to specify the BOOT environment variable. The BOOT environment variable specifies a list of image files on various devices from which the ACE can boot at startup. The image: keyword is available only in the Admin context. The image_name argument is optional. If you do not enter a name, the ACE uses the source filename. Specifies to replace the running-configuration file that currently resides on the ACE in RAM (volatile memory). Specifies to replace the startup-configuration file that currently resides on the ACE in flash memory (nonvolatile memory).
image: [image_name]
running-config startup-config
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To copy a startup-configuration file from a remote FTP server to the ACE, enter:
host1/Admin# copy ftp://192.168.1.2/startup_config_Adminctx startup-config
Related Commands
1-62
OL-25339-01
Chapter 1
copy image:
To copy an ACE software system image from flash memory to a remote server using File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), or Trivial File Transfer Protocol (TFTP), use the copy image: command. copy image:image_filename {ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
image_filename
Name of the ACE system software image. Use the dir image: command or the show version command to view the software system images available in flash memory. Specifies the FTP network server and optional renamed image. Specifies the SFTP network server and optional renamed image. Specifies the TFTP network server and optional renamed image.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
Examples
1-63
CLI Commands
Related Commands
1-64
OL-25339-01
Chapter 1
copy licenses
To create a backup license file for the ACE licenses in the .tar format and copy it to the disk0: file system, use the copy licenses command. copy licenses disk0:[path/]filename.tar
Syntax Description
disk0:
Specifies that the backup license file is copied to the disk0: file system.
[path/]filename.tar Specifies the destination filename for the backup licenses. The destination filename must have a .tar file extension. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To copy the installed software licenses to the disk0: file system, enter:
host1/Admin# copy licenses disk0:mylicenses.tar
Related Commands
1-65
CLI Commands
copy probe:
To copy scripted probe files from the probe: directory to the disk0: file system on the ACE or a remote server using File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), or Trivial File Transfer Protocol (TFTP), use the copy probe: command. copy probe:probe_filename {disk0:[path/]filename | ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
Name of the scripted probe file. Use the dir probe: command to view the files available in flash memory. Specifies that the probe file is copied to the disk0: file system. Specifies the FTP network server and optional renamed image. Specifies the SFTP network server and optional renamed image. Specifies the TFTP network server and optional renamed image.
Command Modes
Command History
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
Examples
1-66
OL-25339-01
Chapter 1
Related Commands
dir
1-67
CLI Commands
copy running-config
To copy the contents of the running configuration file in RAM (volatile memory) to the startup configuration file in flash memory (nonvolatile memory) or a network server, use the copy running-config command. copy running-config {disk0:[path/]filename | startup-config | ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
disk0:[path/]filename
Specifies that the running configuration is copied to a file on the disk0: file system. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Copies the running configuration file to the startup configuration file. Specifies the File Transfer Protocol (FTP) network server and optional renamed file. Specifies the Secure File Transfer Protocol (SFTP) network server and optional renamed file. Specifies the Trivial File Transfer Protocol (TFTP) network server and optional renamed file.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
To copy the running configuration to the startup configuration, you can also use the write memory command.
1-68
OL-25339-01
Chapter 1
Examples
To save the running-configuration file to the startup-configuration file in flash memory on the ACE, enter:
host1/Admin# copy running-config startup-config
Related Commands
copy startup-config
To merge the contents of the startup configuration file into the running configuration file or copy the startup configuration file to a network server, use the copy startup-config command. copy startup-config {disk0:[path/]filename | running-config | ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}
Syntax Description
disk0:[path/]filename
Specifies that the startup configuration is copied to a file on the disk0: file system. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Merges contents of the startup configuration file into the running configuration file. Specifies the File Transfer Protocol (FTP) network server and optional renamed file. Specifies the Secure File Transfer Protocol (SFTP) network server and optional renamed file. Specifies the Trivial File Transfer Protocol (TFTP) network server and optional renamed file.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-69
CLI Commands
When you select a destination file system using ftp:, sftp:, or tftp:, the ACE does the following:
Prompts you for your username and password if the destination file system requires user authentication. Prompts you for the server information if you do not provide the information with the command. Copies the file to the root directory of the destination file system if you do not provide the path information.
Examples
To merge the contents of the startup-configuration file into the running-configuration file in flash memory, enter:
host1/Admin# copy startup-config running-config
Related Commands
show startup-config
copy sftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote Secure File Transfer Protocol (SFTP) server to a location on the ACE, use the copy sftp: command. copy sftp://[username@]server/path[/filename] {disk0:[path/]filename| image:[image_name] | running-config | startup-config}
Syntax Description
sftp://[username@]server/path[/filename] Specifies the SFTP network server and optional renamed file. disk0:[path/]filename Specifies that the file destination is the disk0: directory of the current context and the filename. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies to copy a system software image to flash memory. Use the boot system command in configuration mode to specify the BOOT environment variable. The BOOT environment variable specifies a list of image files on various devices from which the ACE can boot at startup. The image: keyword is available only in the Admin context. The image_name argument is optional. If you do not enter a name, the ACE uses the source filename. Specifies to replace the running-configuration file that currently resides on the ACE in RAM (volatile memory). Specifies to replace the startup-configuration file that currently resides on the ACE in flash memory (nonvolatile memory).
image: [image_name]
running-config startup-config
Command Modes
Exec
1-70
OL-25339-01
Chapter 1
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To copy a startup-configuration file from a remote SFTP server to the ACE, enter:
host1/Admin# copy sftp://192.168.1.2/startup_config_Adminctx startup-config
Related Commands
1-71
CLI Commands
copy tftp:
To copy a file, software image, running-configuration file, or startup-configuration file from a remote Trivial File Transfer Protocol (TFTP) server to a location on the ACE, use the copy tftp: command. copy tftp://server[:port]/path[/filename] {disk0:[path/]filename | image:[image_name] | running-config | startup-config}
Syntax Description
tftp://server[:port]/path[/filename] disk0:[path/]filename
Specifies the TFTP network server and optional renamed file. Specifies that the file destination is the disk0: directory of the current context and the filename. If you do not provide the optional path, the ACE copies the file to the root directory on the disk0: file system. Specifies to copy a system software image to flash memory. Use the boot system command in configuration mode to specify the BOOT environment variable. The BOOT environment variable specifies a list of image files on various devices from which the ACE can boot at startup. The image: keyword is available only in the Admin context. The image_name argument is optional. If you do not enter a name, the ACE uses the source filename. Specifies to replace the running-configuration file that currently resides on the ACE in RAM (volatile memory). Specifies to replace the startup-configuration file that currently resides on the ACE in flash memory (nonvolatile memory).
image: [image_name]
running-config startup-config
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the config-copy feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To copy a startup-configuration file from a remote TFTP server to the ACE, enter:
host1/Admin# copy tftp://192.168.1.2/startup_config_Adminctx startup-config
1-72
OL-25339-01
Chapter 1
Related Commands
crypto crlparams
To configure signature verification on a Certificate Revocation List (CRL) to determine that it is from a trusted certificate authority, use the crypto crlparams command. crypto crlparams crl_name cacert ca_cert_filename no crypto crlparams crl_name
Syntax Description
crl_name ca_cert_filename
Name of an existing CRL. Name of the CA certificate file used for signature verification.
Command Modes
Command History
A3(2.2)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config-ssl-proxy) crl
1-73
CLI Commands
crypto delete
To delete a certificate and key pair file from the ACE that is no longer valid, use the crypto delete command. crypto delete {filename | all}
Syntax Description
filename all
Name of a specific certificate or key pair file to delete. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Deletes all of the certificate and key pair files.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The all option does not delete the preinstalled sample certificate and key files. When you use the all keyword, the ACE prompts you with the following message to verify the deletion:
This operation will delete all crypto files for this context from the disk, but will not interrupt existing SSL services. If new SSL files are not applied SSL services will be disabled upon next vip inservice or device reload. Do you wish to proceed? (y/n) [n]
To view the list of the certificate and key pair files stored on the ACE for the current context, use the show crypto files command. You cannot delete the ACE cisco-sample-key and cisco-sample-cert files.
Examples
Related Commands
1-74
OL-25339-01
Chapter 1
crypto export
To export a copy of a certificate or key pair file from the ACE to a remote server or the terminal screen, use the crypto export command. crypto export local_filename {ftp | sftp | tftp | terminal} ip_addr username remote_filename
Syntax Description
Name of the file stored on the ACE to export. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Specifies the File Transfer Protocol (FTP) file transfer process. Specifies the Secure File Transfer Protocol (SFTP) file transfer process. Specifies the Trivial File Transfer Protocol (TFTP) file transfer process. Displays the file content on the terminal for copy and paste purposes. Use the terminal keyword when you need to cut and paste certificate or private key information from the console. You can only use the terminal method to display PEM files, which are in ASCII format. IP address or name of the remote server. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). Username required to access the remote server. The ACE prompts you for your password when you enter the command. Name to save the file to on the remote server. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You cannot export a certificate or key pair file that you marked as nonexportable when you imported the file to the ACE. The remote server variables listed after the terminal keyword in the Syntax Description are used by the ACE only when you select a transport type of ftp, sftp, or tftp (the variables are not used for terminal). We recommend using SFTP as it provides the most security. To view the list of the certificate and key pair files stored on the ACE for the current context, use the show crypto files command.
1-75
CLI Commands
Examples
To use SFTP to export the key file MYKEY.PEM from the ACE to a remote SFTP server, enter:
host1/Admin# crypto export MYKEY.PEM sftp 192.168.1.2 JOESMITH /USR/KEYS/MYKEY.PEM User password: **** Writing remote file /usr/keys/mykey.pem host1/Admin#
Related Commands
Syntax Description
csr_params
CSR parameters file that contains the distinguished name attributes. The ACE applies the distinguished name attributes contained in the CSR parameters file to the CSR. To create a CSR parameters file, use the (config) crypto csr-params command in the configuration mode.
key_filename
RSA key pair filename that contains the key on which the CSR is built. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. It is the public key that the ACE embeds in the CSR. Ensure that the RSA key pair file is loaded on the ACE for the current context. If the appropriate key pair does not exist, the ACE logs an error message.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The crypto generate csr command generates the CSR in PKCS10 encoded in PEM format and outputs it to the screen. Most major certificate authorities have web-based applications that require you to cut and paste the certificate request to the screen. If necessary, you can also cut and paste the CSR to a file.
1-76
OL-25339-01
Chapter 1
Note
The ACE does not save a copy of the CSR locally. After submitting your CSR to the CA, you will receive your signed certificate in one to seven business days. When you receive your certificate, use the crypto import command to import the certificate to the ACE.
Examples
To generate a CSR that is based on the CSR parameter set CSR_PARAMS_1 and the RSA key pair in the file MYRSAKEY_1.PEM, enter:
host1/Admin# crypto generate csr CSR_PARAMS_1 MYRSAKEY_1.PEM
Related Commands
Syntax Description
non-exportable bitsize
(Optional) Marks the key pair file as nonexportable, which means that you cannot export the key pair file from the ACE. Key pair security strength. The number of bits in the key pair file defines the size of the RSA key pair used to secure web transactions. Longer keys produce a more secure implementation by increasing the strength of the RSA security policy. Available entries (in bits) are as follows:
512 (least security) 768 (normal security) 1024 (high security, level 1) 1536 (high security, level 2) 2048 (high security, level 3
filename
Name that you assign to the generated RSA key pair file. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters.The key pair filename is used only for identification purposes by the ACE.
Command Modes
Command History
3.0(0)A1(2)
1-77
CLI Commands
A1(7)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To generate the RSA key pair file MYRSAKEYS.PEM with a bit size of 1536, enter:
host1/Admin# crypto generate key 1536 MYRSAKEYS.PEM
Related Commands
crypto delete crypto export crypto generate csr crypto import crypto verify show crypto
crypto import
To import certificate or key pair files to the ACE or terminal screen from a remote server, use the crypto import command. crypto import [non-exportable] {bulk sftp [passphrase passphrase] ip_addr username remote_url} | {{ftp | sftp} [passphrase passphrase] ip_addr username remote_filename local_filename} | {tftp [passphrase passphrase] ip_addr remote_filename local_filename} | terminal local_filename [passphrase passphrase]
Syntax Description
(Optional) Specifies that the ACE marks the imported file as nonexportable, which means that you cannot export the file from the ACE. Specifies the importing of multiple certificate or key pair files simultaneously. Specifies the Secure File Transfer Protocol (SFTP) file transfer process. Specifies the File Transfer Protocol (FTP) file transfer process. (Optional) Indicates that the file was created with a passphrase, which you must submit with the file transfer request in order to use the file. The passphrase pertains only to encrypted PEM files and PKCS files. IP address or name of the remote server. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). Username required to access the remote server. The ACE prompts you for your password when you enter the command.
1-78
OL-25339-01
Chapter 1
remote_url
Path to the certificate or key pair files that reside on the remote server to import. The ACE matches only files specified by the URL. Enter a file path including wildcards (for example, /remote/path/*.pem). To fetch all files from a remote directory, specify a remote URL that ends with a wildcard character (for example, /remote/path/*). The ACE module fetches all files on the remote server that matches the wildcard criteria. However, it imports only files with names that have a maximum of 40 characters. If the name of a file exceeds 40 characters, the ACE module does not import the file and discards it.
remote_filename
Name of the certificate or key pair file that resides on the remote server to import. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Name to save the file to when imported to the ACE. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Specifies the Trivial File Transfer Protocol (TFTP) file transfer process. Allows you to import a file using cut and paste by pasting the certificate and key pair information to the terminal display. You can only use the terminal method to display PEM files, which are in ASCII format.
Command Modes
Command History
Modification This command was introduced. The bulk keyword was introduced.
3.0(0)A1(2) A2(2.0)
Modification This command was introduced. The bulk keyword was introduced.
A1(7) A4(1.0)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Because a device uses its certificate and corresponding public key together to prove its identity during the SSL handshake, be sure to import both corresponding file types: the certificate file and its corresponding key pair file. The remote server variables listed after the passphrase variable in the Syntax Description table are only used by the ACE when you select a transport type of ftp, sftp, or tftp (the variables are not used for terminal). If you select one of these transport types and do not define the remote server variables, the ACE prompts you for the variable information. We recommend using SFTP because it provides the most security. The ACE supports the importation of PEM-encoded SSL certificates and keys with a maximum line width of 130 characters using the terminal. If an SSL certificate or key is not wrapped or it exceeds 130 characters per line, use a text editor such as the visual (vi) editor or Notepad to manually wrap the
1-79
CLI Commands
certificate or key to less than 130 characters per line. Alternatively, you can import the certificate or key by using SFTP, FTP, or TFTP with no regard to line width. Of these methods, we recommend SFTP because it is secure. This bulk keyword imports files with the names that they have on the remote server and does not allow you to rename the files. If you attempt to import a file that has the same filename of an existing local file, the ACE module does not overwrite the existing file. Before importing the updated file, you must either delete the local file or rename the imported file. The ACE supports 4096 certificates and 4096 keys. The ACE allows a maximum public key size of 4096 bits. The maximum private key size is 2048 bits. To view the list of the certificate and key pair files stored on the ACE for the current context, use the show crypto files command.
Examples
To import the RSA key file MYRSAKEY.PEM from an SFTP server, enter:
host1/Admin# crypto import non-exportable sftp 1.1.1.1 JOESMITH /USR/KEYS/MYRSAKEY.PEM MYKEY.PEM Password: ******** Passive mode on. Hash mark printing on (1024 bytes/hash mark). # Successfully imported file from remote server. host1/Admin#
This example shows how to use the terminal keyword to allow pasting of the certificate information to the file MYCERT.PEM:
host1/Admin# crypto import terminal MYCERT.PEM Enter PEM formatted data ending with a blank line or quit on a line by itself --------BEGIN CERTIFICATE----------------------MIIC1DCCAj2gAwIBAgIDCCQAMA0GCSqGSIb3DQEBAgUAMIHEMQswCQYDVQQGEwJa QTEVMBMGA1UECBMMV2VzdGVybiBDYXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xHTAb BgNVBAoTFFRoYXd0ZSBDb25zdWx0aW5nIGNjMSgwJgYDVQQLEx9DZXJ0aWZpY2F0 aW9uIFNlcnZpY2VzIERpdmlzaW9uMRkwFwYDVQQDExBUaGF3dGUgU2VydmVyIENB MSYwJAYJKoZIhvcNAQkBFhdzZXJ2ZXItY2VydHNAdGhhd3RlLmNvbTAeFw0wMTA3 -----------END CERTIFICATE-----------------------QUIT host1/Admin#
This example shows how to use the bulk keyword to import all of the RSA key files from an SFTP server:
host1/Admin# crypto import bulk sftp 1.1.1.1 JOESMITH /USR/KEYS/*.PEM Initiating bulk import. Please wait, it might take a while... Connecting to 1.1.1.1... Password: password ... Bulk import complete. Summary: Network errors: 0 Bad file URL: 0 Specified local files already exists: 0 Invalid file names: 1 Failed reading remote files: 5 Failed reading local files: 0 Failed writing local files: 0 Unknown errors: 0 Successfully imported: 10 host1/Admin#
1-80
OL-25339-01
Chapter 1
Related Commands
1-81
CLI Commands
crypto verify
To compare the public key in a certificate with the public key in a key pair file, and to verify that they are identical, use the crypto verify command. crypto verify key_filename cert_filename
Syntax Description
key_filename
Name of the key pair file (stored on the ACE) that the ACE uses to verify against the specified certificate. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Name of the certificate file (stored on the ACE) that the ACE uses to verify against the specified key pair. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters.
cert_filename
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If the public key in the certificate does not match the public key in the key pair file, the ACE logs an error message. To view the list of the certificate and key pair files stored on the ACE for the current context, use the show crypto files command.
Examples
To verify that the public keys in the Admin context files MYRSAKEY.PEM and MYCERT.PEM match, enter:
host1/Admin# crypto verify MYRSAKEY.PEM MYCERT.PEM keypair in myrsakey.pem matches certificate in mycert.pem
This example shows what happens when the public keys do not match:
host1/Admin# crypto verify MYRSAKEY2.PEM MYCERT.PEM Keypair in myrsakey2.pem does not match certificate in mycert.pem host1/Admin#
Related Commands
crypto import
1-82
OL-25339-01
Chapter 1
show crypto
debug
To enable the ACE debugging functions, use the debug command. debug {aaa | access-list | accmgr | arpmgr | bpdu | buffer | cfg_cntlr | cfgmgr [rhi-info] | clock | fifo | fm | gslb | ha_dp_mgr | ha_mgr | hm | ifmgr | ip | ipcp | lcp | ldap | license | logfile | mtsmon | nat-download | netio | ntp | pfmgr | pktcap | portmgr | radius | routemgr | scp | scripted_hm | security | sme | snmp | ssl | syslogd | system | tacacs+ | time | tl | virtualization | vnet}
Syntax Description
aaa access-list accmgr arpmgr bpdu buffer cfg_cntlr cfgmgr rhi-info clock fifo fm gslb ha_dp_mgr ha_mgr hm ifmgr ip ipcp lcp ldap license logfile mtsmon nat-download netio ntp
Enables debugging for authentication, authorization, and accounting (AAA). Enables access-list debugging. Loglevel options for application acceleration CM. Enables Address Resolution Protocol (ARP) manager debugging. Enables bridge protocol data unit (BPDU) debugging. Configures debugging of CP buffer manager. Enables configuration controller debugging. Enables configuration manager debugging. (Optional, ACE module only) Enables route health injection (RHI) debugging. (ACE module only) Enables clock module debugging. Configures debugging of the packet first in, first out (FIFO) driver. Enables ACE feature manager debugging. Enables GSLB protocol debugging. Enables HA-DP debugging. Enables HA debugging. Enables HM debugging. Enables interface manager debugging. Enables IP service debugging. Enables interprocess control protocol debugging. (ACE module only) Enables the debugging of the line card processor. Configures debugging for Lightweight Directory Access Protocol (LDAP). Enables the debugging of licensing. Directs the debug output to a log file. Enables MTS monitor debugging. Enables Network Address Translation (NAT) download debugging. Enables the debugging of the CP network I/O. (ACE appliance only) Debugs the Network Time Protocol (NTP) module.
1-83
CLI Commands
pfmgr pktcap portmgr radius routemgr ipcp scp scripted_hm security sme snmp ssl syslogd system tacacs+ tl virtualization vnet
Enables the debugging of the platform manager. Enables packet capture debugging. (ACE appliance only) Debugs the port manager. Configures debugging for the Remote Authentication Dial-In User Service (RADIUS) daemon. Enables route manager debugging. Enables the debugging of the kernel IPCP component. (ACE module only) Configures debugging for the Switch Module Control protocol. Enables scripted health monitoring debugging. Enables the debugging for security and accounting. Enables the debugging for the System Manager Extension. Configures Simple Network Management Protocol (SNMP) server debugging. Enables ACE SSL manager debugging. Enables syslogd debugging. Enables debugging of the system components. Configures debugging for Terminal Access Controller Access Control System Plus (TACACS+). Configures debugging of TL driver. Enables virtualization debugging. Configures debugging of virtual net-device driver.
Command Modes
Command History
Modification This command was introduced. This command was revised. The rhi-info option was added.
Modification This command was introduced. This command was revised. The hardware and optimize options was removed.
Usage Guidelines
This command is available to roles that allow debugging and to network monitor or technician users. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-84
OL-25339-01
Chapter 1
The ACE debug commands are intended for use by trained Cisco personnel only. Entering these commands may cause unexpected results. Do not attempt to use these commands without guidance from Cisco support personnel.
Examples
Related Commands
1-85
CLI Commands
delete
To delete a specified file in an ACE file system, use the delete command. delete {core:filename | disk0:[path/]filename | image:filename | volatile:filename}
Syntax Description
core:filename disk0:[path/]filename
Deletes the specified file from the core: file system. Deletes the specified file from the disk0: file system. If you do not specify the optional path, the ACE looks for the file in the root directory of the disk0: file system. Deletes the specified file from the image: file system. Deletes the specified file from the volatile: file system.
image:filename volatile:filename
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you do not specify a filename with the file system keyword, the ACE prompts you for a filename. To display the list of files that reside in a file system, use the dir command.
Examples
To delete the file 0x401_VSH_LOG.25256.TAR.GZ from the core: file system, enter:
host1/Admin# delete core:0x401_VSH_LOG.25256.TAR.GZ
Related Commands
dir
1-86
OL-25339-01
Chapter 1
dir
To display the contents of a specified ACE file system, use the dir command. dir {core: | disk0:[path/][filename] | image:[filename] | probe:[filename] | volatile:[filename]}
Syntax Description
Displays the contents of the core: file system. Displays the contents of the disk0: file system. Specify the optional path to display the contents of a specific directory on the disk0: file system. Displays the contents of the image: file system. Displays the contents of the probe: file system. This directory contains the Cisco-supplied scripts. For more information about these scripts, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. Displays the contents of the volatile: file system. (Optional) Specified file to display. Displays information, such as the file size and the date that it was created. You can use wildcards in the filename. A wildcard character (*) matches all patterns. Strings after a wildcard are ignored.
volatile: filename
Command Modes
Command History
Modification This command was introduced. The probe: option was introduced.
3.0(0)A1(2) A2(1.0)
Modification This command was introduced. The probe: option was introduced.
A1(7) A3(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To delete a file from a file system, use the delete command. To delete all core dumps, use the clear cores command.
Examples
1-87
CLI Commands
Related Commands
1-88
OL-25339-01
Chapter 1
dm
(ACE Appliance only) To verify the state of the Device Manager (DM), restart it when it is inoperative, or upload a lifeline file to a TFTP server, use the dm command. dm {help | {lifeline tftp host port}| reload | status}
Syntax Description
Displays the list of keywords that are available for use on the dm command. Creates and uploads a lifeline (anm-lifeline.tar.gz) file through TFTP. Restarts the DM with a reinitialized database. Displays the status of the DM.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-89
CLI Commands
exit
To exit out of Exec mode and log out the CLI session, use the exit command. exit
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-90
OL-25339-01
Chapter 1
format flash:
To erase all data stored in the Flash memory and reformat it with the ACE module FAT16 filesystem or the ACE appliance third extended filesystem (ext3) as the base file system, use the format flash: command. All user-defined configuration information is erased and the ACE returns to the factory-default settings. format flash:
Syntax Description
Command Modes
Command History
Modification This command was introduced and replaced the format disk0: command.
A4(1.0)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. (ACE appliance only) The ACE performs the following verification sequence prior to reformatting Flash memory:
If the system image (the current loaded image) is present in the GNU GRand Unified Bootloader (GRUB) boot loader, the ACE automatically performs a backup of that image and then performs the reformat of Flash memory. If the system image is not present in the GRUB boot loader, the ACE prompts you for the location of an available image to backup prior to reformatting the Flash memory. If you choose not to backup an available image file, the ACE searches for the ACE-APPLIANCE-RECOVERY-IMAGE.bin image in the Grub partition of Flash memory. ACE-APPLIANCE-RECOVERY-IMAGE.bin is the recovery software image that the ACE uses if the disk partition in Flash memory is corrupted.
If ACE-APPLIANCE-RECOVERY-IMAGE.bin is present, the ACE continues with the Flash
memory reformat. The CLI prompt changes to switch(RECOVERY-IMAGE)/Admin# as a means for you to copy the regular ACE software image.
If ACE-APPLIANCE-RECOVERY-IMAGE.bin is not present, the ACE stops the Flash memory
reformat because there is no image to boot after format. Before you reformat the Flash memory, you should save a copy of the following ACE operation and configuration attributes to a remote server:
OL-25339-01
1-91
CLI Commands
ACE license (use the copy licenses command) Startup configuration of each context (use the copy startup-config command) Running configuration of each context (use the copy running-config command) Core dump files of each context (use the copy core: command) Packet capture buffers of each context (use the copy capture command) Secure Sockets Layer (SSL) certificate and key pair files of each context (use the crypto export command) Copy the ACE software image to the image: file system using the copy ftp:, copy tftp:, or copy sftp: command Reinstall the ACE license using the license command Import the following configuration files into the associated context using the copy disk0: command:
Startup-configuration file Running-configuration file
After you reformat the Flash memory, perform the following actions:
Import the following SSL files into the associated context using the crypto import command:
SSL certificate files SSL key pair files
Examples
For example, to erase all information in Flash memory and reformat it, enter:
host1/Admin# format flash: Warning!! This will erase everything in the compact flash including startup configs for all the contexts and reboot the system!! Do you wish to proceed anyway? (yes/no) [no] yes
If the ACE fails to extract a system image from the Grub bootloader, it prompts you to provide the location of an available system image to backup:
Failed to extract system image Information from Grub backup specific imagefile? (yes/no) [no] yes Enter Image name: scimi-3.bin Saving Image [scimi-3.bin] Formatting the cf..... Unmounting ext3 filesystems... Unmounting FAT filesystems... Unmounting done... Unmounting compact flash filesystems... format completed successfully Restoring Image backupimage/scimi-3.bin kjournald starting. Commit interval 5 seconds REXT3 FS on hdb2, internal journal EXT3-fs: mounted filesystem with ordered data mode. starting graceful shutdown switch/Admin# Unmounting ext3 filesystems... Unmounting FAT filesystems... Unmounting done...
1-92
OL-25339-01
Chapter 1
Related Commands
copy capture copy ftp: copy tftp: copy sftp: crypto export crypto import dir license
ft switchover
To purposely cause a failover to make a particular context active, use the ft switchover command. ft switchover [all [force] | force | group_id [force]]
Syntax Description
all force
(Optional) Causes a switchover of all FT groups configured in the ACE simultaneously. (Optional) Causes a switchover of the Admin context if you enter the command in the Admin context and do not specify a group ID, or the specified FT group, while ignoring the state of the standby member. Use this option only when the fault-tolerant (FT) VLAN is down. (Optional) Causes a switchover of the specified FT group. Enter the ID of an existing FT group as an integer from 1 to 255.
group_id
Command Modes
Command History
3.0(0)A1(2) A2(1.0)
Modification This command was introduced. Added the all keyword. This command is disabled by default for the network-monitor role.
Usage Guidelines
This command requires the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By using the ft switchover command, you direct the standby group member to statefully become the active member of the FT group, which forces a switchover.
1-93
CLI Commands
You may need to force a switchover when you want to make a particular context the standby (for example, for maintenance or a software upgrade on the currently active context). If the standby group member can statefully become the active member of the FT group, a switchover occurs. To use this command, you must configure the no preempt command in FT group configuration mode. The ft switchover command exhibits the following behavior, depending on whether you enter the command from the Admin context or a user context:
Admin contextIf you specify an FT group ID, then the FT group specified by the group ID switches over. If you do not specify a group ID, then the Admin context switches over. User contextBecause you cannot specify an FT group ID in a user context, the context in which you enter the command switches over.
When you specify the ft switchover command, there may be brief periods of time when the configuration mode is enabled on the new active group member to allow the administrator to make configuration changes. However, these configuration changes are not synchronized with the standby group member and will exist only on the active group member. We recommend that you refrain from making any configuration changes after you enter the ft switchover command until the FT states stabilize to ACTIVE and STANDBY_HOT. Once the FT group reaches the steady state of ACTIVE and STANDBY_HOT, any configuration changes performed on the active group member will be incrementally synchronized to the standby group member, assuming that configuration synchronization is enabled.
Examples
To cause a switchover from the active ACE to the standby ACE of FT group1, enter:
host1/Admin# ft switchover 1
Related Commands
(config-ft-group) preempt
gunzip
To uncompress (unzip) LZ77 coded files residing in the disk0: file system (for example, zipped probe script files), use the gunzip command. gunzip disk0:[path/]filename.gz
Syntax Description
disk0:[path/]filename.gz
Specifies the name of the compressed file on the disk0: file system. The filename must end with a .gz extension. If you do not specify the optional path, the ACE looks for the file in the root directory.
Command Modes
Command History
3.0(0)A1(2)
1-94
OL-25339-01
Chapter 1
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is useful in uncompressing large files. The filename must end with a .gz extension for the file to be uncompressed using the gunzip command. The .gz extension indicates a file that is zipped by the gzip (GNU zip) compression utility. To display a list of available zipped files on disk0:, use the dir command.
Examples
To unzip a compressed series of probe script files from the file PROBE_SCRIPTS in the disk0: file system, enter:
host1/Admin# gunzip disk0:PROBE_SCRIPTS.gz
Related Commands
dir
invoke context
To display the context running configuration information from the Admin context, use the invoke context command. invoke context context_name show running-config Syntax Description
context_name
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-95
CLI Commands
Examples
To display the running configuration for the C1 user context from the Admin context, enter:
host1/Admin# invoke context C1 show running-config
Related Commands
license
To install, update, or uninstall licenses on the ACE, use the license command. license {install disk0:[path/]filename [target_filename] | uninstall {name | all} | update disk0:[path/]permanent_filename demo_filename}
Syntax Description
install disk0:[path/]filename
Installs a demo or permanent license from the disk0: file system into flash memory on the ACE. The filename is the name of the license on the disk0: file system. If you do not specify the optional path, the ACE looks for the file in the root directory. (Optional) Target filename for the license file. Uninstalls the specified license file. Enter the license name as an unquoted text string with no spaces. Uninstalls all installed licenses in the ACE. Updates an installed demo license with a permanent license. Filename for the permanent license. Filename for the demo license.
Command Modes
Command History
Modification This command was introduced. Added the all keyword to the uninstall option
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. Added the all keyword to the uninstall option
A1(7) A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
1-96
OL-25339-01
Chapter 1
After you receive a demo or permanent software license key in an e-mail from Cisco Systems, you must copy the license file to a network server and then use the copy tftp command in Exec mode to copy the file to the disk0: file system on the ACE. To update an installed demo license with a permanent license, use the license update command. The demo license is valid for 60 days. To view the expiration of the demo license, use the show license usage command. To back up license files, use the copy licenses command
Caution
When you remove a demo or permanent virtual context license, the ACE removes all user contexts from the Admin running configuration. By removing the user contexts, their running and startup configurations are also removed from the ACE. Before removing any virtual context license, back up the Admin running configuration and the user context running configurations to a remote server. For more information about the types of ACE licenses available and how to manage the licenses on your ACE, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
mkdir disk0:
To create a new directory in disk0:, use the mkdir disk0: command. mkdir disk0:[path/]directory_name
Syntax Description
[path/]directory_name
Name that you assign to the new directory. Specify the optional path if you want to create a directory within an existing directory.
1-97
CLI Commands
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If a directory with the same name already exists, the ACE does not create the new directory and the Directory already exists message appears.
Examples
Related Commands
move disk0:
To move a file between directories in the disk0: file system, use the move disk0: command. move disk0:[source_path/]filename disk0:[destination_path/]filename
Syntax Description
Indicates the disk0: file system of the current context. (Optional) Path of the source directory. (Optional) Path of the destination directory. Name of the file to move in the disk0: file system.
Command Modes
Command History
3.0(0)A1(2)
1-98
OL-25339-01
Chapter 1
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If a file with the same name already exists in the destination directory, that file is overwritten by the file that you move.
Examples
To move the file called SAMPLEFILE in the root directory of disk0: to the MYSTORAGE directory in disk0:, enter:
host1/Admin# move disk0:SAMPLEFILE disk0:MYSTORAGE/SAMPLEFILE
Related Commands
dir
np session
(ACE module only) To execute network processor-related commands, use the np session command. np session {disable | enable}
Syntax Description
disable enable
Disables sessions to the network processor from the supervisor engine. Enables sessions to the network processor from the supervisor engine.
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To enable sessions to the network processor from the supervisor engine, enter:
host1/Admin# np session enable
1-99
CLI Commands
Related Commands
1-100
OL-25339-01
Chapter 1
ping
To verify the connectivity of a remote host or server by sending echo messages from the ACE, use the ping command. ping [ip | ipv6 [system_address [count count [size size [timeout time]]]]]
Syntax Description
ip | ipv6 system_address
(Optional) Specifies the IPv4 or IPv6 protocol. If you do not specify the IP protocol, it is inferred from the address. (Optional) IP address of the remote host to ping. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). If you do not specify the IP address of the remote host, the CLI prompts you for the information. (Optional) Repeat count. Enter the repeat count as an integer from 1 to 65000. The default is 5. (Optional) Datagram size. Enter the datagram size as an integer from 36 to 1440. The default is 100. (Optional) Timeout in seconds. Enter the timeout value as an integer from 0 to 3600. The default is 2.
Command Modes
Command History
Modification This command was introduced. The size option was increased from 452 to 1440. Added IPv6 support.
Modification This command was introduced. At the datagram size prompt for the extended ping command, the size was increased from 452 to 1400. The size option was increased from 452 to 1440. Added IPv6 support.
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ping command sends an echo request packet to an address from the current context on the ACE and then awaits a reply. The ping output can help you evaluate path-to-host reliability, delays over displaying the name of the current directory and the path, and whether the host can be reached or is functioning. To terminate a ping session before it reaches its timeout value, press Ctrl-C.
1-101
CLI Commands
Examples
IPv6 Example
To send a ping to the IPv6 loopback address 0:0:0:0:0:0:0:1, enter the following command:
host1/Admin# ping ::1 PING 0:0:0:0:0:0:0:1(::1) 56 data bytes 64 bytes from ::1: icmp_seq=1 ttl=255 time=0.039 64 bytes from ::1: icmp_seq=2 ttl=255 time=0.000 64 bytes from ::1: icmp_seq=3 ttl=255 time=0.000 64 bytes from ::1: icmp_seq=4 ttl=255 time=0.108 64 bytes from ::1: icmp_seq=5 ttl=255 time=0.126
ms ms ms ms ms
--- 0:0:0:0:0:0:0:1 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 8002ms rtt min/avg/max/mdev = 0.000/0.054/0.126/0.053 ms
To ping the FTP server with an IP address of 196.168.1.2 using the default ping session values, enter:
host1/Admin# ping 196.168.1.2
Related Commands
traceroute
1-102
OL-25339-01
Chapter 1
reload
To reload the configuration on the ACE, use the reload command. reload
Syntax Description
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The reload command reboots the ACE and performs a full power cycle of both the hardware and software. The reset process can take several minutes. Any open connections with the ACE are dropped after you enter the reload command.
Caution
Configuration changes that are not written to flash memory are lost after a reload. Before rebooting, enter the copy running-conf startup-config command to save a copy of the running configuration to the startup configuration in flash memory. If you fail to save your running configuration changes, the ACE reverts to the last saved version of the startup configuration upon restart.
Examples
Related Commands
1-103
CLI Commands
reprogram bootflash
(ACE module only) To reprogram the field upgradable (FUR) partition of the ROM monitor (rommon) image on the ACE, use the reprogram bootflash command. reprogram bootflash {default-image {disk0:[path/]filename | image:[path/]filename} | fur-image {disk0:[path/]filename | image:[path/]filename} | invalidate-fur-image | validate-fur-image}
Syntax Description
Reprograms the rommon image default partition. Reprograms the rommon image FUR partition. Specifies a file stored on the disk0: file system. Specifies the rommon image stored on the image: file system. Invalidates the rommon image FUR partition. Validates the rommon image FUR partition.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The reprogram bootflash command is intended for use by trained Cisco personnel only. Entering this command may cause unexpected results. Do not attempt to use the reprogram bootflash command without guidance from Cisco support personnel.
Examples
To reprogram the rommon image FUR partition on the image: file system, enter:
host1/Admin# reprogram bootflash fur-image image:sb-ace.NOV_11
Related Commands
1-104
OL-25339-01
Chapter 1
restore
To restore the configuration files and dependent files in a context or in all contexts, use the restore command. restore {[all] disk0:archive_filename} [pass-phrase text_string] [exclude {licenses | ssl-files}]
Syntax Description
Specifies that the ACE should restore the configuration files and dependencies in all contexts. You can specify this keyword only in the Admin context. Name of the archive file that you want to restore.
exclude licenses (Optional) Excludes licenses or SSL certificates and keys from the restoration. Use | ssl-files this option only if you want to keep the license or SSL files already present in your ACE and ignore the license or SSL files in the backup archive, if any. pass-phrase text_string Passphrase that you used to encrypt the backed up SSL keys in the archive. Enter the passphrase as an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. If you used a passphrase when you backed up the SSL keys, the ACE encrypted the keys with AES-256 encryption using OpenSSL software. To restore the SSL keys, you must enter that same passphrase.
Note
If you forget your passphrase, import the required SSL files first. Then, use the exclude option of the restore command to restore e the backup archive.
Command Modes
Command History
A2(3.0)
A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The restore command has the following configuration guidelines and limitations:
The restore command will cause an interruption in service for the two contexts in a redundant configuration. We recommend that you schedule the restoration of a backup archive on a redundant pair during a maintenance window. When you instruct the ACE to restore the archive for the entire ACE in the Admin context, it restores the Admin context completely first, and then it restores the other contexts. The ACE restores all dependencies before it restores the running context. The order in which the ACE restores dependencies is as follows:
License files
1-105
CLI Commands
SSL certificates and key files Health-monitoring scripts Checkpoints Startup-configuration file Running-configuration file
After you restore license files, previously installed license files are uninstalled and the restored files are installed in their place. In a redundant configuration, if the archive that you want to restore is different from the peer configurations in the FT group, redundancy may not operate properly after the restoration. You can restore a single context from an ACE-wide backup archive provided that:
You enter the restore command in the context that you want to restore All files dependencies for the context exist in the ACE-wide backup archive
If you upgrade to software version A4(1.0) or later from a release before A4(1.0), the ACE cannot install the earlier license files because they are unsupported. The ACE ignores these license files and keeps the existing licenses. If you enter the exclude option first, you cannot enter the pass-phrase option.
Examples
Related Commands
1-106
OL-25339-01
Chapter 1
rmdir disk0:
To remove a directory from the disk0: file system, use the rmdir disk0: command. rmdir disk0:directory
Syntax Description
directory
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To remove a directory from disk0:, the directory must be empty. To view the contents of a directory, use the dir command. To delete files from a directory, use the delete command.
Examples
Related Commands
1-107
CLI Commands
setup
(ACE appliance only) To initiate a special setup script that guides you through the basic process of configuring an Ethernet port on the ACE as the management port to access the Device Manager GUI, use the setup command. setup
Syntax Description
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The setup script is intended primarily as the means to guide you though a basic configuration of the ACE to quickly access the Device Manager. Use the setup command when the ACE boots without a startup-configuration file. This situation may occur when the ACE is new and the appliance was not configured upon initial startup. The setup script guides you through configuring a management VLAN on the ACE through one of its Gigabit Ethernet ports. After you specify a gigabit Ethernet port, the port mode, and management VLAN, the setup script automatically applies the following default configuration:
Management VLAN allocated to the specified Ethernet port. VLAN 1000 assigned as the management VLAN interface. GigabitEthernet port mode configured as VLAN access port. Extended IP access list that allows IP traffic originating from any other host addresses. Traffic classification (class map and policy map) created for management protocols HTTP, HTTPS, ICMP, SSH, Telnet, and XML-HTTPS. HTTPS is dedicated for connectivity with the Device Manager GUI. VLAN interface configured on the ACE and a policy map assigned to the VLAN interface.
The ACE provides a default answer in brackets [ ] for each question in the setup script. To accept a default configuration prompt, press Enter, and the ACE accepts the setting. To skip the remaining configuration prompts, press Ctrl-C any time during the configuration sequence. When completed, the setup script prompts you to apply the configuration settings.
Examples
1-108
OL-25339-01
Chapter 1
This script will perform the configuration necessary for a user to manage the ACE Appliance using the ACE Device Manager.The management port is a designated Ethernet port which has access to the same network as your management tools including the ACE Device Manager. You will be prompted for the Port Number, IP Address, Netmask and Default Route (optional). Enter 'ctrl-c' at any time to quit the script Would you like to enter the basic configuration (yes/no): y Enter the Ethernet port number to be used as the management port (1-4):? [1]: 3 Enter the management port IP Address (n.n.n.n): [192.168.1.10]: 192.168.1.10 Enter the management port Netmask(n.n.n.n): [255.255.255.0]: 255.255.255.2 Enter the default route next hop IP Address (n.n.n.n) or <enter> to skip this step: 172.16.2.1 Summary of entered values: Management Port: 3 Ip address 192.168.1.10 Netmask: 255.255.255.2 Default Route: 172.16.2.1 Submit the configuration including security settings to the ACE Appliance? (yes/no/details): [y]: d Detailed summary of entered values: interface gigabit/Ethernet 1/3 switchport access vlan 1000 no shut access-list ALL extended permit ip any any class-map type management match-any remote_access match protocol xml-https any match protocol dm-telnet any match protocol icmp any match protocol telnet any match protocol ssh any match protocol http any match protocol https any match protocol snmp any policy-map type management first-match remote_mgmt_allow_policy class remote_access permit interface vlan 1000 ip address 192.168.1.10 255.255.255.0 access-group input ALL service-policy input remote_mgmt_allow_policy no shutdown ssh key rsa ip route 0.0.0.0 0.0.0.0 172.16.2.1 Submit the configuration including security settings to the ACE Appliance? (yes/no/details): [y]: y Configuration successfully applied. You can now manage this ACE Appliance by entering the url 'https://192.168.1.10' into a web browser to access the Device Manager GUI.
Related Commands
1-109
CLI Commands
set dc
(ACE module only) To set the daughter card console access to the master or the slave network processor, use the set dc command. set dc dc_number console {master | slave}
Syntax Description
Specifies the daughter card on the ACE module. Enter either 1 or 2. Sets the console access to the specified network processor. Specifies the master or the slave network processor on the specified daughter card for console access. The default is master.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role in the Admin context. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To set the daughter card 1 console access to the slave network processor, enter:
host1/Admin# set dc 1 console slave Switched the console access to slave network processor
Related Commands
clear dc show dc
1-110
OL-25339-01
Chapter 1
set sticky-ixp
(ACE module only) This command has been deprecated in software version A4(1.0).
Command History
Modification This command was introduced. This command was removed from the software.
1-111
CLI Commands
show
To display ACE statistical and configuration information, use the show command. show keyword [| {begin pattern | count | end | exclude pattern | include pattern | next | prev}] [> {filename | {disk0:| volatile}:[path/][filename] | ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]}]
Syntax Description
keyword | begin pattern count end pattern exclude pattern include pattern next prev > filename disk0: volatile: [path/][filename]
Keyword associated with the show command. See the show commands that follow. (Optional) Enables an output modifier that filters the command output. Begins with the line that matches the pattern that you specify. Counts the number of lines in the output. Ends with the line that matches the pattern that you specify. Excludes the lines that match the pattern that you specify. Includes the lines that match the pattern that you specify. Displays the lines next to the matching pattern that you specify. Displays the lines before the matching pattern that you specify. (Optional) Enables an output modifier that redirects the command output to a file. Name of the file that the ACE saves the output to on the volatile: file system. Specifies that the destination is the disk0: file system on the ACE flash memory. Specifies that the destination is the volatile: file system on the ACE. (Optional) Path and filename to the disk0: or volatile: file system. This path is optional because the ACE prompts you for this information if you omit it. Specifies the File Transfer Protocol (FTP) network server and optional filename. Specifies the Secure File Transfer Protocol (SFTP) network server and optional filename. Specifies the Trivial File Transfer Protocol (TFTP) network server and optional filename.
Command Modes
Exec
Command History
3.0(0)A1(2)
1-112
OL-25339-01
Chapter 1
A1(7)
Usage Guidelines
The features required in your user role to execute a specific show command are described in the Usage Guidelines section of the command. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Most commands have an associated show command. For example, the associated show command for the interface command in configuration mode is the show interface command. Use the associated show command to verify changes that you make to the running configuration. The output of the show command may vary depending on the context that you enter the command from. For example, the show running-config command displays the running-configuration for the current context only. To convert show command output from the ACE to XML for result monitoring by an NMS, use the xml-show command.
Examples
Related Commands
xml-show
show aaa
To display AAA accounting and authentication configuration information for the current context, use the show aaa command. show aaa {accounting | authentication [login error-enable] | groups} [|] [>]
Syntax Description
Displays accounting configuration information. Displays authentication configuration information. (Optional) Displays the status of the login error message configuration. Displays the configured server groups. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
1-113
CLI Commands
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show aaa command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show accounting log (config) aaa accounting default (config) aaa authentication login
show access-list
To display statistics associated with a specific access control list (ACL), use the show access-list command. show access-list name [detail] [|] [>]
Syntax Description
name detail |
Name of an existing ACL. Enter the name as an unquoted text string. Displays detailed information for the specified ACL. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
1-114
OL-25339-01
Chapter 1
Command History
Modification This command was introduced. This command was revised with the detail option.
3.0(0)A1(2) A2(1.0)
Modification This command was introduced. This command was revised with the detail option.
A1(7) A3(1.0)
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACL information that the ACE displays when you enter the show access-list command includes the ACL name, the number of elements in the ACL, the operating status of the ACL (ACTIVE or NOT ACTIVE), any configured remarks, the ACL entry, and the ACL hit count. For information about the fields in the show access-list command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To display statistical and configuration information for the ACL ACL1, enter:
host1/Admin# show access-list ACL1
Related Commands
clear access-list show running-config (config) access-list ethertype (config) access-list extended (config) access-list remark (config) access-list resequence
Syntax Description
size all
(Optional) Size (in bytes) of the local accounting file. Enter a value from 0 to 250000. The default is 250000 bytes. (Optional) Displays the accounting logs of all contexts in the ACE. This option is available only in the Admin context.
1-115
CLI Commands
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. The all option was added.
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. The all option was added.
A1(7) A4(1.0)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show accounting log command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-116
OL-25339-01
Chapter 1
show acl-merge
The ACE merges individual ACLs into one large ACL called a merged ACL. The ACL compiler then parses the merged ACL and generates the ACL lookup mechanisms. A match on this merged ACL can result in multiple actions. To display statistics related to merged ACLs, use the show acl-merge command. show acl-merge {acls {vlan number | internal vlan 1 | 4095} {in | out} [summary]} | {event-history} | {match {acls {vlan number | internal vlan 1 | 4095} {in | out} ip_address1 ip_address2 protocol src_port dest_port}} | {merged-list {acls {vlan number | internal vlan 1 | 4095}{in | out} [non-redundant | summary]}} | {statistics} [|] [>]
Syntax Description
acls vlan number internal vlan 1 | 4095 in | out summary event-history match ip_address1 ip_address2 protocol src_port dest_port merged-list non-redundant statistics |
Displays various feature ACLs and their entries before the merge. Specifies the interface on which the ACL was applied. Displays the ACL merge information for internal VLAN 1 or 4095 (ACE appliance). Specifies the direction in which the ACL was applied to network traffic: incoming or outgoing. (Optional) Displays summary information before or after the merge. Displays the ACL merge event-history log. Displays the ACL entry that matches the specified tuple. Source IP address. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). Destination IP address. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). Protocol specified in the ACL. Source port specified in the ACL. Destination port specified in the ACL. (Optional) Displays the merged ACL. (Optional) Displays only those ACL entries that have been downloaded to a network processor. Displays ACL merge node failure statistics and other merge and compiler errors. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
1-117
CLI Commands
Command History
Modification This command was introduced. This command was revised to include the internal vlan 1 keywords. This command was revised to include the event-history and statistics keywords.
Modification This command was introduced. This command was revised to include the internal vlan 1 | 4095 keywords. This command was revised to include the event-history and statistics keywords.
Usage Guidelines
This command requires the acl-merge feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only. The ACL merge list number (instance ID) is locally generated (not synchronized) on each ACE in a redundant configuration. The number assigned depends on the order in which the ACLs are applied to the VLANs. This number can be different on the two ACEs. The ACL merged list could be different on the two ACEs depending on when redundancy is enabled.
Examples
Related Commands
show action-list
To display information about an action list configuration, use the show action-list command in Exec mode. The show action-list command output displays all modify HTTP and ACE appliance optimization action list configurations and configured values. show action-list [list_name] [|] [>]
Syntax Description
list_name
(Optional) Identifier of an existing action list as an unquoted text string with a maximum of 64 alphanumeric characters. If you do not enter an action list name, the ACE displays all configured action lists.
1-118
OL-25339-01
Chapter 1
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
A4(1.0)
Modification This command was introduced. The Description field has been added to the show action-list command output. This field displays the previously entered summary about the specific parameter map.
A1(7) A3(2.3)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show action-list command output, see the Application Acceleration and Optimization Guide, Cisco ACE 4700 Series Application Control Engine Appliance and the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show running-config (config) action-list type modify http (ACE appliance only) (config) action-list type optimization http
show arp
To display the current active IP address-to-MAC address mapping in the Address Resolution Protocol (ARP) table, statistics, or inspection or timeout configuration, use the show arp command. show arp [inspection | internal event-history dbg | statistics [vlan vlan_number] | timeout] [|] [>]
1-119
CLI Commands
Syntax Description
inspection
internal event-history dbg (Optional) Displays the ARP internal event history. The ACE debug commands are intended for use by trained Cisco personnel only. Do not attempt to use these commands without guidance from Cisco support personnel. statistics vlan vlan_number timeout | (Optional) Displays the ARP statistics for all VLAN interfaces. (Optional) Displays the statistics for the specified VLAN number. (Optional) Displays the ARP timeout values. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the routing feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show arp command without options displays the active IP address-to-MAC address mapping in the ARP table. For information about the fields in the show arp command output, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
To display the current active IP address-to-MAC address mapping in the ARP table, enter:
host1/Admin# show arp
Related Commands
1-120
OL-25339-01
Chapter 1
show backup
To display backup errors (in the case of a failed backup) or the backup status, use the show backup command. show backup errors | status [details] [|] [>]
Syntax Description
errors
Displays errors that may occur during a backup operation. For information about backup system messages, see the System Message Guide, Cisco ACE Application Control Engine. Displays the status of the last backup operation. Backup status details are not stored across reboots. Possible values in the Status column are as follows:
status [details]
SUCCESSThe component was successfully backed up FAILEDThe component failed to be backed up N/AThe component (for example, a checkpoint or probe script) being backed up contains 0 files
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
A2(3.0)
ACE Appliance Release
A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
1-121
CLI Commands
Admin Admin Admin Admin Admin Admin ct1 ct1 ct1 ct1 ct1 ct2 ct2 ct2 ct2 ct2 ct3 ct3 ct3 ct3 ct3
Running-cfg Startup-cfg Checkpoints Cert/Key License Probe script Running-cfg Startup-cfg Checkpoints Cert/Key Probe script Running-cfg Startup-cfg Checkpoints Cert/Key Probe script Running-cfg Startup-cfg Checkpoints Cert/Key Probe script
Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu
Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep
16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16 16
21:34:04 21:34:04 21:34:07 21:34:07 21:34:07 21:34:07 21:34:12 21:34:12 21:34:12 21:34:12 21:34:12 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13 21:34:13
2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010
SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS N/A SUCCESS SUCCESS N/A SUCCESS N/A SUCCESS SUCCESS N/A SUCCESS N/A SUCCESS SUCCESS N/A SUCCESS N/A
Related Commands
backup
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
1-122
OL-25339-01
Chapter 1
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To configure the banner message, use the banner command in the configuration mode. For information about the fields in the show banner motd command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) banner
show bootvar
To display the current BOOT environment variable and configuration register setting, use the show bootvar command. This command is available only in the Admin context. show bootvar [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To set the BOOT environment variable, use the boot system image: command in the configuration mode.
1-123
CLI Commands
For information about the fields in the show bootvar command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To display the current BOOT environment variable and configuration register setting, enter:
host1/Admin# show bootvar BOOT variable = "disk0:c6ace-t1k9-mzg.3.0.0_A0_2.48.bin" Configuration register is 0x1
To display the current BOOT environment variable and configuration register setting, enter:
host1/Admin# show bootvar BOOT variable = disk0:c4710ace-mz.A5_1_0.bin Configuration register is 0x1
Related Commands
1-124
OL-25339-01
Chapter 1
show buffer
To display the buffer manager module messages, use the show buffer command. show buffer {events-history | stats | usage} [|] [>]
Syntax Description
Displays a historic log of the most recent messages generated by the buffer manager event history. Displays detailed counters for various buffer manager event occurrences. Displays the number of buffers currently being held (allocated but not freed) by each buffer module. The usage keyword also shows an estimate of the number of times a particular buffer module has freed the same buffer more than once (this condition indicates a software error). Displays the Hi watermark field which allows more visibility for buffer usage when monitoring high watermarks (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
1-125
CLI Commands
Related Commands
1-126
OL-25339-01
Chapter 1
show capture
To display the packet information that the ACE traces as part of the packet capture function, use the show capture command. show capture buffer_name [detail [connid connection_id | range packet_start packet_end] | status] [|] [>]
Syntax Description
Name of the packet capture buffer. Specify an unquoted text string with no spaces from 1 to 80 alphanumeric characters. (Optional) Displays additional protocol information for each packet. (Optional) Displays protocol information for a specified connection identifier. (Optional) Displays protocol information for a range of captured packets.
(Optional) Displays capture status information for each packet. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For all types of received packets, the console display is in tcpdump format. To copy the capture buffer information as a file in flash memory, use the copy capture command. For information about the fields in the show capture command output, see the Administration Guide, Cisco ACE Application Control Engine.
1-127
CLI Commands
Examples
To display the captured packet information contained in packet capture buffer CAPTURE1, enter:
switch/Admin# show capture CAPTURE1
Related Commands
copy capture
1-128
OL-25339-01
Chapter 1
show cde
(ACE module only) To display the classification and distribution engine (CDE) interface statistics, health, and register values, use the show cde command. This command includes statistics for the CDE daughter card interface, the CDE control plane interface, and the CDE switch fabric interface. show cde {all | count | dist | hash index_number | health | interrupts | reg cde_number register | stats {cumulative | stats} | vlan vlan_number} [|] [>]
Syntax Description
all count dist health interrupts reg cde_number register stats cumulative delta vlan vlan_number |
Displays all CDE register values. Displays the cumulative count of the CDE interrupts. Displays the CDE distribution type. Displays the CDE health, including the daughter card statistics. Displays the CDE interrupts. Displays the specified CDE register. CDE number (0 or 1). Register value. Enter a hexadecimal value from 0x0 to 0x1d9. Displays the specified CDE statistics. Displays the cumulative CDE statistics from the last invocation of the show cde command. Displays the delta CDE statistics from the last invocation of the show cde command. Displays the VLAN distribution table for the specified VLAN. Enter the desired VLAN number from 0 to 4096. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
hash index_number Displays the hash distribution table. Enter a value from 0 to 63.
>
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
1-129
CLI Commands
Examples
Related Commands
clear cde
show cfgmgr
To display the Configuration Manager internal information, use the show cfgmgr command. show cfgmgr internal {history | {table {access-group | ace name| acl name| action-list | arp | class-map | context | icmp-vip | if-zone | interface | l2-ace | l2-acl | l3-rule| match-item | nat | nat-dynamic | nat-pool | nat-pool-data | nat-static | og name | og-data name | og-exp name | parameter-map | policy-map | probe | probe-instance | rserver | script-file | script-task | sfarm | sfarm-real | slb-policy | ssl-proxy | sticky-grp | sticky-static-grp | time-range | track-probe | vip} [all | context name | detail]} [|] [>]
Syntax Description
history table access-group ace name acl name action-list arp class-map context icmp-vip if-zone interface l2-ace l2-acl l3-rule match-item nat nat-dynamic nat-pool nat-pool-data nat-static og name og-data name og-exp name parameter-map policy-map
Displays the Configuration Manager debug log. Displays the specified Configuration Manager internal table. Displays the access group table. Displays the specified ACE table. Displays the specified ACL table. Displays the action-list table. Displays the ARP table. Displays the class map table. Displays the context table. Displays the ICMP state in VIP table. Displays the if zone table. Displays the interface table. Displays the Layer 2 ACE table. Displays the Layer 2 ACL table. Displays the Layer 3 rule table. Displays the match-item table. Displays the NAT table. Displays the NAT dynamic table. Displays the NAT pool table. Displays the NAT pool data table. Displays the NAT static table. Displays the specified Object Group table. Displays the specified Object Group Data table. Displays the specified Object Group Expanded table. Displays the parameter map table. Displays the policy map table.
1-130
OL-25339-01
Chapter 1
probe probe-instance rserver script-file script-task sfarm sfarm-real slb-policy ssl-proxy sticky-grp sticky-static-grp time-range track-probe vip all context name detail |
Displays the probe table. Displays the probe instance table. Displays the real server table. Displays the script file table. Displays the script task table. Displays the server farm table. Displays the server farm and real server table. Displays the server load-balancing policy table. Displays the SSL proxy table. Displays the sticky group table. Displays the static sticky table. Displays the time-range table. Displays the track probe table. Display the VIP table. Displays the internal table information for all the contexts. Displays the internal table information for the specified context. Displays the detailed Configuration Manager table information. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
1-131
CLI Commands
Examples
Related Commands
show checkpoint
To display information relating to the configured checkpoints, use the show checkpoint command. show checkpoint {all | detail name} [|] [>]
Syntax Description
Displays a list of all existing checkpoints. The show output includes checkpoint time stamps. Displays the running configuration of the specified checkpoint. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show checkpoint command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
1-132
OL-25339-01
Chapter 1
Related Commands
checkpoint
1-133
CLI Commands
show clock
To display the current date and time settings of the system clock, use the show clock command. show clock [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To configure the system clock setting, use the clock command in the configuration mode. For information about the fields in the show clock command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-134
OL-25339-01
Chapter 1
show conn
To display the connection statistics, use the show conn command. show conn {address ip_address1 [ip_address2] [/prefix_length | netmask mask]] [detail]} | count | detail | {port number1 [number2] [detail]} | {protocol {tcp | udp} [detail]} | {rserver rs_name [port_number] [serverfarm sfarm_name1] [detail]} | {serverfarm sfarm_name2 [detail]} [|] [>]
Syntax Description
address ip_address1 Displays connection statistics for a single source or destination IPv4 or IPv6 [ip_address2] address or, optionally, for a range of source or destination IPv4 or IPv6 addresses. To specify a range of IP addresses, enter an IP address for the lower limit of the range and a second IP address for the upper limit of the range. /prefix_length netmask mask Displays connection statistics for the IPv6 address or range of IPv6 addresses that you specify. Enter an IPv6 prefix (for example, /64). Specifies the network mask for the IPv4 address or range of IPv4 addresses that you specify. Enter a network mask in dotted-decimal notation (for example, 255.255.255.0). Displays the total current connections to the ACE.
Note
count
The total current connections is the number of connection objects. There are two connection objects for each flow and complete connection. The total current connections is the number of connection objects. There are two connection objects for each flow and complete connection.
detail
port number1 [number2] rserver rs_name port_number serverfarm sfarm_name1 serverfarm sfarm_name2 |
Displays connection statistics for a single source or destination port or optionally, for a range of source or destination ports. Displays connection statistics for the specified real server. (Optional) Port number associated with the specified real server. Enter an integer from 1 to 65535. (Optional) Displays connection statistics for the specified real server associated with this server farm. Displays connection statistics for the real servers associated with the specified server farm. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
1-135
CLI Commands
Command History
Modification This command was introduced. This detail option was added for a specified address, port, protocol, real server, or server farm. Added support for IPv6.
Modification This command was introduced. This detail option was added for a specified address, port, protocol, real server, or server farm. Added support for IPv6.
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show conn command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
IPv6 Example
IPv4 Example
Related Commands
clear conn
show context
To display the context configuration information, use the show context command. show context [context_name | Admin] [|] [>] Syntax Description context_name (Optional) Name of user-created context. The ACE displays just the specified context configuration information. The context_name argument is case sensitive. and is visible only from the admin context. (Optional) Displays just the admin context configuration information. This keyword is visible only from the admin context.
Admin
1-136
OL-25339-01
Chapter 1
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE displays different information for this command depending on the context that you are in when executing the command:
Admin contextWhen you are in the Admin context and use the show context command without specifying a context, the ACE displays the configuration information for the admin context and all user-created contexts. user-created contextWhen you are in a user-created context and enter the show context command, the ACE displays only the configuration information of the current context.
For information about the fields in the show context command output, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To display the Admin context and all user-context configuration information, enter:
host1/Admin# show context
To display the configuration information for the user context CTX1, enter:
host1/Ctx1# show context
Related Commands
show copyright
To display the software copyright information for the ACE, use the show copyright command.
1-137
CLI Commands
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show copyright command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show crypto
To display the summary and detailed reports on files containing Secure Sockets Layer (SSL) certificates, key pairs, chain and authentication groups, and statistics, use the show crypto command. show crypto { aia-errors | authgroup {group_name| all} | cdp-errors | certificate {filename | all} | chaingroup {filename | all} | {crl {filename [detail]} | all | best-effort} | csr-params {filename | all} | files | key {filename | all} | ocspserver {name [detail] | all | best-effort} | session}} [|] [>]
1-138
OL-25339-01
Chapter 1
Syntax Description
Displays the AuthorityInfoAccess (AIA) extension error statistics. Specifies the authentication group file type. Name of the specific authentication group file. Displays the summary report that lists all the files of the specified file type or certificates for each authentication group, or certificate revocation lists (CRLs) in the context. Displays the statistics for discrepancies in CRL Distribution Points (CDPs) for the certificates on the ACE; not context specific. A CDP indicates the location of the CRL in the form of a URL. CDP parsing in the certificate occurs only when best effort CRL is in use. The statistics include incomplete, malformed and missing information, and unrecognized transports and the number of times that the ACE ignores CDP errors as related to the (config-parammap-ssl) cdp-errors ignore command. Specifies the certificate file type. Name of a specific file. The ACE displays the detailed report for the specified file. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Specifies the chaingroup file type. Specifies the certificate revocation list configured in the context. (Optional) Displays detailed statistics for the downloading of the CRL including failure counters. Displays summarized information for all best-effort CRLs in ACE (a maximum of 16 CRLs). Specifies the Certificate Signing Request (CSR) parameter set. Displays the summary report listing all of the crypto files loaded on the ACE, including certificate, chaingroup, and key pair files. The summary report also shows whether the file contains a certificate, a key pair, or both. Specifies the key pair file type. Identifier of a configured OCSP server. The ACE displays Online Certificate Status Protocol (OCSP) information. You can use OCSP as an alternative to CRLs. Instructs the ACE to display detailed statistics for the specified OCSP server. Displays statistics for all configured OCSP servers. Displays statistics for OCSP servers that were obtained on a best-effort basis by extracting the server information from the client packets. Displays the number of cached TLS and SSL client and server session entries in the current context. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
cdp-errors
certificate filename
>
Command Modes
1-139
CLI Commands
Command History
Modification This command was introduced. This command was revised with the hardware and stats keywords. This command was revised with the authgroup, csr-params, crl, and session keywords. This command was revised with the cdp-errors, detail, and best-effort keywords. This command was revised to include the Best Effort CDP Errors Ignored field displayed with the cdp-errors keyword. Added the aia-errors and the ocspserver keywords and arguments. Modification This command was introduced. This command was revised with the authgroup, csr-params, crl, and session keywords. The cdp-errors keyword and the detail option were added. The best-effort keyword was added. Added the aia-errors and the ocspserver keywords and arguments.
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When using the show crypto certificate command and the certificate file contains a chain, the ACE displays only the bottom level certificate (the signers are not displayed). For information about the fields in the show crypto command output, see the SSL Guide, Cisco ACE Application Control Engine.
Examples
To display the summary report that lists all of the crypto files, enter:
host1/Admin# show crypto files
To display
Related Commands
crypto delete crypto export crypto import crypto verify (config) crypto csr-params (config-parammap-ssl) cdp-errors ignore
1-140
OL-25339-01
Chapter 1
show dc
(ACE module only) To display the statistics for the daughter card hardware on the ACE ACE, use the show dc command. show dc dc_number {console | controller {all | health | interrupts | reg register_number | stats {cumulative | delta}} | interrupts} [|] [>]
Syntax Description
dc_number console
Number of the daughter card (1 or 2). Displays whether the master or the slave network processor console is directed to the base board front panel for the specified daughter card. For example, if the master network processor is directed to the front panel, the following message appears: mCPU console is directed to base board front panel. See the related set dc dc_number console command. Displays the register values for the specified daughter card CPU and the specified controller area. Displays all controller register values for the specified daughter card CPU Displays the controller health and statistics for the specified daughter card. Displays the controller interrupt statistics for the specified daughter card.
reg Displays the description, value, and register type for the specified controller register register_number in the specified daughter card. stats Displays the controller statistics registers for the specified daughter card. You can instruct the ACE to display either cumulative stats since the last reboot or the change in stats since the last time you entered this command. Displays accumulated controller statistics since the last time you rebooted the ACE or entered the clear dc command. Displays the difference in controller statistics since the last time you entered this command. Displays the interrupt statistics for the specified daughter card. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
1-141
CLI Commands
Usage Guidelines
This command requires the Admin feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only. For information about the fields in the show dc command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
1-142
OL-25339-01
Chapter 1
47 VERNI_DCTX0_BYTCNT_L_REG_ADDR 48 VERNI_DCTX0_BYTCNT_H_REG_ADDR 49 VERNI_DCTX1_BYTCNT_L_REG_ADDR 50 VERNI_DCTX1_BYTCNT_H_REG_ADDR 51 VERNI_DCTX2_BYTCNT_L_REG_ADDR 52 VERNI_DCTX2_BYTCNT_H_REG_ADDR 53 VERNI_DCTX3_BYTCNT_L_REG_ADDR 54 VERNI_DCTX3_BYTCNT_H_REG_ADDR 55 VERNI_DCTX4_BYTCNT_L_REG_ADDR 56 VERNI_DCTX4_BYTCNT_H_REG_ADDR 57 VERNI_DCTX5_BYTCNT_L_REG_ADDR 58 VERNI_DCTX5_BYTCNT_H_REG_ADDR 59 VERNI_DCTX6_BYTCNT_L_REG_ADDR 60 VERNI_DCTX6_BYTCNT_H_REG_ADDR 61 VERNI_DCTX7_BYTCNT_L_REG_ADDR 62 VERNI_DCTX7_BYTCNT_H_REG_ADDR 63 VERNI_DCTX0_PKTCNT_REG_ADDR 64 VERNI_DCTX1_PKTCNT_REG_ADDR 65 VERNI_DCTX2_PKTCNT_REG_ADDR 66 VERNI_DCTX3_PKTCNT_REG_ADDR 67 VERNI_DCTX4_PKTCNT_REG_ADDR 68 VERNI_DCTX5_PKTCNT_REG_ADDR 69 VERNI_DCTX6_PKTCNT_REG_ADDR 70 VERNI_DCTX7_PKTCNT_REG_ADDR 71 VERNI_DCTX0_EPKTCNT_REG_ADDR 72 VERNI_DCTX1_EPKTCNT_REG_ADDR 73 VERNI_DCTX2_EPKTCNT_REG_ADDR 74 VERNI_DCTX3_EPKTCNT_REG_ADDR 75 VERNI_DCTX4_EPKTCNT_REG_ADDR 76 VERNI_DCTX5_EPKTCNT_REG_ADDR 77 VERNI_DCTX6_EPKTCNT_REG_ADDR 78 VERNI_DCTX7_EPKTCNT_REG_ADDR 79 VERNI_DCTX0_CRCECNT_REG_ADDR 80 VERNI_DCTX1_CRCECNT_REG_ADDR 81 VERNI_DCTX2_CRCECNT_REG_ADDR 82 VERNI_DCTX3_CRCECNT_REG_ADDR 83 VERNI_DCTX4_CRCECNT_REG_ADDR 84 VERNI_DCTX5_CRCECNT_REG_ADDR 85 VERNI_DCTX6_CRCECNT_REG_ADDR 86 VERNI_DCTX7_CRCECNT_REG_ADDR 87 VERNI_SOP_ILL_CNT_REG_ADDR 88 VERNI_SNKCH0_BYTCNT_L_REG_ADDR 89 VERNI_SNKCH0_BYTCNT_H_REG_ADDR 90 VERNI_SNKCH1_BYTCNT_L_REG_ADDR 91 VERNI_SNKCH1_BYTCNT_H_REG_ADDR 92 VERNI_SNKCH2_BYTCNT_L_REG_ADDR 93 VERNI_SNKCH2_BYTCNT_H_REG_ADDR 94 VERNI_SNKCH3_BYTCNT_L_REG_ADDR 95 VERNI_SNKCH3_BYTCNT_H_REG_ADDR 96 VERNI_SNKCH4_BYTCNT_L_REG_ADDR 97 VERNI_SNKCH4_BYTCNT_H_REG_ADDR 98 VERNI_SNKCH5_BYTCNT_L_REG_ADDR 99 VERNI_SNKCH5_BYTCNT_H_REG_ADDR 100 VERNI_SNKCH6_BYTCNT_L_REG_ADDR 101 VERNI_SNKCH6_BYTCNT_H_REG_ADDR 102 VERNI_SNKCH7_BYTCNT_L_REG_ADDR 103 VERNI_SNKCH7_BYTCNT_H_REG_ADDR 104 VERNI_SNKCH0_PKTCNT_REG_ADDR 105 VERNI_SNKCH1_PKTCNT_REG_ADDR 106 VERNI_SNKCH2_PKTCNT_REG_ADDR 107 VERNI_SNKCH3_PKTCNT_REG_ADDR 108 VERNI_SNKCH4_PKTCNT_REG_ADDR 109 VERNI_SNKCH5_PKTCNT_REG_ADDR 110 VERNI_SNKCH6_PKTCNT_REG_ADDR
0x4104 0x4100 0x4114 0x4110 0x4124 0x4120 0x4134 0x4130 0x4144 0x4140 0x4154 0x4150 0x4164 0x4160 0x4174 0x4170 0x4200 0x4204 0x4208 0x420c 0x4210 0x4214 0x4218 0x421c 0x4300 0x4304 0x4308 0x430c 0x4310 0x4314 0x4318 0x431c 0x4400 0x4404 0x4408 0x440c 0x4410 0x4414 0x4418 0x441c 0x4420 0x5104 0x5100 0x5114 0x5110 0x5124 0x5120 0x5134 0x5130 0x5144 0x5140 0x5154 0x5150 0x5164 0x5160 0x5174 0x5170 0x5200 0x5210 0x5220 0x5230 0x5240 0x5250 0x5260
0 0 29588774 0 15457403 0 0 0 0 0 7139354 0 82 0 0 0 0 345107 150138 0 0 77580 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 29589286 0 15466363 0 0 0 0 0 7141402 0 82 0 0 0 0 345107 150138 0 0 75532 1
1-143
CLI Commands
111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
VERNI_SNKCH7_PKTCNT_REG_ADDR VERNI_SNKCH0_EPKTCNT_REG_ADDR VERNI_SNKCH1_EPKTCNT_REG_ADDR VERNI_SNKCH2_EPKTCNT_REG_ADDR VERNI_SNKCH3_EPKTCNT_REG_ADDR VERNI_SNKCH4_EPKTCNT_REG_ADDR VERNI_SNKCH5_EPKTCNT_REG_ADDR VERNI_SNKCH6_EPKTCNT_REG_ADDR VERNI_SNKCH7_EPKTCNT_REG_ADDR VERNI_SNK_GERRCNT_REG_ADDR VERNI_SRCCH0_BYTCNT_L_REG_ADDR VERNI_SRCCH0_BYTCNT_H_REG_ADDR VERNI_SRCCH1_BYTCNT_L_REG_ADDR VERNI_SRCCH1_BYTCNT_H_REG_ADDR VERNI_SRCCH2_BYTCNT_L_REG_ADDR VERNI_SRCCH2_BYTCNT_H_REG_ADDR VERNI_SRCCH3_BYTCNT_L_REG_ADDR VERNI_SRCCH3_BYTCNT_H_REG_ADDR VERNI_SRCCH4_BYTCNT_L_REG_ADDR VERNI_SRCCH4_BYTCNT_H_REG_ADDR VERNI_SRCCH5_BYTCNT_L_REG_ADDR VERNI_SRCCH5_BYTCNT_H_REG_ADDR VERNI_SRCCH6_BYTCNT_L_REG_ADDR VERNI_SRCCH6_BYTCNT_H_REG_ADDR VERNI_SRCCH7_BYTCNT_L_REG_ADDR VERNI_SRCCH7_BYTCNT_H_REG_ADDR VERNI_SRCCH0_PKTCNT_REG_ADDR VERNI_SRCCH1_PKTCNT_REG_ADDR VERNI_SRCCH2_PKTCNT_REG_ADDR VERNI_SRCCH3_PKTCNT_REG_ADDR VERNI_SRCCH4_PKTCNT_REG_ADDR VERNI_SRCCH5_PKTCNT_REG_ADDR VERNI_SRCCH6_PKTCNT_REG_ADDR VERNI_SRCCH7_PKTCNT_REG_ADDR VERNI_SRCCH0_EPKTCNT_REG_ADDR VERNI_SRCCH1_EPKTCNT_REG_ADDR VERNI_SRCCH2_EPKTCNT_REG_ADDR VERNI_SRCCH3_EPKTCNT_REG_ADDR VERNI_SRCCH4_EPKTCNT_REG_ADDR VERNI_SRCCH5_EPKTCNT_REG_ADDR VERNI_SRCCH6_EPKTCNT_REG_ADDR VERNI_SRCCH7_EPKTCNT_REG_ADDR CH0_OCTEON_FLOWCTRL_CNT_REG_ADDR CH1_OCTEON_FLOWCTRL_CNT_REG_ADDR CH2_OCTEON_FLOWCTRL_CNT_REG_ADDR CH3_OCTEON_FLOWCTRL_CNT_REG_ADDR CH4_OCTEON_FLOWCTRL_CNT_REG_ADDR CH5_OCTEON_FLOWCTRL_CNT_REG_ADDR CH6_OCTEON_FLOWCTRL_CNT_REG_ADDR CH7_OCTEON_FLOWCTRL_CNT_REG_ADDR
0x5270 0x5300 0x5310 0x5320 0x5330 0x5340 0x5350 0x5360 0x5370 0x5400 0x6104 0x6100 0x6114 0x6110 0x6124 0x6120 0x6134 0x6130 0x6144 0x6140 0x6154 0x6150 0x6164 0x6160 0x6174 0x6170 0x6200 0x6210 0x6220 0x6230 0x6240 0x6250 0x6260 0x6270 0x6300 0x6310 0x6320 0x6330 0x6340 0x6350 0x6360 0x6370 0x6400 0x6410 0x6420 0x6430 0x6440 0x6450 0x6460 0x6470
Related Commands
set dc clear dc
1-144
OL-25339-01
Chapter 1
show debug
To display the debug flags, use the show debug command. show debug {aaa | access-list | arpmgr | ascii-cfg | bpdu | buffer | cfg_cntlr | cfgmgr | clock | dhcp | fifo | fm | fs-daemon | ha_dp_mgr | ha_mgr | hm | ifmgr | ipcp | lcp | ldap | license | logfile | nat-download | netio | pfmgr | pktcap | radius | routemgr | scp | security | sme | snmp | ssl | syslogd | system | tacacs+ | tl | ttyd | virtualization | vnet | vshd} [|] [>]
Syntax Description
aaa access-list arpmgr ascii-cfg bpdu buffer cfg_cntlr cfgmgr clock dhcp fifo fm fs-daemon ha_dp_mgr ha_mgr hm ifmgr ipcp lcp ldap license logfile nat-download netio pfmgr pktcap radius routemgr scp
Displays the 301 debug flags. Displays the access-list debug flags. Displays the Address Resolution Protocol (ARP) manager debug flags. Displays the ASCII cfg debug flags. Displays the bridge protocol data unit (BPDU) debug flags. Displays the CP buffer debug flags. Displays the configuration controller debug flags. Displays the configuration manager debug flags. (ACE module only) Displays the state of clock debug settings. Displays the Dynamic Host Configuration Protocol (DHCP) debug flags. Displays the show packet first in, first out (FIFO) debug flags. Displays the feature manager debug flags. Displays the FS daemon debug flags. Displays the high availability (HA) dataplane manager debug flags. Displays the HA manager debug flags. Displays the HM debug flags. Displays the interface manager debug flags. Displays the kernel IP Control Protocol (IPCP) debug flags. (ACE module only) Displays the LCP debug flags. Displays the Lightweight Directory Access Protocol (LDAP) debug flags. Displays the licensing debug flags. Displays the contents of the logfile. Displays the Network Address Translation (NAT) download debug flags. Displays the CP net I/O debug flags. Displays the platform manager debug flags. Displays the packet capture debug flags. Displays the Remote Authentication Dial-In User Service (RADIUS) debug flags. Displays the route manager debug flags. (ACE module only) Displays the Secure Copy Protocol (SCP) debug flags.
1-145
CLI Commands
security sme snmp ssl syslogd system tacacs+ tl ttyd virtualization vnet vshd |
Displays the security/accounting debug flags. Displays the System Manager Extension (SME) debug flags. Displays the Simple Network Management Protocol (SNMP) server debug flags. Displays the Secure Sockets Layer (SSL) manager debug flags. Displays the syslogd debug flags. Displays the system debug flags. Displays the Terminal Access Controller Access Control System Plus (TACACS+) debug flags. Displays the CP buffer debug flags. Displays the TTYD debug flags. Displays the virtualization debug flags. Displays the virtual network (VNET) driver debug flags. Displays the VSHD debug flags. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the debug feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE debug commands are intended for use by trained Cisco personnel only. Entering these commands may cause unexpected results. Do not attempt to use these commands without guidance from Cisco support personnel.
Examples
1-146
OL-25339-01
Chapter 1
Related Commands
1-147
CLI Commands
show domain
To display the information about the configured domains in the ACE, use the show domain command. show domain [name] [|] [>]
Syntax Description
name |
(Optional) Name of an existing context domain. Specify a domain name to display the detailed configuration report that relates to the specified domain. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the complete domain configuration report that lists all of the configured domains, enter the show domain command without including the name argument. For information about the fields in the show domain command output, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To display the domain configuration report for the domain D1, enter:
host1/Admin# show domain D1
Related Commands
(config) domain
1-148
OL-25339-01
Chapter 1
Syntax Description
all summary
Displays the configuration download status for all interfaces on all contexts (Admin context only). Displays the summary status of the download information for the context. When you include the all option with the summary option, this command displays the download summary status for all contexts. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced. This command displays the regex download optimization status, enabled or disabled through the debug cfgmgr limit-regex-dnld command.
A2(3.0)
ACE Appliance Release
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If no option is included with this command, the status information for all interfaces in the current context is displayed. You can execute the show download information command to monitor the progress of the download. When you apply changes to a configuration file, the ACE downloads the configuration to its data plane. When you perform incremental changes, such as copying and pasting commands in a configuration, the ACE immediately performs the configuration download and does not display any terminal messages at the start or end of the download.
1-149
CLI Commands
However, in the following situations, the ACE defers the configuration download until the entire configuration is applied to the context:
The startup configuration at boot time Copying of the configuration to the running-config file A checkpoint rollback
We recommend that you do not execute any configuration commands during the deferred download. The ACE does not deny you from entering configuration changes. But the changes will not occur until the download is completed. If the command times out during the download, the following message appears:
Config application in progress. This command is queued to the system.
The ACE does not queue the command immediately, however, the ACE processes and executes the command when the download is completed even if the command times out.
Examples
Related Commands
show eobc
(ACE module only) To display the Ethernet Out-of-Band Channel (EOBC) registers and statistics on the ACE, use the show eobc command. show eobc {registers | stats} [|] [>]
Syntax Description
registers stats |
Displays the EOBC registers. Displays the EOBC statistics. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
1-150
OL-25339-01
Chapter 1
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-151
CLI Commands
show fifo
To display the packet first in, first out (FIFO) statistics for the Pkt-Fifo module, use the show fifo command. show fifo {event-history | registers | stats} [|] [>]
Syntax Description
Displays a historic log of the most recent debug messages generated by the Pkt-Fifo module. Displays the state of all the registers associated with the transmit and receive hardware engines. Displays detailed counters for the various Pkt-Fifo module event occurrences. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Interrupt statistics were added to the output of the stats keyword.
3.0(0)A1(2) 3.0(0)A1(5)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-152
OL-25339-01
Chapter 1
show file
To display the contents of a specified file in a directory in persistent memory (flash memory) or volatile memory (RAM), use the show file command. show file {disk0: | volatile:}[directory/]filename [cksum | md5sum] [|] [>]
Syntax Description
Specifies the disk0 file system in persistent memory. Specifies the file system in volatile memory. Path and name of the specified file. (Optional) Displays the cyclic redundancy check (CRC) checksum for the file. The checksum values compute a CRC for each named file. Use this command to verify that the files are not corrupted. You compare the checksum output for the received file against the checksum output for the original file. (Optional) Displays the MD5 checksum (electronic fingerprint) for the file. MD5 is the latest implementation of the Internet standards described in RFC 1321 and is useful for data security and integrity. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
md5sum
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show file command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To display the contents of the file FILE1 stored in the directory MYFILES in disk0:, enter:
host1/Admin# show file disk0:MYFILES/FILE1
1-153
CLI Commands
Related Commands
1-154
OL-25339-01
Chapter 1
show fragment
To display the IPv4 an IPv6 fragmentation and reassembly statistics for all interfaces in the ACE or the specified interface, use the show fragment command. show fragment [vlan vlan_id] [|] [>]
Syntax Description
vlan vlan_id |
(Optional) Specifies an existing interface. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2) A5(1.0)
A1(7) A5(1.0)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you omit the vlan vlan_id optional keyword and argument, you can display statistics for all interfaces in the ACE. For information about the fields in the show fragment command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To display the IPv4 and IPv6 fragmentation and reassembly statistics for VLAN 210, enter:
host1/Admin# show fragment vlan 210
Related Commands
show vlans
1-155
CLI Commands
show ft
To display the fault-tolerant (ft), or redundancy, statistics per context, use the show ft command. show ft {config-error [context_name]} | {group {brief | {[group_id] {detail | status | summary}}}} | {history {cfg_cntlr | ha_dp_mgr | ha_mgr}} | {idmap} | {memory [detail]} | {peer peer_id {detail | status | summary}} | {stats group_id} | {track group_id {detail | status | summary}} [|] [>]
Syntax Description
config-error [context_name]
Displays the commands that fail on the standby ACE during bulk synchronization in a redundant configuration. If all commands succeed on the standby ACE, the command displays the following message:
No bulk config apply errors
In the Admin context, the optional context_name argument is the name of a user context. If you do not enter the argument, the command uses the Admin context. In a user context, this argument is not available. group group_id Displays FT group statistics for the specified FT group. In the Admin context, this keyword displays statistics for all FT groups in the ACE. Also, in the Admin context, you can specify an FT group number to display statistics for an individual group. In a user context, this keyword displays statistics only for the FT group to which the user context belongs. Displays the group ID, local state, peer state, context name, context ID of all the FT groups that are configured in the ACE, and the configuration synchronization status. Displays detailed information for the specified FT group or peer, including the configuration synchronization status of the running- and the startup-configuration files. Displays the current operating status for the specified FT group or peer. Displays summary information for the specified FT group or peer. Displays a history of internal redundancy software statistics (Admin context only). Displays the configuration controller debug log. Displays the high availability (HA) dataplane manager debug log. Displays the HA manager debug log. Displays the IDMAP table for all object types. In a redundancy configuration, the IDMAP table is used to map objects between the active and the standby ACEs for use in config sync and state replication.
brief detail
memory [detail] Displays summary HA manager memory statistics or optional detailed HA manager memory statistics (Admin context only). peer peer_id stats group_id track group_id | Specifies the identifier of the remote standby member of the FT group. Displays redundancy statistics for the specified FT group. Displays redundancy statistics related to tracked items for all FT groups. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
1-156
OL-25339-01
Chapter 1
Command Modes
Command History
Modification This command was introduced. The brief and idmap keywords were added to this command. The status of config sync was added to the output of the detail keyword. The config-error keyword and context_name option were added to this command.
Modification This command was introduced. The config-error keyword and context_name option were added to this command. The show ft {history | memory} command is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. See the Usage Guidelines section for more information. The brief and detail options were added to the show ft group command.
A4(1.0)
Usage Guidelines
This command requires the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show ft {history | memory} command is available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. Because these commands are not context specific, we recommend that you issue them from the Admin context only. If you issue these commands in a user context, they may not display any data if other user context information could be displayed. For detailed information about the fields in the show ft command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear ft (config) ft auto-sync (config) ft group (config) ft interface vlan (config) ft peer
1-157
CLI Commands
(config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface
show hardware
To display the ACE hardware details, such as the serial number and the hardware revision level of the ACE and the ACE module daughter card, use the show hardware command. show hardware [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2) A4(1.0)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show hardware command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-158
OL-25339-01
Chapter 1
show hyp
(ACE module only) To display the Hyperion backplane ASIC register values and statistics, use the show hyp command. show hyp [reg reg_number | stats] [|] [>]
Syntax Description
(Optional) Displays the specified Hyperion backplane ASIC register values. Enter a hexadecimal value from 0x0 to 0x6db. (Optional) Displays the Hyperion backplane ASIC statistics. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-159
CLI Commands
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the clear icmp-statistics command to clear the ICMP statistics. For information about the fields in the show icmp statistics command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-160
OL-25339-01
Chapter 1
show interface
To display the interface information, use the show interface command. show interface [bvi number | eobc | gigabitEthernet slot_number/port_number [counters] | internal {event-history {dbg | mts} | iftable [name] | port-vlantable | seciptable | vlantable [number]} port-channel channel_number | vlan number] [|] [>]
Syntax Description
(Optional) Displays the information for the specified Bridge Group Virtual Interface (BVI). (Optional, ACE module only) Displays the interface information for the Ethernet Out-of-Band channel (EOBC).
gigabitEthernet (Optional, ACE appliance only) Displays the statistics for the specified gigabit slot_number/por Ethernet slot and port. t_number The slot_number represents the physical slot on the ACE containing the Ethernet ports. This selection is always 1.
The port_number represents the physical Ethernet port on the ACE. Valid selections are 1 through 4.
This keyword is available in the Admin context only. counters internal event-history dbg mts iftable name port-vlantable seciptable vlantable number (ACE appliance only) Displays a summary of interface counters for the specified Ethernet data port related to the receive and transmit queues. (Optional) Displays the internal interface manager tables and events. Displays event history information. Displays debug history information. Displays message history information. Displays the master interface table (Admin context only). (Optional) Interface table name. If you specify an interface table name, the ACE displays the table information for that interface. (Optional, ACE appliance only) Displays the Ethernet port manager VLAN table. Displays the interface manager's (ifmgr) view of a logical interface and displays all the configured secondary IP addresses under an interface Displays the VLAN table (Admin context only). (Optional) VLAN number. If you specify an interface number, the ACE displays the table information for that interface.
port-channel (Optional, ACE appliance only) Displays the channel number assigned to a channel_number port-channel interface. Valid values are from 1 to 255. This keyword is available in the Admin context only. vlan number | (Optional) Displays the statistics for the specified VLAN. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
1-161
CLI Commands
Command Modes
Exec BVI and VLAN interfaceAdmin and user contexts (ACE appliance only) Ethernet data port, Ethernet management port, and port-channel interfaceAdmin context only
Command History
3.0(0)A1(2) A2(3.1)
Modification This command was introduced. The command output includes the reason for an UP transition, timestamp for the last change, number for transitions since creation, and the last three previous states including the timestamp and the transition reasons. If you do not configure a load-balance scheme on the interface, the load-balance scheme field through the port-channel option displays src-dst-mac, which is the default load-balance scheme on the source or destination MAC address.
A1(7) A3(2.5)
A4(1.0)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. (ACE appliance only) In addition, the Ethernet data port, Ethernet management port, and port-channel interface command functions require the Admin user role. (ACE appliance only) You can configure flow control on each Ethernet port of a Catalyst 6500 series switch. However, the ACE does not support flow control. If you connect an ACE to a Catalyst 6500 series switch, the flow control functionality is disabled on the ACE. The output of the show interface gigabitEthernet command on the ACE displays the input flow-control is off, output flow control is off flow-control status line as shown in the example above regardless of the state of flow control on the Catalyst 6500 series switch port to which the ACE is connected. To display all of the interface statistical information, enter the show interface command without using any of the optional keywords. The internal keyword and options are intended for use by trained Cisco personnel for troubleshooting purposes only. For information about the fields in the show interface command output, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
1-162
OL-25339-01
Chapter 1
Related Commands
clear interface
show inventory
To display the system hardware inventory, use the show inventory command. show inventory [raw] [|] [>]
Syntax Description
raw |
(Optional) Displays the hardware inventory report and information about each temperature sensor in the ACE. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
3.0(0)A1(2)
ACE Appliance Release
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the show inventory command to display information about the field-replaceable units (FRUs) in the ACE, including product IDs, serial numbers, and version IDs. If you do not include the raw keyword, the ACE displays the hardware inventory report only. For information about the fields in the show inventory command output, see the Administration Guide, Cisco ACE Application Control Engine.
1-163
CLI Commands
Examples
To display the hardware inventory report and information about each temperature sensor, enter:
host1/Admin# show inventory raw
Related Commands
show hardware
show ip
To display the IP statistics, use the show ip command. show ip {dhcp relay {conf | information policy | statistics} | fib [np number {dest-ip ip_address}} | summary | wr dest-ip ip_address] | interface brief {[bvi | gigabitEthernet | port-channel | vlan] number} | route [summary | internal {event-history dbg | memory}] | traffic} [|] [>]
Syntax Description
Specifies the Dynamic Host Configuration Protocol (DHCP) configuration information. Displays the DHCP relay configuration information. Displays the relay agent information and the reforwarding policy status. Displays the DHCP relay statistics. Displays the Forwarding Information Base (FIB) table for the context. This table contains information that the forwarding processors require to make IP forwarding decisions. This table is derived from the route and ARP tables. (Optional) Displays the FIB information for a destination address on the specified ACE NP (network processor). For the number argument:
For the ACE module, enter an integer from 1 to 4. For the ACE appliance, enter 1.
For the ip_address argument, enter the IPV4 address in dotted-decimal notation (for example, 172.27.16.10). summary wr dest-ip ip_address (Optional) Displays the FIB table or route summary for the current context. (Optional) Displays the FIB information for the specified wire region (0 only) and destination IP address. Enter the IPv4 address in dotted-decimal notation (for example, 172.27.16.10). Displays a brief configuration and status summary of all interfaces, a specified bridge group virtual interface (BVI), or a virtual LAN (VLAN), including the interface number, IP address, status, and protocol. Displays the information for a specified BVI. Displays the information for an existing gigabit Ethernet (GE) port. Enter 1. Displays the information for an existing port-channel. Displays the statistics for a specified VLAN number.
interface brief
1-164
OL-25339-01
Chapter 1
number
Number of the existing BVI, gigabit Ethernet (GE) port, port-channel, or VLAN. For a BVI, enter an integer from 1 to 4090. For a GE port, enter 1. For a port channel, enter an integer from 1 to 255. For a VLAN, enter an integer from 2 to 4090. Displays the route entries. (Optional) Specifies the internal route entries. Displays the event history statistics. Displays the mtrack output statistics. Displays the IPv4 and IPv6 protocol statistics. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Added the interface brief and related keywords. Added IPv6 support for the traffic keyword.
Modification This command was introduced. Added the interface brief and related keywords. Added the gigabitEthernet and port-channel keywords. The interface brief option displays the hardware interfaces along with the logical interfaces. It also supports the individual output of each physical interface. For FT interfaces, (ft) appears after the VLAN ID in the output. This change is only applicable in the Admin context.
A5(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The internal and fib keywords and options are intended for use by trained Cisco personnel for troubleshooting purposes only.
1-165
CLI Commands
For information about the fields in the show ip command output, see the Security Guide, Cisco ACE Application Control Engine and the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear ip
1-166
OL-25339-01
Chapter 1
show ipcp
To display the Interprocess Communication Protocol (IPCP) statistics, use the show ipcp command. The ACE module uses the Interprocess Communication Protocol for communication between the control plane processor and the dataplane processors. show ipcp {cde | clients | event-history | peek_poke} [|] [>]
Syntax Description
cde
ACE moduleIPCP messages that were sent over the classification and distribution engine (CDE) interface. ACE applianceDisplays IPCP statistical information. ACE moduleDisplays the IPCP statistics of the service access points (SAPs). ACE applianceDisplays IPCP message queue information. ACE moduleDisplays the history of error messages (usually none) in the IPCP driver. ACE applianceDisplays IPCP event history information. ACE moduleDisplays the statistics of the special queue that is used to read from or write to the network processor or the control plane processor memory from the control plane. ACE applianceDisplays IPCP peek poke message queue information.
clients
event-history
peek_poke
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
A2(1.0)
1-167
CLI Commands
Modification This command was introduced. The pci option was removed.
A1(7) A4(1.0)
Usage Guidelines
This command requires the Admin role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
To display IPCP statistics for the CDE interface, enter the following command:
host1/Admin# show ipcp cde
Related Commands
show ipv6
To display the IPv6 statistics, use the show ipv6 command. show ipv6 {dhcp relay [statistics]} | {fib [{np number dest-ip ip_address} | summary | wr dest-ip ip_address]} | {interface [brief] [[bvi | vlan] number]} | neighbors | {route [summary | internal ktable]} [|] [>]
Syntax Description
Specifies the Dynamic Host Configuration Protocol (DHCP) configuration information. (Optional) Displays the DHCP relay statistics. Displays the Forwarding Information Base (FIB) table for the context. This table contains information that the forwarding processors require to make IP forwarding decisions. This table is derived from the route and ARP tables. (Optional) Displays the FIB information for a destination address on the specified ACE NP (network processor). For the number argument:
For the ACE module, enter an integer from 1 to 4. For the ACE appliance, enter 1.
For the ip_address argument, enter the IP address in dotted-decimal notation (for example, 172.27.16.10). summary wr dest-ip ip_address (Optional) Displays the FIB table or route summary for the current context. (Optional) Displays the FIB information for the specified wire region (0 only) and destination IP address. Enter the IP address in dotted-decimal notation (for example, 172.27.16.10). Displays the configuration and status of all interfaces, including the interface number, IP address, status, and protocol.
interface
1-168
OL-25339-01
Chapter 1
brief
Displays a brief configuration and status summary of all interfaces, a specified bridge group virtual interface (BVI), or a virtual LAN (VLAN), including the interface number, IP address, status, and protocol. Displays the configuration and status information for a specified BVI. Displays the configuration and status information for a specified VLAN number. Number of the existing BVI, gigabit Ethernet (GE) port, port-channel, or VLAN. For a BVI, enter an integer from 1 to 4090. For a GE port, enter 1. For a port channel, enter an integer from 1 to 255. For a VLAN, enter an integer from 2 to 4090. Displays information about the IPv6 neighbors, including the IPv6 address, MAC address, status (Up or Down), and more. Displays the route entries. (Optional) Specifies the internal route entries. Displays the IPv6 kernel route table entries. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Added the interface brief and related keywords. Added IPv6 support.
Modification This command was introduced. Added the interface brief and related keywords. Added the gigabitEthernet and port-channel keywords. The interface brief option displays the hardware interfaces along with the logical interfaces. It also supports the individual output of each physical interface. For FT interfaces, (ft) appears after the VLAN ID in the output. This change is only applicable in the Admin context.
A5(1.0)
1-169
CLI Commands
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The internal and fib keywords and options are intended for use by trained Cisco personnel for troubleshooting purposes only. For information about the fields in the show ipv6 command output, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
Syntax Description
all
Displays the latest load information for all VIP addresses, and VIP-based tags and domains with their associated VIP addresses and port numbers. Displays the latest load information for the specified domain name. Displays the latest load information for the specified VIP address or VIP tag name. For the ip_address argument, enter the IP address in dotted-decimal notation (for example, 192.168.11.1). (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
1-170
OL-25339-01
Chapter 1
Command History
Modification This command was introduced. The all keyword was added. The vip tag name keyword and argument were added.
A2(1.0) A2(2.0)
Modification This command was introduced. The tag name keyword and argument were added.
A3(1.0) A4(1.0)
Usage Guidelines
The output fields for the show kalap udp load all command display the VIP address, VIP tag with its associated VIP address and port number, or domain name with its associated VIP address and port number, its load value, and the time stamp.
Examples
To display the latest load information to the KAL-AP request for VIP address 10.10.10.10, enter:
host1/Admin# show kalap udp load vip 10.10.10.10
To display the latest load information to the KAL-AP request for domain KAL-AP-TAG1, enter:
host1/Admin# show kalap udp load domain KAL-AP-TAG1
To display the latest load information to the KAL-AP request for the VIP KAL-AP-TAG2 tag, enter:
host1/Admin# show kalap udp load vip tag KAL-AP-TAG2
Related Commands
(config-pmap-c) kal-ap-tag
1-171
CLI Commands
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-172
OL-25339-01
Chapter 1
show ldap-server
To display the configured Lightweight Directory Access Protocol (LDAP) server and server group parameters, use the show ldap-server command. show ldap-server [groups] [|] [>]
Syntax Description
groups |
(Optional) Displays configured LDAP server group information. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show ldap-server command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) aaa group server (config) ldap-server host (config) ldap-server port (config) ldap-server timeout
1-173
CLI Commands
show license
To display your ACE license information, use the show license command. show license [brief | file filename | internal event-history | status | usage] [|] [>]
Syntax Description
(Optional) Displays a filename list of currently installed licenses. (Optional) Displays the file contents of the specified license. (Optional) Displays a history of licensing-related events. (Optional) Displays the status of licensed features. (Optional) Displays the usage table for all licenses. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
Modification This command was introduced. The Count value for Web Optimization in the show license status command output has been modified from cps to concurrent connections.
A1(7) A3(2.3)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Entering the show license command without any options and arguments displays all of the installed ACE license files and their contents. For information about the fields in the show license command output, see the Administration Guide, Cisco ACE Application Control Engine. To manage the licenses on your ACE, use the license command.
1-174
OL-25339-01
Chapter 1
Examples
To display all of the installed ACE license files and their contents, enter:
host1/Admin# show license
Related Commands
1-175
CLI Commands
show line
To display all of the configured console and virtual terminal line sessions, use the show line command. show line [console [connected]] [|] [>]
Syntax Description
console connected |
(Optional) Displays the configured console settings for the ACE. (Optional) Displays the physical connection status. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show line command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To display all configured console and virtual terminal line sessions, enter:
host1/Admin# show line
Related Commands
1-176
OL-25339-01
Chapter 1
show logging
To display the current severity level and state of all syslog messages stored in the logging buffer, or to display information related to specific syslog messages, use the show logging command. show logging [history | internal {event-history dbg | facility} | message [syslog_id | all | disabled] | persistent | queue | rate-limit | statistics] [|] [>]
Syntax Description
(Optional) Displays the logging history file. (Optional) Displays syslog internal messages. Displays the debug history for the syslog server. Displays the registered internal facilities for the syslog server. (Optional) Displays a list of syslog messages that have been modified from the default settings. These are messages that have been assigned a different severity level or messages that have been disabled. (Optional) Identifier of a specific system log message to display, specified by message ID, and identifies whether the message is enabled or disabled. (Optional) Displays all system log message IDs and identifies whether they are enabled or disabled. (Optional) Displays a complete list of suppressed syslog messages. (Optional) Displays statistics for the log messages sent to flash memory on the ACE. (Optional) Displays statistics for the internal syslog queue. (Optional) Displays the current syslog rate-limit configuration. (Optional) Displays syslog statistics. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
1-177
CLI Commands
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the show logging command, you must have the ACE buffer enabled as a logging output location. By default, logging to the local buffer on the ACE is disabled. To enable system logging to a local buffer and to limit the messages sent to the buffer based on severity, use the logging buffered configuration command from the desired context. The show logging command lists the current syslog messages and identifies which logging command options are enabled. To clear the ACE buffer of the logging information currently stored, use the clear logging command. For information about the fields in the show logging command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To display statistics for the log messages sent to flash memory on the ACE, enter:
host1/Admin# show logging persistent
Related Commands
1-178
OL-25339-01
Chapter 1
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To configure the login timeout value, use the login timeout command in configuration mode. For information about the fields in the show login timeout command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-179
CLI Commands
show nat-fabric
To display the Network Address Translation (NAT) policy and pool information for the current context, use the show nat-fabric command. show nat-fabric {policies | src-nat policy_id mapped_if | dst-nat static_xlate_id | nat-pools | implicit-pat| global-static} [|] [>]
Syntax Description
Displays the NAT policies. Displays the specified source NAT policy information. To obtain the values for the policy_id and mapped_if arguments, view the policy_id and mapped_if fields displayed by the show nat-fabric policies command. Displays the static address translation for the specified static XLATE ID. To obtain the value for the static_xlate_id argument, view the static_xlate_id field displayed by the show nat-fabric policies command. Displays NAT pool information for a dynamic NAT policy. Displays the implicit PAT policies. Displays global static NAT information when the static command in global configuration mode is configured. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. This command was revised with the global-static keyword.
3.0(0)A1(2) A2(1.0)
Modification This command was introduced. This command was revised with the global-static keyword.
A1(7) A3(1.0)
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
1-180
OL-25339-01
Chapter 1
To obtain the values for the policy_id, mapped_if, and static_xlate_id arguments, view their respective fields displayed by the show nat-fabric policies command.
Examples
Related Commands
show netio
To display the control plane network I/O information, use the show netio command. show netio {clients | event-history | stats} [|] [>]
Syntax Description
Displays statistics for the applications that are transmitting and receiving packets through the Netio module. Displays a historic log of the most recent debug network I/O messages. Displays detailed counters for various Netio event occurrences. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
1-181
CLI Commands
Examples
Related Commands
show nexus-device
To display the Nexus device connection statistics, use the show nexus-device command. show nexus-device [name][detail]
Syntax Description
name
Configured identifier of the Nexus device. Enter the name of an existing Nexus device as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Displays an additional field for the IP address of the Nexus device. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
detail |
>
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To display the Nexus device connection information, enter the following command:
host1/Admin# show nexus-device DC1
1-182
OL-25339-01
Chapter 1
Related Commands
(config) nexus-device
1-183
CLI Commands
show np
To display the hardware information stored on the four network processors (NPs), use the show np command. show np np_number {access-list {node vlan vlan_number {in node_address | out node_address} | resource | root vlan vlan_number {in | out} | syslog {lineno-table [index_1 index_2 | all] | name-table [index_3 index_4 | all]} | trace vlan vlan_number in protocol prot_number | source source_ip source_port | destination dest_ip dest_port} | {adjacency [lower_index upper_index [all]} | {buffer stats {event-history | stats | usage}} | {cpu | internal [lower_index upper_index]] | reap]} | {interface {icmlookup [all] | iflookup}} | {interrupts} | {lb-stats {option}} | {mac-address-table} | {me-stats ucdump_option} | {memory} | {mtrie dest-ip dest_ip} | {nat {bitmap map_id | dst_nat policy_id | implicit-pat | policies | src-nat policy_id interface_id} | {reg} | {status } [|] [>]
Syntax Description
np_number
access-list node vlan vlan_number in out node_address resource root syslog lineno-table index_1 index_2 all name-table index_3 index_4
Displays information related to the access control list (ACL). Displays the contents of the hardware ACL node that is identified by the vlan_number. Specifies the number of the VLAN. Specifies the inbound traffic flow. Specifies the outbound traffic flow. Address of the node. Displays information about the ACL resource usage. Displays the hardware address of the root of the downloaded, aggregated ACL, identified by the vlan_number. Displays the ACL syslog tables. Displays the ACl syslog line-number table. Range of indices to display. Enter an integer from 0 to 262143 for index_1 and index_2. Specifies whether to display invalid entries. Displays the ACL syslog namestring table. Range of indices to display. Enter an integer from 0 to 16383 for index_3 and index_4.
1-184
OL-25339-01
Chapter 1
trace protocol prot_number source source_ip source_port destination dest_ip dest_port adjacency lower_index upper_index all internal buffer event-history stats usage cpu reap interface icmlookup iflookup
Traces a packet through a specific ACL. Specifies a protocol number. Specifies the source of the flow. Source IP address. Source port number. Specifies the destination of a flow. Destination IP address. Destination port number. Displays information related to the adjacent nodes. Lower index value. Enter a value from 1 to 32767. Upper index value. Enter a value from 1 to 32767. Displays all entries, including invalid entries. Displays the internal information for adjacency structures. Displays NP buffer usage available and status of ft switchover. Displays control plane buffer event history. Displays control plane buffer statistics. Displays control plane buffer usage. Displays information about the CPU processes. This command option is available only for a user with the Admin role in any context. (Optional, ACE appliance only) Retrieves the encap reap statistics. Displays information related to the interface tables. Displays the ICM/OCM interface table from the CP (0) or the specified NP. Displays the fast path interface lookup table from the CP (0) or the specified NP.
Note
The iflookup keyword presents information from the fast path interface lookup table. If you wish to verify the configured shared VLAN host ID value, enter the show running-config | include shared command.
(ACE module only) Displays the network processor interrupt error counters (for example, PIP, L2D, L2T, DRAM, and so on). Displays load-balancing statistics similar to the LbInspectTool. Displays the MAC address table. Displays Micro Engine statistics for the network processors. This command option is available only for a user with the Admin role in any context. Options for the ucdump utility. The ucdump utility is a binary on Xscale which returns information about Micro Engine statistics. Specify --help as the ucdump_option argument to list all of the supported ucdump utility options. Enter up to 80 alphanumeric characters.
Note
ucdump_option
The following ucdump utility options are disabled from show np me-stats: -C, -f, and -i.
memory
Displays information about the memory processes. This command option is available only for a user with the Admin role in any context.
1-185
CLI Commands
mtrie dest-ip dest_ip nat bitmap map_id dst_nat policy_id implicit-pat policies src-nat policy_id interface_id reg status
Displays Mtrie entry for the specified destination IP address. Displays information related to the network processor Network Address Translation (NAT) tables. Specifies the NAT-pool bit-map table in the network processor. Specifies the destination NAT policy. Specifies the implicit Port Address Translation (PAT) policy table. Specifies the full NAT policy table. Specifies the source NAT policy. Policy identifier number. Enter a value from 0 to 65535. Mapped interface identifier. Enter a value from 0 to 65535. (ACE module only) Displays information related to the network processor registers. (ACE appliance only) Displays status information related to the specified network processor. You can only display the statistics for network processor 1. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. The value of 0 was removed from the network processor np_number argument range. Added the buffer keyword and options.
Modification This command was introduced. Added the buffer keyword and options.
A1(7) A4(1.1)
Usage Guidelines
This command and its options require the access-list or interface feature in your user role, except for the cpu, me-stats, and memory options. These three options require that you have the Admin user role in any context. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
1-186
OL-25339-01
Chapter 1
(ACE appliance only) The show np 1 {me-stats | memory | status} is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. Because these commands are not context specific, we recommend that you issue them from the Admin context only. If you issue these commands in a user context, they may not display any data if other user context information could be displayed.
Examples
To display the access list information from the hardware using the network processor 1, enter:
host1/Admin# show np 1 access-list
To display Micro Engine statistics for a ucdump utility (-b, which instructs the ACE to dump fastpath buffer memory), enter:
host1/Admin# show np me-stats -b Fastpath thread buffers ================================= ME:1 thread:0 addr:0x0010 particle:0x00000000 len:78 rx_seq=7 0018 0x8500004e 0x00608034 0x0000001e 0x00101e07 ...N .`.4 .... .... 001c 0x0000ffff 0xffffffff 0x00059a3b 0x9a390800 .... .... ...; .9.. 0020 0x4500002c 0xa4540000 0xff11fd64 0x0c010105 E.., .T.. ...d .... 0024 0x0c010101 0xc350c352 0x00185db6 0x000100f0 .... .P.R ..]. .... 0028 0x00000008 0x00000000 0x00000064 0x00000000 .... .... ...d ....
Related Commands
1-187
CLI Commands
show ntp
(ACE appliance only) To display information about the Network Time Protocol (NTP) statistics, use the show ntp command. show ntp {peer-status | peers | statistics [io | local | memory | peer ip_address]} [|] [>]
Syntax Description
Displays the status for all configured NTP servers and peers. Displays a listing of all peers. Displays the NTP statistics. (Optional) Displays information the input/output statistics. (Optional) Displays the counters maintained by the local NTP. (Optional) Displays the statistical counters related to the memory code. (Optional) Displays the peer-peer statistical counters of the specified peer. Peer statistics for the specified IP address. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To display the status for all configured NTP servers and peers, enter:
host1/Admin# show peer-status
Related Commands
(config) ntp
1-188
OL-25339-01
Chapter 1
show optimization-global
To display information about the global optimization statistics, use the show optimization-global command. show optimization-global [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) optimize
1-189
CLI Commands
show parameter-map
To display the detailed configuration information for a specified parameter map, use the show parameter-map command. show parameter-map [parammap_name] [|] [>]
Syntax Description |
parammap_name
(Optional) Name of an existing parameter map. Enter the name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. The persistence rebalance field now displays the enabled strict state when you configure the persistence-rebalance strict command.
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. The Description field has been added to the show parameter-map command output. This field displays the previously entered summary about the specific parameter map.
A1(7) A3(2.3)
Usage Guidelines
This command requires the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show running-config
1-190
OL-25339-01
Chapter 1
show probe
To display the probe information including script probes, use the show probe command. show probe [probe_name] [detail] [|] [>]
Syntax Description
probe_name detail |
(Optional) Name of an existing probe. (Optional) Displays a detailed probe report that includes configuration information and statistics for all configured probes. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
Modification This command was introduced. The regex cache-length field was added to display the configured cache length.
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you enter the show probe command without specifying a probe name, the ACE displays a summary report that includes all configured probes. For information about the fields in the show probe command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-191
CLI Commands
show processes
To display the general information about all of the processes running on the ACE, use the show processes command. The show processes command displays summary CPU information for the ACE module SiByte 1250 Processor or ACE appliance Pentium processor. show processes [cpu | log [details | pid process_id] | memory] [|] [>]
Syntax Description
(Optional) Displays information about the CPU processes. (Optional) Displays information about the process logs. (Optional) Displays detailed process log information for all process identifiers. (Optional) Displays process information about a specific process identifier. Enter a value from 0 to 2147483647. (Optional) Displays information about the memory processes. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec Admin users (users with an Admin role), across all contexts
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show processes command is available only to Admin users (users with an Admin role) across all contexts. The displayed system processes information is at the CPU system level (the total CPU usage) and is not on a per-context level. For information about the fields in the show processes command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
1-192
OL-25339-01
Chapter 1
Related Commands
show pvlans
(ACE module only) To display the private VLANs on the ACE downloaded from the supervisor engine in the Catalyst 6500 series switch, use the show pvlans command. show pvlans [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show pvlans command output, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
To display the private VLANs on the ACE downloaded from the supervisor engine, enter:
host1/Admin# show pvlans
Related Commands
1-193
CLI Commands
show radius-server
To display the configured Remote Authentication Dial-In User Service (RADIUS) server and group parameters, use the show radius-server command. show radius-server [groups | sorted] [|] [>]
Syntax Description
groups sorted |
(Optional) Displays configured RADIUS server group information. (Optional) Displays RADIUS server information sorted by name. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show radius-server command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
1-194
OL-25339-01
Chapter 1
Related Commands
(config) aaa group server (config) radius-server attribute nas-ipaddr (config) radius-server deadtime (config) radius-server host (config) radius-server key (config) radius-server retransmit
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec (ACE module) Admin context only ACE appliance) Admin and user contexts
Command History
3.0(0)A1(2)
Modification This command was introduced. This command is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. See the Usage Guidelines section for more information.
A1(7) A3(2.6)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command shows the resource allocation but does not show the actual resources being used. To display information about actual resource usage, use the show resource usage command.
1-195
CLI Commands
(ACE appliance only) The show resource allocation command is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. Because these commands are not context specific, we recommend that you issue them from the Admin context only. If you issue these commands in a user context, they may not display any data if other user context information could be displayed. For information about the fields in the show resource allocation command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
Syntax Description
Displays the resource driver application map. Displays the current memory usage for the virtual server ID. Displays the current socket resources. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec (ACE module) Admin context only (ACE Appliance) Admin and user contexts
Command History
Modification This command was introduced. The regexp keyword was added.
3.0(0)A1(2) A4(1.0)
1-196
OL-25339-01
Chapter 1
Modification This command was introduced. This command is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. See the Usage Guidelines section for more information. The regexp keyword was added.
A1(7) A3(2.6)
A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only. (ACE appliance only) The show resource internal command is now available to users configured with a custom role in both the Admin context and a user-configured context, as well as the predefined Admin and Network-Monitor roles. Because these commands are not context specific, we recommend that you issue them from the Admin context only. If you issue these commands in a user context, they may not display any data if other user context information could be displayed.
Examples
Related Commands
1-197
CLI Commands
Syntax Description
np 1 number
(Optional) Displays the resource usage for the NP. (ACE appliance only) Displays all resource usage statistics for the NP. Enter 1. (ACE module only) Network Processor (NP) number. Enter a number from 1 to 4. Since the ACE divides all resources equally between all NPs, this argument allows you to monitor the resource usage for each NP independently in case it reaches a limit. When an NP reaches a limit, it can deny a connection even though the limit is not reached in the other NPs. Displays the active concurrent instances or the current rate of the resource for the NPs. Displays the number of denied uses of the resource for the NPs since the resource statistics were last cleared. Displays the peak concurrent instances, or the peak rate of the resource for the NPs since the statistics were last cleared, either using the clear resource usage command or because the device rebooted. (Optional) Displays the resource usage for each context individually. This is the default setting. This option is available in the Admin context only. (Optional) Displays the resource usage for the specified context. The context_name argument is case sensitive. This option is available in the Admin context only. (Optional) Displays the total resource usage for all contexts together. For example, the denied column shows the items that have been denied for each context limit. This option is available in the Admin context only. (Optional) Displays the greatest n users of a single resource arranged from the highest to the lowest percentage of resources used. You must specify a single resource type and cannot use the resource all keywords with this option. This option is available in the Admin context only. (Optional) Displays statistics for one of the following specified resources. This option is available for the np option in the Admin context only. (ACE appliance only) Displays the number of application acceleration connections. Displays the ACL memory usage. Displays the resource usage for all resources used by the specified context or contexts. Displays the resource usage for simultaneous connections. Displays the resource usage for management connections.
summary
top number
1-198
OL-25339-01
Chapter 1
probes proxy-connections rate bandwidth connections http-comp inspect-conn mac-miss mgmt-traffic ssl-connections syslog regexp sticky syslogbuffer xlates counter all current denied peak
Displays the resource usage for probes. Displays the resource usage for proxy connections. Displays the rate per second for the specified connections or syslog messages. Displays the bandwidth in bytes per second. Displays connections per second. Displays the HTTP compression rate in bytes per second. To convert the value to bits per second, multiply the displayed value by 8. Displays all inspection connections per second. Displays MAC miss traffic that was punted to the CP packets per second. Displays management traffic bytes per second. Displays Secure Sockets Layer (SSL) connections. Displays the syslog message buffer usage. Displays resource usage for regular expressions. Displays resource usage for sticky entries. Displays resource usage for the syslog buffer. Displays resource usage by Network Address Translation (NAT) and Port Address Translation (PAT) entries. (Optional) Displays all statistics. You can specify one of the following options: (Optional) Displays all statistics. This is the default setting. (Optional) Displays the active concurrent instances or the current rate of the resource. (Optional) Displays the number of denied uses of the resource since the resource statistics were last cleared. (Optional) Displays the peak concurrent instances, or the peak rate of the resource since the statistics were last cleared, either using the clear resource usage command or because the device rebooted. (Optional) Number above which resources are shown. Enter an integer from 0 to 4294967295. The default is 1. If the usage of the resource is below the number you set, then the resource is not shown. If you specify all for the counter name, then the count_threshold applies to the current usage. To show all resources, set the count_threshold to 0. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
count_threshold
>
Defaults
None
Command Modes
Exec
1-199
CLI Commands
Command History
Modification This command was introduced. This command was modified to include the np option and http-comp keywords for compression.
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. This command was modified to include the np option.
A1(7) A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show resource usage command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-200
OL-25339-01
Chapter 1
show restore
To display restore errors or the restore status, use the show restore command. show restore errors | status [details] [|] [>]
Syntax Description
errors
Displays errors that may occur during a backup operation. For information about backup system messages, see the System Message Guide, Cisco ACE Application Control Engine. Displays errors that occur during a restore operation. For information about restore system messages, see the System Message Guide, Cisco ACE Application Control Engine.
status [details]
Command Modes
Command History
A2(3.0)
A4(1.0)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
1-201
CLI Commands
ct1 ct1 ct1 ct2 ct2 ct2 ct2 ct2 ct3 ct3 ct3 ct3 ct3
Checkpoints Startup-cfg Running-cfg Cert/Key Probe script Checkpoints Startup-cfg Running-cfg Cert/Key Probe script Checkpoints Startup-cfg Running-cfg
Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu Thu
Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep Sep
16 16 16 16 16 16 16 16 16 16 16 16 16
23:28:17 23:28:17 23:28:18 23:28:18 23:28:18 23:28:18 23:28:18 23:28:18 23:28:19 23:28:19 23:28:19 23:28:19 23:28:19
2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010 2010
SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS SUCCESS
Related Commands
restore
1-202
OL-25339-01
Chapter 1
show role
To display the configured user roles (predefined and user-configured roles), use the show role command. show role [role_name] [|] [>]
Syntax Description
role_name |
(Optional) Name of an existing role. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To configure roles, use the role command in configuration mode. For information about the fields in the show role command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) role
1-203
CLI Commands
show rserver
To display the IPv6 or IPv4 summary or detailed statistics for a named real server or for all real servers, use the show rserver command. show rserver [rserver_name] [detail] [|] [>]
Syntax Description
rserver_name detail
(Optional) Identifier of an existing real server. (Optional) Displays detailed statistics for the real server name that you enter or for all real servers. If you do not include the detail keyword, the summary report is displayed. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2) A5(1.0)
A1(7) A5(1.0)
Usage Guidelines
This command requires the rserver feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show rserver command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. For the Total Conn-failures output field of the show rserver detail command, the following conditions apply: For Layer 4 traffic with normalization on, the count increments if the three-way handshake fails to be established for either of the following reasons:
A RST comes from the client or the server after a SYN-ACK. The server does not reply to a SYN. The connection times out.
For Layer 4 traffic with normalization off, the count does not increment.
1-204
OL-25339-01
Chapter 1
For L7 traffic (normalization is always on), the count increments if the three-way handshake fails to be established for either of the following reasons:
A RST comes from the server after the front-end connection is established The server does not reply to a SYN. The connection times out.
Examples
Related Commands
1-205
CLI Commands
show running-config
To display the running configuration information associated with the current context, use the show running-config command. show running-config [aaa | access-list | action-list | class-map | context | dhcp | domain | ft | interface | object-group | parameter-map | policy-map | probe | resource-class | role | rserver | serverfarm | sticky [name]] [|] [>]
Syntax Description
(Optional) Displays authentication, authorization, and accounting (AAA) information. (Optional) Displays access control list (ACL) information. (Optional) Displays action-list information. (Optional) Displays the list of all class maps configured for the current context. The ACE also displays configuration information for each class map listed. (Optional) Displays the list of contexts configured on the ACE. The ACE also displays the resource class (member) assigned to each context. The context keyword only works from within the admin context. (Optional) Displays Dynamic Host Configuration Protocol (DHCP) information. (Optional) Displays the list of domains configured for the current context. The ACE also displays configuration information for each domain listed. (Optional) Displays the list of redundancy or fault-tolerance (ft) configurations configured for the current context. The ACE also displays configuration information for each ft configuration listed. (Optional) Displays interface information. (Optional) Displays object-group information. (Optional) Displays policy map information. (Optional) Displays probe information. (Optional) Displays resource class information. (Optional) Displays the list of roles configured for the current context. The ACE also displays configuration information for each role on the list. (Optional) Displays rserver information. (Optional) Displays server farm information. (Optional) Displays sticky information. (Optional) Object name to display. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
dhcp domain ft
interface object-group policy-map probe resource-class role rserver serverfarm sticky name |
>
Command Modes
Exec
1-206
OL-25339-01
Chapter 1
Command History
Modification This command was introduced. This command was revised. Added the optional name argument.
Modification This command was introduced. This command was revised. The name option was added.
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show running-config command is a context-sensitive command. The ACE creates a running configuration for each context that you create; therefore, to display the running-config file of a specific context, you must enter the show running-config command from within the desired context. If you need to change to another context before executing the show running-config command, use the changeto command or log directly in to the desired context. Use the copy capture command to do the following:
Save a copy of the running configuration to a file on one or more destination locations. Save the running configuration as the startup configuration. Save the startup configuration as the running configuration.
For information about the fields in the show running-config command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-207
CLI Commands
show scp
(ACE module only) To display the Switch Command Control Protocol (SCP) statistics, use the show scp command. show scp {debugs | event-history | stats} [|] [>]
Syntax Description
Displays SCP debug filter settings. Displays a historic log of the most recent SCP debug messages. Displays detailed counters for SCP events. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-208
OL-25339-01
Chapter 1
show script
To display the statistics for a script file that is active on the ACE including exit codes and exit messages, use the show script command. show script {script_name probe_name [rserver_name [port_number] [serverfarm sfarm_name]] | code script_name} [|] [>]
Syntax Description
Name of a loaded script. Name of a probe containing an association with the specified script. (Optional) Name of a real server that contains an association with the specified probe. (Optional) Port number on the specified real server. (Optional) Specifies the server farm containing an association with the specified real server. Displays the code for the specified script. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show script command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To display the script file code for the script in the file MYSCRIPT, enter:
host1/Admin# show script code MYSCRIPT
1-209
CLI Commands
Related Commands
1-210
OL-25339-01
Chapter 1
Syntax Description
errors msgs |
Displays the debug error logs of the security manager. Displays the message logs of the security manager. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-211
CLI Commands
show serverfarm
To display a summary or detailed statistics about a specified server farm, use the show serverfarm command. show serverfarm [name [retcode]] [detail] [NPn] [|] [>] show serverfarm [name [inband]] [|] [>]
Syntax Description
name retcode
(Optional) Detailed report for the specified server farm. If you do not specify a server farm name, the summary report is displayed. (Optional) Displays the HTTP return codes statistics for configured real server and retcode map combinations only if the return code hit count is greater than 0. All return code hit counts are an aggregate of the counts of both network processors. Displays the HTTP return codes associated with the server farm. (Optional) Displays detailed statistics for the specified server farm, including the current and total connections stuck to each real server due to sticky. When used after the retcode option, the detail option displays return code statistics even if the value is 0. (Optional) Displays the number of inband health monitoring connection failures for each real server in a server farm. (Optional) Indicates which network processor (NP) handled a connection for a particular real server. Use this field to troubleshoout real server connections when only some connections are dropped. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
detail
inband NPn
>
Command Modes
Command History
Modification This command was introduced. This command was revised. The Out-of-Rotation Count field was added to the show command output. This command was revised to include the inband option. Added the NPn option.
1-212
OL-25339-01
Chapter 1
Modification This command was introduced. This command with the name or detail option was revised to include the real server description field as defined by the description command in the serverfarm host real server configuration mode. This command was revised to include the inband option. Added the NPn option.
A1(7) A3(2.3))
A4(1.0) A4(1.1)
Usage Guidelines
This command requires the serverfarm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. In software version A4(1.1) and later, the ACE retains the retcode and inband health monitoring statistics of a server farm when a real server transitions from the OPERATIONAL state to the INACTIVE state. For information about the fields in the show serverfarm command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-213
CLI Commands
show service-policy
To display the statistics for all policy maps or a specific policy map that is currently in service, use the show service-policy command. This command also allows you to display statistics for a specific class map in a policy or the hit counts for match HTTP URL statements in a Layer 7 HTTP policy map. If you do not enter an option with this command, the ACE displays all enabled policy statistics. show service-policy [policy_name [class-map class_name]] [detail [dad] | summary | url-summary] [|] [>]
Syntax Description
policy_name
(Optional) Identifier of an existing policy map that is currently in service (applied to an interface) as an unquoted text string with a maximum of 64 alphanumeric characters. If you do not enter the name of an existing policy map, the ACE displays information and statistics for all policy maps. (Optional) Displays the statistics for the specified class map associated with the policy. (Optional) Displays a more detailed listing of policy map or class map statistics and status information. (Optional) Displays the IPv6 duplicate address detection (DAD) information, including the DAD status of the VIP. (Optional) Displays a summary of policy map or class map statistics and status information. (Optional) Displays the number of times that a connection is established based on a match HTTP URL statement for a class map in a Layer 7 HTTP policy map. The URL hit counter is per match statement per load-balancing Layer 7 policy. If you are using the same combination of Layer 7 policy and class maps with URL match statements in different VIPs, the count is combined. If the ACE configuration exceeds 64K URL and load-balancing policy combinations, this counter displays NA.
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Command syntax was changed to allow the display of all service policies that are configured in the ACE. The class-map class_name and summary options were added.
1-214
OL-25339-01
Chapter 1
Modification The url-summary option was added. The regex dnld status field was added. Added VIP DWS state output field Added optional dad keyword and associated output fields for IPv6.
Modification This command was introduced. The class-map class_name and summary options were added. Compression counter fields were added. The regex dnld status field was added. The url-summary option was added. Added VIP DWS state output field Added optional dad keyword and associated output fields for IPv6.
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show service-policy command displays the following information:
VLAN to which the policy is applied Class map associated with the policy Status of any NAT operations Status of any load-balancing operations Status of any compression operations Dynamic Workload Scaling (DWS) status of the VIP DAD status of IPv6 VIPs
The ACE updates the counters that the show service-policy command displays after the applicable connections are closed. For information about the fields in the show service-policy command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To display detailed statistics and current status of the service policy MGMT_POLICYMAP, enter:
host1/Admin# show service-policy MGMT_POLICYMAP detail
Related Commands
1-215
CLI Commands
show snmp
To display the Simple Network Management Protocol (SNMP) statistics and configured SNMP information, use the show snmp command. show snmp [community | engineID | group | host | sessions | user] [|] [>]
Syntax Description
(Optional) Displays SNMP community strings. (Optional) Displays the identification of the local SNMP engine and all remote engines that have been configured on the ACE. (Optional) Displays the names of groups on the ACE, the security model, the status of the different views, and the storage type of each group. (Optional) Displays the configured SNMP notification recipient host, the User Datagram Protocol (UDP) port number, the user, and the security model. (Optional) Displays the IP address of the targets for which traps or informs have been sent. (Optional) Displays SNMPv3 user information. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, this command displays the ACE contact, the ACE location, the packet traffic information, community strings, and the user information. You can instruct the ACE to display specific SNMP information by including the appropriate keyword. For information about the fields in the show snmp command output, see the Security Guide, Cisco ACE Application Control Engine.
1-216
OL-25339-01
Chapter 1
Examples
Related Commands
(config) snmp-server community (config) snmp-server contact (config) snmp-server enable traps (config) snmp-server host (config) snmp-server location (config) snmp-server trap link ietf (config) snmp-server trap-source vlan (config) snmp-server user
1-217
CLI Commands
show ssh
To display the information about the Secure Shell (SSH) keys and sessions, use the show ssh command. show ssh {key [dsa | rsa | rsa1] | maxsessions [context_name] | session-info [context_name]} [|] [>]
Syntax Description
Displays the host key pair details for all SSH keys. (Optional) Displays only the details of the DSA key pair for the SSH version 2 protocol. (Optional) Displays only the details of the RSA key pair for the SSH version 2 protocol. (Optional) Displays only the details of the RSA1 key pair for the SSH version 1 protocol. Displays the maximum number of SSH sessions that the ACE allows. Context administrators may also view SSH session information associated with a particular context. (Optional) Name of an existing context that contains the SSH session information that the context administrator wants to view. Only the global administrator can view Telnet information associated with a particular context. The context_name argument is case sensitive and is visible only from the admin context. Displays session information, including the session ID, the remote host IP address, and the active time. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
context_name
session-info |
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. From the Admin context, this argument allows you to display only the SSH information associated with a specific user-created context.
1-218
OL-25339-01
Chapter 1
For information about the fields in the show ssh command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To display the maximum number of SSH sessions that the ACE permits for the context C2, enter:
host1/Admin # show ssh maxsessions C2 Maximum Sessions Allowed is 2(SSH Server is enabled)
Related Commands
clear ssh (config) class-map (config) ssh key (config) ssh maxsessions
1-219
CLI Commands
show startup-config
To display information about the startup configuration that is associated with the current context, use the show startup-config command. show startup-config [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To clear the startup configuration, use the clear startup-config command. To copy the running configuration to the startup configuration, or copy the startup configuration to the running configuration, use the copy running-config command. For information about the fields in the show startup-config command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-220
OL-25339-01
Chapter 1
show stats
To display statistics about the ACE operation, use the show stats command. show stats [connection | {crypto {client [alert | authentication | cipher | termination]} | {server [alert | authentication | cipher | insert | redirect | termination]}} | http | inspect [ftp | http | rtsp]| kalap [all] | loadbalance [radius | rdp | rtsp | sip] | optimization http | probe [type probe_type] | sticky] [|] [>]
Syntax Description
(Optional) Displays global connection statistics associated with the current context. (Optional) Displays the back-end (client keyword) and front-end (server keyword) SSL statistics for the current context. Displays the back-end SSL client statistics for the current context. If you do not enter any options with this keyword, this command displays alert, authentication, cipher, and termination statistics. (Optional) Displays SSL alert statistics. (Optional) Displays the SSL cipher statistics. (Optional) Displays the back-end SSL termination statistics. Displays the front-end SSL server statistics for the current context. If you do not enter any options with this keyword, this command displays alert, authentication, cipher, header insertion, redirect, and termination statistics. (Optional) Displays the header insertion statistics. (Optional) Displays the redirect statistics. (Optional) Displays global HTTP statistics associated with the current context. (Optional) Displays global FTP, HTTP, or RTSP inspect statistics associated with the current context. If you do not include any options with the inspect keyword, the ACE displays the global HTTP statistics. (Optional) Displays global server load-balancing (GSLB) statistics associated with the current context. (Optional) In the admin context, displays the total number of KAL-AP statistics for all contexts. These statistics are followed by the statistics for the admin context and then all other contexts. (Optional) Displays global load-balancing statistics associated with the current context. (Optional) Displays Remote Authentication Dial-In User Service (RADIUS) load-balancing statistics associated with the current context. (Optional) Displays Reliable Datagram Protocol (RDP) load-balancing statistics associated with the current context. (Optional) Displays Real-Time Streaming Protocol (RTSP) load-balancing statistics associated with the current context. (Optional) Displays Session Initiation Protocol (SIP) load-balancing statistics associated with the current context. (Optional, ACE appliance only) Displays HTTP optimization global statistics associated with the current context.
1-221
CLI Commands
(Optional) Displays global probe statistics associated with the current context. (Optional) Displays global sticky statistics associated with the current context. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec
Command HistoryA
Modification This command was introduced. This command was revised to add the crypto, radius, and rtp keywords. This command was revised to add the rtsp and sip keywords. This command was revised to add the all keyword. This command was revised to add counters for SSL redirect and header insertion.
A4(1.0)
This command was revised to add the alert, authentication, cipher, insert, redirect, and termination options.
Modification This command was introduced. This command was revised. The alert, authentication, cipher, and termination options were added.
Usage Guidelines
This command requires the loadbalance, inspect, NAT, connection, or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the statistics for a specific probe type (for example, scripted), include the type probe_type keyword and argument.
Examples
1-222
OL-25339-01
Chapter 1
Related Commands
clear stats
Syntax Description
sticky_group_name |
The name of the configured sticky group (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
A3(2.2)
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command displays information that correlates the inserted cookie, the sticky entry, and the final destination for the cookie insert configuration. For information about the fields in the show sticky cookie-insert command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To display the inserted cookie information for the sticky group, enter:
host1/Admin# show sticky cookie-insert group STICKY-TEST
Related Commands
1-223
CLI Commands
Syntax Description
static
(Optional) Displays static sticky database entries. If you do not use an optional keyword to specify the type of static sticky database entry to display, all entries are displayed. (Optional) Displays sticky database entries within the specified connection count range. (Optional) Displays sticky database entries for the source IPv6 or IPv4 address of a client that you specify. (Optional) Displays sticky database entries for the sticky group name that you specify. (Optional) Displays sticky database entries for the HTTP content value that you specify. (Optional) Displays sticky database entries for the HTTP cookie value that you specify. (Optional) Displays sticky database entries for the HTTP header value that you specify. (Optional) Displays sticky database entries for both the source and destination addresses, the destination address only, or the source address only.
active-conn-count min value1 max value2 client ip_address group name1 http-content value3 http-cookie value4 http-header value5 ip-netmask {both {source ip_address2 destination ip_address3} | destination ip_address4 | source ip_address5} layer4-payload value6 rserver name2 port serverfarm name3 rtsp-header value7 sip-header value8 time-to-expire min value9 max value10 type http-content
(Optional) Displays sticky database entries for the Layer 4 payload value that you specify. (Optional) Displays sticky database entries for the real-server name that you specify. (Optional) Real server port number. Specifies a server farm associated with the real server. (Optional) Displays sticky database entries for the RTSP header value that you specify. (Optional) Displays sticky database entries for the SIP header value that you specify. (Optional) Displays the sticky database entries within the specified time to expire range. (Optional) Displays sticky database entries for one of the following sticky group types: Specifies HTTP content sticky database entries.
1-224
OL-25339-01
Chapter 1
http-cookie http-header ip-netmask both destination source radius calling-id framed-ip username rtsp-header sip-header count
Specifies HTTP cookie sticky database entries. Specifies HTTP header sticky database entries. Specifies IP netmask sticky database entries. Specifies both source and destination IP netmasks. Specifies the destination IP netmask. Specifies the source IP netmask. Specifies RADIUS attribute sticky database entries. Specifies RADIUS calling-ID attribute sticky database entries. Specifies RADIUS framed-IP attribute sticky database entries. Specifies RADIUS username attribute sticky database entries. Specifies RTSP header sticky database entries. Specifies SIP header sticky database entries. (Optional) Displays the count for the sticky database entries.
Note
Only the show sticky database count and show sticky database static count commands display the total number of entries in the system as Total Active Sticky Entries.
detail
(Optional) Displays detailed statistics for the specified sticky database component. The detail option output includes the sticky-hit-count field to display the total number of times that a sticky entry is hit. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
Modification This command was introduced. This command was revised. The show sticky database static http-cookie value2 command no longer displays the hash key. Added the active-conn-count, ip-netmask, time-to-expire, count, and deatil options.
A1(7) A3(1.0)
1-225
CLI Commands
Modification Added the active-conn-count, ip-netmask, time-to-expire, count, and deatil options. When you enable cookie insertion through the cookie insert command in sticky-cookie configuration mode, the show sticky database static http-cookie command no longer displays the hash key. This command displays the source and destination addresses in dotted-decimal notation instead of the hexadecimal equivalent.
A4(1.1) A3(2.2)
A3(2.6)
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show sticky command output, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To display sticky statistics for the client with a source IP address of 192.168.12.15, enter:
host1/Admin# show sticky database client 192.168.12.15
Related Commands
(config-sfarm-host-rs) cookie-string
1-226
OL-25339-01
Chapter 1
Syntax Description
text
Cookie or URL text for which you want to calculate the hash value. Enter the cookie or URL value as an unquoted text string with no spaces and with a maximum of 1024 alphanumeric characters. If you want to include spaces in the text string, enclose the text string in quotation marks ( )
Command Modes
Command History
Usage Guidelines
Examples
To generate the hash value for the cookie value 1.1.1.10, enter the following command:
host1/Admin# show sticky hash 1.1.1.10 Hash: 0x8a0937592c500bfb - 9946542108159511547
Now you can display the sticky database for a particular sticky group and match the generated hash with the sticky entry (hash) in the sticky database. For example, to display the sticky database for the group STICKY_GROUP1, enter the following command:
host1//Admin# show sticky database group STICKY_GROUP1 sticky group : STICKY_GROUP1 type : HTTP-COOKIE timeout : 1440 timeout-activeconns : FALSE sticky-entry rserver-instance time-to-expire flags --------------------+----------------+----------------+-------+ 9946542108159511547 SERVER1:80 86390 -
Related Commands
1-227
CLI Commands
Syntax Description
internal_id
Command Modes
Command History
Usage Guidelines
Examples
The following example shows how to use the two above-mentioned commands to display all the connections associated with a particular sticky entry. To obtain the internal IDs of sticky database entries, enter the following command:
switch/Admin# show sticky database static detail | i internal internal entry-id: 0x200006 internal entry-id: 0x200007
After you have obtained an internal sticky id, use the show conn sticky command to display all the connections linked to that sticky entry as follows:
switch/Admin# show conn sticky 0x200006 conn-id np dir proto vlan source destination state -------+--+---+-----+----+-------------------+----------------+------+ 242 1 in TCP 20 192.168.20.45:44425192.168.20.15:80 ESTAB 243 1 out TCP 40 192.168.40.28:80 192.168.20.45:44425 ESTAB switch/Admin# show conn sticky 0x200007 conn-id np dir proto vlan source destination state
-------+--+---+-----+----+-----------------+-----------------+------+ switch/Admin#
Related Commands
1-228
OL-25339-01
Chapter 1
show syn-cookie
To display SYN cookie statistics, use the show syn-cookie command. To display SYN cookie statistics for all VLANs that are configured in the current context, enter the command with no arguments. show syn-cookie [vlan number]
Syntax Description
vlan number
Instructs the ACE to display SYN cookie statistics for the specified interface. Enter an integer from 2 to 2024.
Command Modes
Command History
A2(1.0)
A1(7)
Usage Guidelines
Examples
Related Commands
clear syn-cookie
1-229
CLI Commands
show system
To display the ACE system information, use the show system command. show system {cpuhog} | {error-id {hex_id | list} | internal {aaa {event-history {errors | msgs} | mem-stats} | dmesg | log {boot {kickstart | system} | install [details]} | mts {buffers [age seconds | details | node name | order | sap number | sap_all | summary] | memory | opcode} | radius event-history {errors | msgs} | sysmgr {event-history {errors | msgs} | service {all [detail] | local [detail] | name service_name [dependencies | policies | seqnotbl] | not-running [details] | pid id [config | dependencies | log] | running [details] | uuid hex_id [config | dependencies]} | startup-config {locks | state} | state | time} | tacacs+ event-history {errors | msgs} | urifs | vshd {config-intro | feature-list | license-info | log {running-config | tree-table} | subtype-table | tree-table}} | kcache | kmem | kmemtrack | resources | skbtrack | uptime | watchdog [lcp | memory | scp]} [|] [>]
Syntax Description
cpuhog
Displays the largest amount of time that a driver was executing in the kernel. This keyword is intended for use by trained Cisco personnel for troubleshooting purposes only. Displays description about errors. This keyword is available in all user contexts. Error ID in hexadecimal format. The range is from 0x0 to 0xffffffff. Specifies all error IDs. Displays Cisco internal system-related functions. The internal keywords and related keywords, options, and arguments are intended for use by trained Cisco personnel for troubleshooting purposes only. This option is available in the Admin context only. Displays Linux kernel cache statistics. Displays Linux kernel memory statistics. Displays how the kernel memory is being currently used. This keyword is intended for use by trained Cisco personnel for troubleshooting purposes only. Displays system-related CPU and memory statistics. Displays the allocation and deallocation of network buffers in the drivers. This keyword is intended for use by trained Cisco personnel for troubleshooting purposes only. Displays how long the ACE has been up and running. This keyword is available in all user contexts.
resources skbtrack
uptime
1-230
OL-25339-01
Chapter 1
Displays whether the watchdog is enabled or disabled, and its timeout. When you enter this keyword without an option, all watchdogs are displayed. To display a specific watchdog, enter one of the following options:
lcp(ACE module only) Displays the LCP process watchdog memoryDisplays whether the low memory watchdog is enabled or disabled, and its timeout. scp(ACE module only) Displays the watchdog for SCP keepalive messages from the hardware timer interrupt level
The system watchdog command allows you to configure the Memory watchdog timeout. (ACE module only) The LCP and SCP timeouts are not configurable. | (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec Admin context User contexts (error-id and uptime keywords only)
Command History
Modification This command was introduced. The watchdog keyword was added.
3.0(0)A1(2) A4(1.0)
Modification This command was introduced. The dmseg and watchdog memory keywords were added.
A1(7) A4(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show system command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
1-231
CLI Commands
Related Commands
system watchdog
show tacacs-server
To display the configured Terminal Access Controller Access Control System Plus (TACACS+) server and server group parameters, use the show tacacs-server command. show tacacs-server [groups | sorted] [|] [>]
Syntax Description
groups sorted |
(Optional) Displays configured TACACS+ server group information. (Optional) Displays TACACS+ server information sorted by name. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show tacacs-server command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
1-232
OL-25339-01
Chapter 1
Related Commands
(config) aaa group server (config) tacacs-server deadtime (config) tacacs-server host (config) tacacs-server key (config) radius-server timeout
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show tcp statistics command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-233
CLI Commands
show tech-support
To display information that is useful to technical support when reporting a problem with your ACE, use the show tech-support command. show tech-support [details] [|] [>]
Syntax Description
details |
(Optional) Provides detailed information for each of the show commands described below in the Usage Guidelines section. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
Modification This command was introduced. This command no longer displays the following:
A1(7) A3(2.2)
All show acl-merge acls vlan command output All show acl-merge merge-list vlan number out command output
It also now displays a maximum of four VLANs. A3(2.6) This command no longer executes the following commands:
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show tech-support command is useful when collecting a large amount of information about your ACE for troubleshooting purposes with Cisco technical support. The output of this command can be provided to technical support representatives when reporting a problem.
1-234
OL-25339-01
Chapter 1
The show tech-support command displays the output of several show commands at once. The output from this command varies depending on your configuration. The default output of the show tech-support command includes the output of the following commands:
show hardwareSee the show hardware command. show interface See the show interface command. show processSee the show processes command. show running-configSee the show running-config command. show system internal dmesgSee the show system command. show versionSee the show version command.
Explicitly set the terminal length command to 0 (zero) to disable autoscrolling and enable manual scrolling. Use the show terminal command to view the configured terminal size. After obtaining the output of this command, reset your terminal length as required. You can save the output of this command to a file by appending > filename to the show tech-support command. If you save this file, verify that you have sufficient space to do so as each of these files may take about 1.8 MB. For information about the fields in the show tech-support command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show fifo show hardware show interface show processes show running-config show terminal show version
show telnet
To display the information about the Telnet session, use the show telnet command. show telnet [maxsessions] [context_name] [|] [>]
Syntax Description
maxsessions context_name
(Optional) Displays the maximum number of enabled Telnet sessions. (Optional) Name of an existing context. Use the context_name argument to display Telnet information that pertains only to the specified context. The context_name argument is case sensitive.
1-235
CLI Commands
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you do not include the optional maxsessions keyword, the ACE displays the following Telnet information:
Session IDUnique session identifier for the Telnet session Remote hostIP address and port of the remote Telnet client Active timeTime since the Telnet connection request was received by the ACE
For information about the fields in the show telnet command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show terminal
To display the console terminal settings, use the show terminal command. show terminal [internal info] [|] [>]
1-236
OL-25339-01
Chapter 1
Syntax Description
internal info |
(Optional) Displays terminal internal information. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show terminal command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
terminal
1-237
CLI Commands
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show udp statistics command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show user-account
To display user account information, use the show user-account command. show user-account [user_name] [|] [>]
Syntax Description
user_name
1-238
OL-25339-01
Chapter 1
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Exec
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the user account information for all users, do not specify a user with the optional user_name argument. For information about the fields in the show user-account command output, see the Administration Guide, Cisco ACE Application Control Engine. The Account Expiry field for this command displays the date, if any, when the user account expires. This date is based on Coordinated Universal Time (UTC/GMT), which the ACE keeps internally. If you use the clock timezone command to configure a UTC offset, this field displays the UTC date and does not reflect the date with the offset as displayed by the show clock command.
Examples
Related Commands
show users
To display the information for users that are currently logged in to the ACE, use the show users command. show users [user_name] [|] [>]
1-239
CLI Commands
Syntax Description
user_name |
(Optional) Name of user. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To display the information for all users that are currently logged in to the ACE, do not specify a user with the optional user_name argument. For information about the fields in the show users command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To display information for all users that are currently logged in to the ACE, enter:
host1/Admin# show users
Related Commands
show version
To display the version information of system software that is loaded in flash memory and currently running on the ACE, use the show version command. show version [|] [>]
1-240
OL-25339-01
Chapter 1
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The show version command also displays information related to the following ACE hardware components:
(ACE module only) Slot numberSlot number that the ACE occupies on the Catalyst 6500 series chassis. CPUNumber of CPUs and type and model MemoryTotal and shared volatile memory Flash memoryTotal and used flash memory
Use the show version command to verify the software version on the ACE before and after an upgrade. For information about the fields in the show version command output, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show tech-support
1-241
CLI Commands
show vlans
To display the VLANs on the ACE, use the show vlans command. For the ACE module, they are downloaded from the supervisor engine in the Catalyst 6500 series switch show vlans [|] [>]
Syntax Description
(Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show vlans command output, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-242
OL-25339-01
Chapter 1
show vm-controller
To display the VM controller connection statistics, use the show vm-controller command. show vm-controller [name] [detail]
Syntax Description
name
Configured identifier of the VM controller. Enter the name of an existing VM controller as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Displays additional fields for the vendor and the URL location of the VM controller. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
detail |
>
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) vm-controller
1-243
CLI Commands
show vnet
To display information about the virtual network (VNET) device, use the show vnet command. show vnet {event-history | stats} [|] [>]
Syntax Description
event-history stats |
Displays a historic log of the most recent debug VNET messages. Displays detailed counters for various VNET events. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-244
OL-25339-01
Chapter 1
show xlate
To display information about the IP and port translation (XLATE), use the show xlate command. show xlate [global {ip_address1 [ip_address2 [/prefix-length | netmask mask1]]}] [local {ip_address3 [ip_address4 [/prefix-length2 | netmask mask2]]}] [gport port1 [port2]] [lport port1 [port2]] [|] [>]
Syntax Description
global ip_address1 ip_address2 /prefix-length netmask mask local ip_address3 ip_address4 gport port1 port2
(Optional) Displays information for a global IPv6 or IPv4 address or a range of global IPv6 or IPv4 addresses to which the ACE translates source addresses for static and dynamic NAT. To specify a range of IP addresses, enter a second IP address. IPv6 prefix length that specifies the number of bytes used for the network identifier. (Optional) Specifies a subnet mask for the specified IP addresses. (Optional) Displays information for a local IP address or a range of local IP addresses. To specify a range of local IP addresses, enter a second IP address. (Optional) Displays information for a global port or a range of global ports to which the ACE translates source ports for static port redirection and dynamic PAT. Enter a port number as an integer from 0 to 65535. To specify a range of port numbers, enter a second port number. (Optional) Displays information for a local port or a range of local ports. Enter a port number as an integer from 0 to 65535. To specify a range of port numbers, enter a second port number. (Optional) Pipe character (|) for enabling an output modifier that filters the command output. For a complete description of the options available for filtering the command output, see the show command. (Optional) Greater-than character (>) for enabling an output modifier that redirects the command output to a file. For a complete description of the options available for redirecting the command output, see the show command.
>
Command Modes
Command History
3.0(0)A1(2)
A1(7)
1-245
CLI Commands
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the fields in the show xlate command output, see the Security Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
clear xlate
ssh
To initiate a Secure Shell (SSH) session with another device, use the ssh command. ssh {hostname | user@hostname}
Syntax Description
hostname user
Name or IP address of the host to access. If no username is specified, the default is admin. Enter up to 64 alphanumeric characters. Username on a host.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
1-246
OL-25339-01
Chapter 1
Related Commands
clear ssh show ssh (config) class-map (config) login timeout (config) ssh key (config) ssh maxsessions
1-247
CLI Commands
system internal
To generate a debug snapshot of a service, use the system internal command. system internal snapshot service {name}
Syntax Description
Specifies debug snapshots of a service. Name of a system service for which you want to take a snapshot. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command requires the Admin role in the Admin context. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only.
Examples
Related Commands
1-248
OL-25339-01
Chapter 1
system watchdog
To enable all system watchdogs or the specific system watchdog, use the system watchdog command. When you enter this command without an option, all watchdogs are enabled. By default, the watchdogs are enabled. Use the no form of this command to disable the system watchdogs. When you disable the low memory watchdog, its timeout is reset to its default. system watchdog [lcp | memory [timeout seconds] | scp] system no watchdog [lcp | memory | scp]
Syntax Description
lcp
(Optional, ACE module only) Enables the watchdog for the LCP process. The current SCP watchdog watches this process. However, if the LCP process is not scheduled on time, this watchdog reboots the ACE. (Optional) Enables the low memory watchdog when the ACE memory reaches 99 percent. (Optional) Configures the low memory watchdog timeout in seconds. Enter a number from 5 to 180. The default is 90. To change the timeout, reenter the system watchdog memory timeout seconds command. When reenable a disabled watchdog, the timeout is reset to its default value. (Optional, ACE module only) Enables the watchdog that monitors the SCP keepalive messages from the hardware timer interrupt level.
scp
Command Modes
Command History
Modification This command was introduced. The lcp, memory and scp options were added. The system watchdog command now enables all watchdogs. Previously, it enabled only the SCP watchdog timer.
3.0(0)A1(2) A2(2.4)
A4(1.0)
Usage Guidelines
This command requires the Admin role in the Admin context. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is intended for use by trained Cisco personnel for troubleshooting purposes only. When you are troubleshooting the ACE, disable the watchdog timeout to prevent the ACE from rebooting.
1-249
CLI Commands
Examples
To enable the low memory system watchdog after it has been disabled, enter:
host1/Admin# system watchdog memory
Related Commands
show system
1-250
OL-25339-01
Chapter 1
tac-pac
To save Technical Assistance Center (TAC) information to a local or remote location, use the tac-pac command. tac-pac [ftp://server/path[/filename] | scp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename] | disk0:[path/]filename]
Syntax Description
(Optional) Specifies the File Transfer Protocol network server as the destination. (Optional) Specifies the Secure Copy network server as the destination. (Optional) Specifies the Secure File Transfer Protocol network server as the destination. (Optional) Specifies the Trivial File Transfer Protocol network server as the destination. (Optional) Specifies the disk0: file system in flash memory on the ACE as the destination.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The TAC information that the ACE saves when using the tac-pac command is the same information that you can display using the show tech-support command. If you do not specify a directory on a file system, the default is the root directory. The output of the show tech-support command is in gzip format. We recommend that you include the .gz extension in the filename so that it can be easily unzipped from the destination filesystem.
Examples
To save TAC information and send the output of the show tech-support command to a remote FTP server, enter:
host1/Admin# tac-pac ftp://192.168.1.2/tac-output_10-7-07.gz
1-251
CLI Commands
Related Commands
1-252
OL-25339-01
Chapter 1
telnet
To initiate a Telnet session with another network device, use the telnet command. telnet ip_address [port]
Syntax Description
ip_address port
IP address of the network host. Enter an IP address in dotted-decimal notation (for example, 172.16.1.10). (Optional) Port number on network host. The range is from 0 to 2147483647.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
1-253
CLI Commands
terminal
To configure the terminal display settings, use the terminal command. terminal {length lines | monitor | no | session-timeout minutes | terminal-type text | width characters}
Syntax Description
length lines
Sets the number of lines displayed on the current terminal screen. This command is specific to the console port only. Telnet and Secure Shell (SSH) sessions set the length automatically. Valid entries are from 0 to 511. The default is 24 lines. A value of 0 instructs the ACE to scroll continuously (no pausing) and overrides the terminal width command. Displays the syslog output on the terminal for the current terminal and session. To enable the various levels of syslog messages to the terminal, use the logging monitor command in configuration command mode. Negates a command or sets it back to its default value.
monitor
no
session-timeout Specifies the session timeout value in minutes to configure the automatic logout time minutes for the current terminal session on the ACE. When you exceed the time limit configured by this command, the ACE closes the session and exits. The range is 0 to 525600. The default is 5 minutes. You can set the terminal session-timeout value to 0 to disable this feature so that the terminal remains active until you choose to exit the ACE. The ACE does not save this change in the configuration file. terminal-type text width characters Specifies the name and type of the terminal used to access the ACE. If a Telnet or SSH session specifies an unknown terminal type, the ACE uses the VT100 terminal by default. Specify a text string from 1 to 80 alphanumeric characters. Sets the number of characters displayed on the current terminal screen. This command is specific to only the console port. Telnet and SSH sessions set the width automatically. Valid entries are from 24 to 512. The default is 80 columns.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the show terminal command to display the current terminal settings.
1-254
OL-25339-01
Chapter 1
All terminal parameter-setting commands are set locally and do not remain in effect after you end a session. You must perform this task at the Exec prompt at each session to see the debugging messages.
Examples
To specify the VT100 terminal, set the number of screen lines to 35, and set the number of characters to 250, enter:
host1/Admin# terminal terminal-type vt220 host1/Admin# terminal length 35 host1/Admin# terminal width 250
To specify a terminal timeout of 600 minutes for the current session, enter
host1/Admin# terminal session-timeout 600
Related Commands
traceroute
To trace the route that an IP packet takes to a network host from the ACE, use the traceroute command. traceroute [ip | ipv6 [ip_address [size packet]]
Syntax Description
(Optional) Specifies the IPv4 or IPv6 protocol. If you do not specify the IP protocol, it is inferred from the address. (Optional) IP address of the network host. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). (Optional) Specifies the packet size. Enter a number from 40 to 452. The default is 40.
Command Modes
1-255
CLI Commands
Command History
3.0(0)A1(2) A5(1.0)
A1(7) A5(1.0)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command traces the route that an IP packet follows to an Internet host by launching User Datagram Protocol (UDP) probe packets with a small time to live (TTL), and then listening for an Internet Control Message Protocol (ICMP) time exceeded reply from a gateway.
Examples
IPv6 Example
To display the route that a packet takes from the ACE to a network host with the IP address 196.126.1.2, enter:
host1/Admin# traceroute 196.126.1.2
Related Commands
ping
undebug all
To disable all debugging, use the undebug all command. undebug all
Syntax Description
Command Modes
1-256
OL-25339-01
Chapter 1
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command is available to all user roles that allow debugging and is not available to network monitor or technician users. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE debug commands are intended for use by trained Cisco personnel only. Entering these commands may cause unexpected results. Do not attempt to use these commands without guidance from Cisco support personnel.
Examples
Related Commands
debug
1-257
CLI Commands
untar disk0:
To untar a single file with a .tar extension in the disk0: file system, use the untar command. untar disk0:[path/]filename
Syntax Description
[path/]filename
Name of the .tar file on the disk0: file system. The filename must end with a .tar extension.
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The copy licenses disk0: command creates backup .tar license files on the ACE. If a license becomes corrupted or lost, or you accidently remove the license on the ACE, you can untar the license and reinstall it. You must use the untar command in the Admin context to untar a backup tar license file.
Examples
Related Commands
1-258
OL-25339-01
Chapter 1
write
To manage persistent and nonpersistent configuration information, use the write command. write {erase | memory [all] | terminal}
Syntax Description
erase
Erases the entire startup configuration with the exception of any configuration that affects the loader functionality. The startup configuration then reverts back to the factory-default values. The running configuration is not affected. Writes the running configuration to the startup configuration. (Optional) Writes configurations for all existing contexts. This keyword is available only in the Admin context. Writes the running configuration to the terminal.
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The different versions of this command require the following user role or feature in your user role:
The write erase command does not remove license files or crypto files (certs and keys) from the ACE. To remove license files, see the license uninstall command. To remove crypto files, see the crypto delete command. If you intend to use the write memory command to save the contents of the running-configuration file for the current context to the startup-configuration file, you must also specify this command in the Admin context. Saving changes to the Admin context startup-configuration file is important because the Admin context startup-configuration file contains all configurations that are used to create each user context. To write the running configuration to the startup configuration, you can also use the copy running-config startup-config command. To erase the startup configuration, you can also use the clear startup-config command. To display the running configuration, use the show running-config command.
1-259
CLI Commands
Examples
Related Commands
xml-show
To enable the display of raw XML request show command output in XML format, use the xml-show command. xml show {off | on | status}
Syntax Description
off on status
Displays CLI show command output in regular CLI display output, not in XML format. Displays CLI show command output in XML format unless a specific show command is not implemented to display its output in XML format. Displays the current setting of the xml-show command (on or off).
Command Modes
Command History
3.0(0)A1(2)
A1(7)
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, XML responses will automatically appear in XML format if the corresponding CLI show command output supports the XML format. However, if you are running commands on the CLI console or you are running raw XML responses from NMS, the XML responses appear in regular CLI display format. You can enable the display of raw XML request show command output in XML format by performing one of the following actions:
Specifying the xml-show on command in Exec mode from the CLI, or Including the xml-show on command in the raw XML request itself (CLI commands included in an XML wrapper).
Specification of the xml-show on command is not required if you are running true XML.
1-260
OL-25339-01
Chapter 1
For details on the show command output supported in XML format, consult the ACE schema file, schema.xsd for the ACE module or for the ACE appliance, that is included as part of the software image (see the Administration Guide, Cisco ACE Application Control Engine). The ACE schema File contains the information on the XML attributes for those show output commands that support XML format. The off and on keywords affect only the current CLI session in use; they are session-based functions.
Examples
To enable the display of raw XML request show command output in XML format from the CLI, enter:
host1/Admin# xml-show on
Related Commands
1-261
All contexts, when configured in the Admin context A single user context, when configured in that context
Configuration mode also allows you to access all the ACE subordinate configuration modes. These modes provide parameters to configure the major features of the ACE, including access control lists (ACLs), application protocol inspection, fragmentation and reassembly, interfaces, Network Address Translation (NAT), persistence (stickiness), protocols, redundancy, routing, scripts, Secure Sockets Layer (SSL), server load balancing (SLB), TCP/IP normalization, users, and virtualization. To access configuration mode, use the config command. The CLI prompt changes to (config). See the individual command descriptions of all the configuration mode commands on the following pages.
Command Modes
Command History
Usage Guidelines
This command requires one or more features assigned to your user role that allow configuration, such as AAA, interface, or fault-tolerant. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-262
OL-25339-01
Syntax Description
group group_name
Associates the accounting method with a TACACS+ or RADIUS server defined previously through the aaa group server command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies to use the local database on the ACE as the accounting method. Specifies that the ACE does not perform password verification, which disables password verification. If you configure this option, users can log in without providing a valid password.
Note
local none
Only users with an Admin role can configure the none keyword.
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To enable user accounting to be performed using remote TACACS+ servers, followed by local login as the fallback method, enter:
host1/Admin(config)# aaa accounting default group TacServer local
Related Commands
2-263
2-264
OL-25339-01
Syntax Description
Specifies the console port login authentication method, identified by the specified server group. Specifies the default login authentication method (by console or by Telnet or Secure Shell [SSH] session) that is identified by the specified server group. Associates the login authentication process with a Terminal Access Controller Access Control System Plus (TACACS+), Remote Authentication Dial-In User Service (RADIUS), or Lightweight Directory Access Protocol (LDAP) server defined through the aaa group server command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies to use the local database on the ACE as the login authentication method. If the server does not respond, then the local database is used as the fallback authentication method. Specifies that the ACE does not perform password verification. If you configure this option, users can log in to the ACE without providing a valid password.
Note
local
none
Only users with an Admin role can configure the none keyword.
error-enable
Enables the display of the login error message when the remote AAA servers fail to respond.
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the error-enable option cautiously. If you specify none, any user will be able to access the ACE at any time.
2-265
To view the current display status, use the show aaa authentication login error-enable command. When a user attempts to log in, and the remote AAA servers do not respond to the authentication request, the ACE processes the login sequence by switching to local user database.
Examples
To enable console authentication using the TACSERVER server group, followed by local login as the fallback method, enter:
host1/Admin(config)# aaa authentication login console group TACSERVER local
Password verification remains enabled for login authentication. To turn off password validation, enter:
host1/Admin(config)# aaa authentication login console group TACSERVER local none
Related Commands
show aaa (config) aaa accounting default (config) aaa group server
Syntax Description
ldap
Specifies an LDAP directory server group. For information about the commands in the LDAP server configuration mode, see the LDAP Configuration Mode Commands section. Specifies a RADIUS server group. For information about the commands in the RADIUS server configuration mode, see the RADIUS Configuration Mode Commands section. Specifies a TACACS+ server group. For information about the commands in the TACACS+ server configuration mode, see the TACACS+ Configuration Mode Commands section. Name for the LDAP, RADIUS, or TACACS+ server group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
radius
tacacs+
group_name
Command Modes
2-266
OL-25339-01
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A server group is a list of server hosts of a particular type. The ACE allows you to configure multiple TACACS+, RADIUS, and LDAP servers as a named server group. You group the different AAA server hosts into distinct lists. The ACE searches for the server hosts in the order in which you specify them within a group. You can configure a maximum of 10 server groups for each context in the ACE. You can configure server groups at any time, but they take effect only when you apply them to the AAA service using the aaa authentication login or the aaa accounting default commands. To create a AAA server group and access one of the three AAA server group configuration modes, enter the aaa group server ldap, aaa group server radius, or aaa group server tacacs+ command in configuration mode. The CLI prompt changes to (config-ldap), (config-radius), or (config-tacacs+). In this mode, you specify the IP address of one or more previously configured servers that you want added to or removed from the server group.
Examples
To create a RADIUS server group and add a previously configured RADIUS server, enter:
(config)# aaa group server radius RAD_Server_Group1 host1/Admin(config-radius)# server 192.168.252.1 host1/Admin(config-radius)# server 192.168.252.2 host1/Admin(config-radius)# server 192.168.252.3
Related Commands
show aaa show running-config (config) aaa accounting default (config) aaa authentication login
(config) access-group
To apply an IPv4 or IPv6 access control list (ACL) to the inbound direction on all VLAN interfaces in a context and make the ACL active, use the access-group command. Use the no form of this command to remove an ACL from all interfaces in a context. access-group input acl_name no access-group input acl_name
2-267
Syntax Description
input acl_name
Specifies the inbound direction of all interfaces in a context on which you want to apply the ACL Identifier of an existing ACL that you want to apply to an interface
Command Modes
Command History
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use this command to apply an IPv6 or an IPv4 ACL to a single interface or all interfaces in a context. You must apply an ACL to an interface to allow the passing of traffic on that interface. This command enables you to apply an ACL to all interfaces in a context in the inbound direction only and to allow traffic on all interfaces simultaneously. The following considerations apply:
You can use the access-group command in configuration mode only if there are no interfaces in the context to which you have applied an ACL previously using the (config-if) access-group command in interface configuration mode. If you have applied an ACL globally to all interfaces in a context, you cannot apply an ACL to an individual interface using the (config-if) access-group command in interface configuration mode. You can apply one Layer 2 ACL and one Layer 3 ACL globally to all interfaces in a context. You can apply both a Layer 3 and a Layer 2 ACL to all Layer 2 bridge-group virtual interfaces (BVIs) in a context. On Layer 3 virtual LAN (VLAN) interfaces, you can apply only Layer 3 ACLs. You can apply one IPv6 and one IPv4 ACL in each direction on a Layer 3 VLAN interface. In a redundant configuration, the ACE does not apply a global ACL to the FT VLAN. For details about redundancy, see the Administration Guide, Cisco ACE Application Control Engine.
For complete details on ACLs, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To apply an ACL named INBOUND to the inbound direction of all interfaces in the Admin context, enter:
host1/Admin(config)# access-group input INBOUND
2-268
OL-25339-01
Related Commands
2-269
Syntax Description
Unique identifier of the ACL. Enter an unquoted text string with a maximum of 64 alphanumeric characters. Specifies a subprotocol of type: any, bpdu, ipv6, or mpls. Blocks connections on the assigned interface. Allows connections on the assigned interface. Specifies any EtherType. Specifies bridge protocol data units. Specifies Internet Protocol version 6. Specifies Multiprotocol Label Switching.
Command Modes
Command History
Modification This command was introduced. BPDU packets are not subjected to bandwidth policing in a bridge-mode configuration.
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure an ACL that controls traffic based on its EtherType. An EtherType is a subprotocol identifier. EtherType ACLs support Ethernet V2 frames. EtherType ACLs do not support 802.3-formatted frames because they use a length field instead of a type field. Bridge protocol data units (BPDUs) are exceptions because they are SNAP-encapsulated, and the ACE is designed to specifically handle BPDUs. You can permit or deny BPDUs. By default, all BPDUs are denied. The ACE receives trunk port (Cisco proprietary) BPDUs because ACE ports are trunk ports. Trunk BPDUs have VLAN information inside the payload, so the ACE modifies the payload with the outgoing VLAN if you permit BPDUs. BPDU packets are not subjected to bandwidth policing in a bridge-mode configuration. You can configure an EtherType ACL only on a Layer 2 interface in the inbound direction.
2-270
OL-25339-01
When you specify the mpls keyword in an EtherType ACL, the ACE denies or permits both MPLS-unicast and MPLS-multicast traffic. Examples To configure an ACL that controls traffic based on its EtherType, enter:
(config)# access-list INBOUND ethertype permit mpls
Related Commands
2-271
For a non-ICMP extended ACL, the syntax is as follows: access-list name [line number] extended {deny | permit} {protocol {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length | object-group net_obj_grp_name} [operator port1 [port2]] {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length | object-group net_obj_grp_name} [operator port3 [port4]]} | {object-group service_obj_grp_name} {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length | object-group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length | object-group net_obj_grp_name} no access-list name [line number] extended {deny | permit} {protocol {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length | object-group net_obj_grp_name} [operator port1 [port2]] {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length | object-group net_obj_grp_name} [operator port3 [port4]]} | {object-group service_obj_grp_name} {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length | object-group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length | object-group net_obj_grp_name} For an ICMP-extended ACL, the syntax is as follows: access-list name [line number] extended {deny | permit} {icmpv6 {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length| object_group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length| object_group network_grp_name} [icmp_type [code operator code1 [code2]]]} | {object-group service_obj_grp_name} {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length| object-group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length| object-group net_obj_grp_name} no access-list name [line number] extended {deny | permit} {icmpv6 {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length| object_group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length| object_group network_grp_name} [icmp_type [code operator code1 [code2]]]} | {object-group service_obj_grp_name} {anyv6 | host src_ipv6_address | src_ipv6_address/prefix_length| object-group net_obj_grp_name} {anyv6 | host dest_ipv6_address | dest_ipv6_address/prefix_length| object-group net_obj_grp_name}
IPv4 Syntax
For a non-ICMP extended ACL, the syntax is as follows: access-list name [line number] extended {deny | permit} {protocol {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} [operator port1 [port2]] {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} [operator port3 [port4]]}
2-272
OL-25339-01
|{object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} no access-list name [line number] extended {deny | permit} {protocol {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} [operator port1 [port2]] {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} [operator port3 [port4]]} |{object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} For an ICMP-extended ACL, the syntax is as follows: access-list name [line number] extended {deny | permit} {icmp {any | host src_ip_address | src_ip_address netmask | object_group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object_group network_grp_name} [icmp_type [code operator code1 [code2]]]} |{object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} no access-list name [line number] extended {deny | permit} {icmp {any | host src_ip_address | src_ip_address netmask | object_group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object_group network_obj_grp_name} [icmp_type [code operator code1 [code2]]]} |{object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name}
Syntax Description
Unique identifier of the ACL. Enter an unquoted text string with a maximum of 64 alphanumeric characters. (Optional) Specifies the line number position where you want the entry that you are configuring to appear in the ACL. The position of an entry affects the lookup order of the entries in an ACL. If you do not configure the line number of an entry, the ACE applies a default increment and a line number to the entry and appends it at the end of the ACL.
2-273
extended
Specifies an extended ACL. Extended ACLs allow you to specify the destination IP address and subnet mask and other parameters not available with a standard ACL. Blocks connections on the assigned interface. Allows connections on the assigned interface. Name or number of an IP protocol. Enter a protocol name or an integer from 0 to 255 that represents an IP protocol number from the following:
ah(51) Authentication Header eigrp(88) Enhanced IGRP esp(50) Encapsulated Security Payload gre(47) Generic Routing Encapsulation icmp(1) Internet Control Message Protocol (See Table 1-1 for optional ICMPv4 messaging types) icmpv6(58) Internet Control Message Protocol (See Table 1-2 for optional ICMPv6 messaging types) igmp(2) Internet Group Management Protocol ip(0) Internet Protocol ip-in-ip(4) IP-in-IP Layer 3 tunneling protocol ospf(89) Open Shortest Path First pim(103) Protocol Independent Multicast tcp(6) Transmission Control Protocol udp(17) User Datagram Protocol
any anyv6 host src_ipv6_address host src_ip_address src_ipv6_address/ prefix_length src_ip_address netmask object-group network_obj_grp_ name
Specifies the network traffic from any IPv4 source. Specifies the network traffic from any IPv6 source. Specifies the IPv6 address of the host from which the network traffic originates. Use this keyword and argument to specify the network traffic from a single IPv6 address. Specifies the IP address of the host from which network traffic originates. Use this keyword and argument to specify the network traffic from a single IP address. Traffic from a source defined by the IPv6 address and the prefix length. Use these arguments to specify network traffic from a range of IPv6 source addresses. Traffic from a source defined by the IP address and the network mask. Use these arguments to specify the network traffic from a range of source IP addresses. Specifies the identifier of an existing source network object group. To use object groups in an ACL, replace the normal network ( source_address, mask, and so on), service (protocol operator port) or ICMP type (icmp_type) arguments with an object-group name.
2-274
OL-25339-01
operator
(Optional) Operand used to compare source and destination port numbers for TCP, TCP-UDP, and UDP protocols. The operators are as follows:
eqEqual to. gtGreater than. ltLess than. neqNot equal to. rangeAn inclusive range of port values. If you entered the range operator, enter a second port number value to define the upper limit of the range.
port1 [port2]
TCP or UDP source port name or number from which you permit or deny services access. Enter an integer from 0 to 65535. To enter an inclusive range of ports, enter two port numbers. Port2 must be greater than or equal to port1. See Table 1-3 for a list of well-known TCP port names and numbers and Table 1-4 for a list of well-known UDP port names and numbers.
dest_ipv6_address/ IPv6 address of the network or host to which the packet is being sent and the prefix_length prefix length of the IPv6 destination address. Use these arguments to specify a range of IPv6 destination addresses. dest_ip_address netmask anyv6 any host dest_ipv6_address host destination_ address operator Specifies the IP address of the network or host to which the packet is being sent and the network mask bits that are to be applied to the destination IP address. Use these arguments to specify a range of destination IP addresses. Specifies the network traffic that goes to any IPv6 destination. Specifies the network traffic going to any destination. Specifies the IPv6 address of the destination of the packets in a flow. Use this keyword and argument to specify the network traffic destined to a single IPv6 address. Specifies the IP address and subnet mask of the destination of the packets in a flow. Use this keyword and argument to specify the network traffic destined to a single IP address. (Optional) Operand used to compare source and destination port numbers for TCP, TCP-UDP, and UDP protocols. The operators are as follows:
ltLess than. gtGreater than. eqEqual to. neqNot equal to. rangeAn inclusive range of port values. If you enter this operator, enter a second port number value to define the upper limit of the range.
port3 [port4]
TCP or UDP destination port name or number to which you permit or deny access to services. To enter an optional inclusive range of ports, enter two port numbers. Port4 must be greater than or equal to port3. See Table 1-3 for a list of well-known ports. (Optional) Type of ICMP messaging. Enter either an integer that corresponds to the ICMP code number or one of the ICMP types as described in Table 1-1. (Optional) Specifies that a numeric operator and ICMP code follows.
icmp_type code
2-275
operator
An operator that the ACE applies to the ICMP code number that follows. Enter one of the following operators:
ltLess than. gtGreater than. eqEqual to. neqNot equal to. rangeAn inclusive range of ICMP code values. When you use this operator, specify two code numbers to define the range.
code1, code2
ICMP code number that corresponds to an ICMP type. See Table 1-3. If you entered the range operator, enter a second ICMP code value to define the upper limit of the range.
Command Modes
Command History
Modification This command was introduced. This command was revised with the object-group keyword and associated keywords and arguments. Added IPv6 support.
Modification This command was introduced. This command was revised with the object-group keyword and associated keywords and arguments. Added IPv6 support.
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE does not explicitly support standard ACLs. To configure a standard ACL, specify the destination addresses as any and do not specify ports in an extended ACL. For the source IP address and destination IP address netmasks, the ACE supports only standard subnet mask entries in an ACL. Wildcard entries and non-standard subnet masks are not supported. For TCP and UDP connections, you do not need to also apply an ACL on the destination interface to allow returning traffic, because the ACE allows all returning traffic for established connections. You can apply only one extended ACL to each direction (inbound or outbound) of an interface. You can also apply the same ACL on multiple interfaces.You can apply EtherType ACLs only in the inbound direction and only on Layer 2 interfaces.
2-276
OL-25339-01
If you create an ICMP extended ACL, you can optionally specify the type of ICMP messaging. Enter either an integer that corresponds to the ICMP code number or one of the ICMP messaging types as described in Table 1-1 (ICMPv4) and Table 1-2 (ICMPv6). ACLs have no effect on neighbor discovery (ND) packets and they are always permitted to and through the ACE. For more information about ND, see the Routing and Bridging Guide, Cisco ACE Application Control Engine.
Table 1-1 ICMPv4 Types
ICMPv4 Type echo-reply unreachable source-quench redirect alternate-address echo router-advertisement router-solicitation time-exceeded parameter-problem timestamp-request timestamp-reply information-request information-reply mask-request mask-reply traceroute conversion-error mobile-redirect
Table 1-2
ICMPv6 Types
2-277
Table 1-2
Table 1-3
Keyword aol bgp chargen citrix-ica cmd ctiqbe daytime discard domain echo exec finger ftp ftp-data gopher hostname http https ident imap4 irc kerberos klogin kshell ldap ldaps login lotusnotes
Port Number 5190 179 19 1494 514 2748 13 9 53 7 512 79 21 20 70 101 80 443 113 143 194 88 543 544 389 636 513 1352
Description America-Online Border Gateway Protocol Character Generator Citrix Independent Computing Architecture protocol Same as exec, with automatic authentication Computer Telephony Interface Quick Buffer Encoding Daytime Discard Domain Name System Echo Exec (RSH) Finger File Transfer Protocol FTP data connections Gopher NIC hostname server Hyper Text Transfer Protocol HTTP over TLS/SSL Ident Protocol Internet Message Access Protocol, version 4 Internet Relay Chat Kerberos Kerberos Login Kerberos Shell Lightweight Directory Access Protocol LDAP over TLS/SSL Login (rlogin) IBM Lotus Notes
2-278
OL-25339-01
Table 1-3
Keyword lpd matip-a netbios-ssn nntp pim-auto-rp pop2 pop3 pptp rtsp sip skinny smtp sqlnet ssh sunrpc tacacs talk telnet time uucp whois www
Port Number 515 350 139 119 496 109 110 1723 554 5060 2000 25 1521 22 111 49 517 23 37 540 43 80
Description Printer Service Mapping of Airline Traffic over Internet Protocol (MATIP) Type A NetBIOS Session Service Network News Transport Protocol PC Anywhere data PIM Auto-RP Post Office Protocol v2 Post Office Protocol v3 Point-to-Point Tunneling Protocol, RFC 2637 Real Time Streaming Protocol Session Initiation Protocol Cisco Skinny Client Control Protocol (SCCP) Simple Mail Transfer Protocol Structured Query Language Network Secure Shell Sun Remote Procedure Call Terminal Access Controller Access Control System Talk Telnet Time UNIX-to-UNIX Copy Program Nicname World Wide Web (HTTP)
pcanywhere-data 5631
Table 1-4
Description Mail notification Bootstrap Protocol client Bootstrap Protocol server Discard DNSIX Security protocol auditing (dn6-nlm-aud) Domain Name System
2-279
Table 1-4
Keyword echo isakmp kerberos mobile-ip nameserver netbios-dgm netbios-ns netbios-ssn ntp pcanywhere- status radius radius-acct rip snmp snmptrap sunrpc syslog tacacs talk tftp time who wsp wsp-wtls wsp-wtp wsp-wtp-wtls xdmcp
Port Number 7 500 88 434 42 138 137 139 123 5632 1812 1813 520 161 162 111 514 49 517 69 37 513 9200 9202 9201 9203 177
Description Echo Internet Security Association Key Management Protocol Kerberos Mobile IP registration Host Name Server NetBIOS datagram service NetBIOS name service NetBIOS Session Service Network Time Protocol PC Anywhere status Remote Authentication Dial-in User Service RADIUS Accounting Routing Information Protocol Simple Network Management Protocol SNMP Traps Sun Remote Procedure Call System Logger Terminal Access Controller Access Control System Talk Trivial File Transfer Protocol Time Who service (rwho) Connectionless Wireless Session Protocol Secure Connectionless WSP Connection-based WSP Secure Connection-based WSP X Display Manager Control Protocol
Examples
IPv6 Examples
2-280
OL-25339-01
To control a ping, specify echo (128) (host to ACE). To allow an external host with IP address 2001:DB8:1::2 to ping a host behind the ACE with an IP address of FC00:ABCD:1:2::5, enter:
host1/Admin(config)# access-list INBOUND extended permit icmpv6 host 2001:DB8:1::2 host FC00:ABCD:1:2::5 echo code eq 0
IPv4 Examples
To allow an external host with IP address 192.168.12.5 to be able to ping a host behind the ACE with an IP address of 10.0.0.5, enter:
(config)# code eq 0 access-list INBOUND extended permit icmp host 192.168.12.5 host 10.0.0.5 echo
Related Commands
2-281
Syntax Description
Unique identifier of the ACL. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the line number position where you want the comments to appear in the ACL. If you do not specify a line number, the ACE applies a default increment and a line number to the remark and appends it at the end of the ACL. Specifies any comments that you want to include about the ACL. Comments appear at the top of the ACL. Enter an unquoted text string with a maximum of 100 alphanumeric characters. You can enter leading spaces at the beginning of the text. Trailing spaces are ignored.
remark text
Command Modes
Command History
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you delete an ACL using the no access-list name command, then the remarks are also removed.
Examples
Related Commands
2-282
OL-25339-01
Syntax Description
Unique identifier of the ACL. Enter an unquoted text string with a maximum of 64 alphanumeric characters. Specifies the renumbering of the entries in an ACL. Number assigned to the first entry in the ACL. Enter any integer. The default is 10. Number added to each entry in the ACL after the first entry. Enter any integer. The default is 10.
Command Modes
Command History
Usage Guidelines
This command requires the access-list feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ability to resequence entries in an ACL is supported only for extended ACLs.
Examples
For example, to assign the number 5 to the first entry in the access list INBOUND and then number each succeeding entry by adding 15 to the preceding entry line number, enter:
host1/Admin(config)# access-list INBOUND resequence 5 15
Related Commands
2-283
Syntax Description
name
Unique name for the action list. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-284
OL-25339-01
Syntax Description
optimization http
Specifies an optimization HTTP action list. After you create the optimization HTTP type action list, you configure application acceleration and optimization functions in the action list optimization configuration mode. For information about the commands in action list optimization configuration mode, see the Action List Optimization Configuration Mode Commands section. Name assigned to the action list. Enter a unique name as an unquoted text string with a maximum of 64 alphanumeric characters.
list_name
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you configure the action list, you associate it with a specific statement in a Layer 7 HTTP optimization policy map. The Layer 7 optimization HTTP policy map activates an optimization HTTP action list that allows you to configure the specified optimization actions. For information about the commands in action list optimization configuration mode, see the Action List Optimization Configuration Mode Commands section. For details about configuring the commands in the action list optimization configuration mode, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
2-285
Examples
Related Commands
2-286
OL-25339-01
(config) arp
To configure the Address Resolution Protocol (ARP) on the ACE to manage and map IP to Media Access Control (MAC) information to forward and transmit packets, use the arp command. Use the no form of this command to remove the ARP entry or reset a default value. arp {ip_address mac_address | interval seconds | inspection enable [flood | no flood] | learned-interval seconds | learned-mode enable | rate seconds | ratelimit pps | retries number | sync disable | sync-interval seconds} no arp {ip_address mac_address | interval | inspection enable | learned-interval | learned-mode enable | rate | ratelimit | retries | sync disable | sync-interval}
Syntax Description
ip_address mac_address
Static ARP entry in the ARP table that allows ARP responses from an IP address to a MAC address. Enter the IP address in dotted-decimal notation (for example, 172.16.56.76). Enter the MAC address in dotted-hexadecimal notation (for example, 00.60.97.d5.26.ab). Specifies the interval in seconds that the ACE sends ARP requests to the configured hosts. Enter a number from 15 to 31526000. The default is 300. Enables ARP inspection, preventing malicious users from impersonating other hosts or routers, known as ARP spoofing. The default is disabled. (Optional) Enables ARP forwarding of nonmatching ARP packets. The ACE forwards all ARP packets to all interfaces in the bridge group. This is the default setting. (Optional) Disables ARP forwarding for the interface and drops non-matching ARP packets. Sets the interval in seconds when the ACE sends ARP requests for learned hosts. Enter a number from 60 to 31536000. The default is 14400. Enables the ACE to learn MAC addresses if the command has been disabled. By default, for bridged traffic, the ACE learns MAC addresses from all traffic. For routed traffic, the ACE learns MAC addresses only from ARP response packets or from packets that are destined to the ACE (for example, a ping to a VIP or a ping to a VLAN interface). Specifies the time interval in seconds between ARP retry attempts to hosts. Enter a number from 1 to 60. The default is 10. Specifies the rate limit in packets per second for gratuitous ARPs sent by the ACE. Enter a number from 100 to 8192. The default is 512. Note that this keyword applies to the entire ACE. Specifies the number of ARP attempts before the ACE flags the host as down. Enter a number from 2 to 15. The default is 3. Disables the replication of ARP entries. By default, ARP entry replication is enabled. Specifies the time interval between ARP sync messages for learned hosts. Enter an integer from 1 to 3600 seconds (1 hour). The default is 5 seconds.
Command Modes
Configuration mode
2-287
Admin and user contexts. The ratelimit keyword is available in the Admin context only.
Command History
Modification This command was introduced. This command was revised with the sync disable and sync-interval keywords. This command was revised with the ratelimit keyword. The static arp this command now allows the configuration of a multicast MAC address. Modification This command was introduced. The static arp this command now allows the configuration of a multicast MAC address.
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The static arp command in configuration mode now allows the configuration of the multicast MAC address for a host. The ACE uses this multicast MAC address while sending packets to the host. This enhancement allows the support of deployments that involve clustering (for example Checkpoint clustering). A host can be assigned an multicast MAC address with the arp command. The ACE does not learn the multicast MAC addresses for a host. ARP inspection operates only on ingress bridged interfaces. By default, ARP inspection is disabled on all interfaces, allowing all ARP packets through the ACE. When you enable ARP inspection, the ACE uses the IP address and interface ID (ifID) of an incoming ARP packet as an index into the ARP table. The ACE then compares the MAC address of the ARP packet with the MAC address in the indexed static ARP entry in the ARP table and takes the following actions:
If the IP address, source ifID, and MAC address match a static ARP entry, the inspection succeeds and the ACE allows the packet to pass. If the IP address and interface of the incoming ARP packet match a static ARP entry, but the MAC address of the packet does not match the MAC address that you configured in that static ARP entry, ARP inspection fails and the ACE drops the packet. If the ARP packet does not match any static entries in the ARP table or there are no static entries in the table, then you can set the ACE to either forward the packet out all interfaces (flood) or to drop the packet (no-flood). In this case, the source IP address to MAC address mapping is new to the ACE. If you enter the flood option, the ACE creates a new ARP entry and marks it as LEARNED. If you enter the no-flood option, the ACE drops the ARP packet.
The ARP rate limit applies to all gratuitous ARPs sent for local addresses on new configurations, ACE reboot, and on MAC address changes. When you change the ARP request internal for learned hosts and configured hosts, the new timeout does not take effect until the existing time is reached. If you want the new timeout to take effect immediately, enter the clear arp command to apply the new ARP interval (see the clear arp command). For more information, see the Routing and Bridging Guide, Cisco ACE Application Control Engine
2-288
OL-25339-01
Examples
To allow ARP responses from the router at 10.1.1.1 with the MAC address 00.02.9a.3b.94.d9, enter:
host1/contexta(config)# arp 10.1.1.1 00.02.9a.3b.94.d9
To enable ARP inspection and to drop all nonmatching ARP packets, enter:
host1/contexta(config)# arp inspection enable no-flood
Related Commands
(config) banner
Use the banner command to specify a message to display as the message-of-the-day banner when a user connects to the ACE CLI. Use the no form of this command to delete or replace a banner or a line in a multiline banner. banner motd text no banner motd text
Syntax Description
motd text
Configures the system to display as the message-of-the-day banner when a user connects to the ACE. Line of message text to be displayed as the message-of-the-day banner. The text string consists of all characters that follow the first space until the end of the line (carriage return or line feed). The # character functions as the delimiting character for each line. For the banner text, spaces are allowed but tabs cannot be entered at the CLI. Multiple lines in a message-of-the-day banner are handled by entering a new banner command for each line that you wish to add. The banner message is a maximum of 80 alphanumeric characters per line, up to a maximum of 3000 characters (3000 bytes) total for a message-of-the-day banner. This maximum value includes all line feeds and the last delimiting character in the message.
Command Modes
2-289
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To replace a banner or a line in a multiline banner, use the no banner motd command before adding the new lines. To add multiple lines in a message-of-the-day banner, precede each line by the banner motd command. The ACE appends each line to the end of the existing banner. If the text is empty, the ACE adds a carriage return (CR) to the banner. You can include tokens in the form $(token) in the message text. Tokens will be replaced with the corresponding configuration variable, as follows:
$(hostname)Displays the hostname for the ACE during run time. $(line)Displays the tty (teletypewriter) line or name (for example, /dev/console, /dev/pts/0, or 1).
To use the $(hostname) in single line banner motd input, include double quotation marks () around the $(hostname) so that the $ is interpreted to a special character for the beginning of a variable in the single line. An example is as follows:
switch/Admin(config)# banner motd #Welcome to $(hostname)...#
Do not use the double quotation mark () or the percent sign (%) as a delimiting character in a single line message string. Do not use the delimiting character in the message string. For multiline input, double quotation marks () are not required for the token because the input mode is different from the signal line mode. The ACE treats the double quotation mark () as a regular character when you operate in multiline mode.
Examples
Related Commands
2-290
OL-25339-01
Syntax Description
filename
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can add several images to the BOOT environment variable to provide a fail-safe boot configuration. If the first file fails to boot the ACE, subsequent images that are specified in the BOOT environment variable are tried until the ACE boots or there are no additional images to attempt to boot. If there is no valid image to boot, the ACE enters ROM-monitor mode where you can manually specify an image to boot. The ACE stores and executes images in the order in which you added them to the BOOT environment variable. If you want to change the order in which images are tried at startup, you can either prepend and clear images from the BOOT environment variable to attain the desired order or you can clear the entire BOOT environment variable and then redefine the list in the desired order. If the file does not exist (for example, if you entered the wrong filename), then the filename is appended to the boot string, and this message displays:
Warning: File not found but still added in the bootstring.
If the file does exist, but is not a valid image, the file is not added to the bootstring, and this message displays:
Warning: file found but it is not a valid boot image.
Examples
Related Commands
2-291
Syntax Description
active number1
Specifies the buffer threshold for the active redundant ACE or stand-alone ACE as a percentage. Enter 50, 75, 88, 95, or 100. There is no default value. In a redundant configuration, if the buffer usage of any NP reaches or exceeds the threshold and each of the NPs buffer usage in the standby ACE is below the configured standby threshold, the active ACE reboots and a switchover occurs. For a standalone ACE, if any of the NPs buffer usage exceeds the active value, then the ACE reboots.
standby number Specifies the buffer threshold for the standby redundant ACE. Enter 10, 20, 30, 40, 50. There is no default value. In a redundant configuration, if the active ACE buffer usage reaches or exceeds the configured active threshold and the standby ACE buffer usage reaches or exceeds the standby threshold, the active ACE does not reboot and no switchover occurs. For a reload and a switchover to occur, the standby buffer usage of all NPs must be less than the configured standby threshold value. action reload Specifies that the ACE reloads when the buffer utilization exceeds the configured threshold. In a redundant configuration, a switchover occurs upon reload of the active ACE.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE checks the status of NP buffer usage every five seconds to initiate the reload action if the buffer threshold is configured and reached, and to generate syslogs if necessary. If the buffer threshold command is configured and if the NP buffer usage reaches or exceeds the threshold, the ACE reloads. In a redundant configuration, a switchover occurs and the former standby ACE becomes the active ACE. In the absence of this command, the automatic reload feature is disabled. You can also use this command in a stand-alone ACE.
Examples
To specify the active NP buffer utilization threshold as 88 percent and the standby NP buffer utilization threshold as 40 percent, enter the following command:
2-292
OL-25339-01
Related Commands
show np
2-293
(config) class-map
To create a Layer 3 and Layer 4 or a Layer 7 class map, use the class-map command. Use the no form of the command to remove a class map from the ACE. class-map [match-all | match-any] map_name class-map type {ftp inspect match-any | generic {match-all | match-any}} map_name class-map type {http {inspect | loadbalance} | management | radius loadbalance | rtsp loadbalance | sip {inspect | loadbalance}} [match-all | match-any] map_name no class-map [match-all | match-any] map_name no class-map type {ftp inspect match-any | generic {match-all | match-any}} map_name no class-map type {http {inspect | loadbalance} | management | radius loadbalance | rtsp loadbalance | sip {inspect | loadbalance}} [match-all | match-any] map_name
Syntax Description
match-all
Determines how the ACE evaluates Layer 3 and Layer 4 network traffic when multiple match criteria exist in a class map. The class map is considered a match if all the match criteria listed in the class map match the network traffic class in the class map (typically, match commands of different types). The default setting is to meet all of the match criteria (match-all) in a class map. Determines how the ACE evaluates Layer 3 and Layer 4 network traffic when multiple match criteria exist in a class map. The class map is considered a match if only one of the match criteria listed in the class map matches the network traffic class in the class map (typically, match commands of the same type). The default setting is to meet all of the match criteria (match-all) in a class map. Name assigned to the class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. For a Layer 3 and Layer 4 class map, you enter the class map configuration mode and the prompt changes to (config-cmap). Specifies the class map type that is to be defined. When you specify a class map type, you enter its corresponding class map configuration mode (for example, HTTP inspection configuration mode). Specifies a Layer 7 class map for the inspection of File Transfer Protocol (FTP) request commands. For information about commands in FTP inspection configuration mode, see the Class Map FTP Inspection Configuration Mode Commands section. Specifies a Layer 7 class map for generic TCP or UDP data parsing. For information about commands in class map generic configuration mode, see the Class Map Generic Configuration Mode Commands section. Specifies a Layer 7 class map for HTTP server load balancing (loadbalance keyword) or a Layer 7 class map for the HTTP deep packet application protocol inspection (inspect keyword) of traffic through the ACE. For information about commands in class map HTTP inspection configuration mode, see the Class Map HTTP Inspection Configuration Mode Commands section. For information about commands in class map HTTP server load-balancing configuration mode, see the Class Map HTTP Load Balancing Configuration Mode Commands section.
match-any
map_name
type
ftp inspect
generic
2-294
OL-25339-01
management
Specifies a Layer 3 and Layer 4 class map to classify the IP network management protocols received by the ACE. For information about commands in class map management configuration mode, see the Class Map Management Configuration Mode Commands section. Specifies a Layer 7 class map for RADIUS server load balancing of traffic through the ACE. For information about commands in RADIUS server load-balancing configuration mode, see the Class Map RADIUS Load Balancing Configuration Mode Commands section. Specifies a Layer 7 class map for RTSP server load balancing of traffic through the ACE. For information about commands in RTSP server load-balancing configuration mode, see the Class Map RTSP Load Balancing Configuration Mode Commands section. Specifies a Layer 7 class map for SIP server load balancing (loadbalance keyword) or a Layer 7 class map for the SIP deep packet application protocol inspection (inspect keyword) of traffic through the ACE. For information about commands in class map SIP inspection configuration mode, see the Class Map SIP Inspection Configuration Mode Commands section. For information about commands in class map SIP server load-balancing configuration mode, see the Class Map SIP Load Balancing Configuration Mode Commands section.
radius loadbalance
rtsp loadbalance
Command Modes
Command History
Usage Guidelines
This command requires the inspect, loadbalance, NAT, connection, SSL, or vip feature in your user role, depending on the type of class map that you want to configure. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the class map configuration mode commands to create class maps that classify inbound network traffic destined to, or passing through, the ACE based on a series of flow match criteria specified in the class map. The CLI prompt changes correspondingly to the selected class map configuration mode, for example, (config-cmap), (config-cmap-ftp-insp), (config-cmap-http-lb), or (config-cmap-mgmt). A Layer 3 and Layer 4 class map contains match criteria that classifies the following:
Network traffic that can pass through the ACE based on source or destination IP address, source or destination port, or IP protocol and port
2-295
Network management traffic that can be received by the ACE based on the HTTP, HTTPS, ICMP, SNMP, SSH, or Telnet protocols
A Layer 7 class map contains match criteria that classifies specific Layer 7 protocol information. The match criteria enables the ACE to do the following:
Perform server load balancing based on the HTTP cookie, the HTTP header, the HTTP URL, protocol header fields, or source IP addresses Perform deep packet inspection of the HTTP protocol Perform FTP request command filtering
The ACE supports a system-wide maximum of 8192 class maps. For details about creating a class map, see the Administration Guide, Cisco ACE Application Control Engine. When multiple match criteria exist in the traffic class, you can identify evaluation instructions using the match-any or match-all keywords. If you specify match-any, the traffic that is evaluated must match one of the specified criteria (typically, match commands of the same type). If you specify match-all, the traffic that is evaluated must match all of the specified criteria (typically, match commands of different types).
Examples
To create a Layer 3 and Layer 4 class map named L4VIP_CLASS that specifies the network traffic that can pass through the ACE for server load balancing, enter:
host1/Admin(config)# class-map match-all L4VIP_CLASS host1/Admin(config-cmap)#
To create a Layer 3 and Layer 4 class map named MGMT-ACCESS_CLASS that classifies the network management protocols that can be received by the ACE, enter:
host1/Admin(config)# class-map type management match-any MGMT-ACCESS_CLASS host1/Admin(config-cmap-mgmt)#
To create a Layer 7 class map named L7SLB_CLASS that performs HTTP server load balancing, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLB_CLASS host1/Admin(config-cmap-http-lb)#
To create a Layer 7 class map named HTTP_INSPECT_L7CLASS that performs HTTP deep packet inspection, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)#
To create a Layer 7 class map named FTP_INSPECT_L7CLASS that performs FTP command inspection, enter:
host1/Admin(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS host1/Admin(config-cmap-ftp-insp)#
Related Commands
2-296
OL-25339-01
Syntax Description
zone_name 8-letter name of the time zone (for example, PDT) to be displayed when the time zone is in effect. See Table 1-5 in the Usage Guidelines section for a list of the common time zone acronyms used for this argument. hours minutes standard time_zone Hours offset from Coordinated Universal Time (UTC). Minutes offset from UTC. Range is from 0 to 59 minutes. Sets the time to a standard time zone that include an applicable UTC hours offset. Enter one of the following well-known time zones:
ACSTAustralian Central Standard Time as UTC + 9.5 hours AKSTAlaska Standard Time as UTC 9 hours ASTAtlantic Standard Time as UTC 4 hours BSTBritish Summer Time as UTC + 1 hour CESTCentral Europe Summer Time as UTC + 2 hours CETCentral Europe Time as UTC + 1 hour CSTCentral Standard Time as UTC 6 hours EESTEastern Europe Summer Time as UTC + 3 hours EETEastern Europe Time as UTC + 2 hours ESTEastern Standard Time as UTC 5 hours GMTGreenwich Mean Time as UTC HSTHawaiian Standard Time as UTC 10 hours ISTIrish Summer Time as UTC + 1 hour MSDMoscow Summer Time as UTC + 4 hours MSKMoscow Time as UTC + 3 hours MSTMountain Standard Time as UTC 7 hours PSTPacific Standard Time as UTC 8 hours WESTWestern Europe Summer Time as UTC + 1 hour WSTWestern Standard Time as UTC + 8 hours
Command Modes
2-297
Command History
Modification This command was introduced. The ACST keyword was introduced. It replaced the CST keyword, as UTC +9.5 hours.
Modification This command was introduced. The ACST keyword was introduced. It replaced the CST keyword, as UTC +9.5 hours.
Usage Guidelines
The ACE keeps time internally in Universal Time Coordinated (UTC) offset, so this command is used only for display purposes and when the time is set manually. This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Table 1-5 lists common time zone acronyms used for the zone_name argument.
Table 1-5 Time Zone Acronyms
Acronym Europe BST CET CEST EET EEST GMT IST MSK MSD WET WEST AST ADT CT CST CDT ET
Time Zone Name and UTC Offset British Summer Time as UTC + 1 hour Central Europe Time as UTC + 1 hour Central Europe Summer Time as UTC + 2 hours Eastern Europe Time as UTC + 2 hours Eastern Europe Summer Time as UTC + 3 hours Greenwich Mean Time as UTC Irish Summer Time as UTC + 1 hour Moscow Time as UTC + 3 hours Moscow Summer Time as UTC + 4 hours Western Europe Time as UTC Western Europe Summer Time as UTC + 1 hour Atlantic Standard Time as UTC 4 hours Atlantic Daylight Time as UTC 3 hours Central Time, either as CST or CDT, depending on the place and time of the year Central Standard Time as UTC 6 hours Central Daylight Saving Time as UTC 5 hours Eastern Time, either as EST or EDT, depending on the place and time of the year
2-298
OL-25339-01
Table 1-5
Acronym EST EDT MT MDT MST PT PDT PST AKST AKDT HST Australia CST EST WST
Time Zone Name and UTC Offset Eastern Standard Time as UTC 5 hours Eastern Daylight Saving Time as UTC 4 hours Mountain Time, either as MST or MDT, depending on the place and time of the year Mountain Daylight Saving Time as UTC 6 hours Mountain Standard Time as UTC 7 hours Pacific Time, either as PST or PDT, depending on the place and time of the year Pacific Daylight Saving Time as UTC 7 hours Pacific Standard Time as UTC 8 hours Alaska Standard Time as UTC 9 hours Alaska Standard Daylight Saving Time as UTC 8 hours Hawaiian Standard Time as UTC 10 hours Central Standard Time as UTC + 9.5 hours Eastern Standard/Summer Time as UTC + 10 hours (+11 hours during summer time) Western Standard Time as UTC + 8 hours
Examples
To set the time zone to PST and to set an UTC offset of 8 hours, enter:
host1/Admin(config)# clock timezone PST -8 0
Related Commands
(ACE appliance only) clock set show clock (config) clock summer-time
2-299
Syntax Description
daylight_timezone_name
8-letter name of the time zone (for example, PDT) to be displayed when summer time is in effect. For a list of the common time zone acronyms used for this argument, see the Usage Guidelines section for the (config) clock timezone command. Start week for summer time, ranging from 1 through 5. Start day for summer time, ranging from Sunday through Saturday. Start month for summer time, ranging from January through December. Start time (military time) in hours and minutes. End week for summer time, ranging from 1 through 5. End day for summer time, ranging from Sunday through Saturday. End month for summer time, ranging from January through December. End time (military format) in hours and minutes. Number of minutes to add during summer time. Valid entries are from 1 to 1440. The default is 60. Sets the daylight time to a standard time zone that includes an applicable daylight time start and end range along with a daylight offset. Enter one of the following well-known time zones:
start_week start_day start_month start_time end_week end_day end_month end_time daylight_offset standard time_zone
ADTAtlantic Daylight Time: 2 a.m. first Sunday in April2 a.m. last Sunday in October, + 60 minutes AKDTAlaska Standard Daylight Time: 2 a.m. first Sunday in April2 a.m. last Sunday in October, + 60 minutes CDTCentral Daylight Time: 2 a.m. first Sunday in April2 a.m. last Sunday in October, + 60 minutes EDTEastern Daylight Time: 2 a.m. first Sunday in April2 a.m. last Sunday in October, + 60 minutes MDTMountain Daylight Time: 2 a.m. first Sunday in April 2 a.m. last Sunday in October, + 60 minutes PDTPacific Daylight Time: 2 a.m. first Sunday in April2 a.m. last Sunday in October, + 60 minutes
Command Modes
2-300
OL-25339-01
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The first part of the command specifies when summer time begins, and the second part of the command specifies when summer time ends. All times are relative to the local time zone; the start time is relative to standard time and the end time is relative to summer time. If the starting month is after the ending month, the ACE assumes that you are located in the southern hemisphere.
Examples
To specify that summer time begins on the first Sunday in April at 02:00 and ends on the last Sunday in October at 02:00, with a daylight offset of 60 minutes, enter:
host1/Admin(config)# clock summer-time Pacific 1 Sun Apr 02:00 5 Sun Oct 02:00 60
Related Commands
(config) config-register
To change the configuration register settings, use the config-register configuration command. Use the no form of this command to reset the config-register to its default setting. config-register value no config-register value
2-301
Syntax Description
value
Configuration register value that you want to use the next time that you restart the ACE.
For the ACE module, the supported value entries are as follows:
0(default) Upon reboot, the ACE boots to ROM monitor. The ACE remains in
environment variable (see the (config) boot system image: command). The BOOT environment variable specifies a list of image files on various devices from which the ACE can boot at startup. If the ACE encounters an error or if the image is not valid, it will try the second image (if one is specified). If the second image also fails to boot, the ACE returns to ROM monitor.
For the ACE appliance, the supported value entries are as follows:
0x0Upon reboot, the ACE boots to the GNU GRand Unified Bootloader (GRUB).
From the GRUB boot loader, you specify the system boot image to use to boot the ACE. Upon startup, the ACE loads the startup-configuration file stored in Flash memory (nonvolatile memory) to the running-configuration file stored in RAM (volatile memory).
0x1(default) Upon reboot, the ACE boots the system image identified in the
BOOT environment variable (see (config) boot system image:). The BOOT environment variable specifies a list of image files on various devices from which the ACE can boot at startup. If the ACE encounters an error or if the image is not valid, it will try the second image (if one is specified). Upon startup, the ACE loads the startup-configuration file stored in Flash memory (nonvolatile memory) to the running-configuration file stored in RAM (volatile memory).
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can modify the boot method that the ACE uses at the next startup by setting the boot field in the software configuration register. The configuration register identifies how the ACE should boot. For the ACE module, it also identifies where the system image is stored. You can modify the boot field to force the ACE to boot a particular system image at startup instead of using the default system image. The config-register command affects only the configuration register bits that control the boot field and leaves the remaining bits unaltered.
2-302
OL-25339-01
Examples
To set the boot field in the configuration register to boot the system image identified in the BOOT environment variable upon reboot, enter:
host1/Admin(config)# config-register 1
To set the boot field in the configuration register to boot the system image identified in the BOOT environment variable upon reboot and to load the startup-configuration file stored in Flash memory, enter:
host1/Admin(config)# config-register 0x1
Related Commands
(config) context
To create a context, use the context command. The CLI prompt changes to (config-context). A context provides a user view into the ACE and determines the resources available to a user. Use the no form of this command to remove a context. context name no context name
Syntax Description
name
Name that designates a context. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Do not configure a context name that contains opening braces, closing braces, white spaces, or any of the following characters: ` $ % & * ( ) \ | ; ' " <>/? Do not start the context name with the following characters: - . # ~
Command Modes
Command History
Modification This command was introduced. This command no longer supports you from configuring a context name that contains opening braces, closing braces, white spaces, or any of the following symbols: ` $ % & * ( ) \ | ; ' " < > / ?
2-303
Modification This command was introduced. This command no longer supports you from configuring a context name that contains opening braces, closing braces, white spaces, or any of the following symbols: ` $ % & * ( ) \ | ; ' " < > / ?
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the ACE allows you to create and use five user-configured contexts plus the default Admin context. To use a maximum of 251 contexts (Admin context plus 250 user contexts), you must purchase an additional license from Cisco Systems.
Examples
Related Commands
Syntax Description
group_name
Name that you assign to the authentication group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-304
OL-25339-01
Command History
Modification This command was introduced. The number of certificates in an authentication group was increased from 4 to 10.
Modification This command was introduced. The number of certificates in an authentication group was increased from 4 to 10.
Usage Guidelines
This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By creating an authentication group, you can implement a group of certificates that are trusted as certificate signers on the ACE. After creating the authentication group and assigning its certificates, you can configure client authentication on an SSL-proxy service by assigning the authentication group to the service. You include an authentication group in the handshake process by configuring the SSL proxy-service with the authentication group (see the (config) ssl-proxy service command). You can configure an authentication group with up to ten certificates.
Examples
Related Commands
Syntax Description
group_name
Name that you assign to the chain group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-305
Command History
Usage Guidelines
This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A chain group specifies the certificate chains that the ACE sends to its peer during the handshake process. A certificate chain is a hierarchal list of certificates that includes the subjects certificate, the root CA certificate, and any intermediate CA certificates. You include a chain group in the handshake process by configuring the SSL proxy service with the chain group (see the (config) ssl-proxy service command). Each context on the ACE can contain up to eight chain groups.
Examples
Related Commands
Syntax Description
crl_name url
Name that you assign to the CRL. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. URL where the ACE retrieves the CRL. Enter the URL full path including the CRL filename in an unquoted alphanumeric string with a maximum of 255 characters. Both HTTP and LDAP URLs are supported. Start the URL with the http:// prefix or the ldap:// prefix.
Command Modes
2-306
OL-25339-01
Command History
Modification This command was introduced. This command was revised to support LDAP URLs and increased the number of CRLs per context from four to eight.
Modification This command was introduced. This command was revised to support LDAP URLs and increased the number of CRLs per context from four to eight.
Usage Guidelines
This command requires the Secure Sockets Layer (SSL) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can use a CRL downloaded to the ACE for client or server authentication on an SSL proxy service. After you download the CRL, you can assign it to an SSL proxy service for either client or server authentication (see (config-ssl-proxy) crl for more information). The ldap:/// prefix is not considered a valid LDAP CRL link in the CDP portion of the server certificate. Valid formats for LDAP URLs are as follows:
To use a question mark (?) character as part of the URL, press Ctrl-v before entering it. Otherwise the ACE interprets the question mark as a help command. You can configure up to eight CRLs per context.
Examples
To download a CRL that you want to name CRL1 from http://crl.verisign.com/class1.crl, enter:
host1/Admin(config)# crypto crl CRL1 http://crl.verisign.com/class1.crl
Related Commands
2-307
crypto crlparams crl_name {cacert ca_cert_filename | timeout number} no crypto crlparams crl_name {cacert ca_cert_filename | timeout number}
Syntax Description
Name that you assign to the CRL. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Name of the CA certificate file used for signature verification. Specifies the time in seconds that the ACE waits for the CRL data before closing the connection with the server. For static CRLs, enter an integer from 2 to 300. For best-effort CRLs, the timeout is 60 seconds and not user-configurable. If the ACE does not receive the entire CRL data within the timeout limit, the ACE closes the socket connection with the server. For static CRLs, you can abort the CRL data download by removing the static CRL from the configuration.
Command Modes
Command History
Modification This command was introduced. Added the timeout number keyword and argument.
Modification This command was introduced. Added the timeout number keyword and argument.
Usage Guidelines
This command requires the PKI feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. In the absence of the timeout keyword, if the ACE does not receive the complete certificate revocation list (CRL) in a timely manner from a CRL server or the server does not close the connection, the ACE continues to wait for the data to arrive. While it is waiting for the CRL data, the ACE keeps the socket connection with the server open until the TCP connection with the server is closed because of inactivity. The TCP inactivity timer value could be as large as an hour. There is no way to clear this already established connection with the CRL server even if the static CRL is removed from the configuration.
Examples
To download a CRL that you want to name CRL1 from http://crl.verisign.com/class1.crl, enter:
host1/Admin(config)# crypto crl CRL1 http://crl.verisign.com/class1.crl
to configure a 200-second CRL download timeout for CRL1, enter the following command:
2-308
OL-25339-01
When the CRL data download timeout expires and the download is aborted, the ACE generates a syslog to log the event as follows:
%ACE-6-253008: CRL crl_name could not be retrieved, reason: crl data dnld timeout error
The crl_name variable indicates the name of an existing CRL whose download was aborted because the CRL download timeout expired. To return the behavior of the ACE to the default of waiting until the entire CRL is downloaded before closing the SSL connection or waiting for the TCP inactivity timeout to close the TCP connection, enter the following command:
host1/Admin(config)# no crypto crl-params CRL1 timeout 200
Related Commands
Syntax Description
csr_param_name Name that designates a CSR parameter set. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-309
A CSR parameter set defines the distinguished name attributes that the ACE applies to the CSR during the CSR-generating process. The distinguished name attributes provide the CA with the information that it needs to authenticate your site. Creating a CSR parameter set allows you to generate multiple CSRs with the same distinguished name attributes. You can create up to eight CSR parameter sets per context. When you use the crypto csr-params command to specify a CSR parameter set, the prompt changes to the csr-params configuration mode (for more information on this mode and commands, see the CSR Parameters Configuration Mode Commands section), where you define each of the distinguished name attributes. The ACE requires that you define the following attributes: Country name
If you do not configure the required attributes, the ACE displays an error message when you attempt to generate a CSR using the incomplete CSR parameter set.
Examples
Related Commands
Syntax Description
ocsp_server_name
Identifier of the OCSP server. You use this name to apply the OCSP server to an SSL proxy service. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. HTTP URL in the form: http://ocsphost.com:port_id/. The port ID is optional. If you do not specify a port, the default value of 2560 is used. You can specify either an IPv4- or an IPv6-based URL. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. (Optional) TCP connection inactivity timeout. in seconds. Enter an integer from 2 to 3600. The default is 300 seconds.
url
conninactivitytout timeout
2-310
OL-25339-01
(Optional) Enables or disables the use of a nonce. By default, nonce is disabled. A nonce is a unique string that is used to bind OCSP requests and responses. When a nonce is enabled, the ACE includes a unique string in the requests that is sends to the OCSP server. The server must include the string in its responses to the ACE to verify the response.
reqsigncert (Optional) Signers certificate filename to sign outgoing requests to the OCSP signer_cert_filename server. By default, the request is not signed. reqsignkey signer_key_filename (Optional) Signers private key filename to sign outgoing requests to the OCSP server. By default, the request is not signed. If you enter the reqsigncert option, you must enter the reqsignkey option.
respsigncert (Optional) Certificate to verify the signature of the OCSP server responses. By response_signer_cert default, the signature in the response from the OCSP server are not verified.
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. OCSP has the following configurations guidelines and restrictions:
You can configure a maximum of 64 OCSP servers in the ACE. You can configure a maximum of 10 OCSP servers in an SSL proxy service. The ACE can handle a maximum of 64 OCSP server connections with both static and best effort OCSP servers combined. If you configure best-effort OCSP servers and best-effort CRLs in the same proxy list, the ACE extracts a maximum of four AIAs and four CDPs to conserve resources. Client authentication may be delayed when you configure OCSP servers and CRLs in the same SSL proxy service. The ACE does not perform authentication and revocation checks on response signer certificates.
Examples
To configure an OCSP server that the ACE uses to check the revocation status of SSL certificates, enter the following command:
host1/Admin(config)# crypto ocspserver OCSP_SSERVER1 http://10.10.10.10/ nonce enable conninactivitytout 60
To remove an OCSP server from the configuration, enter the following command:
2-311
Related Commands
show crypto
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The crypto rehandshake enabled configuration mode command overrides the rehandshake enable parameter map command that you can configure individually in an SSL proxy service.
Examples
To return the ACE behavior to the default of rehandshake being disabled, enter:
host1/Admin(config)# no crypto rehandshake enabled
Related Commands
2-312
OL-25339-01
(config) domain
To create a domain, use the domain command. The CLI prompt changes to (config-domain). See the Domain Configuration Mode Commands section for details. Use the no form of this command to remove a domain from the configuration. domain name no domain name
Syntax Description
name
Name for the domain. Enter an unquoted text string with no spaces and a maximum of 76 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. The length of the name argument changes from 64 to 76 characters.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure a maximum of 63 domains in each context. A domain does not restrict the context configuration that you can display using the show running-config command. You can still display the running configuration for the entire context. However, you can restrict your access to the configurable objects within a context by adding to the domain only a limited subset of all the objects available to a context. To limit a users ability to manipulate the objects in a domain, you can assign a role to that user. For more information about domains and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure KAL-AP TAGs as domains. For the domain load calculation, the ACE considers the Layer 3 class map, server farm, and real server objects. All other objects under the domain are ignored during the calculation.
Examples
2-313
Related Commands
(config) end
To exit from configuration mode and return to Exec mode, use the end command. end
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can also press Ctrl-Z or enter the exit command to exit configuration mode.
Examples
Related Commands
(config) exit
To exit from the current configuration mode and return to the previous mode, use the exit command. exit
2-314
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. In configuration mode, the exit command transitions to the Exec mode. In all other configuration modes, the exit command transitions to the previous configuration mode. You can also press Ctrl-Z, enter the (config) end command, or enter the exit command to exit configuration mode.
Examples
To exit from interface configuration mode and return to configuration mode, enter:
host1/Admin(config-if)# exit host1/Admin(config)#
Related Commands
(config) ft auto-sync
To enable automatic synchronization of the running-configuration and the startup-configuration files in a redundancy configuration, use the ft auto-sync command. Use the no form of this command to disable the automatic synchronization of the running-configuration or the startup-configuration file. ft auto-sync {running-config | startup-config} no ft auto-sync {running-config | startup-config}
2-315
Syntax Description
running-config startup-config
Enables autosynchronization of the running-configuration file. The default is enabled. Enables autosynchronization of the startup-configuration file. The default is enabled.
Command Modes
Command History
Usage Guidelines
This command requires the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the ACE automatically updates the running configuration on the standby context of an FT group with any changes that occur to the running configuration of the active context. If you disable the ft auto-sync command, you need to update the configuration of the standby context manually. For more information about configuration synchronization and configuring redundancy, see the Administration Guide, Cisco ACE Application Control Engine.
Caution
Toggling ft auto-sync running-config in the Admin context may have undesirable side effects if the same command is also disabled in an active user context. If the ft auto-sync running-config command is disabled in the active Admin context and in an active user context, and you subsequently enable the ft auto-sync running-config command in the active Admin context first, the entire configuration of the standby user context will be lost. Always enter the ft auto-sync running-config command in the active user context first, and then enable the command in the active Admin context. The ACE does not copy or write changes in the running-configuration file to the startup-configuration file unless you enter the copy running-config startup-config command or the write memory command for the current context. To write the contents of the running-configuration file to the startup-configuration file for all contexts, use the write memory all command. At this time, if the ft auto-sync startup-config command is enabled, the ACE syncs the startup-configuration file on the active ACE to the standby ACE. The ACE does not synchronize the SSL certificates and key pairs that are present in the active context with the standby context of an FT group. If the ACE performs a configuration synchronization and does not find the necessary certs and keys in the standby context, config sync fails and the standby context enters the STANDBY_COLD state.
2-316
OL-25339-01
Caution
Do not enter the no inservice command followed by the inservice command on the active context of an FT group when the standby context is in the STANDBY_COLD state. Doing so may cause the standby context running-configuration file to overwrite the active context running-configuration file. To copy the certs and keys to the standby context, you must export the certs and keys from the active context to an FTP or TFTP server using the crypto export command, and then import the certs and keys to the standby context using the crypto import command. For more information about importing and exporting certs and keys, see the SSL Guide, Cisco ACE Application Control Engine. To return the standby context to the STANDBY_HOT state in this case, ensure that you have imported the necessary SSL certs and keys to the standby context, and then perform a bulk sync of the active context configuration by entering the following commands in configuration mode in the active context of the FT group:
1. 2.
Examples
Related Commands
(config) ft group (config) ft interface vlan (config) ft peer (config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface
Syntax Description
Command Modes
2-317
Command History
Usage Guidelines
This command requires the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Initially, after you disable connection replication, the active ACE does not synchronize connections to the standby ACE. After a bulk sync:
New connections are not synchronized Connections are not updated in a periodic scan Connections that are already synchronized on the standby are not torn down New connections are synced immediately Existing connections are synced in the next periodic cycle (in approximately 3 to 4 minutes)
If you enable connection replication after a bulk sync occurs, the ACE takes the following actions:
Sticky replication is disabled by default and you can configure it on a per sticky group basis. The replicate sticky command takes precedence over the ft connection-sync disable command, so new client connections can be load balanced to the same server even when connection replication is disabled. Note the following caveats with stickiness when connection replication is disabled:
The sticky database is not always in sync on the standby. With connection replication disabled, sticky connections on the active close normally, but on the standby the connections time out according to the idle timeout setting. When sticky entries are approaching their expiration time, it is possible to have a zero active-conns-count on the standby and still have active connections on the active ACE. This condition can lead to sticky entries that are not present after a switchover.
Examples
To reenable connection replication after you have disabled it, enter the following command:
host1/Admin(config)# no ft connection-sync disable
Related Commands
(config) ft auto-sync
(config) ft group
To create a fault-tolerant (FT) group for redundancy, use the ft group command. After you enter this command, the system enters the FT group configuration mode. Use the no form of this command to remove an FT group from the configuration.
2-318
OL-25339-01
Syntax Description
group-id
For the ACE module, enter an integer from 1 to 255. For the ACE appliance, enter an integer from 1 to 64.
Command Modes
Command History
Modification This command was introduced. The number of FT groups increased from 21 to 64.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You must configure the same group ID on both peer ACEs. On each ACE, you can create multiple FT groups:
For ACE module, up to a maximum of 251 (250 contexts and 1 Admin context) For ACE appliance, up to a maximum of 64 groups
Each group consists of a maximum of two members (contexts): one active context on one ACE and one standby context on the peer ACE. For information about the commands in FT group configuration mode, see the FT Group Configuration Mode Commands section.
Examples
Related Commands
2-319
(config) ft peer (config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface
Syntax Description
vlan_id
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Peer ACEs communicate with each other over a dedicated FT VLAN. These redundant peers use the FT VLAN to transmit and receive heartbeat packets and state and configuration replication packets. You must configure the same VLAN on each peer ACE. You cannot use this VLAN for normal network traffic and the FT VLAN does not support IPv6. To remove an FT VLAN, first remove it from the FT peer using the no ft interface vlan command in FT peer configuration mode. See the (config-ft-peer) ft-interface vlan command for more information. (ACE appliance only) To configure one of the Ethernet ports or a port-channel interface on the ACE for fault tolerance using a dedicated FT VLAN for communication between the members of an FT group, use the ft-port vlan command in interface configuration mode. See the (config-if) ft-port vlan command for more information. (ACE appliance only) On both peer ACE appliances, you must configure the same Ethernet port or port-channel interface as the FT VLAN port. For example:
2-320
OL-25339-01
If you configure ACE appliance 1 to use Ethernet port 4 as the FT VLAN port, then be sure to configure ACE appliance 2 to use Ethernet port 4 as the FT VLAN port. If you configure ACE appliance 1 to use port-channel interface255 as the FT VLAN port, then be sure to configure ACE appliance 2 to use port-channel interface 255 as the FT VLAN.
Examples
Related Commands
(config) ft auto-sync (config) ft group (config) ft peer (config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface (ACE appliance only) (config-if) ft-port vlan
(config) ft peer
On both peer ACEs, configure an FT peer definition. To create an FT peer, use the ft peer command. After you enter this command, the system enters the FT peer configuration mode. You can configure a maximum of two ACEs as redundancy peers. Use the no form of this command to remove the FT peer from the configuration. ft peer peer_id no ft peer peer_id
Syntax Description
peer_id
Command Modes
Command History
2-321
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Each ACE ACE can have one FT peer. FT peers are redundant ACE ACEs that communicate with each other over a dedicated FT VLAN. Before you can remove an FT peer from the configuration, remove the peer from the FT group using the no peer command in FT group configuration mode. For information about the commands in FT peer configuration mode, see the FT Peer Configuration Mode Commands section.
Examples
Related Commands
(config) ft auto-sync (config) ft group (config) ft interface vlan (config) ft track host (ACE module only) (config) ft track hsrp (config) ft track interface
Syntax Description
name
Unique identifier of the tracking process for a gateway or host. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
2-322
OL-25339-01
Usage Guidelines
This command requires the fault-tolerant (FT) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about commands in FT track host configuration mode, see the FT Track Host Configuration Mode Commands section. For details about configuring redundant ACE ACEs, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
Syntax Description
name
Unique identifier of the tracking process for an HSRP group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the fault-tolerant (FT) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-323
You must configure the HSRP group on the supervisor engine on the Catalyst 6500 series switch before you configure HSRP tracking on the ACE. Failure to do so may result in erroneous state information for the HSRP group being displayed in the show ft track detail command output in Exec mode. For information about commands in FT track hsrp configuration mode, see the FT Track Interface Configuration Mode Commands section. For details about configuring redundant ACE ACEs, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) ft auto-sync (config) ft group (config) ft interface vlan (config) ft peer (config) ft track host (config) ft track interface
Syntax Description
name
Unique identifier of the tracking process for a critical interface. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-324
OL-25339-01
Usage Guidelines
This command requires the fault-tolerant (FT) feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You cannot delete an interface if the ACE is using the interface for tracking. Also, you cannot configure the FT VLAN for tracking. For information about commands in FT track interface configuration mode, see the FT Track Interface Configuration Mode Commands section. For details about configuring redundant ACE ACEs, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) ft auto-sync (config) ft group (config) ft interface vlan (config) ft peer (config) ft track host (ACE module only) (config) ft track hsrp
(config) hostname
To specify a hostname for the ACE, use the hostname command. The hostname is used for the command line prompts and default configuration filenames. If you establish sessions to multiple devices, the hostname helps you track where you enter commands. Use the no form of this command to reset the hostname to the default of switch. hostname name no hostname name
Syntax Description
name
New hostname for the ACE. Enter a case-sensitive text string that contains from 1 to 32 alphanumeric characters (with no spaces). The underscore (_) character is not supported in the hostname for the ACE.
2-325
Command Modes
Command History
Modification This command was introduced. Underscores (_) in the host name for an ACE are not supported.
Modification This command was introduced. Underscores (_) in the host name for an ACE are not supported.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the hostname for the ACE is switch.
Examples
Related Commands
(config) hw-module
(ACE module only) To configure hardware module parameters in the ACE, use the hostname command. Use the no form of this command to reset to the default behavior. hw-module {cde-same-port-hash | optimize-lookup} no hw-module {cde-same-port-hash | optimize-lookup}
Syntax Description
cde-same-port-hash
Configures the classification and distribution engine (CDE) to perform the hash function using the ports when the TCP or UDP packets are equal. When this command is configured, the ACE also disables implicit PAT on packets so that the source port does not change. This command is available only in the Admin context. Disables the egress MAC address lookup that the ACE normally performs. Use this command when you have multiple ACEs installed in a chassis with heavy traffic to improve performance.
optimize-lookup
2-326
OL-25339-01
Command Modes
Command History
Modification This command was introduced. This command was revised with the optimize-lookup keyword.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, when the source and destination ports of a TCP or UDP packet are equal, the CDE uses the source IP address and destination IP address to perform the hash function. When they are not equal, the CDE only uses the ports. When the cde-same-port-hash command is configured and the ports are equal, the CDE uses a slightly different hash method from the default method. If you have multiple ACEs installed in a Catalyst 6500 Series Switch or in a Cisco Catalyst 7600 Router, you may experience lower performance than expected with very high rates of traffic. If you fail to achieve the advertised performance of the ACE, you can disable the egress MAC address lookup using the hw-module optimize-lookup command. Do not use the hw-module optimize-lookup command if you have intelligent modules with distributed forwarding cards (DFCs) installed in the Catalyst 6500 Series Switch or the Cisco Catalyst 7600 Router. Using this command with such modules will cause the Encoded Address Recognition Logic (EARL) units on these modules and on the Supervisor to become unsynchronized.
Examples
To configure the CDE to perform the hash function using the ports when the TCP or UDP packets are equal, enter:
switch/Admin(config)# hw-module cde-same-port-hash
Related Commands
show cde
(config) interface
To configure a bridge-group virtual interface (BVI), VLAN interface, and for the ACE appliance, the Ethernet port, or port-channel interface, use the interface command. The CLI prompt changes to (config-if). Use the no form of this command to remove the interface. interface {bvi group_number | gigabitEthernet slot_number/port_number | port-channel channel_number | vlan number} no interface {bvi group_number | gigabitEthernet slot_number/port_number | port-channel channel_number | vlan number}
2-327
Syntax Description
Creates a BVI for a bridge group and accesses interface configuration mode commands for the BVI. The group_number argument is the bridge-group number configured on a VLAN interface. (ACE appliance only) Specifies one of the four Ethernet ports on the rear panel of the ACE as follows:
slot_numberThe physical slot on the ACE containing the Ethernet ports. This selection is always 1, the location of the daughter card in the ACE. The daughter card includes the four Layer 2 Ethernet ports to perform Layer 2 switching. port_numberThe physical Ethernet port on the ACE. Valid selections are 1 through 4, which specifies one of the four Ethernet ports (1, 2, 3, or 4) associated with the slot 1 (daughter card) selection.
(ACE appliance only) Specifies the channel number assigned to this port-channel interface. Valid values are from 1 to 255. Assigns the VLAN to the context and accesses interface configuration mode commands for the VLAN. The number argument is the VLAN number you want to assign to the interface. VLAN numbers are 2 to 4094 (VLAN 1 is reserved for internal use and cannot be used). (ACE module only) The VLAN is assigned to the ACE from the supervisor engine for the Catalyst 6500 series switch.
Command Modes
Configuration mode BVI and VLANAdmin and user contexts (ACE appliance only) Ethernet port and port-channel interfaceAdmin context only
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about commands in interface configuration mode, see the Interface Configuration Mode Commands section. For details about configuring a BVI interface, Ethernet port, port-channel interface, or VLAN interface, see the Routing and Bridging Guide, Cisco ACE Application Control Engine. To enable the bridge-group VLANs, you must configure a bridge-group virtual interface (BVI) that represents a corresponding bridge group. An IP address in the same subnet should be configured on the BVI. This address is used for management traffic and as a source IP address for traffic from the ACE, similar to ARP requests. The ACE supports a maximum of 4093 VLAN interfaces with a maximum of 1,024 shared VLANs.
2-328
OL-25339-01
The ACE supports a maximum of 4094 BVI interfaces. The ACE supports a maximum of 8192 interfaces per system that include VLANs, shared VLANs, and BVI interfaces. The ACE requires a route back to the client before it can forward a request to a server. If the route back is not present, the ACE cannot establish a flow and drops the client request. Make sure that you configure the appropriate routing to the client network on the ACE VLAN where the client traffic enters the ACE ACE. You can configure one or more VLAN interfaces in any user context before you assign those VLAN interfaces to the associated user contexts through the (config-context) allocate-interface command in the Admin context.
ACE Appliance Guidelines
In addition, the Ethernet port and port-channel interface command functions require the Admin user role. The four Ethernet ports provide physical Ethernet ports to connect servers, PCs, routers, and other devices to the ACE. You can configure the four Ethernet ports to provide an interface for connecting to 10-Mbps, 100-Mbps, or 1000-Mbps networks. Each Layer 2 Ethernet port supports autonegotiate, or full-duplex or half-duplex operation on an Ethernet LAN, and can carry traffic within a designated VLAN. You can group physical ports together on the ACE to form a logical Layer 2 interface called the EtherChannel (or port-channel). All the ports belonging to the same port-channel must be configured with same values; for example, port parameters, VLAN membership, trunk configuration. Only one port-channel in a channel group is allowed, and a physical port can belong to only to a single port-channel interface.
Examples
To assign VLAN interface 200 to the Admin context and access interface configuration mode, enter:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)#
2-329
Related Commands
Syntax Description
enable
Accepts DHCP requests from clients on the associated context or interface and enables the DHCP relay agent. The DHCP relay starts forwarding packets to the DHCP server address specified in the ip dhcp relay server command for the associated interface or context. Configures a relay agent information reforwarding policy on the DHCP server to identify what the DHCP server should do if a forwarded message already contains relay information. Indicates that existing information is left unchanged on the DHCP relay agent. This is the default setting. Indicates that existing information is overwritten on the DHCP relay agent. Specifies the IP address of a DHCP server to which the DHCP relay agent forwards client requests. IP address of the DHCP server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
information policy
Command Modes
Command History
Usage Guidelines
This command requires the DHCP feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-330
OL-25339-01
The DHCP relay agent can be configured at both the context and interface level of the ACE. Note the following configuration considerations:
If you configure the DHCP relay agent at the context level, the configuration is applicable to all interfaces associated with the context. If you configure the DHCP relay agent at the interface level, the configuration is applicable to that particular interface only; the remaining interfaces fallback to the context level configuration.
Examples
Related Commands
clear ip show ip
2-331
(config) ip domain-list
To configure a domain name search list, use the ip domain-list command. The domain name list can contain a maximum of three domain names. Use the no form of this command to remove a domain name from the list. ip domain-list name no ip domain-list name
Syntax Description
name
Domain name. Enter an unquoted text string with no spaces and a maximum of 85 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the domain name feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure a Domain Name System (DNS) client on the ACE to communicate with a DNS server to provide hostname-to-IP-address translation for hostnames in CRLs for the client authentication feature. For unqualified hostnames (hostnames that do not contain a domain name), you can configure a default domain name or a list of domain names that the ACE can use to:
If you configure both a domain name list and a default domain name, the ACE uses only the domain name list and not the single default name. After you have enabled domain name lookups and configured a domain name list, the ACE uses each domain name in turn until it can resolve a single domain name into an IP address.
Examples
2-332
OL-25339-01
Related Commands
(config) ip domain-lookup
To enable the ACE to perform a domain lookup (host-to-address translation) with a DNS server, use the ip domain-lookup command. By default, this command is disabled. Use the no form of this command to return the state of domain lookups to the default value of disabled. ip domain-lookup no ip domain-lookup
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the Domain Name feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure a Domain Name System (DNS) client on the ACE to communicate with a DNS server to provide hostname-to-IP-address translation for hostnames in CRLs for the client authentication feature. Before you configure a DNS client on the ACE, ensure that one or more DNS name servers are properly configured and are reachable. Otherwise, translation requests (domain lookups) from the DNS client will be discarded. You can configure a maximum of three name servers. The ACE attempts to resolve the hostnames with the configured name servers in order until the translation succeeds. If the translation fails, the ACE reports an error. For unqualified hostnames (hostnames that do not contain a domain name), you can configure a default domain name or a list of domain names that the ACE can use to do the following:
2-333
Examples
To return the state of domain lookups to the default value of disabled, enter:
host1/Admin(config)# no ip domain-lookup
Related Commands
2-334
OL-25339-01
(config) ip domain-name
To configure a default domain name, use the ip domain-name command. The domain name list can contain a maximum of three domain names. Use the no form of this command to remove a domain name from the list. ip domain-list name no ip domain-list name
Syntax Description
name
Default domain name. Enter an unquoted text string with no spaces and a maximum of 85 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the domain name feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The DNS client feature allows you to configure a default domain name that the ACE uses to complete unqualified hostnames. An unqualified hostname does not contain a domain name (any name without a dot). When domain lookups are enabled and a default domain name is configured, the ACE appends a dot (.) and the configured default domain name to the unqualified host name and attempts a domain lookup.
Examples
In the above example, the ACE appends cisco.com to any unqualified host name in a CRL before the ACE attempts to resolve the host name to an IP address using a DNS name server. To remove the default domain from the configuration, enter:
host1/Admin(config)# no ip domain-name cisco.com
2-335
Related Commands
2-336
OL-25339-01
(config) ip name-server
To configure a DNS name server on the ACE, use the ip name-server command. You can configure a maximum of three DNS name servers. Use the no form of this command to remove a name server from the list. ip name-server ip_address no ip name-server ip_address
Syntax Description
ip_address
IP address of a name server. Enter the address in dotted decimal notation (for example, 192.168.12.15). You can enter up to three name server IP addresses in one command line.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the domain name feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To translate a hostname to an IP address, you must configure one or more (maximum of three) existing DNS name servers on the ACE. Ping the IP address of each name server before you configure it to ensure that the server is reachable.
Examples
For example, to configure three name servers for the DNS client feature, enter:
host1/Admin(config)# ip name-server 192.168.12.15 192.168.12.16 192.168.12.17
Related Commands
2-337
(config) ip route
To configure a default or static IP route, use the ip route command. Use the no form of this command to remove a default or static IP route from the configuration. ip route ipv6_dest_address/prefix_length {global_nexthop_address | {bvi number | vlan number {link_local_address}}} | {ipv4_dest_address netmask gateway_ip_address} no ip route dest_ip_prefix netmask gateway_ip_address
Syntax Description
ipv6_dest_address
IPv6 destination address for the route. The address that you specify for the static route is the address that is in the packet before entering the ACE and performing network address translation. Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter a a forward slash character (/) followed by an integer from 1 to 128. The default is /128.
/prefix_length
global_nexthop_add IP address of the gateway router (the next-hop address for this route). The ress gateway address must be in the same network as specified in the ip address command for a VLAN interface. For information on configuring the address, see the Routing and Bridging Guide, Cisco ACE Application Control Engine. bvi number link_local_address vlan number ipv4_dest_address Forward bridged VLAN interface for the link-local address. Link-local address of the interface. Forward VLAN interface for the link-local address. IPv4 destination address for the route. The address that you specify for the static route is the address that is in the packet before entering the ACE and performing network address translation. Subnet mask for the route.
netmask
gateway_ip_address IP address of the gateway router (the next-hop address for this route). The gateway address must be in the same network as specified in the ip address command for a VLAN interface.
Command Modes
Command History
2-338
OL-25339-01
Usage Guidelines
This command requires the routing feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The default route identifies the router IP address to which the ACE sends all IP packets for which it does not have a route. Admin and user contexts do not support dynamic routing. You must use static routes for any networks to which the ACE is not directly connected; for example, use a static route when there is a router between a network and the ACE. The ACE supports up to eight equal cost routes on the same interface for load balancing. Routes that identify a specific destination address take precedence over the default route. See the Routing and Bridging Guide, Cisco ACE Application Control Engine for more information about configuring default or static routes.
Examples
IPv6 Examples
To configure a static route to send all traffic destined to 2001:DB8:1::1/64 to the next-hop router at 2001:DB8:1::10, enter the following command:
host1/Admin(config)# ip route 2001:DB8:1::1/64 2001:DB8:1::10
To configure a default route, set the IPv6 address for the route to ::/0, the IPv6 equivalent of any. For example, if the ACE receives traffic that does not have a route and you want the ACE to send the traffic out the interface to the router at 2001:DB8:1::10/64, enter:
host1/Admin(config)# ip route ::/0 2001:DB8:1::10
To remove a default or static route, use the no form of the command as follows:
host1/Admin(config)# no ip route 2001:DB8:1::1/64 2001:DB8:1::10
IPv4 Examples
To configure a default route, set the IP address and the subnet mask for the route to 0.0.0.0. For example, if the ACE receives traffic that it does not have a route, it sends the traffic out the interface to the router at 192.168.4.8. Enter:
host1/Admin(config)# ip route 0.0.0.0 0.0.0.0 192.168.4.8
Related Commands
(config-if) ip address
2-339
Syntax Description
interval number
Indicates the frequency of the neighbor solicitation (NS) messages that are sent by the ACE. Specifies the time interval in seconds between NS messages for configured hosts. Enter an integer from 15 to 31536000. The default is 300 seconds (5 minutes).
Command Modes
Command History
Usage Guidelines
Examples
To configure an NS message interval of 600 seconds (10 minutes), enter the following command:
host1/Admin(config)# ipv6 nd interval 600
To reset the NS message interval to the default of 300 seconds, enter the following command;
host1/Admin(config)# no ipv6 nd interval 600
Related Commands
2-340
OL-25339-01
Syntax Description
learned-interval number
Indicates the refresh interval for ND entries of learned hosts. Specifies the time interval in seconds between NS messages for learned neighbor entries. Enter an integer from 60 to 31536000. The default is 300 seconds (5 minutes).
Command Modes
Command History
Usage Guidelines
Examples
To configure a learned neighbor interval of 600 seconds (10 minutes), enter the following command:
host1/Admin(config)# ipv6 nd learned-interval 600
To reset the learned neighbor interval to the default of 300 seconds, enter the following command;
host1/Admin(config)# no ipv6 nd learned-interval 600
Related Commands
2-341
Syntax Description
number
Specifies the number of times that the ACE resends the NS messages before considering a host as down. Enter an integer from 1 to 15. The default is 3.
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to resend NS messages five times before marking the host as down, enter the following command:
host1/Admin(config)# ipv6 nd retries 5
To reset the number of retries to the default value of 3, enter the following command;
host1/Admin(config)# no ipv6 nd retries 5
Related Commands
2-342
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To disable ND entry replication for the current context, enter the following command:
host1/Admin(config)# ipv6 nd sync disable
Related Commands
2-343
Syntax Description
number
Specifies the time interval between ND synchronization messages. Enter an integer from 1 to 3600 seconds (1 hour). The default is 5 seconds.
Command Modes
Command History
Usage Guidelines
Examples
To specify a time intervall between ND synchronization messages for learned hosts of 100 seconds, enter:
host1/Admin(config)# ipv6 nd sync-interval 100
Related Commands
2-344
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports secure KAL-AP for MD5 encryption of data between the ACE and the Global Site Selector (GSS). For encryption, you must configure a shared secret as a key for authentication between the GSS and the ACE context. For information about the commands in KAL-AP UDP configuration mode, see the KAL-AP UDP Configuration Mode Commands section.
Examples
Related Commands
2-345
Syntax Description
IP address for the LDAP server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1). (Optional) Specifies the TCP destination port for communicating authentication requests to the LDAP directory server. The port_number argument specifies the LDAP + port number. Enter an integer from 1 to 65535. (Optional) Specifies the time in seconds to wait for a response from the LDAP server before the ACE can declare a timeout failure with the LDAP server. Use this option to change the time interval that the ACE waits for the LDAP server to reply to an authentication request. Enter an integer from 1 to 60. The default is 5 seconds. (Optional) Defines the distinguished name (DN) for a user who is unrestricted by access controls or administrative limit parameters to perform operations on the LDAP server directory. The rootDN user can be thought of as the root user for the LDAP server database. Enter a quoted string with a maximum of 63 alphanumeric characters. The default is an empty string. (Optional) Defines the bind password (rootpw) applied to the rootDN of the LDAP server directory. Enter an unquoted string with a maximum of 63 alphanumeric characters. The default is an empty string.
timeout seconds
rootDN DN_string
password bind_password
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-346
OL-25339-01
By default, the LDAP server port is 389. If your LDAP server uses a port other than 389, use the port keyword to configure an appropriate port before starting the LDAP service. The ldap-server port command overrides the global setting for the specified server. By default, the ACE waits 5 seconds for the LDAP server to reply to an authentication request before the ACE declares a timeout failure and attempts to contact the next server in the group. The ldap-server timeout command overrides the global setting for the specified server.
Examples
Related Commands
show aaa (config) aaa group server (config) ldap-server port (config) ldap-server timeout
Syntax Description
port_number
Destination port to the LDAP server. Enter an integer from 1 to 65535. The default is TCP port 389.
Command Modes
Command History
2-347
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To override the global TCP port setting (specified by the ldap-server port command) for a specific server, use the ldap-server host port command.
Examples
Related Commands
show aaa (config) aaa group server (config) ldap-server host (config) ldap-server timeout
Syntax Description
seconds
Timeout value in seconds. Enter an integer from 1 to 60. The default is 5 seconds.
Command Modes
Command History
2-348
OL-25339-01
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To override the global TCP timeout setting (specified by the ldap-server timeout command) for a specific server, use the ldap-server host timeout command.
Examples
Related Commands
show aaa (config) aaa group server (config) ldap-server host (config) ldap-server port
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The console port is an asynchronous serial port on the Catalyst 6500 series switch that enables the ACE to be set up for initial configuration through a standard RS-232 port with an RJ-45 connector. Any device connected to this port must be capable of asynchronous transmission. Connection to a terminal requires a terminal emulator to be configured as 9600 baud, 8 data bits, 1 stop bit, no parity.
2-349
For information about the commands in console configuration mode, see the Console Configuration Mode Commands section.
Examples
Related Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in line configuration mode, see the Line Configuration Mode Commands section.
Examples
2-350
OL-25339-01
Related Commands
2-351
Syntax Description
minutes
Length of time in minutes. Enter a value from 0 to 60 minutes. A value of 0 instructs the ACE never to time out. The default is 5 minutes.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-352
OL-25339-01
Syntax Description
severity_level
Maximum level for system log messages sent to the buffer. The severity level that you specify indicates that you want syslog messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To set the logging buffer level to 3 for logging error messages, enter:
host1/Admin(config)# logging buffered 3
2-353
Related Commands
2-354
OL-25339-01
Syntax Description
severity_level
Maximum level for system log messages sent to the console. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Logging to the console can degrade system performance. Use the logging console command only when you are testing and debugging problems, or when there is minimal load on the network. We recommend that you use the lowest severity level possible because logging at a high rate may affect ACE performance. Do not use this command when the network is busy.
Examples
To enable system logging to the console for messages with severity levels of 2, 1, and 0:
host1/Admin(config)# logging console 2
2-355
Related Commands
2-356
OL-25339-01
Syntax Description
Specifies the name of the current context as the device ID to uniquely identify the syslog messages sent from the ACE. Specifies the hostname of the ACE as the device ID to uniquely identify the syslog messages sent from the ACE. Specifies the IP address of the interface as the device ID to uniquely identify the syslog messages sent from the ACE. You can specify the IP address of a VLAN interface or BVI as the device ID. If you use the ipaddress keyword, syslog messages sent to an external server contain the IP address of the interface specified, regardless of which interface the ACE uses to send the log data to the external server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies a text string to uniquely identify the syslog messages sent from the ACE. The maximum length is 64 alphanumeric characters without spaces. You cannot use the following characters: & (ampersand), (single quotation mark), (double quotation marks), < (less than), > (greater than), or ? (question mark).
string text
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The device ID part of the syslog message is viewed through the syslog server only and not directly on the ACE. The device ID does not appear in EMBLEM-formatted messages, Simple Network Management Protocol (SNMP) traps, or on the ACE console, management session, or buffer.
Examples
To instruct the ACE to use the hostname of the ACE to uniquely identify the syslog messages, enter:
host1/Admin(config)# logging device-id hostname
2-357
Related Commands
2-358
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Message logging is disabled by default. When enabled, log messages are sent to a logging process, which logs messages to designated locations asynchronously to the processes that generated the messages. You must set a logging output location to view any logs.
Examples
Related Commands
2-359
Syntax Description
number
Syslog facility. Enter an integer from 16 (LOCAL0) to 23 (LOCAL7). The default is 20 (LOCAL4).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The syslog daemon uses the specified syslog facility to determine how to process messages. Each logging facility configures how the syslog daemon on the host handles a message. Syslog servers file messages based on the facility number in the message. For more information on the syslog daemon and facility levels, see your syslog daemon documentation.
Examples
Related Commands
2-360
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Because of the large number of syslog messages that are generated by connection setup and teardown, you can instruct the ACE to send these syslogs through the fast path instead of the control plane. The fast path supports a much higher rate of syslogs than the control plane does. When you instruct the ACE to send these syslogs through the fast path, the message formatting changes (different message spacing) and the syslog IDs change from 106023, 302022, 302023, 302024, and 302025 to 106028, 302028, 302029, 302030, and 302031, respectively.
Examples
To configure the ACE to log connection setup and teardown syslog messages, enter:
host1/Admin(config)# logging fastpath
To disable the ACE from logging connection setup and teardown syslog messages, enter:
host1/Admin(config)# no logging fastpath
Related Commands
2-361
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To enable or disable all SNMP syslog message logging, use the logging history command without the severity_level argument. We recommend that you use the debugging (7) level during initial setup and during testing. After setup, set the level from debugging (7) to a lower value for use in your network. To send informational system message logs to an SNMP NMS, enter:
host1/Admin(config)# logging history 6
Examples
2-362
OL-25339-01
Related Commands
2-363
Syntax Description
IP address of the host to be used as the syslog server. (Optional) Specifies to use TCP to send messages to the syslog server. A server can only be specified to receive either UDP or TCP, not both. (Optional) Specifies to use UDP to send messages to the syslog server. A server can only be specified to receive either UDP or TCP, not both. (Optional) Port that the syslog server listens to for syslog messages. Enter an integer from 1025 to 65535. The default protocol and port are UDP/514. The default TCP port, if specified, is 1470. (Optional) Instructs the ACE to default to UDP if the TCP transport fails to communicate with the syslog server. (Optional) Enables EMBLEM-format logging for each syslog server. The Cisco Resource Management Environment (RME) is a network management application that collects syslogs. RME can process syslog messages only if they are in EMBLEM format.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you choose to send log messages to a host, the ACE sends those messages using either UDP or TCP. The host must run a program (known as a server) called syslogd, a daemon that accepts messages from other applications and the network, and writes them out to system wide log files. UNIX provides the syslog server as part of its operating system. If you are running Microsoft Windows, you must obtain a syslog server for the Windows operating system.
2-364
OL-25339-01
If you use TCP as the logging transport protocol, the ACE denies new network access sessions if the ACE is unable to reach the syslog server, if the syslog server is misconfigured, if the TCP queue is full, or if the disk is full. The format emblem keywords allow you to enable EMBLEM-format logging for each syslog server. EMBLEM-format logging is available for either TCP or UDP syslog messages. If you enable EMBLEM-format logging for a particular syslog host, then the messages are sent to that host. If you also enable the logging timestamp command, the messages are sent to the syslog server with a time stamp. For example, the EMBLEM format for a message with a time stamp appears as follows:
ipaddress or dns name [Dummy Value/Counter]: [mmm dd hh:mm:ss TimeZone]: %FACILITY-[SUBFACILITY-]SEVERITY-MNEMONIC: [vtl-ctx: context id] Message-text
Examples
Related Commands
2-365
Syntax Description
Specific message that you want to disable or to enable. (Optional) Changes the severity level associated with a specific system log message. For example, the %<ACE>-4-411001 message listed in the syslog has the default assigned severity level of 4 (warning message). You can change the assigned default severity level to a different level. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can use the show logging command to determine the level currently assigned to a message and whether the message is enabled. For information on syslog messages and their IDs, see the System Message Guide, Cisco ACE Application Control Engine.
2-366
OL-25339-01
Examples
To disable the %<ACE>-6-615004 syslog message (VLAN available for configuring an interface), enter:
host1/Admin(config)# no logging message 615004
To change the severity level of the 615004 syslog message from the default of 6 (informational) to a severity level of 5 (notification), enter:
(config)# logging message 615004 level 5
To return the severity level of the 615004 syslog message to the default of 6, enter:
host1/Admin(config)# no logging message 615004
Related Commands
2-367
Syntax Description
severity_level
Maximum level for system log messages displayed during the current SSH or Telnet session. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Note
Before you can use this command, you must enable remote access on the ACE and establish a remote connection using the SSH or Telnet protocols from a PC.
2-368
OL-25339-01
To display logs during the SSH or Telnet session, use the terminal monitor Exec mode command. This command enables syslog messages for all sessions in the current context. The logging monitor command sets the logging preferences for all SSH and Telnet sessions, while the terminal monitor command controls logging for each individual Telnet session. However, in each session, the terminal monitor command controls whether syslog messages appear on the terminal during the session.
Examples
To send informational system message logs to the current Telnet or SSH session, enter:
host1/Admin# terminal monitor host1/Admin# config Enter configuration commands, one per line. End with CNTL/Z host1/Admin(config)# logging monitor 6
To disable system message logging to the current Telnet or SSH session, enter:
host1/Admin(config)# no logging monitor
Related Commands
Syntax Description
severity_level
Maximum level for system log messages sent to compact flash. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
2-369
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. We recommend that you use a lower severity level, such as severity level 3, because logging at a high rate to flash memory on the ACE might affect performance.
Examples
To send informational system message logs to flash memory on the ACE, enter:
host1/Admin(config)# logging persistent 6
Related Commands
Syntax Description
queue_size
Queue size for storing syslog messages. Enter an integer from 1 to 8192. The default is 80 messages.
Command Modes
Command History
2-370
OL-25339-01
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Set the queue size before the ACE processes syslog messages. When traffic is heavy, messages might get discarded.
Examples
Related Commands
Syntax Description
num interval
Number at which the syslog is to be rate limited. Time interval in seconds over which the system message logs should be limited. The default time interval is 1 second.
2-371
level severity_level
Specifies the syslog level that you want to rate limit. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Identifies the ID of the specific message you want to suppress reporting. Disables rate limiting for messages in the syslog.
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Disabled rate limiting is the default setting. In this case, the logging rate-limit unlimited command will not be displayed in the ACE running-configuration file. The severity level you enter indicates that you want all syslog messages at the specified level to be rate-limited. For example, if you specify a severity level of 7, the ACE applies a rate limit only to level 7 (debugging messages). If you want to apply a logging rate limit on a different severity level, you must configure the logging rate-limit level command for that level as well. If you configure rate limiting for syslogs 302028 through 302031 (connection setup and teardown syslogs that are formatted in the data plane), the ACE always rate-limits these syslogs at level 6. Even if you change the logging level to a different value using the logging message command and the new logging level appears on the syslog server or other destination, the ACE will continue to rate-limit these syslogs at level 6. For information on syslog messages and their IDs, see the System Message Guide, Cisco ACE Application Control Engine.
2-372
OL-25339-01
Examples
To limit the syslog rate to a 60-second time interval for informational messages (level 6), enter:
host1/Admin(config)# logging rate-limit 42 60 level 6
Related Commands
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is disabled by default.
Examples
2-373
Related Commands
Syntax Description
severity_level Maximum level for system log messages. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-374
OL-25339-01
Examples
To send informational system message logs to the supervisor engine on the Catalyst 6500 series switch, enter:
host1/Admin(config)# logging supervisor 6
Related Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is disabled by default.
Examples
2-375
Related Commands
Syntax Description
severity_level Maximum level for system log messages. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the syslog feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To send logging messages to a syslog server, use the logging host command to specify the name or IP address of the host to be used as the syslog server.
2-376
OL-25339-01
Examples
Related Commands
(config) nexus-device
To create the DCI device (Nexus 7000 series switch) for the dynamic workload scaling (DWS) feature, use the nexus-device command. The CLI prompt changes to (config-dci). See the DCI Configuration Mode Commands section for details. Use the no form of this command to remove the DCI device from the configuration. nexus-device name no nexus-device name
Syntax Description
name
Name of the DCI device that the ACE queries for the locality information of the VMs. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The DCI device provides the locality information (local or remote) of the virtual machines (VMs) only. You can configure one DCI device per ACE.
Examples
2-377
Related Commands
show nexus-device
2-378
OL-25339-01
(config) ntp
(ACE appliance only) To configure the ACE system clock to synchronize a peer (or to be synchronized by a peer) or to be synchronized by a time server, use the ntp command. Use the no form of the command to remove an NTP peer or server from the configuration. ntp {peer ip_address1 [prefer] | server ip_address2 [prefer]} no ntp {peer ip_address1 [prefer] | server ip_address2 [prefer]}
Syntax Description
Configures the ACE system clock to synchronize a peer or to be synchronized by a peer. You can specify multiple associations. IP address of the peer providing or being provided by the clock synchronization. (Optional) Makes this peer the preferred peer that provides synchronization. Using the prefer keyword reduces switching back and forth between peers. Configures the ACE system clock to be synchronized by a time server. You can specify multiple associations. IP address of the time server that provides the clock synchronization. (Optional) Makes this server the preferred server that provides synchronization. Use the prefer keyword to set this NTP server as the preferred server if multiple servers have similar accuracy. NTP uses an algorithm to determine which server is the most accurate and synchronizes to that one. If servers have similar accuracy, then the prefer keyword specifies which of those servers to use.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. An NTP association can be a peer association, which means that the ACE is willing to synchronize to the other system or to allow the other system to synchronize to the ACE. An NTP association can also be a server association, which means that only this system will synchronize to the other system, not the other way around. You can identify multiple servers; the ACE uses the most accurate server. To send logging messages to a syslog server, use the logging host command to specify the name or IP address of the host to be used as the syslog server.
Examples
To specify multiple NTP server IP addresses and identify a preferred server, enter:
host1/Admin(config)# ntp server 192.168.10.10 prefer host1/Admin(config)# ntp server 192.168.4.143 host1/Admin(config)# ntp server 192.168.5.10
2-379
Related Commands
(config) object-group
To create an object group, use the object-group command. Object groups allow you to streamline the creation of multiple ACL entries in an ACL. Use the no form of this command to remove the object group from the configuration. object-group [network | service] name no object-group [network | service] name
Syntax Description
Specifies a group of hosts or subnet IP addresses. Specifies a group of TCP or UDP port specifications. Unique identifier for the object group. Enter the object group name as an unquoted, alphanumeric string from 1 to 64 characters.
Command Modes
Command History
Usage Guidelines
You can create either network or service object groups. After you create these groups, you can use a single ACL entry to allow trusted hosts to make specific service requests to a group of public servers. If you add new members to an existing object group that is already in use by an entry in a large ACL, recommitting the ACL can take a long time, depending on the size of the ACL and the object group. In some cases, making this change can cause the ACE to devote over an hour to committing the ACL, during which time you cannot access the terminal. We recommend that you first remove the ACL entry that refers to the object group, make your change, and then add the ACL entry back into the ACL.
2-380
OL-25339-01
Examples
Related Commands
2-381
(config) optimize
(ACE appliance only) To configure the global optimization settings on the ACE, enter the optimize command. The CLI prompt changes to (config-optimize). To remove an optimize mode selection, use the no form of the command. optimize no optimize
Syntax Description
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about commands in optimize configuration mode, see the Optimize Configuration Mode Commands section. For details about configuring the commands in the optimize configuration mode, see the Application Acceleration and Optimization Guide, Cisco ACE 4700 Series Application Control Engine Appliance.
Examples
Related Commands
show optimization-global
2-382
OL-25339-01
Syntax Description
connection
Specifies a connection-type parameter map. After you create the connection-type parameter map, you configure TCP, IP, and other settings for the map in the parameter map connection configuration mode. For information about the commands in parameter map connection configuration mode, see the Parameter Map Connection Configuration Mode Commands section. Specifies a DNS parameter map. After you create a DNS parameter map, you configure settings for the map in the parameter map DNS configuration mode. For information about the commands in parameter map DNS configuration mode, see the Parameter Map DNS Configuration Mode Commands section. Specifies a generic Layer 7 parameter map. After you create the generic Layer 7 parameter map, you configure settings for the map in the parameter map generic configuration mode. For information about the commands in parameter map generic configuration mode, see the Parameter Map HTTP Configuration Mode Commands section. Specifies an HTTP-type parameter map. After you create the HTTP-type parameter map, you configure HTTP settings for the map in the parameter map HTTP configuration mode. For information about the commands in parameter map HTTP configuration mode, see the Parameter Map HTTP Configuration Mode Commands section. (ACE appliance only) Specifies an optimization HTTP-type parameter map and define its application acceleration and optimization settings. After you create the optimization HTTP-type parameter map, you configure settings for the map in the parameter map optimization HTTP configuration mode. For information about the commands in parameter map HTTP connection configuration mode, see the Parameter Map Optimization Configuration Mode Commands section. Specifies an RTSP-type parameter map. After you create the RTSP-type parameter map, you configure RTSP settings for the map in the parameter map RTSP configuration mode. For information about the commands in parameter map RTSP configuration mode, see the Parameter Map RTSP Configuration Mode Commands section. Specifies a SIP-type parameter map. After you create the SIP-type parameter map, you configure SIP settings for the map in the parameter map SIP configuration mode. For information about the commands in parameter map SIP configuration mode, see the Parameter Map SIP Configuration Mode Commands section. Specifies a Skinny Client Control Protocol (SCCP) type parameter map. After you create the SCCP-type parameter map, you configure SCCP settings for the map in the parameter map SCCP configuration mode. For information about the commands in parameter map SCCP configuration mode, see the Parameter Map SCCP Configuration Mode Commands section.
dns
generic
http
optimization http
rtsp
sip
skinny
2-383
ssl
Specifies an SSL-type parameter map. After you create the SSL-type parameter map, you configure SSL settings for the map in the parameter map SSL configuration mode. For information about the commands in parameter map SSL connection configuration mode, see the Parameter Map SSL Configuration Mode Commands section. Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
name
Command Modes
Command History
Usage Guidelines
The connection and http commands requires the connection feature in your user role. The ssl commands in this mode require the connection or SSL feature. (ACE appliance only) The optimization http commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The parameter-map type command allows you to configure a series of Layer 3 and Layer 4 statements that instruct the ACE how to handle TCP termination, normalization and reuse, SSL termination, and advanced HTTP behavior for server load-balancing connections. After you enter this command, the system enters the corresponding parameter map configuration mode. To access one of the parameter-map configuration modes, enter the appropriate parameter-map type command. For example, enter parameter-map type connection, parameter-map type http, or parameter-map type ssl. The CLI prompt changes to the corresponding mode, for example, (config-parammap-conn), (config-parammap-http), or (config-parammap-ssl). After you configure the parameter map, you associate it with a specific action statement in a policy map.
Examples
2-384
OL-25339-01
Related Commands
Syntax Description
name
New hostname for the peer ACE. Enter a case-sensitive text string that contains from 1 to 32 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the hostname for the ACE is switch.
2-385
Examples
To change the hostname of the peer ACE from switch to ACE_1, enter:
switch/Admin(config)# peer hostname ACE_1 ACE_1/Admin(config)#
Related Commands
(config) hostname
Syntax Description
number
Bank of MAC addresses that the ACE uses. Enter a number from 1 to 16. Be sure to configure different bank numbers for multiple ACEs.
Command Modes
Command History
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
2-386
OL-25339-01
Related Commands
2-387
(config) policy-map
Use the policy-map command to create a Layer 3 and Layer 4 or Layer 7 policy map. To access one of the policy map configuration modes, use the policy-map command. Use the no form of this command to remove a policy map from the ACE. policy-map multi-match map_name policy-map type inspect {ftp first-match | http all-match | sip all-match | skinny} map_name policy-map type loadbalance {first-match | generic first-match | http first-match | radius first-match | rdp first-match | rtsp first-match | sip first-match} map_name policy-map type management first-match map_name policy-map type optimization http first-match map_name no policy-map multi-match map_name no policy-map type inspect {ftp first-match | http all-match | sip all-match | skinny} map_name no policy-map type loadbalance {first-match | generic first-match | http first-match | radius first-match | rdp first-match | rtsp first-match | sip first-match} map_name no policy-map type management first-match map_name
Syntax Description
multi-match
Configures a Layer 3 and Layer 4 policy map that defines the different actions applied to traffic passing through the ACE. The ACE attempts to match multiple classes within the Layer 3 and Layer 4 policy map to allow a multifeature Layer 3 and Layer 4 policy map. The ACE executes the action for only one matching class within each of the class sets. The definition of which classes are in the same class set depends on the actions applied to the classes; the ACE associates each policy map action with a specific set of classes. For information about the commands in policy map configuration mode, see the Policy Map Configuration Mode Commands section.
map_name type
Name assigned to the policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies the type of policy map to be defined. When you specify a policy map type, you enter its corresponding policy map configuration mode (for example, RADIUS load balancing). Specifies a Layer 7 policy map that defines the inspection of File Transfer Protocol (FTP) commands by the ACE. The ACE executes the action for the first matching classification. For a list of classes in a policy map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map FTP inspection configuration mode, see the Policy Map FTP Inspection Configuration Mode Commands section.
2-388
OL-25339-01
Specifies a Layer 7 policy map that defines the deep packet inspection of the HTTP protocol by the ACE. The ACE attempts to match all specified conditions against the matching classification and executes the actions of all matching classes until it encounters a deny for a match request. For information about the commands in policy map inspection HTTP configuration mode, see the Policy Map Inspection HTTP Configuration Mode Commands section. Specifies a Layer 7 policy map that defines the inspection of SIP protocol packets by the ACE. The ACE attempts to match all specified conditions against the matching classification and executes the actions of all matching classes until it encounters a deny for a match request. For information about the commands in policy map inspection SIP configuration mode, see the Policy Map Inspection SIP Configuration Mode Commands section. Specifies a Layer 7 policy map that defines the inspection of SCCP or skinny protocol packets by the ACE. The ACE uses the SCCP inspection policy to filter traffic based on message ID and to perform user-configurable actions on that traffic. For information about the commands in policy map inspection SIP configuration mode, see the Policy Map Inspection Skinny Configuration Mode Commands section. Specifies a Layer 7 policy map that defines Layer 7 first-match server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing HTTP Configuration Mode Commands section. Specifies a Layer 7 policy map that defines Layer 7 generic server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing Generic Configuration Mode Commands section.
inspect skinny
loadbalance first-match
loadbalance http first-match Specifies a Layer 7 policy map that defines Layer 7 HTTP server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing HTTP Configuration Mode Commands section.
2-389
Specifies a Layer 7 policy map that defines Layer 7 RADIUS server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing RADIUS Configuration Mode Commands section. Specifies a Layer 7 policy map that defines Layer 7 RDP server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing RDP Configuration Mode Commands section.
loadbalance rtsp first-match Specifies a Layer 7 policy map that defines Layer 7 RTSP server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing RDP Configuration Mode Commands section. loadbalance sip first-match Specifies a Layer 7 policy map that defines Layer 7 SIP server load-balancing decisions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map load balance configuration mode, see the Policy Map Load Balancing SIP Configuration Mode Commands section. Specifies a Layer 3 and Layer 4 policy map that defines the IP management protocols that can be received by the ACE. The ACE executes the specified action only for traffic that meets the first matching classification with a policy map. For information about the commands in policy map management configuration mode, see the Policy Map Management Configuration Mode Commands section. (ACE appliance only) Specifies a Layer 7 policy map that defines Layer 7 HTTP optimization operations. The Layer 7 optimization HTTP policy map associates an HTTP optimization action list and parameter map to configure the specified optimization actions. The ACE executes the action for the first matching classification. For a list of classes in a policy-map, the actions associated with the first class that matches the packet are the actions that the ACE executes on the packet. For information about the commands in policy map optimization configuration mode, see the Policy Map Optimization Configuration Mode Commands section.
management first-match
Command Modes
Configuration mode
2-390
OL-25339-01
Command History
Usage Guidelines
This command requires the inspect, loadbalance, NAT, connection, or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the policy map configuration mode commands to configure a series of Layer 3 and Layer 4 or Layer 7 policies. Each policy map defines a series of actions (functions) that you apply to a set of classified inbound traffic. The CLI prompt changes correspondingly to the selected policy map configuration mode: config-pmap, config-pmap-c, config-pmap-insp-http, config-pmap-insp-http-c, config-pmap-insp-http-m, config-pmap-lb, config-pmap-lb-c, config-pmap-lb-m, config-pmap-mgmt, and config-pmap-mgmt-c. (ACE appliance only) In addition, the prompt include config-pmap-optmz and config-pmap-optmz-c. For a Layer 3 and Layer 4 traffic classification, you create Layer 3 and Layer 4 policy maps with actions that configure the following:
Network management traffic received by the ACE (HTTP, HTTPS, ICMP, SNMP, SSH, or Telnet) Server load balancing based on Layer 3 and Layer 4 connection information (virtual IP address) Secure Sockets Layer (SSL) security services between a web browser (the client) and the HTTP connection (the server) Static or dynamic Network Address Translation (NAT) Application protocol inspection (also known as protocol fixup) TCP termination, normalization, and reuse IP normalization and fragment reassembly Server load balancing based on the Layer 7 HTTP-related information (such as HTTP headers, cookies, and URLs), or the client IP address (ACE appliance only) Application acceleration and optimization functions Deep packet inspection of the HTTP protocol FTP command inspection
For a Layer 7 traffic classification, you create policy maps with actions that configure the following:
The ACE supports a system-wide maximum of 4096 policy maps. For details about creating a policy map, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 3 and Layer 4 server load-balancing policy map named L4_SLB_POLICY, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY
2-391
host1/Admin(config-pmap)#
To create a Layer 3 and Layer 4 management protocol policy map named L4_MGMT-ACCESS_POLICY, enter:
host1/Admin(config)# policy-map type management match-any L4_MGMT-ACCESS_CLASS host1/Admin(config-pmap-mgmt)#
(ACE appliance only) To create a Layer 7 optimization HTTP policy map named L7OPTIMIZATION_POLICY, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host/Admin(config-pmap-optmz)#
To create a Layer 7 HTTP server load-balancing policy map named L7_SLB_POLICY, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7_SLB_POLICY host1/Admin(config-pmap-lb)#
To create a Layer 7 HTTP deep packet inspection policy map named L7_HTTP_INSPECT_POLICY, enter:
host/Admin(config) # policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host/Admin(config-pmap-ins-http)#
To create a Layer 7 FTP command inspection policy map named L7_FTP_INSPECT_POLICY, enter:
host1/Admin(config)# class-map type ftp inspect match-any L7_FTP_INSPECT_POLICY host1/Admin(config-pmap-ftp-ins)#
Related Commands
(config) probe
To define a probe and access its configuration mode, use the probe command. The CLI prompt changes to (config-probe_type). Use the no form of this command to delete the probe. probe probe_type probe_name no probe probe_type probe_name
Syntax Description
probe_type
Probe types. The probe type determines what the probe sends to the real server. Enter one of the following keywords:
dnsSends a request to a DNS server giving it a configured domain. To determine if the server is up, the ACE must receive the configured IP address for that domain. echo {tcp | udp}Sends a string to the server and compares the response to the original string. If the response string matches the original string, the server is marked as passed. Otherwise, the ACE retries a configured number of times and time interval before the server is marked as failed.
2-392
OL-25339-01
fingerSends a Finger probe to a server to verify that a defined username is a username on the server. Use the Finger protocol to configure the username string. ftpInitiates an FTP session. By default, this probe is for an anonymous login with the option of configuring a user ID and password. The ACE performs an FTP GET or LS to determine the outcome of the probe. This probe supports only active connections. httpSets up a TCP connection and issues an HTTP request. The default request is an HTTP 1.1 GET request with the URL /. Any valid HTTP response causes the probe to mark the real server as passed. You can also configure an HTTP response value. httpsSimilar to the HTTP probe, but this probe uses SSL to generate encrypted data. icmpSends an ICMP request and listens for a response. If the server returns a response, the ACE marks the real server as passed. If there is no response and the time times out, or an ICMP standard error such as DESTINATION_UNREACHABLE occurs, the ACE marks the real server as failed. imapIdentical to POP/POP3 probe, but uses IMAP. popInitiates a POP session, using a configured user ID and password. Then, the probe attempts to retrieve e-mail from the server and validates the result of the probe based on the return codes received from the server. radiusConnects to a RADIUS server and logs in to it to determine whether the server is up. rtspEstablishes a TCP connection and sends a request packet to the RTSP server to determine whether the server is up. scriptedExecutes probes from a configured script to perform health probing. You can author specific scripts with features not present in standard health probes. sip {tcp | udp} Establishes a TCP or UDP connection and sends an OPTIONS request packet to the user agent on the SIP server to determine whether the server is up. smtpInitiates an SMTP session by logging in to the server. snmpEstablishes a UDP connection and sends a maximum of eight SMNP OID queries to probe the server. tcpInitiates a TCP handshake and expects a response. By default, a successful response causes the probe to mark the server as passed, and then the probe sends a FIN to end the session. If the response is not valid or if there is no response, the probe marks the real server as failed. telnetEstablishes a connection to the real server and verifies that a greeting from the application was received.
2-393
udpSends a UDP packet to a real server. The probe marks the server as failed only if an ICMP Port Unreachable message is returned. Optionally, you can configure this probe to send specific data and expect a specific response to mark the real server as passed. vmPolls the local VM load information from the VM controller (vCenter) for the dynamic workload scaling (DWS) feature. The ACE calculates the average aggregate load information as a percentage of CPU usage or memory usage to determine when to burst traffic to the remote data center. If the server farm consists of both physical servers and VMs, the ACE considers load information only from the VMs. After you configure the VM probe and its attributes, you associate it with a VM controller and a server farm.
probe_name
Identifier for the probe. The probe name associates the probe to the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
ACE Module Release 3.0(0)A1(2) A2(1.0) A4(2.0) ACE Appliance Release A1(7) A3(1.0) A4(2.0)
Modification This command was introduced. This command was revised. Added the VM probe type. Modification This command was introduced. This command was revised. Added the VM probe type.
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about commands in probe configuration mode, see the Probe Configuration Mode Commands section.
Examples
To define a TCP probe named PROBE1 and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1 host1/Admin(config-probe-tcp)#
2-394
OL-25339-01
Related Commands
Syntax Description
nas_ip_address
IP address that is used as the RADIUS NAS-IP-Address, attribute 4. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the NAS-IP-Address is not configured. The ACE performs a route lookup on the Remote Authentication Dial-In User Service (RADIUS) server IP address and uses the result. The RADIUS NAS-IP-Address attribute allows you to configure an arbitrary IP address to be used as RADIUS attribute 4, NAS-IP-Address for each context. The radius-server attribute nas-ipaddr command allows the ACE to behave as a single RADIUS client from the perspective of the RADIUS server. The configured NAS-IP-Address will be encapsulated in all outgoing RADIUS authentication request and accounting packets.
Examples
2-395
To delete the RADIUS NAS-IP-Address and return to the default configuration, enter:
host1/Admin(config)# no radius-server attribute nas-ipaddr 192.168.1.1
Related Commands
Syntax Description
minutes
Length of time that the ACE skips a nonresponsive RADIUS server for transaction requests. Enter an integer from 0 to 1440 (24 hours). The default is 0.
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use of this command causes the ACE to mark as dead any RADIUS servers that fail to respond to authentication requests. This action avoids the wait for the request to time out before trying the next configured server. The ACE skips a RADIUS server that is marked as dead by sending additional requests for the duration of minutes. The dead-time interval starts when the server does not respond to the number of authentication request transmissions configured through the radius-server retransmit command. When the server responds to a probe access-request packet, the ACE transmits the authentication request to the server.
2-396
OL-25339-01
Examples
To globally configure a 15-minute dead-time for RADIUS servers that fail to respond to authentication requests, enter:
host1/Admin(config)# radius-server deadtime 15
Related Commands
Syntax Description
ip_address key
IP address for the RADIUS server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1). (Optional) Enables an authentication key for communication between the ACE and the RADIUS daemon running on the RADIUS server. The key is a text string that must match the encryption key used on the RADIUS server. Key that is used to authenticate communication between the RADIUS client and server. The shared secret must match the one configured on the RADIUS server. Enter the shared secret as a case-sensitive string with no spaces with a maximum of 63 alphanumeric characters. (Optional) Configures a key specified in clear text (indicated by 0) to authenticate communication between the RADIUS client and server. (Optional) Configures a key specified in encrypted text (indicated by 7) to authenticate communication between the RADIUS client and server. (Optional) Specifies the UDP destination port for communicating authentication requests to the RADIUS server. By default, the RADIUS authentication port is 1812 (as defined in RFC 2138 and RFC 2139). The port_number argument specifies the RADIUS port number. Valid values are from 1 to 65535.
shared_secret
0 7
auth-port port_number
2-397
acct-port port_number
(Optional) Specifies the UDP destination port for communicating accounting requests to the RADIUS server. By default, the RADIUS accounting port is 1813 (as defined in RFC 2138 and RFC 2139). The port_number argument specifies the RADIUS port number. Valid values are from 1 to 65535. (Optional) Specifies that the RADIUS server is used only for authentication purposes. If neither the authentication nor the accounting options are specified, the RADIUS server is used for both accounting and authentication purposes.
authentication
accounting
(Optional) Specifies that the RADIUS server is used only for accounting purposes. If neither the authentication nor the accounting options are specified, the RADIUS server is used for both accounting and authentication purposes.
timeout seconds
(Optional) Specifies the time interval that the ACE waits for the RADIUS server to reply to an authentication request before retransmitting a request. Valid entries are from 1 to 60 seconds. The default is 1 second. (Optional) Specifies the number of times that the ACE retransmits an authentication request to a timed-out RADIUS server before declaring the server to be unresponsive and contacting the next server in the group. Valid entries are from 1 to 5 attempts. The default is one attempt.
retransmit count
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The key option overrides the global setting of the radius-server key command. If you do not specify a key, the global value is used. RADIUS keys are always stored in encrypted form in persistent storage. The running configuration also displays keys in encrypted form. If neither the authentication nor the accounting options are specified, the RADIUS server is used for both accounting and authentication. If your RADIUS server uses a port other than 1813, use the acct-port keyword to configure the ACE for the appropriate port before starting the RADIUS service.
2-398
OL-25339-01
If your RADIUS server uses a port other than 1812, use the auth-port keyword to configure the ACE for the appropriate port before starting the RADIUS service. The retransmit and timeout options override the global settings assigned for the specified server when you enter the radius-server retransmit and radius-server timeout commands.
Examples
Related Commands
show aaa (config) aaa group server (config) radius-server attribute nas-ipaddr
2-399
Syntax Description
shared_secret
Key used to authenticate communication between the RADIUS client and the server. The shared secret must match the one configured on the RADIUS server. Enter the shared secret as a case-sensitive string with no spaces and a maximum of 63 alphanumeric characters. Configures a key specified in clear text (indicated by 0) to authenticate communication between the RADIUS client and server. Configures a key specified in encrypted text (indicated by 7) to authenticate communication between the RADIUS client and server.
0 7
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The key is a text string that must match the encryption key used on the RADIUS server. RADIUS keys are always stored in encrypted form in persistent storage on the ACE. This global key will be applied to those RADIUS servers in a named server group for which a shared secret is not individually configured by the (config) radius-server host command.
Examples
To globally configure an authentication key to be sent in encrypted text (indicated by 7) to the RADIUS server, enter:
host1/Admin(config)# radius-server key 7 abe4DFeeweo00o
2-400
OL-25339-01
Related Commands
Syntax Description
count
Number of times that the ACE attempts to connect to a RADIUS server(s) before trying to contact the next available server. Enter an integer from 1 to 5. The default is 1.
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE applies this global retransmission value to those RADIUS servers for which a value is not individually configured by the (config) radius-server host command. If all servers in the group are unavailable for authentication and accounting, the ACE tries the local database if you configure a local fallback method by entering the aaa authentication login or the aaa accounting default commands. If you do not have a fallback method, the ACE continues to contact one of the AAA servers listed in the server group.
Examples
2-401
Related Commands
Syntax Description
seconds
Time in seconds between retransmissions to the RADIUS server. Enter an integer from 1 to 60 seconds. The default is 1 second.
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE applies this global timeout value to those RADIUS servers for which a timeout value is not individually configured by the (config) radius-server host command.
Examples
Related Commands
2-402
OL-25339-01
Syntax Description
minutes
Timeout value in minutes. Enter an integer from 1 to 500. The default timeout is 60 minutes.
Command Modes
Command History
ACE Appliance Release A3(2.7). Not applicable for A4(1.0) and A4(2.0).
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. This command is applicable across all contexts.
Examples
To reset the regex compilation timeout to the default value of 60 minutes, enter the following command:
host/Admin(config)# no regex compilation-timeout
Related Commands
2-403
(config) resource-class
Caution
The no resource-class command will remove all resources from any context to which the specified resource class is assigned. Be sure that you want to do this before you enter the command. To create a resource class and enter resource configuration mode, use the resource-class command. The CLI prompt changes to (config-resource). Configure a resource class to limit the use of system resources by one or more contexts. Use the no form of this command to remove the resource-class setting. resource-class name no resource-class name
Syntax Description
name
Name assigned to the resource class. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can also use the resource class called default.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use a resource class to allocate and limit system resources among contexts in your ACE. The default resource class allocates 100 percent of all configurable system resources to each context. By creating a resource class, you can prevent oversubscription by limiting the percentage of resources available to each context. After you create and configure a resource class, use the (config-context) member command in context configuration mode to assign a context to the class. To use the stickiness feature, you must allocate a minimum percentage of resources to the feature. Otherwise, stickiness will not work. For more details, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in the resource configuration mode, see the Resource Configuration Mode Commands section.
2-404
OL-25339-01
Examples
Related Commands
show resource allocation show resource usage show user-account show users (config-context) member
(config) role
To assign a user role to a user and enter role configuration mode, use the role command. The CLI prompt changes to (config-role). User roles determine the privileges that a user has, the commands that a user can enter, and the actions that a user can perform in a particular context. You can apply the roles that you create only in the context in which you create them. See the Role Configuration Mode Commands section for details. Use the no form of this command to remove the user role assignment. role name no role name
Syntax Description
name
Identifier associated with a user role. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-405
If you do not assign a user role to a new user, the default user role is Network-Monitor. For users that you create in the Admin context, the default scope of access is the entire device. For users that you create in other contexts, the default scope of access is the entire context. If you need to restrict a users access, you must assign a role-domain pair using the (config) username command. For information about the commands in the role configuration mode, see the Role Configuration Mode Commands section. For information about configuring roles and assigning them to users, see the Virtualization Guide, Cisco ACE Application Control Engine
Examples
Related Commands
(config) rserver
To create a real server for server load balancing (SLB) and enter real server configuration mode, use the rserver command. The CLI prompt changes to (config-host-rserver) or (config-redirect-rserver), depending on the type of real server that you create. You can create a maximum of 16,384 real servers. Use the no form of this command to remove the real server from the configuration. rserver [host | redirect] name no rserver [host | redirect] name
Syntax Description
host
(Optional) Specifies a typical real server that provides content and services to clients. This is the default setting. For details on the commands in real server host configuration mode, see the Real Server Host Configuration Mode Commands section. (Optional) Specifies a real server used to redirect traffic to a new location as specified in the relocn-string argument of the webhost-redirection command. For details on the commands in real server redirect configuration mode, see the Real Server Redirect Configuration Mode Commands section. Identifier for the real server. Enter an unquoted text string with no spaces and maximum of 64 alphanumeric characters.
redirect
name
2-406
OL-25339-01
Command Modes
Command History
Usage Guidelines
This command requires the rserver feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. All servers in a server farm must be of the same type: host or redirect. You can create a maximum of 4096 real servers in each ACE.
Examples
To remove the real server of type host from the configuration, enter:
host1/Admin(config)# no rserver server1
Related Commands
Command Modes
2-407
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To run a script or create a health probe using a script, you must see the script name, not the script file from which the script was loaded.
Examples
Related Commands
show script
(config) serverfarm
To create a new server farm or modify an existing server farm and enter the serverfarm configuration mode, use the serverfarm command. You can configure a maximum of 4096 server farms on each ACE. Use the no form of this command to remove the server farm from the configuration. serverfarm [host | redirect] name no serverfarm [host | redirect] name
Syntax Description
host
(Optional) Specifies a typical server farm that consists of real servers that provide content and services to clients. This is the default. For details on the commands in the serverfarm host configuration mode, see the Server Farm Host Configuration Mode Commands section. (Optional) Specifies that the server farm consist only of real servers that redirect client requests to alternate locations specified by the relocation string or port number in the real server configuration. For details on the commands in the serverfarm redirect host configuration mode, see the Server Farm Redirect Configuration Mode Commands section. Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
redirect
name
2-408
OL-25339-01
Command Modes
Command History
Usage Guidelines
This command requires the server-farm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create a server farm, you configure the other server farm attributes and add real servers to the farm. You can configure a maximum of 4096 server farms in each ACE.
Examples
Related Commands
(config) service-policy
To apply a previously created policy map and attach the traffic policy to a specific VLAN interface or globally to all VLAN interfaces in the same context, use the service-policy command. Use the no form of this command to remove a service policy. service-policy input policy_name no service-policy input policy_name
2-409
Syntax Description
input
Specifies that the traffic policy is to be attached to the input direction of an interface. The traffic policy evaluates all traffic received by that interface. Name of a previously defined policy map, configured with a previously created policy-map command. The name can be a maximum of 64 alphanumeric characters.
policy_name
Command Modes
Command History
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Note the following when creating a service policy:
Policy maps, applied globally in a context, are internally applied on all interfaces existing in the context. You can apply the policy in an input direction only. A policy activated on an interface overwrites any specified global policies for overlapping classification and actions. The ACE allows only one policy of a specific feature type to be activated on a given interface.
Examples
To specify an interface VLAN and apply the Layer 3 and Layer 4 SLB policy map to the VLAN, enter:
host1/C1(config)# interface vlan50 host1/C1(config-if)# mtu 1500 host1/C1(config-if)# ip address 172.20.1.100 255.255.0.0 host1/C1(config-if)# service-policy input L4SLBPOLICY
To globally apply the Layer 3 and Layer 4 SLB policy map to the entire context:
host1/C1(config)# service-policy input L4SLBPOLICY
Related Commands
2-410
OL-25339-01
(config) shared-vlan-hostid
To configure a specific bank of MAC addresses for an ACE, use the shared-vlan-hostid command. Use the no form of this command to remove a configured bank of MAC addresses. shared-vlan-hostid number no shared-vlan-hostid
Syntax Description
number
Bank of MAC addresses that the ACE uses. Enter a number from 1 to 16. Be sure to configure different bank numbers for multiple ACEs.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When contexts share a VLAN, the ACE assigns a different MAC address to the VLAN on each context. The MAC addresses reserved for shared VLANs are 0x001243dc6b00 to 0x001243dcaaff, inclusive. All ACE ACEs derive these addresses from a global pool of 16k MAC addresses. This pool is divided into 16 banks, each containing 1,024 addresses. An ACE supports only 1,024 shared VLANs, and would use only one bank of MAC addresses out of the pool. By default, the bank of MAC addresses that the ACE uses is randomly selected at boot time. However, if you configure two ACE ACEs in the same Layer 2 network and they are using shared VLANs, the ACEs may select the same address bank and use the same MAC addresses. To avoid this conflict, you need to configure the bank that the ACEs will use.
Examples
2-411
Related Commands
Syntax Description
SNMP community name for this system. Enter an unquoted text string with no space and a maximum of 32 alphanumeric characters. (Optional) Identifies the role group to which the user belongs. Enter Network-Monitor, the default group name and the only role that is supported.
Note
Only network monitoring operations are supported through the ACE implementation of SNMP. In this case, all SNMP users are automatically assigned the system-defined default group of Network-Monitor. For details on creating users, see the Virtualization Guide, Cisco ACE Application Control Engine.
ro
Command Modes
Caution
If you change the SNMP engine ID for an Admin or user context, all configured SNMP users become invalid. You must recreate all SNMP users by using the snmp-server community command in configuration mode.
Command History
2-412
OL-25339-01
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create or modify a community, all SNMP devices assigned to that community as members have the same access rights (as described in RFC 2576). The ACE allows read-only access to the MIB tree for devices included in this community. The read-only community string allows a user to read data values, but prevents that user from modifying modify the data. SNMP communities are applicable only for SNMPv1 and SNMPv2c. SNMPv3 requires user configuration information such as specifying the role group that the user belongs to, authentication parameters for the user, authentication password, and message encryption parameters.
Examples
To specify an SNMP community called SNMP_Community1, which is a member of the user group, with read-only access privileges for the community, enter:
host1/Admin(config)# snmp-server community SNMP_Community1 group Network-Monitor
Related Commands
2-413
Syntax Description
contact_information
SNMP contact information for this system. Enter a text string with a maximum of 240 alphanumeric characters, including spaces. If the string contains more than one word, enclose the string in quotation marks ( ). You can include information on how to contact the person; for example, you can include a phone number or an e-mail address.
Command Modes
Command History
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can specify only one contact name per SNMP system.
Examples
Related Commands
2-414
OL-25339-01
Syntax Description
notification_type
(Optional) Type of notification to enable. If no type is specified, the ACE sends all notifications. Specify one of the following keywords:
licenseSends SNMP license manager notifications. This keyword appears only in the Admin context. slbSends server load-balancing notifications. When you specify the slb keyword, you can specify a notification_option value. snmpSends SNMP notifications. When you specify the snmp keyword, you can specify a notification_option value. syslogSends error message notifications (Cisco Syslog MIB). Specify the level of messages to be sent with the logging history command. virtual-contextSends virtual context change notifications. This keyword appears only in the Admin context. When you specify the snmp keyword, specify the authentication, coldstart, linkdown, or linkup keyword to enable SNMP notifications. This selection generates a notification if the community string provided in SNMP request is incorrect, or when a VLAN interface is either up or down. The coldstart keyword appears only in the Admin context. When you specify the slb keyword, specify the real, serverfarm, or vserver keyword to enable server load-balancing notifications. This selection generates a notification if one of the following occurs:
The real server changes state (up or down) due to such
notification_option
server represents the servers behind the content switch in the ACE to the outside world and consists of the following attributes: destination address (can be a range of IP addresses), protocol, destination port, incoming VLAN.
Command Modes
Configuration mode
2-415
Command History
Modification This command was introduced. The serverfarm option was added to this command.
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The notification types used in the snmp-server enable traps command all have an associated MIB object that globally enables or disables them. However, not all of the notification types available in the snmp-server host command have notificationEnable MIB objects, so some of the notification types cannot be controlled using the snmp-server enable traps command. To configure the ACE to send the SNMP notifications, specify at least one snmp-server enable traps command. To enable multiple types of notifications, you must enter a separate snmp-server enable traps command for each notification type and notification option. If you enter the command without any keywords, the ACE enables all notification types and traps. The snmp-server enable traps command is used with the snmp-server host command. The snmp-server host command specifies which host receives the SNMP notifications. To send notifications, you must configure at least one SNMP server host. (ACE appliance only) The supported SNMP notifications (traps) in the CISCO-ENHANCED-SLB-MIB for the serverfarm option are as follows:
esRealServerStateUpRev1 State of a real server configured in a server farm is up due to user intervention.The notification is sent with the following varbinds:
cesRealServerName cesServerFarmRserverBackupPort cesServerFarmName cesServerFarmRserverAdminStatus cesServerFarmRserverOperStatus cesRserverIpAddressType cesRserverIpAddress cesServerFarmRserverDescr
cesRealServerStateDownRev1 State of a real server configured in a server farm is down due to user intervention. The notification is sent with the following varbinds:
cesRealServerName cesServerFarmRserverBackupPort cesServerFarmName cesServerFarmRserverAdminStatus
2-416
OL-25339-01
cesRealServerStateChangeRev1 State of a real server configured in a server farm changed to a new state as a result of something other than a user intervention. This notification is sent for situations such as ARP failures, probe failures, and so on. The notification is sent with the following varbinds:
cesRealServerName cesServerFarmRserverBackupPort cesServerFarmName cesServerFarmRserverAdminStatus cesServerFarmRserverOperStatus cesServerFarmRserverStateDescr cesRserverIpAddressType cesRserverIpAddress cesProbeName cesServerFarmRserverDescr
Examples
To enable the ACE to send server load-balancing traps to the host myhost.cisco.com using the community string public, enter:
host1/Admin(config)# snmp-server host myhost.cisco.com host1/Admin(config)# snmp-server community SNMP_Community1 group Network-Monitor host1/Admin(config)# snmp-server enable traps slb real
Related Commands
2-417
Syntax Description
contact_information
SNMPv3 engine ID that you want to configure. Enter a range of 10 to 64 hexadecimal digits.
Command Modes
Caution
If you change the SNMP engine ID for an Admin or user context, all configured SNMP users become invalid and all SNMP communities are deleted. You must recreate all SNMP users by using the snmp-server user command in configuration mode. You must recreate all SNMP communities by using the snmp-server community command in configuration mode.
Command History
Usage Guidelines
The ACE allows you to configure an SNMP engine ID for the Admin or user context. By default, the ACE automatically creates an SNMP engine ID for the Admin context and each user context. The SNMP engine represents a logically separate SNMP agent. The IP address for an ACE context provides access to only one SNMP engine ID. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
2-418
OL-25339-01
To display the engine ID for a context, use the show snmp engineID command in Exec mode for the context. For example, to display the engine ID for the Admin context, enter:
host1/Admin# show snmp engineID
Related Commands
2-419
Syntax Description
host_address informs
IP address of the host (the targeted recipient). Enter the address in dotted-decimal IP notation (for example, 192.168.11.1). (Optional) Sends SNMP inform requests to the identified host, which allows for manager-to-manager communication. Inform requests can be useful when you need more than one NMS in the network. (Optional) Sends SNMP traps to the identified host. An agent uses a trap to tell the NMS that a problem has occurred. The trap originates from the agent and is sent to the trap destination, as configured within the agent itself. The trap destination is typically the IP address of the NMS. (Optional) Specifies the version of SNMP used to send the traps. SNMPv3 is the most secure model because it allows packet encryption with the priv keyword. Specifies SNMPv1. Specifies SNMPv2C. Specifies SNMPv3.
traps
version
Enables Message Digest 5 (MD5) and Secure Hash Algorithm (SHA) packet authentication. Specifies the noAuthNoPriv security level. Enables Data Encryption Standard (DES) packet encryption (privacy). SNMP community string or username with the notification operation to send. Enter an unquoted text string with no space and a maximum of 32 alphanumeric characters. (Optional) Specifies the port UDP port of the host to use. The default is 162. Enter a number from 0 to 65535.
udp-port number
Command Modes
Command History
2-420
OL-25339-01
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports a maximum of 10 SNMP hosts per context.
Examples
Related Commands
Syntax Description
location
Physical location of the system. Enter a text string with a maximum of 240 alphanumeric characters, including spaces. If the string contains more than one word, enclose the string in quotation marks ( ).
Command Modes
Command History
2-421
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can specify only one location per SNMP system.
Examples
Related Commands
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
2-422
OL-25339-01
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. By default, the ACE sends the Cisco implementation of linkUp and linkDown traps to the NMS. The ACE sends the Cisco Systems IF-MIB variable bindings that consist of ifIndex, ifAdminStatus, ifOperStatus, ifName, ifType, clogOriginID, and clogOriginIDType. You can configure the ACE to send the IETF standards-based implementation for linkUp and linkDown traps (as outlined in RFC 2863). The Cisco var-binds are sent by default. To receive RFC 2863-compliant traps, you must specify the snmp-server trap link ietf command.
Examples
To configure the linkUp and linkDown traps to be compliant with RFC 2863, enter:
host1/Admin(config)# snmp-server trap link ietf
Related Commands
Syntax Description
number
VLAN number of the configured interface. Enter a value from 2 to 4094 for an existing VLAN.
Command Modes
Command History
2-423
Modification You can no longer select the VLAN number of the FT VLAN interface that has been specified between redundant ACE appliances as the trap source address contained in the SNMP v1 trap PDU.
Usage Guidelines
By default, the ACE uses the trap source IP address from the internal routing table, depending on the destination host address, where the ACE will send the notification. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. (ACE appliance only) The ACE restricts you from selecting the VLAN number of the FT VLAN interface that has been specified between redundant ACE appliances as the trap source address contained in the SNMP v1 trap PDU.
Examples
To specify VLAN 50 in the VLAN interface as the source address in the SNMPv1 trap PDUs, enter:
host1/Admin(config)# snmp-server trap-source vlan 50
To remove the specified VLAN as the source address in the SNMPv1 trap PDU and reset the default behavior, enter:
host1/Admin(config)# no snmp-server trap-source
Related Commands
Syntax Description
Command Modes
Command History
2-424
OL-25339-01
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To assign multiple roles to a user, enter multiple snmp-server user commands. You can create a maximum of 28 SNMP users for each context. User configuration through the snmp-server user command is applicable only for SNMPv3; SNMPv1 and SNMPv2c use a community string match for user authentication. The ACE synchronizes the interactions between a user created with the username command and the same user specified using the snmp-server user command; updates made to a user configuration in the ACE CLI are automatically reflected in the SNMP server. For example, when you delete a user, the user is automatically deleted from both the SNMP server and the CLI. In addition, user-role mapping changes are synchronized in SNMP and CLI. Only network monitoring operations are supported through the ACE implementation of SNMP where all SNMP users are automatically assigned to the system-defined default group of Network-Monitor.
Examples
Related Commands
2-425
Syntax Description
user_name group_name
Username. Enter an unquoted text string with no spaces and a maximum of 24 alphanumeric characters.
(Optional) User role group to which the user belongs. Enter Network-Monitor, the default group name and the only role that is supported. Only network monitoring operations are supported through the ACE implementation of SNMP. In this case, all SNMP users are automatically assigned the system-defined default group of Network-Monitor. For details on creating users, see the Virtualization Guide, Cisco ACE Application Control Engine.
Note
(Optional) Sets authentication parameters for the user. Authentication determines that the message is from a valid source. Specifies the HMAC Message Digest 5 (MD5) encryption algorithm for user authentication. Specifies the HMAC Secure Hash Algorithm (SHA) encryption algorithm for user authentication. User authentication password. Enter an unquoted text string with no space and a maximum of 130 alphanumeric characters. The ACE automatically synchronizes the SNMP authentication password as the password for the CLI user. The ACE supports the following special characters in a password: ,./=+-^@!%~#$*() Note that the ACE encrypts clear text passwords in the running-config.
priv
(Optional) Specifies encryption parameters for the user. The priv option and the aes-128 option indicate that this privacy password is for generating a 128-bit AES key. (Optional) Specifies the 128-byte Advanced Encryption Standard (AES) algorithm for privacy. AES is a symmetric cipher algorithm and is one of the privacy protocols for SNMP message encryption. It conforms with RFC 3826. Encryption password for the user. The AES priv password can have a minimum of eight alphanumeric characters. If the passphrases are specified in clear text, you can specify a maximum of 64 alphanumeric characters. If you use the localized key, you can specify a maximum of 130 alphanumeric characters. Spaces are not allowed. The ACE supports the following special characters in a password: ,./=+-^@!%~#$*() Note that the ACE encrypts clear text passwords in the running-config.
aes-128
password2
localizedkey
(Optional) Specifies that the password is in a localized key format for security encryption.
2-426
OL-25339-01
Command Modes
Note
If you change the SNMP engine ID for an Admin or user context, all configured SNMP users become invalid. You must recreate all SNMP users by using the snmp-server user command in configuration mode.
Command History
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To assign multiple roles to a user, enter multiple snmp-server user commands. You can create a maximum of 28 SNMP users for each context. User configuration through the snmp-server user command is applicable only for SNMPv3; SNMPv1 and SNMPv2c use a community string match for user authentication. The ACE synchronizes the interactions between a user created with the username command and the same user specified using the snmp-server user command; updates made to a user configuration in the ACE CLI are automatically reflected in the SNMP server. For example, when you delete a user, the user is automatically deleted from both the SNMP server and the CLI. In addition, user-role mapping changes are synchronized in SNMP and CLI. Only network monitoring operations are supported through the ACE implementation of SNMP where all SNMP users are automatically assigned to the system-defined default group of Network-Monitor.
Examples
Related Commands
2-427
Syntax Description
Generates the DSA key pair for the SSH version 2 protocol. Generates the RSA key pair for the SSH version 2 protocol. Generates the RSA1 key pair for the SSH version 1 protocol. (Optional) Number of bits for the key pair. For DSA, enter an integer from 768 to 2048. For RSA and RSA1, enter an integer from 768 to 4096. The greater the number of bits that you specify, the longer it takes to generate the key. The default is 1024. (Optional) Forces the generation of a DSA or RSA key even when previous keys exist. If the SSH key pair option is already generated for the required version, use the force option to overwrite the previously generated key pair.
force
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Before you generate the key, set the hostname. This setting is used in the generation of the key. The global administrator performs the key generation in the Admin context. All contexts associated with the ACE share the common key. There is only a single host-key pair. If you are the administrator or another user authorized in the Admin context, use the changeto command in exec mode to move to the Admin context. An administrator can perform all allowable functions within the Admin context. Ensure that you have an SSH host key pair with the appropriate version before you enable the SSH service. The SSH service accepts three types of key pairs for use by SSH versions 1 and 2. Generate the SSH host key pair according to the SSH client version used.
2-428
OL-25339-01
Examples
Related Commands
Syntax Description
max_sessions
Maximum number of concurrent SSH sessions allowed for the associated context. The range is from 1 to 4 SSH sessions per user context and from 1 to 16 SSH sessions for the Admin context. The defaults are 4 (user context) and 16 (Admin context).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports a total maximum of 256 concurrent SSH sessions.
2-429
Examples
To set the maximum number of concurrent SSH sessions in the Admin context to 3, enter:
host1/Admin(config)# ssh maxsessions 3
To revert to the default of 16 SSH sessions for the Admin context, enter:
host1/Admin(config)# no ssh maxsessions
Related Commands
Syntax Description
pservice_name
Name of the SSL proxy service. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you create a SSL proxy service, the CLI prompt changes to the ssl-proxy configuration mode, where you define the following SSL proxy service attributes:
2-430
OL-25339-01
For information about the commands in SSL proxy configuration mode, see the SSL Proxy Configuration Mode Commands section.
Examples
Related Commands
(config-ssl-proxy) cert (config-ssl-proxy) authgroup (config-ssl-proxy) chaingroup (config-ssl-proxy) key (config-ssl-proxy) ssl advanced-options
(config) static
(ACE module only) To configure the static NAT overwrite feature, use the static command. This feature allows a maximum number of 400 K static NATs. By default, the ACE allows you to configure a maximum 8 K static NAT configurations. Use the no form of this command to reset the default behavior. static vlan mapped_vlan_id vlan real_vlan_id mapped_ip_address {real_ip_address [netmask mask]} no static vlan mapped_vlan_id vlan real_vlan_id mapped_ip_address {real_ip_address [netmask mask]}
Syntax Description
mapped_vlan_id
The VLAN ID of the interface connected to the mapped IP address network. In a context, the mapped interface must be the same in each static NAT configuration. The VLAN ID of the interface connected to the real IP address network. The translated IP address for the real address. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). In a context, the mapped IP address must be different in each static NAT configuration. The real server IP address for translation. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). In a context, you must configure a different address for configurations that have the same real server interface. (Optional) Specifies the subnet mask for the real server address. Enter a subnet mask in dotted-decimal notation (for example, 255.255.255.0).
real_vlan_id mapped_ip_address
real_ip_address
netmask mask
2-431
Command Modes
Command History
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE creates static connections that contain the NATs as soon as the configuration is applied. Because these connections exist before the packets are received, no ACL is required to permit flows that will be translated. When using the static command, consider the following restrictions:
The ACE supports this configuration only in routed mode. The ACE allows only one mapped interface in a context. However, each static NAT configuration must have a different mapped IP address. The ACE does not support bidirectional NAT, source address and destination address translation for the same flow. You must limit the number of real server IP addresses on the same subnet as the real interface to less than 1 K. Also, limit the number of mapped IP addresses on the same subnet as the mapped interface to less than 1 K. You must not configure more than one next-hop at any point on the mapped interface.
It is not recommended that you configure MPC-based NAT for the same context in which you configure the static command.
Examples
To create a static NAT configuration for the mapped interface VLAN 176, real server interface VLAN 171, and real server IP address of 10.181.0.2 255.255.255.255 to be translated to the mapped address 5.6.7.4, enter:
host1/C1(config)# static vlan 176 vlan 171 5.6.7.4 10.81.0.2 netmask 255.255.255.255
Related Commands
2-432
OL-25339-01
Syntax Description
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in sticky HTTP content configuration mode, see the Sticky HTTP Content Configuration Mode Commands section.
Examples
Related Commands
2-433
Syntax Description
http-cookie name1 Specifies that the ACE learn the cookie value from the HTTP header of the client request or from the Set-Cookie message from the server. Enter a unique identifier for the cookie as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. name2 Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in sticky cookie configuration mode, see the Sticky HTTP Cookie Configuration Mode Commands section.
Examples
2-434
OL-25339-01
Related Commands
2-435
Syntax Description
name1
HTTP header name. Enter the HTTP header name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Alternatively, you can select one of the following standard headers:
Accept Accept-Charset Accept-Encoding Accept-Language Authorization Cache-Control Connection Content-MD5 Expect From Host If-Match Pragma Referer Transfer-Encoding User-Agent Via
See the Server Load-Balancing Guide, Cisco ACE Application Control Engine for a definition of each standard header. name2 Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-436
OL-25339-01
Command History
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in HTTP sticky header configuration mode, see the Sticky HTTP Header Configuration Mode Commands section.
Examples
Related Commands
2-437
Syntax Description
netmask
Network mask that the ACE applies to the IP address. Enter a network mask in dotted-decimal notation (for example, 255.255.255.0). Specifies the IP address used for stickiness. Enter one of the following options after the address keyword:
bothSpecifies that the ACE use both the source IP address and the destination IP address to stick the client to a server. destinationSpecifies that the ACE use the destination address specified in the client request to stick the client to a server. You typically use this keyword in caching environments. sourceSpecifies that the ACE use the client source IP address to stick the client to a server. You typically use this keyword in web application environments.
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-438
OL-25339-01
For information about the commands in sticky IP configuration mode, see the Sticky IP Configuration Mode Commands section.
Examples
To create a sticky group that uses IP address stickiness based on both the source IP address and the destination IP address, enter:
host1/Admin(config)# sticky ip-netmask 255.255.255.0 address both GROUP1 host1/Admin(config-sticky-ip)#
Related Commands
Syntax Description
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-439
To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. You can create a maximum of 4096 sticky groups on an ACE.For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in sticky Layer 4 payload configuration mode, see the Sticky Layer 4 Payload Configuration Mode Commands section.
Examples
Related Commands
Syntax Description
(Optional) Specifies stickiness based on the RADIUS framed IP attribute and the calling station ID attribute. (Optional) Specifies stickiness based on the RADIUS framed IP attribute and the username attribute. Unique identifier of the RADIUS sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-440
OL-25339-01
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. For information about the commands in sticky RADIUS configuration mode, see the Sticky RADIUS Configuration Mode Commands section.
Examples
Related Commands
Syntax Description
name1 name2
RTSP header field. The ACE supports only the RTSP Session header field for stickiness. Enter Session. Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-441
Command History
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports only the RTSP Session header field for stickiness. For information about the commands in RTSP sticky header configuration mode, see the Sticky RTSP Header Configuration Mode Commands section.
Examples
Related Commands
Syntax Description
name1 name2
SIP header field. The ACE supports only the SIP Call-ID header field for stickiness. Enter Call-ID. Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-442
OL-25339-01
Command Modes
Command History
Usage Guidelines
This command requires the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use the stickiness feature, you must allocate a minimum percentage of system resources to stickiness. Otherwise, the feature will not work. For more information about allocating resources, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports only the SIP Call-ID header field for stickiness. For information about the commands in SIP sticky header configuration mode, see the Sticky SIP Header Configuration Mode Commands section.
Examples
Related Commands
(config) switch-mode
To change the way that the ACE handles TCP and UDP connections that are not destined to a particular VIP and those connections that do not have any policies associated with their traffic, use the switch-mode command. When you enable this command, the ACE still creates connection objects for those TCP sessions that are not destined to the VIP. The ACE processes these connections as stateless connections, which means that they do not undergo any TCP normalization checks (for example, TCP window, TCP state, TCP sequence number, and other normalization checks). switch-mode [timout seconds] no switch-mode
2-443
Syntax Description
timeout seconds
Length of time in seconds that the ACE waits before removing the switch mode connection. Enter an integer from 0 to 1440 (24 hours). The default is 0.
Command Modes
Command History
Modification This command was introduced. The timeout option was added.
Usage Guidelines
If you configure switch mode and you configure any connection parameter-map commands (for example, set tcp buffer-share, rate-limit, exceed-mss, nagle, random-sequence-number, reserved-bits, set tcp wan-optimization, timeout inactivity, slowstart, and so on) either locally on a specific interface or globally on all interfaces, switch mode will override these commands for certain types of traffic. This behavior applies only to non-VIP, non-inspection, non-NATed, and non-management traffic. The ACE continues to apply local, global, and VIP-specific connection parameter maps to load-balanced (VIP), inspected, NATed, and management traffic. For details about switch mode, see the Parameter Map Connection Configuration Mode Commands section.
Examples
To enable the switch mode feature with a timeout of 300 seconds (5 minutes), enter the following command:
host1/Admin(config)# switch-mode timeout 300
To reset the switch-mode timeout to the default value of 8100 seconds after you have enabled switch mode and configured a timeout, enter the following command:
host1/Admin(config)# switch-mode
Related Commands
2-444
OL-25339-01
Syntax Description
minutes
Length of time in minutes that the ACE skips a nonresponsive TACACS+ server for transaction requests. Enter an integer from 0 to 1440 (24 hours). The default is 0.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The dead-time interval starts when the server does not respond to an authentication request transmission. When the server responds to a probe access-request packet, the ACE retransmits the authentication request to the server. Using this command causes the ACE to mark as dead any TACACS+ servers that fail to respond to authentication requests. This action avoids the wait for the request to time out before trying the next configured server. The ACE skips a TACACS+ server that is marked as dead by additional requests for the duration of minutes.
Examples
To globally configure a 15-minute dead time for TACACS+ servers that fail to respond to authentication requests, enter:
host1/Admin(config)# tacacs-server deadtime 15
2-445
Related Commands
Syntax Description
IP address for the TACACS+ server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1). (Optional) Enables an authentication key for communication between the ACE and the daemon running on the TACACS+ server. (Optional) Configures a key specified in clear text (indicated by 0) to authenticate communication between the TACACS+ client and server. (Optional) Configures a key specified in encrypted text (indicated by 7) to authenticate communication between the TACACS+ client and server. Key used to authenticate communication between the TACACS+ client and server. The shared secret must match the one configured on the TACACS+ server. Enter the shared secret as a case-sensitive string with no spaces with a maximum of 63 alphanumeric characters. (Optional) Specifies the TCP destination port for communicating authentication requests to the TACACS+ server. By default, the TACACS+ authentication port is 1812 (as defined in RFC 2138 and RFC 2139). If your TACACS+ server uses a port other than 1812, use the port keyword to configure the ACE for the appropriate port before starting the TACACS+ service. The port_number argument specifies the TACACS+ port number. Enter an integer from 1 to 65535. (Optional) Specifies the time interval that the ACE waits for the TACACS+ server to reply to an authentication request. Enter an integer from 1 to 60. The default is 1 second.
port port_number
timeout seconds
Command Modes
Command History
2-446
OL-25339-01
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The key shared_secret text string must match the encryption key used on the TACACS+ server. This key overrides the global setting of the (config) tacacs-server key command. If you do not specify a key, the global value is used. TACACS+ keys are always stored in encrypted form in persistent storage. The running configuration also displays keys in encrypted form. For the specified server, the timeout keyword used with the tacacs-server host command overrides the global setting assigned using the (config) tacacs-server timeout command. By default, the ACE waits 1 second for the TACACS+ server to reply to an authentication request before it declares a timeout and attempts to contact the next server in the group. If all servers in the group are unavailable for authentication and accounting, the ACE tries the local database if you configure the database as the local fallback method by entering the (config) aaa authentication login or the (config) aaa accounting default command.
Examples
Related Commands
2-447
Syntax Description
0 7 shared_secret
(Optional) Configures a key specified in clear text (indicated by 0) to authenticate communication between the TACACS+ client and server. (Optional) Configures a key specified in encrypted text (indicated by 7) to authenticate communication between the TACACS+ client and server. Key used to authenticate communication between the TACACS+ client and server. The shared secret must match the one configured on the TACACS+ server. Enter the shared secret as a case-sensitive string with no spaces with a maximum of 63 alphanumeric characters or you can include spaces if you enclose the entire key with quotation marks (for example, my key). (Optional) Globally configures the time interval that the ACE waits for the TACACS+ server to reply before retransmitting an authentication request to the TACACS+ server. The seconds argument is the timeout value in seconds. Valid entries are from 1 to 60 seconds. By default, the ACE waits 1 second to receive a response from a TACACS+ server before it declares a timeout failure and attempts to contact the next server in the group. This option configures the same time interval as the tacacs-server timeout command.
timeout seconds
Command Modes
Command History
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The key is a text string that must match the encryption key used on the TACACS+ server. TACACS+ keys are always stored in encrypted form in persistent storage on the ACE. This global key will be applied to those TACACS+ servers in a named server group for which a shared secret is not individually configured using the (config) tacacs-server host command.
2-448
OL-25339-01
Examples
To globally configure an authentication key in encrypted text (indicated by 7) to authenticate communication between the TACACS+ client and server, enter:
host1/Admin(config)# tacacs-server key 7 abe4DFeeweo00o
Related Commands
Syntax Description
seconds
Timeout value in seconds. Valid entries are from 1 to 60 seconds. The default is 1 second.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-449
Examples
Related Commands
2-450
OL-25339-01
Syntax Description
sessions
Maximum number of concurrent Telnet sessions allowed for the associated context. The range is from 1 to 4 Telnet sessions per user context and from 1 to 16 Telnet sessions for the Admin context. The defaults are 4 (user context) and 16 (Admin context).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports a total maximum of 256 concurrent Telnet sessions.
Examples
To set the maximum number of concurrent Telnet sessions to 3 in the Admin context, enter:
host1/Admin(config)# telnet maxsessions 3
To revert to the default of 16 Telnet sessions for the Admin context, enter:
host1/Admin(config)# no telnet maxsessions
Related Commands
2-451
Syntax Description
seconds
Time in seconds that the ACE waits to free the Xlate slot after it becomes idle. Enter an integer from 60 to 2147483. The default is 10800 seconds (3 hours).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To reset the NAT idle timeout to the default value of 10800 seconds (3 hours), enter:
host1/Admin(config)# no timeout xlate
Related Commands
2-452
OL-25339-01
(config) udp
(ACE module only) To configure the UDP booster feature, use the udp command. Use this feature when your application requires very high UDP connection rates. Use the no form of this command to disable the UDP booster feature. udp {ip-source-hash | ip-destination-hash} no udp
Syntax Description
ip-source-hash
Instructs the ACE to hash the source IP address of UDP packets that hit a source-hash VLAN interface prior to performing a connection match. Configure this keyword on a client-side interface. Instructs the ACE to hash the destination IP address of UDP packets that hit a destination-hash VLAN interface prior to performing a connection match. Configure this keyword on a server-side interface.
ip-destination-hash
Command Modes
Command History
Usage Guidelines
This command requires the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To use this feature, you must configure both keywords on the appropriate interfaces, and configure standard load balancing on the ACE. For details about configuring load balancing and more information about this command, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. We recommend that you do not configure this feature with per-packet UDP load balancing (also called UDP fast-age) using the (config-pmap-c) loadbalance vip udp-fast-age command. Otherwise, unexpected results may occur. To configure the UDP booster feature on a the ACE, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# udp ip-source-hash host1/Admin(config-if)# exit host1/Admin(config)# interface vlan 200 host1/Admin(config-if)# udp ip-destination-hash
Related Commands
2-453
(config) username
To change the default username and password, use the username command. Use the no form of this command to remove the username from the configuration. username name1 [password [0 | 5] password] [expire date] [role name2] [domain name3 name4 . . . namen] no username name1 [password [0 | 5] password] [expire date] [role name2] [domain name3 name4 . . . namen]
Syntax Description
name1
Identifier of the user that you are creating. Enter an unquoted text string with no spaces and a maximum of 24 alphanumeric characters. The ACE supports the following non-alphanumeric characters in a username: -_@\ The ACE does not support the following characters: $/;!#
Note
The . character is not supported on the local database but a username with this character is authenticated when it is configured on an ACS server.
password 0 5 password
(Optional) Indicates that a password follows. (Optional) Specifies a clear text password. (Optional) Specifies an MD5-hashed strong encryption password. Password in clear text, encrypted text, or MD5 strong encryption, depending on the numbered option that you enter. If you do not enter a numbered option, the password is in clear text by default. If you enter the password keyword, you must enter a password. Enter a password as an unquoted text string with a maximum of 64 alphanumeric characters. The ACE supports the following special characters in a password: ,./=+-^@!%~#$*() Note that the ACE encrypts clear text passwords in the running-config.
expire date
(Optional) Specifies the expiration date of the user account. Enter the expiration date in the format yyyy-mm-dd. Be aware that the ACE applies the configured UTC offset to this date. (Optional) Specifies an existing role that you want to assign to the user. (Optional) Specifies the domains in which the user can operate. You can enter multiple domain names up to a maximum of 10, including default-domain.
Command Modes
2-454
OL-25339-01
Command History
Usage Guidelines
This command requires the context Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE creates the following default user accounts at startup:
The admin user is the global administrator and cannot be deleted. (ACE appliance only) The dm user is for accessing the Device Manager GUI and cannot be deleted. The dm user is an internal user required by the Device Manager GUI; it is hidden on the ACE CLI.
Note
Do not modify the dm user password from the ACE CLI. If the password is changed, the Device Manager GUI will become inoperative. If this occurs, restart the Device Manager using the dm reload command (you must be the global administrator to access the dm reload command). Note that restarting the Device Manager does not impact ACE functionality; however, it may take a few minutes for the Device Manager to reinitialize as it reads the ACE CLI configuration. The www user account is used by the ACE for the XML interface.
If you do not assign a role to a new user, the default role is Network-Monitor. For users that you create in the Admin context, the default scope of access is the entire device. For users that you create in other contexts, the default scope of access is the entire context. If you need to restrict a users access, you must assign a role-domain pair. For more information about creating users, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-455
(config) vm-controller
To configure the VM controller (vCenter) that the ACE queries for VM load information for the dynamic workload scaling (DWS) feature, use the vm-controller command. Use the no form of this command to remove the username from the configuration. vm-controller name no vm-controller name
Syntax Description
name
Name of an existing VM controller (vCenter) that the ACE queries for VM load information. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show vm-controller
2-456
OL-25339-01
Syntax Description
name
Unique name for the action list. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-457
(config-actlist-modify) description
(ACE appliance only) To add a description about the action list, use the description command. Use the no form of this command to remove the description from the action list. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
After you create an action list and associate actions with it, you must associate the action list with a Layer 7 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show action-list
2-458
OL-25339-01
Syntax Description
Specifies that the ACE delete the header from HTTP request packets from clients. Specifies that the ACE delete the header from HTTP response packets from servers. Specifies that the ACE delete the header from both HTTP request packets and response packets. Identifier of the HTTP header that you want to delete. Enter an unquoted text string with a maximum of 255 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
After you create an action list and associate actions with it, you must associate the action list with a Layer 7 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To remove the header delete action from the action list, enter:
host1/Admin(config-actlist-modify)# no header delete request Host
Related Commands
2-459
2-460
OL-25339-01
Syntax Description
Specifies that the ACE insert an HTTP header in HTTP request packets from clients. Specifies that the ACE insert an HTTP header in HTTP response packets from servers. Specifies that the ACE insert an HTTP header in both HTTP request packets and response packets. Identifier of an HTTP header. Enter an unquoted text string with a maximum of 255 alphanumeric characters. Specifies the value of the HTTP header that you want to insert in request packets, response packets, or both. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can also use the following dynamic replacement strings:
%isInsert the source IP address in the HTTP header. %idInsert the destination IP address in the HTTP header. %psInsert the source port in the HTTP header. %pdInsert the destination port in the HTTP header.
Command Modes
Command History
2-461
Usage Guidelines
After you create an action list and associate actions with it, you must associate the action list with a Layer 7 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. With either TCP server reuse or persistence rebalance enabled, the ACE inserts a header in every client request. For information about TCP server reuse, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To include a header insert action for both request and response packets in an action list, enter:
host1/Admin(config)# action-list type modify http HTTP_MODIFY_ACTLIST host1/Admin(config-actlist-modify)# header insert both Host header-value www.cisco.com
Related Commands
(config) action-list type modify http (config-actlist-modify) header delete (config-actlist-modify) header rewrite (config-actlist-modify) ssl header-insert
Syntax Description
Specifies that the ACE rewrite an HTTP header string in HTTP request packets from clients. Specifies that the ACE rewrite an HTTP header string in HTTP response packets from servers. Specifies that the ACE rewrite an HTTP header string in both HTTP request packets and response packets. Identifier of the HTTP header that you want to rewrite. Enter an unquoted text string with a maximum of 255 alphanumeric characters.
2-462
OL-25339-01
header-value expression
Specifies the value of the HTTP header that you want to replace in request packets, response packets, or both. Enter a text string from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching data strings. Use parenthesized expressions for dynamic replacement using %1 and %2 in the replacement pattern.
Note
When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
replace pattern
Specifies the pattern string that you want to substitute for the header value regular expression. For dynamic replacement of the first and second parenthesized expressions from the header value, use %1 and %2, respectively.
Command Modes
Command History
Usage Guidelines
After you create an action list and associate actions with it, you must associate the action list with a Layer 7 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To include a header replace action for HTTP request packets in an action list, enter:
host1/Admin(config)# action-list type modify http HTTP_MODIFY_ACTLIST host1/Admin(config-actlist-modify)# header rewrite request Host header-value www.cisco.com replace ?
Related Commands
(config) action-list type modify http (config-actlist-modify) header delete (config-actlist-modify) header insert
2-463
Session ParametersSSL session parameters that the ACE and client negotiate during the SSL handshake. Server Certificate FieldsInformation regarding the SSL server certificate that resides on the ACE. Client Certificate FieldsInformation regarding the SSL client certificate that the ACE retrieves from the client when you configure the ACE to perform client authentication.
Use the no form of this command to remove the HTTP header insert information. ssl header-insert {client-cert specific_field | server-cert specific_field | session specific_field} [prefix prefix_string | rename new_field_name] no ssl header-insert {client-cert specific_field | server-cert specific_field | session specific_field} [prefix prefix_string | rename new_field_name]
Syntax Description
Specifies a client certificate (ClientCert) field name to insert into the HTTP header. See Table 1-6 for a list of the valid client certificate field names. Specifies a server certificate (ServerCert) field name to insert into the HTTP header. See Table 1-7 for a list of the valid server certificate field names. Specifies a session field name to insert into the HTTP header. See Table 1-8 for a list of the valid session field names.
prefix prefix_string (Optional) Inserts a prefix string before the specified field name. For example, if you specify the prefix Acme-SSL for the Authority-Key-Id server certificate field, then the ACE adds the field name as Acme-SSL-ServerCert-Authority-Key-Id. Enter a quoted text string. The maximum combined number of prefix string and field name characters that the ACE permits is 32. rename new_field_name (Optional) Assigns a new name to the specified field name. Enter an unquoted text string with no spaces. The maximum combined number of field name and prefix string characters that the ACE permits is 32.
2-464
OL-25339-01
Table 1-6 lists the supported SSL client certificate fields. Depending on how the certificate was generated and what key algorithm was used, all of these fields may not be present for the certificate.
Table 1-6 SSL Session Information: SSL Client Certificate Fields
Description X.509 authority key identifier. Format: ASCII string of hexadecimal bytes separated by colons for the X.509 version 3 Authority Key Identifier. Example: ClientCert-Authority-Key-Identifier: 16:13:15:97:FD:8E:16:B9:D2:99
Basic-Constraints
X.509 basic constraints. Format: String that indicates if the certificate subject can act as a certificate authority. Possible values are CA=TRUE or CA=FALSE basic constraints. Example: ClientCert-Basic-Constraints: CA=TRUE
Certificate-Version
X.509 certificate version. Format: Numerical X.509 version (3, 2, or 1), followed by the ASN.1 defined value for X.509 version (2, 1, or 0) in parentheses. Example: ClientCert-Certificate-Version: 3 (0x2)
Data-Signature-Algorithm X.509 hashing and encryption method. Format: md5WithRSAEncryption, sha1WithRSAEncryption, or dsaWithSHA1 algorithm used to sign the certificate and algorithm parameters. Example: ClientCert-Signature-Algorithm: md5WithRSAEncryption Fingerprint SHA1 hash of the certificate. Format: ASCII string of hexadecimal bytes separated by colons. Example: ClientCert-Fingerprint: 64:75:CE:AD:9B:71:AC:25:ED:FE:DB:C7:4B:D4:1:BA Issuer X.509 certificate issuer's distinguished name. Format: String of characters representing the certificate authority that issued the certificate. Example: ClientCert-Issuer: CN=Example CA, ST=Virginia, C=US/[email protected], 0=Root Issuer-CN X.509 certificate issuer's common name. Format: String of characters representing the common name of the certificate issuer. Example: ClientCert-Issuer-CN: www.exampleca.com Not-After Date after which the certificate is not valid. Format: Universal time string or generalized time string in the Not After date of the Validity field. Example: ClientCert-Not-After: Dec 12 22:45:13 2014 GMT
2-465
Table 1-6
Description Date before which the certificate is not valid. Format: Universal time string or generalized time string in the Not Before date of the Validity field. Example: ClientCert-Not-Before: Dec 12 22:45:13 2011 GMT
Public-Key-Algorithm
Algorithm used for the public key. Format: rsaEncryption, rsa, or dsaEncryption public key algorithm used to create the public key in the certificate. Example: ClientCert-Public-Key-Algorithm: rsaEncryption
RSA-Modulus
RSA algorithm modulus. Format: RSA algorithm modulus (n) printed in big-endian format hexadecimal, without leading 0x, and lowercase alphanumeric characters separated by a colon (:) character. Together with the exponent (e), this modulus forms the public key portion in the RSA certificate Example: ClientCert-RSA-Modulus: +00:d8:1b:94:de:52:a1:20:51:b1:77
RSA-Exponent
Public RSA exponent. Format: Printed as a whole integer for the RSA algorithm exponent (e). Example: ClientCert-RSA-Exponent: 65537
RSA-Modulus-Size
Size of the RSA public key. Format: Number of bits as a whole integer of the RSA modulus (typically 512, 1024, or 2048) followed by the word bit. Example: ClientCert-RSA-Modulus-Size: 1024 bit
Serial-Number
Certificate serial number. Format: Whole integer value assigned by the certificate authority; this can be any arbitrary integer value. Example: ClientCert-Serial-Number: 2
Signature
Certificate signature. Format: Secure hash of the other fields in the certificate and a digital signature of the hash printed in big-endian format hexadecimal, without leading 0x, and lowercase alphanumeric characters separated by a colon (:) character. Example: ClientCert-Signature: 33:75:8e:a4:05:92:65
Signature-Algorithm
Certificate signature algorithm. Format: md5WithRSAEncryption, sha1WithRSAEncryption, or dsaWithSHA1 for the secure hash algorithm. Example: ClientCert-Signature-Algorithm: md5WithRSAEncryption
2-466
OL-25339-01
Table 1-6
Description X.509 subject's distinguished name. Format: String of characters representing the subject that owns the private key being certified. Example: ClientCert-Subject: CN=Example, ST=Virginia, C=US/[email protected], 0=Root
Subject-CN
X.509 subject's common name. Format: String of characters that represent the common name of the subject to whom the certificate has been issued. Example: ClientCert-Subject-CN: www.cisco.com
Subject-Key-Identifier
X.509 subject key identifier. Format: ASCII string of hexadecimal bytes separated by colons for the X.509 version 3 subject key identifier. Example: ClientCert-Subject-Key-Identifier: 16:13:15:97:FD:8E:16:B9:D2:99
Table 1-7 lists the supported SSL server certificate fields. Depending on how the certificate was generated and what key algorithm was used, all of these fields may not be present for the certificate.
Table 1-7 SSL Session Information: Server Certificate Fields
Description X.509 authority key identifier. Format: ASCII string of hex bytes separated by colons for the X.509 version 3 Authority Key Identifier. Example: ServerCert-Authority-Key-Identifier:16:13:15:97:FD:8E:16:B9:D2: 99
Basic-Constraints
X.509 basic constraints. Format: String listing whether the certificate subject can act as a certificate authority. Possible values are CA=TRUE or CA=FALSE. Example: ServerCert-Basic-Constraints: CA=TRUE
Certificate-Version
X.509 certificate version. Format: Numerical X.509 version (3, 2, or 1), followed by the ASN.1 defined value for X.509 version (2, 1, or 0) in parentheses. Example: ServerCert-Certificate-Version: 3 (0x2)
Data-Signature-Alg
X.509 hashing and encryption method. Format: md5WithRSAEncryption, sha1WithRSAEncryption, or dsaWithSHA1 algorithm used to sign the certificate and algorithm parameters. Example: ServerCert-Signature-Algorithm: md5WithRSAEncryption
2-467
Table 1-7
Description SHA1 hash output of the certificate. Format: ASCII string of hexadecimal bytes separated by colons. Example: ServerCert-Fingerprint: 64:75:CE:AD:9B:71:AC:25:ED:FE:DB:C7:4B:D4:1A:BA
Issuer
X.509 certificate issuer's distinguished name. Format: String of characters representing the certificate authority that issued this certificate. Example: ServerCert-Issuer: CN=Example CA, ST=Virginia, C=US/[email protected], 0=Root
Issuer-CN
X.509 certificate issuers common name. Format: String of characters representing the common name of the certificate issuer. Example: ServerCert-Issuer-CN: www.exampleca.com
Not-After
Date after which the certificate is not valid. Format: Universal time string or generalized time string in the Not After date of the Validity field. Example: ServerCert-Not-After: Dec 12 22:45:13 2014 GMT
Not-Before
Date before which the certificate is not valid. Format: Universal time string or generalized time string in the Not Before date of the Validity field. Example: ServerCert-Not-Before: Dec 12 22:45:13 2011 GMT
Public-Key-Algorithm
Algorithm used for the public key. Format: rsaEncryption, rsa, or dsaEncryption public key algorithm used to create the public key in the certificate. Example: ServerCert-Public-Key-Algorithm: rsaEncryption
RSA-Exponent
Public RSA exponent. Format: Whole integer representing the RSA algorithm exponent (e). Example: ServerCert-RSA-Exponent: 65537
RSA-Modulus
RSA algorithm modulus. Format: RSA algorithm modulus (n) printed in big-endian format hexadecimal, without leading 0x, and lowercase alphanumeric characters separated by a colon (:) character. Together with the exponent (e), this modulus forms the public key portion in the RSA certificate. Example: ServerCert-RSA-Modulus: + 00:d8:1b:94:de:52:a1:20:51: b1:77
2-468
OL-25339-01
Table 1-7
Description Size of the RSA public key. Format: Number of bits as a whole integer of the RSA modulus (typically 512, 1024, or 2048), followed by the word bit. Example: ServerCert-RSA-Modulus-Size: 1024 bit
Serial-Number
Certificate serial number. Format: Whole integer value assigned by the certificate authority; this can be any arbitrary integer value. Example: ServerCert-Serial-Number: 2
Signature
Certificate signature. Format: Secure hash of the other fields in the certificate and a digital signature of the hash printed in big-endian format hexadecimal, without leading 0x, and lowercase alphanumeric characters and separated by a colon (:) character. Example: ServerCert-Signature: 33:75:8e:a4:05:92:65
Signature-Algorithm
Certificate signature algorithm. Format: md5WithRSAEncryption, sha1WithRSAEncryption, or dsaWithSHA1 for the secure hash algorithm. Example: ServerCert-Signature-Algorithm: nmd5WithRSAEncryption
Subject
X.509 subject's distinguished name. Format: String of characters representing the subject that owns the private key being certified. Example: ServerCert-Subject: CN=Example, ST=Virginia, C=US/[email protected], 0=Root
Subject-CN
X.509 subject's common name. Format: String of characters that represents the common name of the certificate issuer. Example: ServerCert-Subject-CN: CN=Example, ST=Virginia, C=US/[email protected], 0=Root
Subject-Key-Id
X.509 subject key identifier. Format: ASCII string of hexadecimal bytes separated by colons for the X.509 version 3 subject key identifier. Example: ServerCert-Subject-Key-Identifier: 16:13:15:97: FD:8E:16:B9:D2:99
2-469
Description Symmetric cipher key size. Format: Whole integer that specifies the length in bytes of the public key. Example: Session-Cipher-Key-Size: 32
Cipher-Name
Symmetric cipher suite name. Format: OpenSSL version name of the cipher suite negotiated during the session. Example: Session-Cipher-Name: EXP1024-RC4-SHA
Cipher-Use-Size
Symmetric cipher use size. Format: Whole integer that specifies the length in bytes of the key used for symmetric encryption during this session. Example: Session-Cipher-Use-Size: 7
Id
SSL Session ID. The default is 0. Format: 32-byte session ID negotiated during this session if a session ID is or has been negotiated, printed in big-endian format; hexadecimal without leading 0x and lowercase alphanumeric characters separated by a colon (:). Example: Session-Id: 75:45:62:cf:ee:71:de:ad:be:ef:00:33:ee:23:89: 25:75:45:62:cf:ee:71:de:ad:be:ef:00:33:ee:23:89:25
Protocol-Version
Version of SSL or TLS. Format: String that indicates whether SSL or TLS protocol is used followed by a version number. Example: Session-Protocol-Version: TLSv1
2-470
OL-25339-01
Table 1-8
Description Use of SGC or StepUp cryptography. Format: String (yes/no) that indicates whether or not the ACE used Server Gated Cryptography (SGC) or StepUp cryptography to increase the level of security by using 128-bit encryption. Example: Session-Step-Up: YES
Verify-Result
SSL session verify result. Format: String value that indicates the SSL session verify result. Possible values are as follows:
okThe SSL session is established. certificate is not yet validThe client certificate is not yet valid. certificate is expiredThe client certificate has expired. bad key sizeThe client certificate has a bad key size. invalid not before fieldThe client certificate notBefore field is in an unrecognized format. invalid not after fieldThe client certificate notAfter field is in an unrecognized format. certificate has unknown issuerThe client certificate issuer is unknown. certificate has bad signatureThe client certificate contains a bad signature. certificate has bad leaf signatureThe client certificate contains a bad leaf signature. unable to decode issuer public keyThe ACE is unable to decode the issuer public key. unsupported certificateThe client certificate is not supported. certificate revoked The client certificate has been revoked. internal errorAn internal error exists.
Example: Session-Verify-Result: ok
Command Modes
Command History
2-471
Usage Guidelines
When you instruct the ACE to insert SSL session information, by default the ACE inserts the HTTP header information into the first HTTP request only that it receives over the client connection. When the ACE and client need to renegotiate their connection, the ACE updates the HTTP header information that it send to the server to reflect the new session parameters. You can also instruct the ACE to insert the session information into every HTTP request that it receives over the connection by creating an HTTP parameter map with either the header modify per-request or persistence-rebalance command enabled. You then reference the parameter map in the policy map that the ACE applies to the traffic. For information about creating an HTTP parameter map, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. To prevent HTTP header spoofing, the ACE deletes any incoming HTTP headers that match one of the headers that it is going to insert into the HTTP request. The maximum amount of data that the ACE can insert is 512 bytes. The ACE truncates the data if it exceeds this limit.
Examples
To insert the client certificate Serial_Number field and rename it Client-Serial-Number, enter:
host1/Admin(config-actlist-modify)# ssl header-insert client-cert Serial-Number rename Client-Serial-Number
Related Commands
show stats (config) action-list type modify http (config-actlist-modify) header insert
2-472
OL-25339-01
Syntax Description
location expression Specifies the rewriting of the URL in the Location response header based on a URL regular expression match. If the URL in the Location header matches the URL regular expression string that you specify, the ACE rewrites the URL from http:// to https:// and rewrites the port number. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching data strings.
Note
When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
clearport number1 (Optional) Specifies the clear port number to which the ACE translates the SSL port number before sending a server redirect response to the client. Enter an integer from 1 to 65535. The default is 80. sslport number (Optional) Specifies the SSL port number from which the ACE translates a clear port number before sending the server redirect response to the client. Enter an integer from 1 to 65535. The default is 443.
Command Modes
Command History
2-473
Usage Guidelines
After you create an action list and configure an HTTP redirect URL for SSL, you must associate the action list with a Layer 3 and Layer 4 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify SSL URL rewrite using the default SSL port of 443 and clear port of 80, enter:
host1/Admin(config)# action-list type modify http HTTP_MODIFY_ACTLIST host1/Admin(config-actlist-modify)# ssl url rewrite location www\.website\.com
In this case, the ACE rewrites all HTTP redirects to http://www.website.com/ as https://www.website.com/ and forwards them to the client.
Related Commands
Syntax Description
list_name
Name assigned to the action list. Enter a unique name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-474
OL-25339-01
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The action-list type command allows you to configure a series of statements. An action list groups a series of individual functions that apply to a specific type of application acceleration and optimization operation. After you enter this command, the system enters the corresponding action list configuration mode. After you configure the action list, you associate it with a specific statement in a Layer 7 HTTP optimization policy map. The Layer 7 optimization HTTP policy map activates an optimization HTTP action list that allows you to configure the specified optimization actions.
Examples
Related Commands
(config-actlist-optm) appscope
(ACE appliance only) To enable AppScope performance monitoring by the optional Cisco AVS 3180A Management Station for use with the ACE, use the appscope command. Use the no form of this command to disable the AppScope function from the action list. appscope no appscope
Syntax Description
Command Modes
Command History
2-475
Usage Guidelines
The statistical log contains an entry for each ACE optimization request to the server and is used for statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical log and sends it to the Cisco AVS 3180A Management Station for loading into the database. For details about the use of the Cisco AVS 3180A Management Station for database, management, and reporting features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide. To control the AppScope features that measure application acceleration and optimization performance, use the appscope commands in parameter map optimization configuration mode. See the Parameter Map Optimization Configuration Mode Commands section for details. To specify the host (the syslog server on the Management Station) that receives the syslog messages sent by the ACE, use the logging host configuration command. See the (config) logging host command. This command allows you to identify the IP address of the Management Station that will be used as the syslog server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples
Related Commands
(config) logging host (config-parammap-optmz) appscope optimize-rate-percent (config-parammap-optmz) parameter-summary parameter-value-limit (config-parammap-optmz) request-grouping-string
(config-actlist-optm) cache
(ACE appliance only) To enable cache optimization for the corresponding URLs, use the cache command. Use the no form of this command to disable the cache function from the action list. cache {dynamic | forward | forward-with-wait} no cache {dynamic | forward | forward-with-wait} Syntax Description dynamic Enables Adaptive Dynamic Caching for the corresponding URLs, even if the expiration settings in the response indicate that the content is dynamic. The expiration of cache objects is controlled by the cache expiration settings based on the time or server load (performance assurance).
2-476
OL-25339-01
forward
Enables the cache forward feature for the corresponding URLs. This keyword allows the ACE to serve the object from its cache (static or dynamic) even when the object has expired if the maximum cache TTL time period has not yet expired (set using the cache ttl command in parameter map optimization mode). At the same time, the ACE sends an asynchronous request to the origin server to refresh its cache of the object. Enables the cache forward with wait feature for the corresponding URLs. If the object has expired but the maximum cache TTL time period has not expired (set using the cache ttl command in parameter map optimization mode), the ACE sends a request to the origin server for the object. The rest of the users requesting this page will still continue to receive the content from the cache during this time. When the fresh object is returned, it is sent to the requesting user and the cache is also updated. This keyword is similar to the forward keyword, except that a single user must wait for the object to be updated before the request is satisfied. This keyword is useful in situations where you are unable to specify the forward keyword because the application requires a context for processing and an asynchronous update process is not appropriate.
forward-withwait
Command Modes
Command History
Usage Guidelines
You define the ACE cache object key, cache freshness, and cache request/response policy settings by configuring the cache and cache-policy commands in parameter map optimization configuration mode. See Parameter Map Optimization Configuration Mode Commands section for details. The ACE restricts you from enabling Adaptive Dynamic Caching if you have previously specified either the delta command (see (config-actlist-optm) delta) or the dynamic etag command (see (config-actlist-optm) dynamic etag).
Examples
For example, to enable the cache forward feature for the corresponding URLs, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1 host1/Admin(config-actlist-optm)# cache forward
Related Commands
(config-parammap-optmz) cache key-modifier (config-parammap-optmz) cache parameter (config-parammap-optmz) cache ttl (config-parammap-optmz) cache-policy request (config-parammap-optmz) cache-policy response
2-477
(config-actlist-optm) delta
(ACE appliance only) To enable delta optimization to condense corresponding URLs, use the delta command. Use the no form of this command to disable delta optimization from the action list. delta no delta
Syntax Description
Command Modes
Command History
Usage Guidelines
The ACE restricts you from enabling delta optimization if you have previously specified either the cache dynamic command (see (config-actlist-optm) cache) or the dynamic etag command (see (config-actlist-optm) dynamic etag). For example, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1 host1/Admin(config-actlist-optm)# delta
Examples
Related Commands
(config-parammap-optmz) delta
2-478
OL-25339-01
(config-actlist-optm) description
(ACE appliance only) To add a description about the action list, use the description command. Use the no form of this command to remove the description from the action list. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
After you create an action list and associate actions with it, you must associate the action list with a Layer 7 policy map. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show action-list
2-479
Syntax Description
Command Modes
Command History
Usage Guidelines
The ACE restricts you from enabling just-in-time object acceleration if you have previously specified either the cache dynamic command (see (config-actlist-optm) cache) or the delta command (see (config-actlist-optm) delta). For example, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1 host1/Admin(config-actlist-optm)# dynamic etag
Examples
Related Commands
2-480
OL-25339-01
(config-actlist-optm) flashforward
(ACE Appliance only) To enable FlashForward for the corresponding URLs and to transform embedded objects, use the flashforward command. Use the no form of this command to disable FlashForward from the action list. flashforward no flashforward
Syntax Description
Command Modes
Command History
Usage Guidelines
The flashforward and flashforward-object commands cannot be configured in the same optimization action list; these two commands are mutually exclusive. For example, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1 host1/Admin(config-actlist-optm)# flashforward
Examples
Related Commands
(config-actlist-optm) flashforward-object
(ACE appliance only) To enable FlashForward static caching for the corresponding URLs, use the flashforward-object command. Use the no form of this command to disable FlashForward static caching from the action list. flashforward-object no flashforward-object
Syntax Description
Command Modes
2-481
Admin and user contexts Command History ACE Appliance Release A1(7) Modification This command was introduced.
Usage Guidelines
The flashforward-object and flashforward commands cannot be configured in the same optimization action list; these two commands are mutually exclusive. For example, enter:
host1/Admin(config)# action-list type optimization http ACT_LIST1 host1/Admin(config-actlist-optm)# flashforward-object
Examples
Related Commands
2-482
OL-25339-01
Syntax Description
group_name
Name that you assign to the certificate authentication group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. During the flow of a normal SSL handshake, the server send its certificate to the client. The client verifies the identity of the server through the certificate. However, the client does not send any identification of its own to the server. When the client authentication feature is enabled on the ACE, it requires that the client send a certificate to the server. On the ACE, you can implement a group of certificates that are trusted as certificate signers by creating an authentication group.
Examples
Related Commands
2-483
(config-authgroup) cert
To add certificate files to the authentication group, use the cert command. You can configure an authentication group with up to ten certificates. Use the no form of this command to remove a certificate file from the authentication group. cert cert_filename no cert cert_filename
Syntax Description
cert_filename
Name of an existing certificate file stored on the ACE. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. To display a list of available certificate files, use the do show crypto files command.
Command Modes
Command History
Modification This command was introduced. The number of certificates in an authentication group increased from 4 to 10.
Modification This command was introduced. The number of certificates in an authentication group increased from 4 to 10.
Usage Guidelines
It is not necessary to add the certificates in any type of hierarchical order because the device that verifies the certificates determines the correct order.
Examples
To add the certificate files MYCERTS.PEM and MYCERTS_2.PEM to the authentication group, enter:
host1/Admin(config-authgroup)# cert MYCERTS.PEM host1/Admin(config-authgroup)# cert MYCERTS_2.PEM
To remove the certificate file MYCERTS_2.PEM from the authentication group, enter:
host1/Admin(config-authgroup)# no cert MYCERTS_2.PEM
Related Commands
2-484
OL-25339-01
Syntax Description
group_name
Name that you assign to the chain group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A chain group specifies the certificate chains that the ACE sends to its peer during the handshake process. A certificate chain is a hierarchical list of certificates that includes the subjects certificate, the root CA certificate, and any intermediate CA certificates. You include a chain group in the handshake process by configuring the SSL proxy-service with the chain group (see the (config) ssl-proxy service command). The ACE supports the following certificate chain group capabilities:
A chain group can contain up to eight certificate chains. Each context on the ACE can contain up to eight chain groups. The maximum size of a chain group is 16 KB.
Examples
2-485
Related Commands
(config-chaingroup) cert
To add certificate files to a chain group, use the cert command. Use the no form of the command to remove a certificate file from a chain group. cert cert_filename no cert cert_filename
Syntax Description
cert_filename
Name of an existing certificate file stored on the ACE. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. To display a list of available certificate files, use the do show crypto files command.
Command Modes
Command History
Usage Guidelines
It is not necessary to add the certificates in any type of hierarchical order because the device verifying the certificates determines the correct order. The ACE supports the following certificate chain group capabilities:
A chain group can contain up to eight certificate chains. Each context on the ACE can contain up to eight chain groups. The maximum size of a chain group is 16 KB.
Examples
To add the certificate files MYCERTS.PEM, MYCERTS_2.PEM, and MYCERTS_3.PEM to the chain group, enter:
host1/Admin(config-chaingroup)# cert MYCERTS.PEM host1/Admin(config-chaingroup)# cert MYCERTS_2.PEM host1/Admin(config-chaingroup)# cert MYCERTS_3.PEM
To remove the certificate file MYCERTS_2.PEM from the chain group, enter:
host1/Admin(config-chaingroup)# no cert MYCERTS_2.PEM
2-486
OL-25339-01
Related Commands
2-487
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates Layer 3 and Layer 4 network traffic when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions:
match-all(Default) All of the match criteria listed in the class map are satisfied to match the network traffic class in the class map, typically, match commands of different types. match-anyOnly one of the match criteria listed in the class map is satisfied to match the network traffic class in the class map, typically, match commands of the same type.
map_name
Name assigned to the Layer 3 and Layer 4 class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The features required in your user role to execute a specific class map configuration command is described in the Usage Guidelines section of the command. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports a system-wide maximum of 8192 class maps.
Examples
To create a Layer 3 and Layer 4 class map named L4VIP_CLASS to identify the network traffic that can pass through the ACE for server load balancing, enter:
host1/Admin(config)# class-map match-all L4VIP_CLASS
2-488
OL-25339-01
host1/Admin(config-cmap)#
Related Commands
(config) policy-map
2-489
(config-cmap) description
To provide a brief summary about a Layer 3 and Layer 4 class map, use the description command. Use the no form of this command to remove the Layer 3 and Layer 4 class map description from the class map. description text no description
Syntax Description
text
Description about a Layer 3 and Layer 4 class map. Enter a description as an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To add a description that the class map is to filter network traffic based on the source IP address, enter:
host1/Admin(config)# class-map L4_SOURCE_IP_CLASS host1/Admin(config-cmap)# description match on source IP address of incoming traffic
Related Commands
2-490
OL-25339-01
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. name Previously created access list identifier. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command has no user role restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A single class map can have multiple match access-list commands. You can combine multiple match access-list, match source-address, match destination-address, and match port commands in a class map. See the Security Guide, Cisco ACE Application Control Engine for details about the creating access control lists in the ACE.
Examples
To specify that the class map is to match on the access control list INBOUND, enter:
2-491
Related Commands
(config-cmap) description
2-492
OL-25339-01
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements.
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can include only one match any command within a class map, and you cannot combine the match any command with other types of match commands in a class map because the match criteria will be ignored.
Examples
To specify that the class map is to match on any IPv4 network traffic, enter:
host1/Admin(config)# class-map match-any L4_MATCHANYTRAFFIC_CLASS_IPV4 host1/Admin(config-cmap)# match any
Related Commands
(config-cmap) description
2-493
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements.
Command Modes
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can include only one match anyv6 command within a class map, and you cannot combine the match anyv6 command with other types of match commands in a class map because the match criteria will be ignored.
Examples
To specify that the class map is to match on any IPv6 network traffic, enter:
host1/Admin(config)# class-map match-any L4_MATCHANYTRAFFIC_CLASS_IPV6 host1/Admin(config-cmap)# match anyv6
Related Commands
(config-cmap) description
2-494
OL-25339-01
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. ipv6_address /prefix_length ip_address mask IPv6 address of the destination. (Optional) Specifies the length of the IPv6 prefix. Destination IPv4 address. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). (Optional) Subnet mask entry in dotted-decimal notation (for example, 255.255.255.0).
Command Modes
Command History
ACE Module Release 3.0(0)A1(2) A5(1.0) ACE Appliance Release A1(7) A5(1.0)
Modification This command was introduced. Added IPv6 support. Modification This command was introduced. Added IPv6 support.
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-495
A single class map can have multiple match destination-address commands. You can combine multiple match destination-address, match access-list, match source-address, and match port commands in a class map. An entry of 0.0.0.0 0.0.0.0 indicates a wildcard match for any destination IPv4 address and subnet mask.
Examples
IPv6 Example
The following example specifies that the network traffic must match destination IPv6 address 2001:DB8:1::7/64:
host1/C1(config)# class-map match-any IP_CLASS host1/C1(config-cmap)# match destination-address 2001:DB8:1::7/64
To remove the destination IPv6 address match criteria from the class map, enter:
host1/C1(config-cmap)# no match destination-address 2001:DB8:1::7/64
IPv4 Example
The following example specifies that the network traffic must match destination IP address 172.27.16.7:
host1/C1(config)# class-map match-any IP_CLASS host1/C1(config-cmap)# match destination-address 172.27.16.7
To remove the destination IP address match criteria from the class map, enter:
host1/C1(config-cmap)# no match destination-address 172.27.16.7
Related Commands
(config-cmap) description
2-496
OL-25339-01
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. tcp | udp any Specifies the protocol: TCP or UDP. Specifies that any TCP or UDP port number can match the specified value.
2-497
eq port_number
Specifies that the TCP or UDP port number must match the specified value. Enter an integer from 0 to 65535. A value of 0 instructs the ACE to include all ports. Alternatively, you can enter the name of a well-known TCP or UDP port as follows:
Specifies a port range to use for the TCP or UDP port. Valid port ranges are from 0 to 65535. A value of 0 (for port1and port2) instructs the ACE to match all ports.
Command Modes
Command History
2-498
OL-25339-01
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A single class map can have multiple match port commands. You can combine multiple match port, match access-list, match source-address, and match destination-address commands in a class map.
Examples
Related Commands
(config-cmap) description
2-499
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. tcp | udp any Specifies the protocol: TCP or UDP. Specifies that any TCP or UDP port number can match the specified value.
2-500
OL-25339-01
eq port_number
Specifies that the TCP or UDP port number must match the specified value. Enter an integer from 0 to 65535. A value of 0 instructs the ACE to include all ports. Alternatively, you can enter the name of a well-known TCP or UDP port as follows:
Specifies a port range to use for the TCP or UDP port. Valid port ranges are from 0 to 65535. A value of 0 (for port1and port2) instructs the ACE to match all ports.
Command Modes
Command History
2-501
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A single class map can have multiple match port-v6 commands. You can combine multiple match port-v6, match access-list, match source-address, and match destination-address commands in a class map.
Examples
To specify that the class map is to match on TCP port number 23 (Telnet client), enter:
host1/Admin(config)# class-map L4_TCPPORT_CLASS host1/Admin(config-cmap)# match port-v6 tcp eq 23
Related Commands
(config-cmap) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. ipv6_address /prefix_length ip_address mask Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0). Source IPv6 address of the client.
Command Modes
2-502
OL-25339-01
Command History
Usage Guidelines
This command has no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A single class map can have multiple match source-address commands. You can combine multiple match source-address, match access-list, match destination-address, and match port commands in a class map. An entry of 0.0.0.0 0.0.0.0 indicates a wildcard match for any source IP address and subnet mask.
Examples
To specify that the class map match on the source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-http-lb)# match source-address 192.168.11.2 255.255.255.0
Related Commands
(config-cmap) description
2-503
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 255 as the line number. For the ACE appliance, enter an integer from 2 to 255 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. vip_address netmask protocol_number any tcp | udp any VIP server IP address of the ACE, specified in dotted-decimal format (for example, 192.168.1.2). (Optional) Subnet mask for the VIP address, specified in dotted-decimal format (for example, 255.255.255.0). (Optional) Number of an IP protocol. Enter an integer from 1 to 255 that represents the IP protocol number. Specifies the wildcard value that allows connections from any IP protocol. Specifies the protocol: TCP or UDP. Specifies the wildcard value for the TCP or UDP port number. With any used in place of either the eq or range values, packets from any incoming port match.
2-504
OL-25339-01
eq port_number
Specifies that the TCP or UDP port number must match the specified value. Enter an integer from 0 to 65535. A value of 0 instructs the ACE to include all ports. Alternatively, you can enter the name of a well-known TCP port or a well-known UDP port as follows:
(119)
pop2Specifies the Post Office Protocol v2 (109) pop3Specifies the Post Office Protocol v3 (110) rdpSpecifies the Remote Desktop Protocol (3389) rtspSpecifies the Real-Time Streaming Protocol (554) sipSpecifies the Session Initiation Protocol (5060) skinnySpecifies the Skinny Client Control protocol
(2000)
smtpSpecifies the Simple Mail Transfer Protocol (25) telnetSpecifies the Telnet protocol (23) wwwSpecifies the World Wide Web (80) xotSpecifies X25 over TCP (1998)
Protocol (9200)
wsp-wtlsSpecifies the Secure Connectionless WSP (9202) wsp-wtpSpecifies the Connection-based WSP (9201) wsp-wtp-wtlsSpecifies the Secure Connection-based
WSP (9203)
2-505
Specifies a port range to use for the TCP or UDP port. Valid port ranges are from 0 to 65535. A value of 0 (for port1and port2) instructs the ACE to match all ports.
Command Modes
Command History
Modification This command was introduced. This command was revised. The ACE no longer allows the configuration of a class-map VIP address that overlaps with an ACE interface IP address.
Usage Guidelines
This command requires the VIP feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can specify multiple match virtual-address commands within a class map. The match virtual-address command cannot be combined with other types of match commands. For KAL-AP, the ACE verifies whether the VIP addresses are active in all Layer 3 class maps that are configured with the addresses. It ignores all other protocol-specific information for the VIP addresses. The ACE does not allow you to configure a class-map VIP address that overlaps with an ACE interface IP address. If you do, the ACE displays the following warning:
Error: Entered VIP address is not the first address in the VIP range
See the Server Load-Balancing Guide, Cisco ACE Application Control Engine for details about configuring the ACE to perform server load balancing.
Examples
To specify that the class map L4VIPCLASS matches traffic destined to VIP address 192.168.1.10 and TCP port number 80, enter:
host1/Admin(config)# class-map L4VIPCLASS host1/Admin(config-cmap)# match virtual-address 192.168.1.10 tcp port eq 80
Related Commands
(config-cmap) description
2-506
OL-25339-01
Chapter 2 CLI Commands Class Map FTP Inspection Configuration Mode Commands
Syntax Description
match-any
Determines how the ACE inspects FTP request commands when multiple match criteria exist in a class map. The FTP request commands being inspected must match only one of the match criteria listed in the class map. Name assigned to the Layer 7 FTP command request class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
map_name
Command Modes
Command History
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 7 class map named FTP_INSPECT_L7CLASS that performs FTP command inspection, enter:
host1/Admin(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS host1/Admin(config-cmap-ftp-insp)#
Related Commands
(config) policy-map
2-507
Chapter 2 CLI Commands Class Map FTP Inspection Configuration Mode Commands
(config-cmap-ftp-insp) description
To provide a brief summary about the Layer 7 File Transfer Protocol (FTP) command inspection class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description text
Syntax Description
text
Description about the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map FTP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the class map is to perform FTP command inspection, enter:
host1/Admin(config-cmap-ftp-insp)# description FTP command inspection of incoming traffic
Related Commands
2-508
OL-25339-01
Chapter 2 CLI Commands Class Map FTP Inspection Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. ftp_command FTP command in the class map to be subjected to FTP inspection by the ACE. The possible FTP commands are as follows:
appeAppend to a file. cdChange to the specified directory. cdupChange to the parent of the current directory. deleDelete a file at the server side. getRetrieve a file. helpHelp information from the server. mkdCreate a directory. putStore a file. rmdRemove a directory. rnfrRename from. rntoRename to. siteSpecify the server-specific command. stouStore a file with a unique name. systGet system information.
Command Modes
Class map FTP inspection configuration mode Admin and user contexts
2-509
Command History
Usage Guidelines
You can specify multiple match request-method commands within a class map.
Examples
To specify FTP_INSPECT_L7CLASS as the name of a class map and identify that at least one FTP inspection command in the class map must be satisfied for the ACE to indicate a match, enter:
(config)# class-map type ftp inspect match-any FTP_INSPECT_L7CLASS host1/Admin(config-cmap-ftp-insp)# match request-method cdup host1/Admin(config-cmap-ftp-insp)# match request-method get host1/Admin(config-cmap-ftp-insp)# match request-method stou host1/Admin(config-cmap-ftp-insp)# match request-method put
Related Commands
(config-cmap-ftp-insp) description
2-510
OL-25339-01
Syntax Description
match-all | match-any
Determines how the ACE evaluates Layer 3 and Layer 4 network traffic when multiple match criteria exist in a class map.
match-allNetwork traffic needs to satisfy all of the match criteria (implicit AND) to match the class map. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the class map.
map_name
Name assigned to the Layer 7 class map for generic TCP and UDP data parsing. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
(config) class-map
(config-cmap-generic) description
To provide a brief description of the Layer 7 class map for generic TCP and UDP data parsing, use the description command. Use the no form of this command to remove the description from the class map. description text no description
2-511
Syntax Description
text
Description of the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-512
OL-25339-01
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. name Name of an existing Layer 7 generic class map.
Command Modes
Command History
Usage Guidelines
The match class-map command allows you to combine the use of the match-any and match-all keywords in the same class map. To combine match-all and match-any characteristics in a class map, create a class map that uses one match command (either match-any or match-all) and then use this class map as a match statement in a second class map that uses a different match type. The ACE restricts the nesting of class maps to two levels to prevent you from including a nested class map under another class map. The nesting of class maps allows you to achieve complex logical expressions for Layer 7 server load balancing.
Examples
To combine the characteristics of two class maps, one with match-any and one with match-all characteristics, into a single class map, enter:
(config)# class-map type generic match-all GENERIC_CLASS3
2-513
(config-cmap-generic)# 100 match layer4-payload offset 500 regex abc123.* (config-cmap-generic)# exit (config)# class-map type generic match-any GENERIC_CLASS4 (config-cmap-generic)# 10 match class-map GENERIC_CLASS3 (config-cmap-generic)# 20 match source-address 192.168.11.2 (config-cmap-generic)# 30 match source-address 192.168.11.3 (config-cmap-generic)# exit
Related Commands
(config-cmap-generic) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. offset number (Optional) Specifies an absolute offset in the data where the Layer 4 payload expression search string starts. The offset starts at the first byte of the TCP or UDP body. Enter an integer from 0 to 999. The default is 0. Specifies the Layer 4 payload expression that is contained within the TCP or UDP entity body. The range is from 1 to 255 alphanumeric characters. For a list of the supported characters that you can use in regular expression strings, see Table 1-9.
regex expression
Command Modes
Command History
Modification This command was introduced. This command supports the \xST metacharacter.
2-514
OL-25339-01
Usage Guidelines
You cannot configure more than one match layer4-payload command in the same match-all class map. Generic data parsing begins at Layer 4 with the TCP or UDP payload, which allows you the flexibility to match Layer 5 data (in the case of LDAP or DNS) or any Layer 7 header or payload (for example, HTTP).
Table 1-9 Characters Supported in Regular Expressions
Convention .* . \. \xhh () Bracketed range [for example, 0-9] A leading ^ in a range [^charset] (expr1 | expr2) (expr)* (expr)+ (expr{m,n} (expr{m} (expr{m,} \a \b \f \n \r \t \v \0 .\\ \xST
Description Zero or more characters. Exactly one character. Escaped character. Any ASCII character as specified in two-digit hex notation. Expression grouping. Matches any single character from the range. Does not match any character in the range; all other characters represent themselves. OR of expressions. 0 or more of expressions. 1 or more of expressions. Matches the previous item between m and n times; valid entries are from 1 to 255. Matches the previous item exactly m times; valid entries are from 1 to 255. Matches the previous item m or more times; valid entries are from 1 to 255. Alert (ASCII 7). Backspace (ASCII 8). Form-feed (ASCII 12). New line (ASCII 10). Carriage return (ASCII 13). Tab (ASCII 9). Vertical tab (ASCII 11). Null (ASCII 0). Backslash. (ACE module only) Stop metacharacter.
Examples
2-515
host1/Admin(config)# class-map type generic match-any GENERIC_L4_CLASS host1/Admin(config-cmap-generic)# 10 match layer4-payload offset 500 regex abc123.*
Related Commands
(config-cmap-generic) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. ip_address netmask Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.2). (Optional) Subnet mask of the IP address. Enter the netmask in dotted-decimal notation (for example, 255.255.255.0). The default is 255.255.255.255.
Command Modes
Command History
2-516
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Usage Guidelines
You cannot configure more than one match source-address command in the same match-all class map.
Examples
To specify that the class map match on source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map type generic match-any GENERIC_L7_CLASS host1/Admin(config-cmap-generic)# 50 match source-address 192.168.11.2 255.255.255.0
To remove the source IP address match statement from the class map, enter:
host1/Admin(config-cmap-generic)# no 50
Related Commands
(config-cmap-generic) description
2-517
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
match-all | match-any
(Optional) Determines how the ACE performs the deep packet inspection of HTTP traffic when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions:
match-all (Default) Specifies that network traffic needs to satisfy all of the match criteria (implicit AND) to match the Layer 7 HTTP deep packet inspection class map. The match-all keyword is applicable only for match statements of different HTTP deep packet inspection types. For example, specifying a match-all condition for URL, HTTP header, and URL content statements in the same class map is valid. However, specifying a match-all condition for multiple HTTP headers with the same names or multiple URLs in the same class map is invalid. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the Layer 7 HTTP deep packet inspection class map. The match-any keyword is applicable for match statements of different Layer 7 HTTP deep packet inspection type or multiple instances of the same type with different names. For example, the ACE allows you to specify a match-any condition for cookie, HTTP header, and URL content statements in the same class map, but it does not allow you to specify a match-any condition for URL length, HTTP header length, and content length statements in the same class map.
map_name
Name assigned to the Layer 7 HTTP deep packet inspection class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 7 class map named HTTP_INSPECT_L7CLASS that performs HTTP deep packet inspection, enter:
2-518
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Related Commands
(config) policy-map
(config-cmap-http-insp) description
To provide a brief summary about the Layer 7 HTTP inspection class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description about the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the class map is to perform HTTP deep packet inspection, enter:
host1/Admin(config-cmap-http-insp)# description HTTP protocol deep inspection of incoming traffic
Related Commands
2-519
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Content expression contained within the HTTP entity body.
For the ACE module, enter a range of 1 to 1024 alphanumeric characters. For the ACE appliance, enter a range of 2 to 1024 alphanumeric characters.
For a list of the supported characters that you can use in regular expressions, see Table 1-9. offset number (Optional) Provides an absolute offset where the content expression search string starts. The offset starts at the first byte of the message body, after the empty line (CR, LF, CR, LF) between the headers and the body of the message. The offset value is from 1 to 4000 bytes.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
2-520
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Examples
To specify a content expression contained within the entity body sent with an HTTP request, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match content .*newp2psig
Related Commands
(config-cmap-http-insp) description
2-521
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. eq bytes Specifies a value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length size equal to the specified value. Valid entries are from 1 to 65535 bytes. Specifies a minimum value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length size greater than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a maximum value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length size less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length size within this range. The range is from 1 to 65535 bytes.
gt bytes
lt bytes
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
2-522
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Usage Guidelines
Examples
To identify content parse length in an HTTP message that can be received by the ACE, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match content length eq 3495
Related Commands
(config-cmap-http-insp) description
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. name cookie_name prefix prefix_name value expression Identifier of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Prefix of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Regular expression of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters.
2-523
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
The following configuration guidelines apply when you configure a secondary cookie match statement for HTTP inspection:
Ensure that secondary cookie names do not overlap with other secondary cookie names in the same match-all class map. For example, the following configuration is not allowed because the two match statements have overlapping cookie names:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match cookie secondary prefix id value .* host1/Admin(config-cmap-http-insp)# match cookie secondary name identity value bob
When you configure a secondary cookie value match across all secondary cookie names in a match-all class map, you cannot configure any other secondary cookie match in the same class map. That is because a secondary cookie match on value alone is equivalent to a wildcard match on name. In the following example, the second match statement is not allowed:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match cookie secondary value bob host1/Admin(config-cmap-http-insp)# match cookie secondary name identity value jane
Examples
To match a secondary cookie called matchme with a regular expression value of .*abc123, enter the following commands:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match cookie secondary name matchme value .*abc123
Related Commands
2-524
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. header_name Name of the HTTP header to match (for example, www.example1.com.) The range is from 1 to 64 alphanumeric characters.
Note
The header_name argument cannot include the colon in the name of the HTTP header; the ACE rejects the colon as an invalid token.
2-525
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
header_field
Standard HTTP/1.1 header field. Valid selections include request-header fields, general-header fields, and entity-header fields. Selections also include two lower-level header-matching commands: length and mime-type. The supported selections are as follows:
AcceptSemicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request. Accept-CharsetCharacter sets that are acceptable for the response. This field allows clients capable of understanding more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Accept-EncodingRestricts the content encoding that a user will accept from the server. Accept-LanguageISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO639 country code to specify a national variant. AuthorizationSpecifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Cache-ControlDirectives that must be obeyed by all caching mechanisms along the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. ConnectionAllows the sender to specify connection options. Content-MD5MD5 digest of the entity body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. ExpectUsed by a client to inform the server about the behaviors that the client requires. FromContains the e-mail address of the person that controls the requesting user agent. HostInternet host and port number of the resource being requested, as obtained from the original URL given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL.
2-526
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
If-MatchUsed with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used on updating requests to prevent inadvertent modification of the wrong version of a resource. As a special case, the value * matches any current entity of the resource. lengthSee the (config-cmap-http-insp) match header length command. mime-typeSee the (config-cmap-http-insp) match header mime-type command. PragmaPragma directives that are understood by servers to whom the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP. For example, the accept field is a comma-separated list of entries for which the optional parameters are separated by semicolons. RefererAddress (URI) of the resource from which the URI in the request was obtained. Transfer-EncodingIndicates what (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient. User-AgentInformation about the user agent (for example, a software program that originates the request). This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents. ViaUsed by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
header-value expression
Specifies the header value expression string to compare against the value in the specified field in the HTTP header. The range is from 1 to 255 alphanumeric characters. Table 1-9 lists the supported characters that you can use in regular expressions.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
2-527
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Usage Guidelines
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces, provided that the spaces are escaped or quoted. Table 1-9 lists the supported characters that you can use in regular expressions.
Examples
To filter on content and allow HTTP headers that contain the expression html, enter:
host1/Admin(config)# class-map type http inspect match-all L7_CLASSFLTRHTML1 host1/Admin(config-cmap-http-insp)# match header accept header-value html
Related Commands
(config-cmap-http-insp) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. request response eq bytes Specifies the size of the HTTP header request message that can be received by the ACE. Specifies the size of the HTTP header response message sent by the ACE. Specifies a value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size equal to the specified value. Valid entries are from 1 to 65535 bytes. Specifies a minimum value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size greater than the specified value. Valid entries are from 1 to 65535 bytes.
gt bytes
2-528
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
lt bytes
Specifies a maximum value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a entity body size within this range. The range is from 1 to 65535 bytes.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
By default, the maximum header length for HTTP deep packet inspection is 2048 bytes.
Examples
To specify that the class map match on HTTP traffic received with a length less than or equal to 3600 bytes in the entity body of the HTTP message, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match header length request eq 3600
Related Commands
2-529
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. mime_type MIME-type message. The ACE includes a predefined list of mime-types, such as image\Jpeg, text\html, application\msword, audio\mpeg. Choose whether only the mime-types included in this list are permitted through the ACE firewall or whether all mime-types are acceptable. The default behavior is to allow all mime-types. The following lists the supported mime-types:
2-530
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
application\pdf application\postscript application\x-gzip application\x-java-archive application\x-java-vm application\x-messenger application\zip audio\* audio\basic audio\midi audio\mpeg audio\x-adpcm audio\x-aiff audio\x-ogg audio\x-wav image \* image\gif image\jpeg image\png image\tiff image\x-3ds image\x-bitmap image\x-niff image\x-portable-bitmap image\x-portable-greymap image\x-xpm text\* text\css text\html text\plain text\richtext text\sgml text\xmcd text\xml
2-531
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
To define MIME type messages in addition to what is supported under the match header mime-type command, use the match header command. For example, to define a match for a new MIME-type audio\myaudio, you could enter the following match statement: match header Content-type header-value audio\myaudio.
Examples
To specify the MIME-type audio\midi and audio\mpeg messages permitted through the ACE, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match header mime-type audio\midi host1/Admin(config-cmap-http-insp)# match header mime-type audio\mpeg
Related Commands
2-532
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. im p2p tunneling Defines the instant messaging application category. The ACE checks for the Yahoo Messenger instant messaging application. Defines the peer-to-peer application category. The applications checked include Kazaa and Gnutella. For the ACE appliance, the GoToMyPC application is included. Defines the tunneling application category. The applications checked include: HTTPort/HTTHost, GNU Httptunnel, GotoMyPC, Firethru, and Http-tunnel.com Client.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
You can specify multiple match port-misuse commands within a class map. Each match port-misuse command configures a single application type. The port misuse application inspection process requires a search of the entity body of the HTTP message, which may degrade performance of the ACE. The ACE disables the match port-misuse command by default. If you do not configure a restricted HTTP application category, the default action by the ACE is to allow the applications without generating a log.
2-533
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Examples
Related Commands
(config-cmap-http-insp) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. ext method Specifies an HTTP extension method. If the RFC request messages does not contain one of the RFC 2616 HTTP request methods, the ACE verifies if it is an extension method. The ACE supports the inspection of the following HTTP request extension methods: bcopy, bdelete, bmove, bpropfind, bproppatch, copy, edit, getattr, getattrname, getprops, index, lock, mkdir, mkcol, move, propfind, proppatch, revadd, revlabel, revlog, revnum, save, search, setattr, startrev, stoprev, unedit, and unlock. (ACE module only) The ACE also supports the inspection of the following HTTP request extension methods: notify, poll, subscribe, unsubscribe, and x-ms-emumatts. rfc method Specifies a RFC 2616 HTTP request method that you want to perform an RFC compliance check on. The ACE supports the inspection of the following RFC 2616 HTTP request methods: connect, delete, get, head, options, post, put, and trace.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
2-534
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Command History
Usage Guidelines
You can specify multiple match request-method commands within a class map.Each match request-method command configures a single request method. For unsupported HTTP request methods, include the inspect http strict command as an action in the Layer 3 and Layer 4 policy map. The ACE disables the match request-method command by default. If you do not configure a request method, the default action by the ACE is to allow the RFC 2616 HTTP request method without generating a log. By default, the ACE allows all request and extension methods.
Examples
To identify that the connect, get, head, and index HTTP RFC 2616 protocols are to be used for application inspection, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match request-method rfc connect host1/Admin(config-cmap-http-insp)# match request-method rfc get host1/Admin(config-cmap-http-insp)# match request-method rfc head host1/Admin(config-cmap-http-insp)# match request-method ext index
Related Commands
(config-cmap-http-insp) description
2-535
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number to assist you in editing or deleting individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. chunked compressed Transfers the message body as a series of chunks. Defines the encoding format produced by the common UNIX file compression program compress. This format is an adaptive Lempel-Ziv-Welch coding (LZW). Defines the .zlib format defined in RFC 1950 in combination with the deflate compression mechanism described in RFC 1951. Defines the encoding format produced by the file compression program gzip (GNU zip) as described in RFC 1952. This format is a Lempel-Ziv coding (LZ77) with a 32 bit CRC. Defines the default (identity) encoding, which does not require the use of transformation.
deflate gzip
identity
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can specify multiple match transfer-encoding commands within a class map. Each match transfer-encoding command configures a single application type. The ACE disables the match transfer-encoding command by default. If you do not configure a transfer-encoding type, the default action by the ACE is to allow the HTTP transfer-encoding types without generating a log.
Examples
To specify a chunked HTTP transfer encoding type to limit the HTTP traffic that flows through the ACE, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match transfer-encoding chunked
2-536
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
Related Commands
(config-cmap-http-insp) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. expression URL or portion of a URL to match. The URL string range is from 1 to 255 characters. Include only the portion of the URL following www.hostname.domain in the match statement. For a list of the supported characters that you can use in regular expressions, see Table 1-9.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
Include only the portion of the URL following www.hostname.domain in the match statement. For example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html. To match the www.anydomain.com portion, the URL string can take the form of a URL regular expressions. The ACE supports the use of regular expressions for matching.
2-537
Chapter 2 CLI Commands Class Map HTTP Inspection Configuration Mode Commands
When matching URLs, the period (.) character does not have a literal meaning in regular expressions. Use either the brackets ([ ]) or the slash (/) character classes to match this symbol, for example, specify www[.]xyz[.]com instead of www.xyz.com.
Examples
To specify that the Layer 7 class map is to match and perform application inspection on a specific URL, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif or .html file, enter:
(config)# class-map type http inspect match-any HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match url .*.gif host1/Admin(config-cmap-http-insp)# match url .*.html
Related Commands
(config-cmap-http-insp) description
Syntax Description
line_number
(Optional) Line number to assist you in editing or deleting individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not dictate a priority or sequence for the match statements. eq bytes Specifies a value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length equal to the specified value. Valid entries are from 1 to 65535 bytes. Specifies a minimum value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length greater than the specified value. Valid entries are from 1 to 65535 bytes.
gt bytes
2-538
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
lt bytes
Specifies a maximum value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length within this range. The range is from 1 to 65535 bytes.
Command Modes
Class map HTTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To specify that the class map is to match on a URL with a length equal to 10000 bytes in the request message, enter:
(config)# class-map type http inspect HTTP_INSPECT_L7CLASS host1/Admin(config-cmap-http-insp)# match url length eq 10000
Related Commands
(config-cmap-http-insp) description
2-539
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates Layer 7 HTTP SLB operations when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions:
match-all (Default) Specifies that network traffic needs to satisfy all of the match criteria (implicit AND) to match the Layer 7 load-balancing class map. The match-all keyword is applicable only for match statements of different Layer 7 load-balancing types. For example, specifying a match-all condition for URL, HTTP header, and URL cookie statements in the same class map is valid. However, specifying a match-all condition for multiple HTTP headers or multiple cookies with the same names or multiple URLs in the same class map is invalid. match-anySpecifies that network traffic needs to satisfy only one of the match criteria (implicit OR) to match the HTTP load-balancing class map. The match-any keyword is applicable only for match statements of the same Layer 7 load-balancing type. For example, the ACE does not allow you to specify a match-any condition for URL, HTTP header, and URL cookie statements in the same class map but does allow you to specify a match-any condition for multiple URLs, or multiple HTTP headers or multiple cookies with different names in the same class map.
map_name
Name assigned to the Layer 7 HTTP SLB class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 7 class map named L7SLB_CLASS that performs server load balancing, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLB_CLASS
2-540
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
host1/Admin(config-cmap-http-lb)#
Related Commands
(config) policy-map
(config-cmap-http-lb) description
To provide a brief summary about the Layer 7 HTTP SLB class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description about the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To add a description that the class map is to perform server load balancing, enter:
host1/Admin(config-cmap-http-lb)# description HTTP LOAD BALANCE PROTOCOL 1
Related Commands
2-541
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. name Name of an existing Layer 7 load-balancing class map.
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The match class map command allows you to combine the use of the match-any and match-all keywords in the same class map. To combine match-all and match-any characteristics in a class map, create a class map that uses one match command (either match-any or match-all) and then use this class map as a match statement in a second class map that uses a different match type. The nesting of class maps allows you to achieve complex logical expressions for Layer 7 HTTP-based server load balancing. The ACE restricts the nesting of class maps to two levels to prevent you from including a nested class map under another class map. See the Server Load-Balancing Guide, Cisco ACE Application Control Engine for details about configuring the ACE to perform server load balancing.
2-542
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Examples
To combine the characteristics of two class maps, one with match-any and one with match-all characteristics, into a single class map, enter:
(config)# class-map type http loadbalance match-all class3 (config-cmap-http-lb)# 100 match http cookie testcookie1 cookie-value 123456 (config-cmap-http-lb)# 200 match http header Host header-value XYZ (config-cmap-http-lb)# exit (config)# class-map type http loadbalance match-any class4 (config-cmap-http-lb)# 10 match class-map class3 (config-cmap-http-lb)# 20 match source-address 192.168.11.2 (config-cmap-http-lb)# 30 match source-address 192.168.11.3 (config-cmap-http-lb)# exit
Related Commands
(config-cmap-http-lb) description
2-543
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Syntax Description
equal-to cipher
Specifies the SSL cipher. The possible values for cipher are as follows:
RSA_EXPORT1024_WITH_DES_CBC_SHA RSA_EXPORT1024_WITH_RC4_56_MD5 RSA_EXPORT1024_WITH_RC4_56_SHA RSA_EXPORT_WITH_DES40_CBC_SHA RSA_EXPORT_WITH_RC4_40_MD5 RSA_WITH_3DES_EDE_CBC_SHA RSA_WITH_AES_128_CBC_SHA RSA_WITH_AES_256_CBC_SHA RSA_WITH_DES_CBC_SHA RSA_WITH_RC4_128_MD5 RSA_WITH_RC4_128_SHA
less-than cipher_strength
Specifies a noninclusive minimum SSL cipher bit strength. For example, if you specify a cipher strength value of 128, any SSL cipher that was no greater than 128 would hit the traffic policy. If the SSL cipher was 128-bit or greater, the connection would miss the policy. The possible values for cipher_strength are as follows:
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
2-544
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Usage Guidelines
Examples
To specify that the Layer 7 SLB class map load balances on a specific SSL cipher, enter:
host1/Admin(config)# class-map type http loadbalance http match-all L7SLBCLASS host1/Admin(config-cmap-http-lb)# 10 match cipher equal-to RSA_WITH_RC4_128_CBC_SHA
To specify that the Layer 7 SLB class map load balances on a specific minimum SSL cipher bit strength, enter:
host1/Admin(config)# class-map type http loadbalance http match-all L7SLBCLASS host1/Admin(config-cmap-http-lb)# 100 match cipher less-than 128
Related Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Regular expression content to match. Enter a string from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching data strings. For a list of the supported characters that you can use in regular expressions, see Table 1-9. (Optional) Specifies the byte at which the ACE begins parsing the packet data. Enter an integer from 0 to 999. The default is 0.
offset number
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
2-545
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Command History
Usage Guidelines
The ACE can perform regular expression matching against the received packet data from a particular connection based on a regular expression string in HTTP packet data (not the header). When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
Examples
To specify that the Layer 7 class map performs SLB based on a specific HTTP header string, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7_HTTP_CLASS host1/Admin(config-cmap-http-lb)# 10 match http content abc*123 offset 50
Related Commands
(config-cmap-http-lb) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. name Unique cookie name. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-546
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
secondary name
Specifies a cookie in a URL string. You can specify the delimiters for cookies in a URL string using a command in an HTTP parameter map. For more information, see the Parameter Map HTTP Configuration Mode Commands section. Specifies a unique cookie value expression. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. The ACE supports the use of regular expressions for matching string expressions. For a list of the supported characters that you can use for matching string expressions, see Table 1-9.
cookie-value expression
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To specify that the Layer 7 class map load balances on a cookie with the name of testcookie1 or testcookie2, enter:
(config)# class-map type http loadbalance match-any L7SLBCLASS (config-cmap-http-lb)# 100 match http cookie testcookie1 cookie-value 123456 (config-cmap-http-lb)# 200 match http cookie testcookie2 cookie-value 789987
Related Commands
(config-cmap-http-lb) description
2-547
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. header_name Name of the field in the HTTP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can enter a text string with spaces if you enclose the entire string in quotation marks (). You can enter any header field name, including a standard HTTP header field name or any user-defined header field name. Valid selections include request-header fields, general-header fields, and entity-header fields.
Note
The header_name argument cannot include the colon in the name of the HTTP header; the ACE rejects the colon as an invalid token.
For a list of the standard HTTP/1.1 header field names, see Table 1-10. header-value expression Specifies the header value expression string to compare against the value in the specified field in the HTTP header. Enter a text string from 1 to 255 alphanumeric characters. For a list of the supported characters that you can use for regular expressions, see Table 1-9.
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. For a list of the supported characters that you can use for regular expressions, see Table 1-9.
2-548
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Table 1-10 lists the standard HTTP header fields that you can use in an HTTP load-balancing class map.
Table 1-10 Standard HTTP Header Fields
Description Semicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request. Character sets that are acceptable for the response. This field allows clients capable of understanding more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Restricts the content encoding that a user will accept from the server. ISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO 639 country code to specify a national variant. Specifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Directives that must be obeyed by all caching mechanisms along the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. Allows the sender to specify connection options. MD5 digest of the entity-body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. Used by a client to inform the server about what behaviors the client requires. E-mail address of the person that controls the requesting user agent. Internet host and port number of the resource being requested, as obtained from the original URI given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL. Used with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used on updating requests to prevent inadvertent modification of the wrong version of a resource. As a special case, the asterisk (*) value matches any current entity of the resource. Pragma directives understood by servers to whom the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP, for example, the accept field, a comma-separated list of entries, for which the optional parameters are separated by semicolons. Address (URI) of the resource from which the URI in the request was obtained. What (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient.
Accept-Encoding Accept-Language
Authorization Cache-Control
If-Match
Pragma
Referer Transfer-Encoding
2-549
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Description Information about the user agent, for example, a software program originating the request. This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents to customize responses to avoid particular user agent limitations. Used by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
Via
Examples
To specify that the Layer 7 class map performs SLB on an HTTP header named Host, enter:
(config)# class-map type http loadbalance match-any L7SLBCLASS (config-cmap-http-lb)# 100 match http header Host header-value .*cisco.com
To use regular expressions in a class map to emulate a wildcard search to match the header value expression string, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-http-lb)# 10 match http header Host header-value .*cisco.com host1/Admin(config-cmap-http-lb)# 20 match http header Host header-value .*yahoo.com
To specify that the Layer 7 class map performs SLB on an HTTP header named Via, enter:
host1/Admin(config)# class-map type http loadbalance match-all L7SLBCLASS host1/Admin(config-cmap-http-lb)# 30 match http header Via header-value 192.*
Related Commands
(config-cmap-http-lb) description
2-550
OL-25339-01
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression URL, or portion of a URL, to match. Enter a URL string from 1 to 255 alphanumeric characters. Include only the portion of the URL that follows www.hostname.domain in the match statement. For a list of the supported characters that you can use for regular expressions, see Table 1-9. (Optional) Specifies the HTTP method to match. Enter a method name as an unquoted text string with no spaces and a maximum of 15 alphanumeric characters. The method can either be one of the standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, or CONNECT) or a text string that must be matched exactly (for example, CORVETTE).
method name
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
Include only the portion of the URL that follows www.hostname.domain in the match statement. For example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html. To match the www.anydomain.com portion, the URL string can take the form of a URL regular expression. The ACE supports the use of regular expressions for matching URL strings. For a list of the supported characters that you can use for regular expressions, see Table 1-9. When matching URLs, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
Examples
To specify that the Layer 7 class map performs SLB on a specific URL, enter:
host1/Admin(config)# class-map type http loadbalance L7SLBCLASS
2-551
Chapter 2 CLI Commands Class Map HTTP Load Balancing Configuration Mode Commands
To use regular expressions to emulate a wildcard search to match on any .gif or .html file, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-http-lb)# 100 match http url .*.gif host1/Admin(config-cmap-http-lb)# 200 match http url .*.html
Related Commands
(config-cmap-http-lb) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. ip_address netmask Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.2). (Optional) Subnet mask of the IP address. Enter the netmask in dotted-decimal notation (for example, 255.255.255.0). The default is 255.255.255.255.
Command Modes
Class map HTTP load balancing configuration mode Admin and user contexts
Command History
2-552
OL-25339-01
Usage Guidelines
Examples
To specify that the class map match on source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map type http loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-http-lb)# 50 match source-address 192.168.11.2 255.255.255.0
Related Commands
(config-cmap-http-lb) description
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates Layer 3 and Layer 4 network management traffic when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions.
match-all(Default) Traffic being evaluated must match all of the match criteria listed in the class map (typically, match commands of different types). match-anyTraffic being evaluated must match one of the match criteria listed in the class map (typically, match commands of the same type).
map_name
Name assigned to the Layer 3 and Layer 4 network management protocol class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-553
Command History
Usage Guidelines
The commands in this mode require the context Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 3 and Layer 4 class map named MGMT-ACCESS_CLASS that classifies the network management protocols that can be received by the ACE, enter:
host1/Admin# class-map type management match-any MGMT-ACCESS_CLASS host1/Admin(config-cmap-mgmt)#
Related Commands
(config-cmap-mgmt) description
To provide a brief summary about the Layer 3 and Layer 4 management class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description about the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
2-554
OL-25339-01
Examples
To add a description that the class map is to allow remote Telnet access, enter:
host1/Admin# class-map type management TELNET-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# description Allow Telnet access to the ACE
Related Commands
2-555
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. http https Specifies the Hypertext Transfer Protocol (HTTP). Specifies the secure (SSL) Hypertext Transfer Protocol (HTTP). (ACE appliance only) Specifies the secure (SSL) Hypertext Transfer Protocol (HTTP) for connectivity with the Device Manager GUI on the ACE using port 443. icmp icmpv6 kalap-udp snmp ssh telnet xml-https Specifies the Internet Control Message Protocol (ping). Specifies the Internet Control Message Protocol Version 6 messages to the ACE. Specifies the keepalive-appliance protocol (KAL-AP) over UDP. Specifies the Simple Network Management Protocol (SNMP). Specifies a Secure Shell (SSH) connection to the ACE. Specifies a Telnet connection to the ACE. (ACE appliance only) Specifies HTTPS as transfer protocol to send and receive XML documents between the ACE and a Network Management System (NMS). Communication is performed using port 10443. Specifies any client source IPv4 address for the management traffic classification. Specifies any client source IPv6 address for the management traffic classification.
any anyv6
2-556
OL-25339-01
source-address
Specifies a client source host IP address and subnet mask as the network traffic matching criteria. As part of the classification, the ACE implicitly obtains the destination IP address from the interface on which you apply the policy map. Source IPv6 address of the client. Prefix length of the client entry (for example, /64). Source IPv4 address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0).
Command Modes
Command History
Modification This command was introduced. This command was revised. Added the anyv6 and icmpv6 keywords.
Modification This command was introduced. This command was revised. Added the anyv6 and icmpv6 keywords.
Usage Guidelines
Examples
To specify that the class map allows SSH access to the ACE from the source IP address 192.168.10.1 255.255.255.0, enter:
host1/Admin# class-map type management SSH-ALLOW_CLASS host1/Admin(config-cmap-mgmt)# match protocol ssh source-address 192.168.10.1 255.255.255.0
Related Commands
(config-cmap-mgmt) description
2-557
Chapter 2 CLI Commands Class Map RADIUS Load Balancing Configuration Mode Commands
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates RADIUS network traffic when multiple match criteria exist in a class map.
match-all(Default) Network traffic needs to satisfy all of the match criteria (implicit AND) to match the RADIUS load-balancing class map. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the RADIUS load-balancing class map.
map_name
Unique identifier assigned to the RADIUS load-balancing class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
2-558
OL-25339-01
Chapter 2 CLI Commands Class Map RADIUS Load Balancing Configuration Mode Commands
Related Commands
2-559
Chapter 2 CLI Commands Class Map RADIUS Load Balancing Configuration Mode Commands
(config-cmap-radius-lb) description
To provide a brief description of the RADIUS load-balancing class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description of the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map RADIUS load balancing configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-560
OL-25339-01
Chapter 2 CLI Commands Class Map RADIUS Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. calling-station-id username expression Specifies the unique identifier of the calling station. Specifies the name of the RADIUS user who initiated the connection. Calling station ID or username to match. Enter a string from 1 to 64 alphanumeric characters. The ACE supports the use of regular expressions for matching strings. For a list of the supported characters that you can use in regular expressions, see Table 1-9.
Command Modes
Class map RADIUS load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The ACE performs Layer 7 RADIUS load balancing based on the calling-station-ID or username RADIUS attribute.
Examples
To configure RADIUS match criteria based on the calling station ID attribute, enter:
host1/Admin(config)# class-map type radius loadbalance match-any RADIUS_L7_CLASS host1/Admin(config-cmap-radius-lb)# 10 match radius attribute calling-station-id 122*
2-561
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
To remove the RADIUS attribute match statement from the RADIUS_L7_CLASS class map, enter:
host1/Admin(config-cmap-radius-lb)# no 10
Related Commands
(config-cmap-radius-lb) description
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates RTSP network traffic when multiple match criteria exist in a class map.
match-all(Default) Network traffic needs to satisfy all of the match criteria (implicit AND) to match the RTSP load-balancing class map. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the RTSP load-balancing class map.
map_name
Unique identifier assigned to the RTSP load-balancing class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
2-562
OL-25339-01
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
Examples
Related Commands
2-563
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
(config-cmap-rtsp-lb) description
To provide a brief description of the RTSP load-balancing class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description of the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map RTSP load balancing configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-564
OL-25339-01
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that you can use to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. name Name of an existing RTSP load-balancing class map.
Command Modes
Class map RTSP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The match class-map command allows you to combine the use of the match-any and match-all keywords in the same class map. To combine match-all and match-any characteristics in a class map, create a class map that uses one match command (either match-any or match-all) and then use this class map as a match statement in a second class map that uses the other match type. The nesting of class maps allows you to achieve complex logical expressions for Layer 7 server load balancing. The ACE restricts the nesting of class maps to two levels to prevent you from including a nested class map under another class map.
Examples
To combine the characteristics of two class maps, one with match-any and one with match-all characteristics, into a single class map, enter:
host1/Admin(config)# class-map type rtsp loadbalance match-any CLASS3 host1/Admin(config-cmap-rtsp-lb)# 100 match rtsp url .*.gif host1/Admin(config-cmap-rtsp-lb)# 200 match rtsp header Host header-value XYZ host1/Admin(config-cmap-rtsp-lb)# exit
2-565
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
host1/Admin(config)# class-map type rtsp loadbalance match-all CLASS4 host1/Admin(config-cmap-rtsp-lb)# 10 match class-map CLASS3 host1/Admin(config-cmap-rtsp-lb)# 20 match source-address 192.168.11.2 host1/Admin(config-cmap-rtsp-lb)# exit
To remove the nested class map from the RTSP class map, enter:
host1/Admin(config-cmap-rtsp-lb)# no 10
Related Commands
(config-cmap-sip-lb) description
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. name Name of the field in the RTSP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can enter a text string with spaces if you enclose the entire string in quotation marks (). You can enter any header field name, including a standard RTSP header field name or any user-defined header field name. Because RTSP is similar in syntax and operation to HTTP/1.1, you can use any HTTP header listed in Table 1-10 if the RTSP server supports it. For a complete list of RTSP headers, see RFC 2326. Header value expression string to compare against the value in the specified field in the RTSP header. Enter a text string with a maximum of 255 alphanumeric characters. The ACE supports the use of regular expressions for header matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the entire string that contains spaces is quoted. If you use a match-all class map, all headers in the header map must be matched. For a list of the supported characters that you can use in regular expressions, see Table 1-9.
expression
2-566
OL-25339-01
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
Command Modes
Class map RTSP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
When the ACE receives an RTSP session request, the load-balancing decision is based on the first request message. All subsequent request and response message exchanges are forwarded to the same server. When you configure header match criteria, ensure that the header is included in the first request message by a media player. The ACE can perform regular expression matching against the received packet data from a particular connection based on the RTSP header expression. You can configure a maximum of 10 RTSP header names per class map.
Examples
To configure an RTSP class map to load balance based on an RTSP header named Session, enter:
host1/Admin(config)# class-map type rtsp loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-rtsp-lb)# 10 match rtsp header Session header-value abc123
To configure an RTSP class map to load balance based on an RTSP header named Via, enter:
host1/Admin(config)# class-map type rtsp loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-rtsp-lb)# 20 match rtsp header Via header-value 192.*
To remove the RTSP header match criteria from the L7SLBCLASS class map, enter:
host1/Admin(config-cmap-rtsp-lb)# no 10 host1/Admin(config-cmap-rtsp-lb)# no 20
Related Commands
(config-cmap-sip-lb) description
2-567
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. expression URL, or portion of a URL, to match. The ACE performs matching on whatever URL string appears after the RTSP method, regardless of whether the URL includes the hostname. The ACE supports the use of regular expressions for matching URL strings. For a list of the supported characters that you can use for regular expressions, see Table 1-9. (Optional) Specifies the RTSP method to match. Enter a method name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. The method can either be one of the standard RTSP method names (DESCRIBE, ANNOUNCE, GET_PARAMETER, OPTIONS, PAUSE, PLAY, RECORD, REDIRECT, SETUP, SET_PARAMETER, TEARDOWN) or a text string that must be matched exactly (for example, STINGRAY).
method name
Command Modes
Class map RTSP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
When matching URLs, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
Examples
To configure an RTSP class map to load balance based on a specific URL, enter:
host1/Admin(config)# class-map type rtsp loadbalance L7SLBCLASS host1/Admin(config-cmap-rtsp-lb)# 10 match rtsp url /whatsnew/latest.*
To configure a URL match criterion that emulates a wildcard search to match on any .wav or .mpg file, enter:
2-568
OL-25339-01
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
host1/Admin(config)# class-map type rtsp loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-rtsp-lb)# 100 match rtsp url .*.wmv host1/Admin(config-cmap-rtsp-lb)# 200 match rtsp url .*.mpg
To remove a URL match statement from the L7SLBCLASS class map, enter:
host1/Admin(config-cmap-rtsp-lb)# no 100
Related Commands
(config-cmap-sip-lb) description
2-569
Chapter 2 CLI Commands Class Map RTSP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. ip_address netmask Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.2). (Optional) Subnet mask of the IP address. Enter the netmask in dotted-decimal notation (for example, 255.255.255.0). The default is 255.255.255.255.
Command Modes
Class map RTSP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To specify that the class map match on source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map type rtsp loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-rtsp-lb)# 50 match source-address 192.168.11.2 255.255.255.0
To remove the source IP address match statement from the class map, enter:
2-570
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
host1/Admin(config-cmap-rtsp-lb)# no 50
Related Commands
(config-cmap-sip-lb) description
Syntax Description
match-all | match-any
(Optional) Determines how the ACE performs the inspection of SIP traffic when multiple match criteria exist in a class map. The class map is considered a match if the match commands meet one of the following conditions:
match-all (Default) Network traffic needs to satisfy all of the match criteria (implicit AND) to match the Layer 7 SIP inspection class map. The match-all keyword is applicable only for match statements of different SIP inspection types. For example, specifying a match-all condition for SIP URI, SIP header, and SIP content statements in the same class map is valid. However, specifying a match-all condition for multiple SIP headers with the same names or multiple URLs in the same class map is invalid. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the Layer 7 SIP inspection class map. The match-any keyword is applicable only for match statements of the same Layer 7 SIP inspection type. For example, the ACE allows you to specify a match-any condition for SIP URI, SIP header, and SIP content statements in the same class map and allows you to specify a match-any condition for multiple URLs, multiple SIP headers, or multiple SIP content statements in the same class map as long as the statements are logical. For example, you could not have two match uri sip length statements in the same class map, but you could have one match uri sip length and one match uri tel length statement in one class map.
map_name
Name assigned to the class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Configuration mode
2-571
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Command History
Usage Guidelines
To classify the SIP application inspection of traffic for evaluation by the ACE, include one or more of the following commands to configure the match criteria for the Layer 7 class map:
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
Examples
To specify SIP_INSPECT_L7CLASS as the name of a class map and identify that all commands in the Layer 7 SIP application inspection class map must be satisfied for the ACE to indicate a match, enter:
(config)# class-map type sip inspect match-all SIP_INSPECT_L7CLASS host1/Admin(config-cmap-sip-insp)# match calling-id .*ABC123 host1/Admin(config-cmap-sip-insp)# match im-subscriber JOHN_Q_PUBLIC host1/Admin(config-cmap-sip-insp)# match content type sdp
To remove the SIP inspection class map from the ACE, enter:
(config)# no class-map type sip inspect match-any SIP_INSPECT_L7CLASS
Related Commands
(config-cmap-sip-insp) description
To provide a brief summary about the Layer 7 SIP inspection class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
2-572
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
text
Description about the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-573
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Calling party in the URI of the To header. Enter a regular expression from 1 to 255 alphanumeric characters.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
You can filter SIP traffic based on the called party (callee or destination) as specified in the URI of the SIP To header. The ACE does not include the display name or tag part of the field. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. Table 1-9 lists the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
2-574
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Calling party in the URI of the SIP From header. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
You can filter SIP traffic based on the calling party (caller or source) as specified in the URI of the SIP From header. The ACE does not include the display name or tag part of the field. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-9 for a list of the supported characters that you can use in regular expressions.
Examples
2-575
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
2-576
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. length gt number Specifies the SIP message body length. Greater than operator. Maximum size of a SIP message body that the ACE allows. Enter an integer from 0 to 65534 bytes. If the message body is greater than the configured value, the ACE performs the action that you configure in the policy map. Specifies a content type check. Specifies that the traffic must be of type Session Description Protocol (SDP) to match the class map. Regular expression that identifies the content type in the SIP message body that is required to match the class map. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching. See Table 1-9 for a list of the supported characters that you can use in regular expressions.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
2-577
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Usage Guidelines
You can configure the ACE to perform SIP content checks based on the content length or content type. By default, the ACE allows all content types.
Examples
To configure the ACE to drop SIP packets that have content with a length greater than 4000 bytes in length, enter:
host1/Admin(config)# class-map type sip inspect match-all SIP_INSP_CLASS host1/Admin(config-cmap-sip-insp)# match content length gt 200 host1/Admin(config)# policy-map type sip inspect all-match SIP_INSP_POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSP_CLASS host1/Admin(config-pmap-ins-sip-c)# deny
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Calling party. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching.
2-578
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-9 for a list of the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
2-579
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression SIP proxy server. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
SIP inspection allows you to filter messages coming from or transiting through certain SIP proxy servers. The ACE maintains a list of unauthorized SIP proxy IP addresses or URIs in the form of regular expressions and then checks this list against the VIA header field in each SIP packet. The default action is to drop SIP packets with VIA fields that match the regex list. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-9 for a list of the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber
2-580
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
(config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
2-581
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. method_name Supported SIP method that uses one of the following keywords:
ack bye cancel info invite message notify options prack refer register subscribe unknown update
Use the unknown keyword to permit or deny unknown or unsupported SIP methods.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
2-582
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Command History
Usage Guidelines
Examples
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match third-party registration (config-cmap-sip-insp) match uri
2-583
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. expression Privileged user that is authorized for third-party registrations. Enter a regular expression from 1 to 255 alphanumeric characters.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
SIP allows users to register other users on their behalf by sending REGISTER messages with different values in the From and To header fields. This process may pose a security threat if the REGISTER message is actually a DEREGISTER message. A malicious user could cause a Denial of Service (DoS) attack by deregistering all users on their behalf. To prevent this security threat, the ACE administrator can specify a list of privileged users who can register or unregister someone else on their behalf. The ACE maintains the list as a regex table. If you configure this policy, the ACE drops REGISTER messages with mismatched From and To headers and a From header value that does not match any of the privileged user IDs. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-9 for a list of the supported characters that you can use in regular expressions.
Examples
2-584
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Inspection Configuration Mode Commands
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match uri
Syntax Description
[line_number]
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate a priority for the match statements. sip tel length gt value Specifies that the ACE validates the length of a SIP URI. Specifies that the ACE validates the length of a Tel URI. Specifies the length of the SIP or Tel URI. Specifies the greater than operator. Maximum value for the length of the SIP URI or Tel URI in bytes. Enter an integer from 0 to 254 bytes.
Command Modes
Class map SIP inspection configuration mode Admin and user contexts
Command History
2-585
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
Usage Guidelines
You can configure the ACE to validate the length of SIP URIs or Tel URIs. A SIP URI is a user identifier that a calling party (source) uses to contact the called party (destination). A Tel URI is a telephone number that identifies the endpoint of a SIP connection. For more information about SIP URIs and Tel URIs, see RFC 2534 and RFC 3966, respectively.
Examples
Related Commands
(config-cmap-sip-insp) match called-party (config-cmap-sip-insp) match calling-party (config-cmap-sip-insp) match content (config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration
Syntax Description
match-all | match-any
(Optional) Determines how the ACE evaluates SIP network traffic when multiple match criteria exist in a class map.
match-all(Default) Network traffic needs to satisfy all of the match criteria (implicit AND) to match the SIP load-balancing class map. match-anyNetwork traffic needs to satisfy only one of the match criteria (implicit OR) to match the SIP load-balancing class map.
map_name
Unique identifier assigned to the SIP load-balancing class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-586
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
Command History
Usage Guidelines
Examples
To remove the SIP load-balancing class map from the configuration, enter:
host1/Admin(config)# no class-map type sip loadbalance match-any SIP_L7_CLASS
Related Commands
2-587
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
(config-cmap-sip-lb) description
To provide a brief description of the SIP load-balancing class map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description of the class map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Class map SIP load balancing configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-588
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that allows you to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. name Name of an existing SIP load-balancing class map.
Command Modes
Class map SIP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The match class-map command allows you to combine the use of the match-any and match-all keywords in the same class map. To combine match-all and match-any characteristics in a class map, create a class map that uses one match command (either match-any or match-all) and then use this class map as a match statement in a second class map that uses the other match type. The ACE restricts the nesting of class maps to two levels to prevent you from including a nested class map under another class map.
Examples
To combine the characteristics of two class maps, one with match-any and one with match-all characteristics, into a single class map, enter:
host1/Admin(config)# class-map type sip loadbalance match-any CLASS3
2-589
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
host1/Admin(config-cmap-sip-lb)# 200 match sip header Host header-value XYZ host1/Admin(config-cmap-sip-lb)# exit host1/Admin(config)# class-map type sip loadbalance match-all CLASS4 host1/Admin(config-cmap-sip-lb)# 10 match class-map CLASS3 host1/Admin(config-cmap-sip-lb)# 20 match source-address 192.168.11.2 host1/Admin(config-cmap-sip-lb)# exit
To remove the nested class map from the SIP class map, enter:
host1/Admin(config)# class-map type sip loadbalance match-all CLASS4 host1/Admin(config-cmap-sip-lb)# no 10
Related Commands
(config-cmap-sip-lb) description
Syntax Description
line_number
(Optional) Line number that you can use to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements.
2-590
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
name
Name of the field in the SIP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can enter a text string with spaces provided that you enclose the entire string in quotation marks ( ). You can enter any header field name, including a standard SIP header field name or any user-defined header field name. For a list of standard SIP header field names, see Table 1-11. Because SIP is similar to HTTP/1.1, you can use any HTTP header listed in Table 1-10 if the SIP server supports it. For a complete list of SIP headers, see RFC 3261. Header value expression string to compare against the value in the specified field in the SIP header. Enter a text string with a maximum of 255 alphanumeric characters. The ACE supports the use of regular expressions for header matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the entire string that contains spaces is quoted. If you use a match-all class map, all headers in the header map must be matched. For a list of the supported characters that you can use in regular expressions, see Table 1-9.
header-value expression
Command Modes
Class map SIP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
The ACE can perform regular expression matching against the received packet data from a particular connection based on the SIP header expression. You can configure a maximum of nine SIP header field names per class map (the ACE always parses Call-ID). When the ACE receives a SIP session request, the load-balancing decision is based on the first request message. All subsequent request and response message exchanges (with the same Call-ID) are forwarded to the same server. For this reason, when you configure header match criteria, ensure that the header is included in the first request message. Table 1-11 lists the standard SIP header fields.
Table 1-11 Standard SIP Header Fields
Description Unique identifier that groups together a series of messages in a call. SIP URI that can be used to contact the user agent. Initiator of the SIP request, the source.
2-591
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
Table 1-11
Description Desired recipient of the SIP request, the destination. Transport used for the transaction and where the response should be sent.
Examples
To configure a SIP load-balancing class map to load balance based on a SIP header named Session, enter:
host1/Admin(config)# class-map type sip loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-sip-lb)# 10 match sip header Session header-value abc123
To configure a SIP load-balancing class map to load balance based on a SIP header named Via, enter:
host1/Admin(config)# class-map type sip loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-sip-lb)# 20 match sip header Via header-value 192.*
To configure a SIP load-balancing class map to emulate a wildcard search to match the header value expression string, enter:
host1/Admin(config)# class-map type sip loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-sip-lb)# 30 match sip header To header-value .*@cisco.com host1/Admin(config-cmap-sip-lb)# 40 match sip header To header-value .*@linksys.com
To remove SIP header match criteria from the L7SLBCLASS class map, enter:
host1/Admin(config-cmap-sip-lb)# no 10 host1/Admin(config-cmap-sip-lb)# no 20
Related Commands
(config-cmap-sip-lb) description
2-592
OL-25339-01
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
Syntax Description
line_number
(Optional) Line number that you can use to edit or delete individual match commands.
For the ACE module, enter an integer from 1 to 1024 as the line number. For the ACE appliance, enter an integer from 2 to 1024 as the line number.
You can enter no line_number to delete long match commands instead of entering the entire line. The line numbers do not indicate any priority for the match statements. ip_address netmask Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.2). (Optional) Subnet mask of the IP address. Enter the netmask in dotted-decimal notation (for example, 255.255.255.0). The default is 255.255.255.255.
Command Modes
Class map SIP load balancing configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To specify that the SIP load-balancing class map match on source IP address 192.168.11.2 255.255.255.0, enter:
host1/Admin(config)# class-map type sip loadbalance match-any L7SLBCLASS host1/Admin(config-cmap-sip-lb)# 50 match source-address 192.168.11.2 255.255.255.0
To remove the source IP address match statement from the class map, enter:
2-593
Chapter 2 CLI Commands Class Map SIP Load Balancing Configuration Mode Commands
host1/Admin(config-cmap-sip-lb)# no 50
Related Commands
(config-cmap-sip-lb) description
2-594
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The console port is an asynchronous serial port on the Catalyst 6500 series switch that enables the ACE to be set up for initial configuration through a standard RS-232 port with an RJ-45 connector. Any device connected to this port must be capable of asynchronous transmission. Connection to a terminal requires a terminal emulator to be configured at 9600 baud, 8 data bits, 1 stop bit, and no parity.
Examples
Related Commands
2-595
(config-console) databits
(ACE module only) To specify the number of data bits per character, use the databits command. Use the no form of this command to revert to the default setting of 8 data bits. databits number no databits number
Syntax Description
number
Number of data bits per character. Enter an integer from 5 to 8. The default is 8 data bits.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-596
OL-25339-01
(config-console) parity
(ACE module only) To set the parity for the console connection, use the parity command. Use the no form of this command to revert to the default setting of none. parity {even | odd | none} no parity {even | odd | none}
Syntax Description
Sets the parity for the console connection to even. Sets the parity for the console connection to odd. Sets the parity for the console connection to none. This is the default setting.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-597
(config-console) speed
(ACE module only) To set the transmit and receive speeds for the serial console, use the speed command. Use the no form of this command to revert to the default setting of 9600 baud. speed baud_rate no speed baud_rate
Syntax Description
baud_rate
Transmit and receive speeds. Enter an integer between 110 and 115200 baud (110, 150, 300, 600, 1200, 2400, 4800, 9600, 19200, 28800, 38400, 57600, or 115200). The default is 9600 baud.
Command Modes
Command History
Usage Guidelines
Examples
To set the transmit and receive speeds for the serial console to 19,200 baud, enter:
host1/Admin# config Enter configuration commands, one per line. End with CNTL/Z host1/Admin(config)# host1/Admin(config)# line console host1/Admin(config-console)# speed 19200
Related Commands
2-598
OL-25339-01
(config-console) stopbits
(ACE module only) To set the number of stop bits for the console connection, use the stopbits command. Use the no form of this command to revert to the default setting of 1 stop bit. stopbits {1 | 2} no stopbits {1 | 2}
Syntax Description
1 2
Sets the stop bit to 1. The default is 1 stop bit. Sets the stop bit to 2.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-599
Syntax Description
name
Unique identifier of a virtual context. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
2-600
OL-25339-01
Related Commands
(config-context) allocate-interface
To assign one or more VLAN interfaces to the context, use the allocate-interface command. Use the no form of this command to remove the VLAN from the context configuration. allocate-interface vlan number_id no allocate-interface vlan number_id
Syntax Description
vlan number_id
Identifies the VLAN to assign to the user context. For the number_id argument, enter the number of an existing VLAN that you want to assign to the context as an integer from 2 to 4094.
Command Modes
Command History
Usage Guidelines
After you allocate the interface to a user context, you can configure the interface in that context. When a VLAN is shared in multiple contexts, the interfaces must be on the same subnet. However, the interfaces that share the VLANs will have different MAC addresses. These different MAC addresses on the same VLAN classify traffic on multiple contexts. No routing can occur across contexts even if you configure shared VLANs. The ACE allows you to configure one or more VLAN interfaces in any user context before you assign those VLAN interfaces to the associated user contexts through the allocate-interface vlan command in the Admin context. For more information about assigning interfaces to the ACE, see the Routing and Bridging Guide, Cisco ACE Application Control Engine. You cannot deallocate a VLAN from a user context if the VLAN is currently in use on that context.
2-601
Examples
To allocate the VLAN interface identified as 100 to the currently active context, enter:
host1/Admin(config-context)# allocate-interface vlan 100
Related Commands
2-602
OL-25339-01
(config-context) description
To enter a description for a user context, use the description command. Use the no form of this command to remove the context description from the configuration. description text no description
Syntax Description
text
Description for the user context. Enter a description as an unquoted text string with a maximum of 240 characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show context
2-603
(config-context) member
To associate a context with a resource class, use the member command. Use the no form of this command to remove a context from a resource class. member class no member class
Syntax Description
class
Name of an existing resource class. Enter the class name as an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can associate a context with only one resource class. If you do not explicitly associate a context with a resource class, the ACE associates the context with the default resource class.
Examples
Related Commands
2-604
OL-25339-01
Syntax Description
csr_param_name Name that designates a CSR parameter set. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you specify a CSR parameter set, you define the following distinguished name attributes:
Common nameSee the (config-csr-params) common-name command. This distinguished name attribute is required. Country nameSee the (config-csr-params) country command. This distinguished name attribute is required. E-mail addressSee the (config-csr-params) email command. LocalitySee the (config-csr-params) locality command. Organization name (certificate subject)See the (config-csr-params) organization-name command. Organization unitSee the (config-csr-params) organization-unit command. Serial numberSee the (config-csr-params) serial-number command. This distinguished name attribute is required.
2-605
StateSee the (config-csr-params) state command. This distinguished name attribute is required.
If you do not define the required distinguished name attributes, the ACE displays an error message when you attempt top generate a CSR using the CSR parameter set. You can create up to eight CSR parameter sets per context. To generate a Certificate Signing Request (CSR) file using the CSR parameter set, use the crypto generate csr command in the Exec mode.
Examples
Related Commands
crypto generate csr (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
(config-csr-params) common-name
To define the common name parameter in the Certificate Signing Request (CSR) parameter set, use the common-name command. Use the no form of this command to delete an existing common name from the CSR parameter set. common-name name no common-name
Syntax Description
name
Name that designates the common name in a CSR parameter set. Enter the common name as an unquoted alphanumeric string with no spaces or a quoted string with spaces and a maximum of 64 characters.
Command Modes
Command History
2-606
OL-25339-01
Usage Guidelines
The common name is a required distinguished name attribute. If you do not configure this attribute (and all other required attributes), the ACE displays an error message when you try to generate a CSR using the CSR parameter set. The common name should be the domain name or individual hostname of the Secure Sockets Layer (SSL) site.
Examples
Related Commands
(config) crypto csr-params (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
(config-csr-params) country
To define the country name parameter in the Certificate Signing Request (CSR) parameter set, use the country command. Use the no form of this command to delete an existing country name from the CSR parameter set. country name no country
Syntax Description
name
Name of the country where the Secure Sockets Layer (SSL) site resides. Enter the country name as an alphanumeric string from 1 to 2 characters.
Command Modes
Command History
2-607
Usage Guidelines
The country name is a required distinguished name attribute. If you do not configure this attribute (and all other required attributes), the ACE displays an error message when you try to generate a CSR using the CSR parameter set.
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
(config-csr-params) email
To define the e-mail address parameter in the Certificate Signing Request (CSR) parameter set, use the email command. Use the no form of this command to delete an existing e-mail address from the CSR parameter set. email address no email
Syntax Description
address
Address that designates the site e-mail address in a CSR parameter set. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
2-608
OL-25339-01
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
(config-csr-params) locality
To define the locality name parameter in the Certificate Signing Request (CSR) parameter set, use the locality command. Use the no form of this command to delete an existing locality from the CSR parameter set. locality name no locality
Syntax Description
name
Name that designates the locality (a county, for example) in a CSR parameter set. Enter an unquoted text string with a maximum of 40 alphanumeric characters including spaces and the ampersand (&) character.
Command Modes
Command History
Modification This command was introduced. The ampersand (&) character is supported.
Modification This command was introduced. The ampersand (&) character is supported.
Usage Guidelines
Examples
2-609
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
2-610
OL-25339-01
(config-csr-params) organization-name
To define the organization name parameter in the Certificate Signing Request (CSR) parameter set, use the organization-name command. Use the no form of this command to delete an existing organization name from the CSR parameter set. organization-name name no organization-name
Syntax Description
name
Name that designates the organization in a CSR parameter set. Enter the organization name as an unquoted alphanumeric string with a maximum of 64 characters including spaces. The ACE also supports the ampersand (&) character.
Command Modes
Command History
Modification This command was introduced. The ampersand (&) character is supported.
Modification This command was introduced. The ampersand (&) character is supported.
Usage Guidelines
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-unit (config-csr-params) serial-number (config-csr-params) state
2-611
(config-csr-params) organization-unit
To define the organization unit parameter in the Certificate Signing Request (CSR) parameter set, use the organization-unit command. Use the no form of this command to delete an existing organization unit from the CSR parameter set. organization-unit unit no organization-unit
Syntax Description
unit
Name that designates the unit (within an organization) in a CSR configuration file. Enter the organization unit as an unquoted alphanumeric string with a maximum of 64 characters including spaces. The ACE also supports the ampersand (&) character.
Command Modes
Command History
Modification This command was introduced. The ampersand (&) character is supported.
Modification This command was introduced. The ampersand (&) character is supported.
Usage Guidelines
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) serial-number (config-csr-params) state
2-612
OL-25339-01
(config-csr-params) serial-number
To define the serial number parameter in the Certificate Signing Request (CSR) parameter set, use the serial-number command. Use the no form of this command to delete an existing serial number from the CSR parameter set. serial-number number no serial-number
Syntax Description
number
Number that designates the serial number in a CSR parameter set. Enter the serial number as an alphanumeric string from 1 to 16 characters.
Command Modes
Command History
Modification This command was introduced. The ampersand (&) character is supported.
Modification This command was introduced. The ampersand (&) character is supported.
Usage Guidelines
The serial number is a required distinguished name attribute. If you do not configure this attribute (and all other required attributes), the ACE displays an error message when you try to generate a CSR using the CSR parameter set. The CA may choose to overwrite the serial number that you provide with its own serial number.
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) state
2-613
(config-csr-params) state
To define the state name parameter in the Certificate Signing Request (CSR) parameter set, use the state command. Use the no form of this command to delete an existing state name from the CSR parameter set. state name no state
Syntax Description
name
Name that designates the state or province in a CSR configuration file. Enter an unquoted text string with a maximum of 40 alphanumeric characters including spaces. and the ampersand (&) character.
Command Modes
Command History
Modification This command was introduced. The ampersand (&) character is supported.
Modification This command was introduced. The ampersand (&) character is supported.
Usage Guidelines
The state name is a required distinguished name attribute. If you do not configure this attribute (and all other required attributes), the ACE displays an error message when you try to generate a CSR using the CSR parameter set.
Examples
Related Commands
(config) crypto csr-params (config-csr-params) common-name (config-csr-params) country (config-csr-params) email (config-csr-params) locality (config-csr-params) organization-name (config-csr-params) organization-unit (config-csr-params) serial-number
2-614
OL-25339-01
Syntax Description
name
Identifier of the local Nexus device. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Nexus device named DCI_DEVICE1 and access DCI configuration mode, enter:
host1/Admin(config)# nexus-device DCI_DEVICE1 host1/Admin(config-dci)#
Related Commands
2-615
(config-dci) credentials
To configure the login credentials that the ACE uses to access the local Nexus device (Nexus 7000 series switch) in a DWS configuration, use the credentials command. Use the no form of this command to remove the login credentials of the local Nexus device from the ACE configuration. credentials {username} {[encrypted] password} no credentials {username} {[encrypted] password}
Syntax Description
username
Username that the ACE uses to log in to the local Nexus device. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the ACE encrypts the local Nexus device password. Password that the ACE uses to access the local Nexus device. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. The password will not appear in the output of the show running-config command.
encrypted password
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You must have either the vdc-admin or the network-admin user role on the Nexus 7000 to receive the Nexus 7000 output for the VM location information in XML format.
Examples
To remove the credentials of the Nexus device from the ACE configuration, enter the following command:
host1/Admin(config-dci)# no credentials admin encrypted mydcipassphrase
Related Commands
2-616
OL-25339-01
(config-dci) ip-address
To configure the IP address of the local Nexus device (Nexus 7000 series switch) in a DWS configuration, use the ip-address command. Use the no form of this command to remove the IP address of the local Nexus device from the ACE configuration. ip-address ip_address no ip-address ip_address
Syntax Description
ip_address
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The IP address specified with this command is the IP address of the management interface of either the default VDC or the VDC in which the OTV configuration is deployed on the Nexus 7000 series switch.
Examples
Related Commands
2-617
Syntax Description
name
Unique identifier of a domain in a context. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the context Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A domain does not restrict the context configuration that you can display using the show running-config command. You can still display the running configuration for the entire context. However, you can restrict your access to the configurable objects within a context by adding to the domain only a limited subset of all the objects available to a context. To limit a users ability to manipulate the objects in a domain, you can assign a role to that user. For more information about domains and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can configure KAL-AP TAGs as domains. For the domain load calculation, the ACE considers the Layer 3 class map, server farm, and real server objects. All other objects under the domain are ignored during the calculation.
Examples
2-618
OL-25339-01
Related Commands
2-619
(config-domain) add-object
To associate a configuration object with a domain, use the add-object command. Use the no form of this command to remove an object added to the domain. add-object {access-list {ethertype | extended} name | action-list name | all | class-map name | interface {bvi number | vlan number} | object-group name | parameter-map name | policy-map name | probe name | rserver name | script name | serverfarm name | sticky name} no add-object {access-list {ethertype | extended} name | action-list name | all | class-map name | interface {bvi number | vlan number} | object-group name | parameter-map name | policy-map name | probe name | rserver name | script name | serverfarm name | sticky name}
Syntax Description
access-list ethertype extended name action-list name all class-map name interface bvi number vlan number object-group name parameter-map name policy-map name probe name rserver name script name serverfarm name sticky name
Specifies an existing access control list that you want to associate with the domain. Specifies an existing EtherType access control list that you want to associate with the domain. Specifies an existing extended access control list that you want to associate with the domain. Name of the access control list. Specifies an existing action list that you want to associate with the domain. Specifies that all configuration objects in the context are added to the domain. Specifies an existing class map for flow classification that you want to associate with the domain. Specifies an existing interfaceeither a Bridge Group Virtual Interface or a VLANthat you want to associate with the domain. Specifies the existing Bridge Group Virtual Interface that you want to associate with the domain. Enter an integer from 1 to 4094. Specifies the existing VLAN that you want to associate with the domain. Enter an integer from 2 to 4094. Specifies an existing object group that you want to associate with the domain. Specifies an existing parameter map that you want to associate with the domain. Specifies an existing policy map that you want to associate with the domain. Specifies an existing real server probe (keepalive) that you want to associate with the domain. Specifies an existing real server that you want to associate with the domain. Specifies an existing script file (created with the ACE TCL scripting language) that you want to associate with the domain. Specifies an existing server farm that you want to associate with the domain. Specifies an existing sticky group that you want to associate with the domain to maintain persistence with a server.
Command Modes
2-620
OL-25339-01
Command History
Usage Guidelines
Examples
Related Commands
show domain
2-621
Syntax Description
group_id
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create an FT group with a group ID of 1 and access ft-group configuration mode, enter:
host1/Admin(config)# ft group 1 host1/Admin(config-ft-group)#
Related Commands
2-622
OL-25339-01
(config-ft-group) associate-context
To associate a context with a fault-tolerant (FT) group, use the associate-context command. You need to make this association for each of the two redundant contexts in an FT group. Use the no form of this command to remove a context from an FT group. associate-context name no associate-context name
Syntax Description
name
Identifier of the context that you want to associate with the FT group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Before you can remove a context from an FT group, you must first take the group out of service using the no inservice command. See the (config-ft-group) inservice command.
Examples
Related Commands
2-623
(config-ft-group) inservice
To place a fault-tolerant (FT) group in service, use the inservice command. Use the no form of this command to take the FT group out of service. inservice no inservice
Syntax Description
Command Modes
Command History
Usage Guidelines
Before you place an FT group in service, be sure that you have associated one or two contexts with the FT group and properly configured the two peers.
Examples
Related Commands
2-624
OL-25339-01
(config-ft-group) peer
To associate a peer ACE with a fault-tolerant (FT) group, use the peer command. Use the no form of this command to remove the peer association with the FT group. peer peer_id no peer peer_id
Syntax Description
peer_id
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The peer designation is used to denote the remote standby member of the FT group. A context in a redundant configuration can have only one peer context.
Examples
Related Commands
2-625
Syntax Description
number
Priority of the FT group on the standby member. Enter an integer from 1 to 255. The default is 100.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Configure a lower priority on the FT group member (context) that you want as the standby member.
Examples
To configure the priority of the FT group on the standby ACE with a value of 50, enter:
host1/Admin(config-ft-group)# peer priority 50
Related Commands
2-626
OL-25339-01
(config-ft-group) preempt
To configure preemption after it has been disabled, use the preempt command. Use the no form of this command to disable preemption. preempt no preempt
Syntax Description
Command Modes
Command History
Usage Guidelines
Preemption ensures that the group member with the higher priority always asserts itself and becomes the active member. By default, preemption is enabled. If you disable preemption and a member with a higher priority is found after the other member has become active, the newly elected member becomes the standby member even though it has a higher priority.
Examples
Related Commands
2-627
(config-ft-group) priority
To configure the priority of the active group member, use the priority command. Use the no form of this command to restore the default priority of 100. priority number no priority number
Syntax Description
number
Priority number for the active group member. Enter an integer from 1 to 255. The default is 100.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You must configure the priority of a group on both peer ACEs. Configure a higher priority for the group on the ACE where you want the active member to initially reside.
Examples
To set the priority of the FT group on the active member to a value of 150, enter:
host1/Admin(config-ft-group)# priority 150
Related Commands
2-628
OL-25339-01
Syntax Description
vlan_id
Identifier of an existing VLAN that you want to use as the FT VLAN. Enter an integer from 2 to 4094.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the System feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To remove an FT VLAN from the redundancy configuration, first dissociate it from the FT peer using the no form of the (config-ft-peer) ft-interface vlan command and then enter the no ft interface vlan command in configuration mode.
Examples
2-629
Related Commands
show ft show interface show running-config (ACE module only) (config) hw-module (config-ft-peer) ft-interface vlan
(config-ft-intf) ip
To assign an IP address to the fault-tolerant (FT) VLAN, use the ip command. Use the no form of this command to remove the IP address from the configuration. ip address ip_address netmask no ip address ip_address netmask
Syntax Description
Specifies the IP address of the FT VLAN. Enter an IP address in dotted-decimal notation (for example, 192.168.12.1). Subnet mask of the FT VLAN. Enter a subnet mask in dotted-decimal notation (for example, 255.255.255.0).
Command Modes
Command History
Usage Guidelines
Examples
2-630
OL-25339-01
Related Commands
2-631
(config-ft-intf) peer ip
To allow the local member of the fault-tolerant (FT) group to communicate with the remote peer, use the peer ip command to configure an IP address for the remote peer. Use the no form of this command to remove the IP address from the peer configuration. peer ip address ip_address netmask no peer ip address ip_address netmask
Syntax Description
Specifies the IP address of the remote peer. Enter an IP address in dotted-decimal notation (for example, 192.168.12.15). Subnet mask of the remote peer. Enter a subnet mask in dotted-decimal notation (for example, 255.255.255.0).
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-632
OL-25339-01
(config-ft-intf) shutdown
To disable the fault-tolerant (FT) VLAN, use the shutdown command. Use the no form of this command to enable the FT VLAN. shutdown no shutdown
Syntax Description
Command Modes
Command History
Usage Guidelines
When you create the FT VLAN, it is disabled by default. Use the no form of this command to enable the FT VLAN.
Examples
Related Commands
show interface
2-633
Syntax Description
peer_id
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-634
OL-25339-01
Syntax Description
vlan_id
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-635
(config-ft-peer) heartbeat
To configure the heartbeat interval and count for verification timing between active and standby fault-tolerant (FT) peers, use the heartbeat command. Use the no form of this command to revert to the default heartbeat interval and count. heartbeat {count number | interval frequency} no heartbeat {count number | interval frequency}
Syntax Description
count number
Specifies the number of heartbeat intervals that must transpire with no heartbeat packet received by the standby member before the standby member determines that the active member is not available. Enter an integer from 10 to 50. The default is 10 heartbeat intervals. Specifies the time period between heartbeats in milliseconds (ms). Enter an integer from 100 to 1000 ms. The default is 300 ms.
interval frequency
Command Modes
Command History
Usage Guidelines
If the standby member of the FT group does not receive a heartbeat packet from the active member, a time period equal to count number times interval frequency must elapse before a switchover between the active and standby members can occur.
Examples
Related Commands
show ft
2-636
OL-25339-01
(config-ft-peer) query-interface
To configure an alternate interface to allow the standby member to determine whether the active member is down or whether there is a connectivity problem with the fault-tolerant (FT) VLAN, use the query-interface command. A query interface helps prevent two redundant contexts from becoming active at the same time for the same FT group. Use the no form of this command to remove the query interface from the peer configuration. query-interface vlan vlan_id no query-interface vlan vlan_id
Syntax Description
vlan vlan_id
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Configuring a query interface allows you to assess the health of the active FT group member, but it increases failover time. You cannot delete a query interface if it is associated with a peer. You must dissociate the interface from the peer first, and then you can delete the query interface.
Examples
Related Commands
2-637
Syntax Description
name
Unique identifier of the tracking process for a gateway or a host. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a process that tracks and detects failures for a gateway or host and accesses FT track host configuration mode, enter:
host1/Admin(config)# ft track host TRACK_GATEWAY1 host1/Admin(config-ft-track-host)#
To delete the process that tracks and detects failures for a gateway or host, enter:
host1/Admin(config)# no ft track host TRACK_GATEWAY1
2-638
OL-25339-01
Related Commands
2-639
Syntax Description
number
Priority of the probes configured for the gateway or host on the standby member. Enter a priority value as an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The peer command keyword indicates the standby member of an FT group. Assign a priority value to multiple probes based on the relative importance of the gateway or host that the probes are tracking. If all the probes go down, the ACE decrements the priority of the FT group on the standby member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To assign a priority for multiple probes on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer priority 50
To reset the priority of multiple probes on the standby member of an FT group to the default value of 0, enter:
host1/Admin(config-ft-track-host)# no peer priority 50
Related Commands
(config-ft-track-host) priority
2-640
OL-25339-01
Syntax Description
Identifier of an existing probe that you want to associate with a gateway or host for tracking. (Optional) Specifies the priority of the probe. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Usage Guidelines
The peer command keyword indicates the standby member of an FT group. Assign a priority value to the probe based on the relative importance of the gateway or host that the probe is tracking. If the probe goes down, the ACE decrements the priority of the FT group on the standby member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
2-641
Related Commands
show probe show running-config (config) ft peer (config) probe (config-ft-track-host) probe
2-642
OL-25339-01
Syntax Description
ip_address
IPv6 or IPv4 address of the gateway or host that you want the standby FT group member to track.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
IPv6 Example:
To configure the IPv6 address of a gateway for tracking on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer track-host 2001:DB8:12::101
To remove the IPv6 address of the tracked gateway from the standby member, enter:
host1/Admin(config-ft-track-host)# no peer track-host 2001:DB8:12::101
IPv4 Example:
To configure the IPv4 address of a gateway for tracking on the standby member of an FT group, enter:
host1/Admin(config-ft-track-host)# peer track-host 172.16.27.1
To remove the IPv4 address of the tracked gateway from the standby member, enter:
host1/Admin(config-ft-track-host)# no peer track-host 172.16.27.1
2-643
Related Commands
2-644
OL-25339-01
(config-ft-track-host) priority
To assign a priority for multiple probes on the active member of a fault-tolerant (FT) group, use the priority command. Use the no form of this command to reset the multiple-probe priority to the default value of 10 on the active member. priority number no priority number
Syntax Description
number
Priority of the probes configured for the gateway or host on the active member. Enter a priority value as an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Assign a priority value for multiple probes based on the relative importance of the gateway or host that the probes are tracking. If all the probes go down, the ACE decrements the priority of the FT group on the active member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To assign a priority for multiple probes on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# priority 100
To reset the priority of multiple probes on the active member of an FT group to the default value of 0, enter:
host1/Admin(config-ft-track-host)# no priority 100
Related Commands
2-645
(config-ft-track-host) probe
To associate an existing probe with a gateway or host for tracking by the active member of a fault-tolerant (FT) group, use the probe command. Use the no form of this command to dissociate the tracking probe from the tracking process on the active member. probe name priority number no probe name priority number
Syntax Description
Identifier of an existing probe that you want to associate with a gateway or host for tracking. (Optional) Specifies the priority of the probe on the active member of an FT group. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Usage Guidelines
Assign a priority value to the probe based on the relative importance of the gateway or host that the probe is tracking. If the probe goes down, the ACE decrements the priority of the FT group on the active member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
Related Commands
2-646
OL-25339-01
(config-ft-track-host) track-host
To configure the IP address of the gateway or host that you want to track on the active member of a fault-tolerant (FT) group, use the track-host command. Use the no form of this command to remove the IP address of the gateway or host from the tracking process on the active member. track-host ip_address no track-host ip_address
Syntax Description
ip_address
IPv6 or IPv4 address of the gateway or host that you want the active FT group member to track.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
IPv6 Example:
To configure the IPv6 address of a gateway for tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# track-host 2001:DB8:12::101
To remove the IPv6 address of the tracked gateway from the active member, enter:
host1/Admin(config-ft-track-host)# no track-host 2001:DB8:12::101
IPv4 Example:
To configure the IPv4 address of a gateway for tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-host)# track-host 172.16.27.1
To remove the IPv4 address of the tracked gateway from the active member, enter:
host1/Admin(config-ft-track-host)# no track-host 172.16.27.1
Related Commands
2-647
Syntax Description
name
Unique identifier of the tracking process for an HSRP group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a process that tracks and detects failures for an HSRP group and accesses FT track HSRP configuration mode, enter:
host1/Admin(config)# ft track hsrp TRACK_HSRP_GRP1 host1/Admin(config-ft-peer)#
To delete the process that tracks and detects failures for an HSRP group, enter:
host1/Admin(config)# no ft track hsrp TRACK_HSRP_GRP1
Related Commands
2-648
OL-25339-01
Syntax Description
number
Priority of the HSRP group configured on the standby member of an FT group. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Usage Guidelines
The peer command keyword indicates the standby member of an FT group. Assign a priority value to the HSRP group based on the relative importance of the group that you are tracking on the standby member. If the HSRP group goes down, the ACE decrements the priority of the FT group on the standby member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To assign a priority to the HSRP group that you are tracking on the standby member of an FT group, enter:
host1/Admin(config-ft-track-hsrp)# peer priority 50
To reset the priority of the HSRP group to the default value of 0, enter:
host1/Admin(config-ft-track-hsrp)# no peer priority 50
Related Commands
(config-ft-track-hsrp) priority
2-649
Syntax Description
name
Identifier of an HSRP group previously configured on the supervisor engine for the Catalyst 6500 series switch that you want to track on the standby member of an FT group. Enter the name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
To configure an HSRP group for tracking on the standby member of an FT group, enter:
host1/Admin(config-ft-track-hsrp)# peer track-hsrp HSRP_GRP1
To remove the HSRP group from the tracking process on the standby member, enter:
host1/Admin(config-ft-track-hsrp)# no peer track-hsrp HSRP_GRP1
Related Commands
2-650
OL-25339-01
(config-ft-track-hsrp) priority
(ACE module only) To assign a priority to the Hot Standby Router Protocol (HSRP) group that you are tracking on the active member of a fault-tolerant (FT) group, use the priority command. Use the no form of this command to reset the priority to the default value of 10. priority number no priority number
Syntax Description
number
Priority of the HSRP group configured on the active member of an FT group. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Usage Guidelines
Assign a priority value to the HSRP group based on the relative importance of the group that you are tracking on the active member. If the HSRP group goes down, the ACE decrements the priority of the FT group on the active member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To assign a priority to the HSRP group that you are tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-hsrp)# priority 100
To reset the priority of the HSRP group to the default value of 0, enter:
host1/Admin(config-ft-track-hsrp)# no priority 100
Related Commands
2-651
(config-ft-track-hsrp) track-hsrp
(ACE module only) To track a Hot Standby Router Protocol (HSRP) group on the active member of a fault-tolerant (FT) group, use the track-hsrp command. Use the no form of this command to remove the HSRP group name from the tracking process on the active member. track-hsrp name no track-hsrp name
Syntax Description
name
Identifier of an HSRP group previously configured on the supervisor engine for the Catalyst 6500 series switch that you want to track on the active member of an FT group. Enter the name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
For example, to configure the HSRP group for tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-hsrp)# track-hsrp HSRP_GRP1
Related Commands
2-652
OL-25339-01
Syntax Description
name
Unique identifier of the process that tracks and detects failures for a critical interface. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the fault-tolerant feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a process that tracks and detects failures for an interface and access FT track interface configuration mode, enter:
host1/Admin(config)# ft track interface TRACK_VLAN200 host1/Admin(config-ft-track-interface)#
To delete the process that tracks and detects failures for an interface, enter:
host1/Admin(config)# no ft track interface TRACK_VLAN200
Related Commands
show running-config
2-653
Syntax Description
number
Priority of the interface tracked by the standby member of a fault-tolerant (FT) group. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The peer command keyword indicates the standby member of an FT group. Assign a priority value based on the relative importance of the interface that you are tracking on the standby member of an FT group. If the tracked interface goes down, the ACE decrements the priority of the FT group on the standby member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To set a priority of 100 for the interface that you are tracking on the standby member, enter:
host1/Admin(config-ft-track-intf)# peer priority 100
Related Commands
(config-ft-track-interface) priority
2-654
OL-25339-01
Syntax Description
vlan_id
Unique identifier of an existing VLAN that you want to track on the standby member of a fault-tolerant (FT) group. Enter an integer from 2 to 4094.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The peer command keyword indicates the standby member of an FT group. You cannot track the FT VLAN because it is reserved for the redundancy protocol.
Examples
To configure the VLAN 200 interface for tracking on the standby member, enter:
host1/Admin(config-ft-track-intf)# peer track-interface vlan 200
Related Commands
2-655
(config-ft-track-interface) priority
To assign a priority to the interface that the active member is tracking, use the priority command. Use the no form of this command to reset the priority of the interface to the default value of 10. priority number no priority number
Syntax Description
number
Priority of the interface tracked by the active member of a fault-tolerant (FT) group. Enter an integer from 0 to 255. The default is 0. Higher values indicate higher priorities.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Assign a priority value based on the relative importance of the interface that you are tracking on the active member of an FT group. If the tracked interface goes down, the ACE decrements the priority of the FT group on the active member by the value of the number argument. If the priority of the FT group on the active member falls below the priority of the FT group on the standby member, a switchover occurs where the active member becomes the standby member and the standby member becomes the active member.
Examples
To set a priority of 100 for the interface that you are tracking on the active member of an FT group, enter:
host1/Admin(config-ft-track-intf)# priority 100
Related Commands
2-656
OL-25339-01
Syntax Description
vlan_id
Unique identifier of an existing VLAN that you want to track on the active member of a fault-tolerant (FT) group. Enter an integer from 2 to 4094.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To configure the VLAN 200 interface for tracking on the active member, enter:
host1/Admin(config-ft-track-intf)# track-interface vlan 200
Related Commands
2-657
Syntax Description
bvi group_number
Creates a BVI for a bridge group and accesses interface configuration mode commands for the BVI. The group_number argument is the bridge-group number configured on a VLAN interface.
gigabitEthernet slot_number/ (ACE appliance only) Specifies one of the four Ethernet ports on the rear panel of the ACE. port_number
slot_numberThe physical slot on the ACE containing the Ethernet ports. This selection is always 1, the location of the daughter card in the ACE. The daughter card includes the four Layer 2 Ethernet ports to perform Layer 2 switching. port_numberThe physical Ethernet port on the ACE. Valid selections are 1 through 4, which specifies one of the four Ethernet ports (1, 2, 3, or 4) associated with the slot 1 (daughter card) selection.
(ACE appliance only) Specifies the channel number assigned to this port-channel interface. Valid values are from 1 to 255. Assigns the VLAN to the context and accesses interface configuration mode commands for the VLAN. The number argument is the VLAN number you want to assign to the interface. VLAN numbers are 2 to 4094 (VLAN 1 is reserved for internal use and cannot be used). (ACE module only) The VLAN is assigned to the ACE from the supervisor engine for the Catalyst 6500 series switch.
Command Modes
Configuration mode BVI and VLAN interfaceAdmin and user contexts (ACE appliance only) Ethernet port and port-channel interfaceAdmin context only
Command History
2-658
OL-25339-01
Usage Guidelines
All commands in this mode require the interface feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To enable the bridge-group VLANs, you must configure a bridge-group virtual interface (BVI) that represents a corresponding bridge group. An IP address in the same subnet should be configured on the BVI. This address is used for management traffic and as a source IP address for traffic from the ACE, similar to ARP requests. The ACE supports a maximum of 4093 VLAN interfaces with a maximum of 1,024 shared VLANs. The ACE supports a maximum of 4094 BVI interfaces. The ACE supports a maximum of 8192 interfaces per system that include VLANs, shared VLANs, and BVI interfaces. The ACE requires a route back to the client before it can forward a request to a server. If the route back is not present, the ACE cannot establish a flow and drops the client request. Make sure that you configure the appropriate routing to the client network on the ACE VLAN where the client traffic enters the ACE ACE. You can configure one or more VLAN interfaces in any user context before you assign those VLAN interfaces to the associated user contexts through the (config-context) allocate-interface command in the Admin context.
ACE Appliance Guidelines
In addition, the Ethernet port and port-channel interface command functions require the Admin user role. The four Ethernet ports provide physical Ethernet ports to connect servers, PCs, routers, and other devices to the ACE. You can configure the four Ethernet ports to provide an interface for connecting to 10-Mbps, 100-Mbps, or 1000-Mbps networks. Each Layer 2 Ethernet port supports autonegotiate, or full-duplex or half-duplex operation on an Ethernet LAN, and can carry traffic within a designated VLAN. You can group physical ports together on the ACE to form a logical Layer 2 interface called the EtherChannel (or port-channel). All the ports belonging to the same port-channel must be configured with same values; for example, port parameters, VLAN membership, trunk configuration. Only one port-channel in a channel group is allowed, and a physical port can belong to only to a single port-channel interface.
Examples
To assign VLAN interface 200 to the Admin context and access interface configuration mode, enter:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)#
2-659
host1/Admin(config-if)#
Related Commands
(config-if) access-group
To apply an IPv6 or an IPv4 access control list (ACL) to the inbound or outbound direction of a VLAN interface and make the ACL active, use the access-group command. Use the no form of this command to remove an ACL from an interface. access-group {input | output} acl_name no access-group {input | output} acl_name
Syntax Description
Specifies the inbound direction of the interface to which you want to apply the ACL. Specifies the outbound direction of the interface to which you want to apply the ACL. Identifier of an existing ACL that you want to apply to an interface.
Command Modes
Command History
2-660
OL-25339-01
Usage Guidelines
You must apply ACLs to a VLAN interface to allow the traffic to pass on an interface. You can apply one IPv6 and one IPv4 ACL of each type (extended and EtherType) to both directions of the interface. For connectionless protocols, you need to apply the ACL to the source and destination interfaces if you want traffic to pass in both directions. For example, you can allow Border Gateway Protocol (BGP) in an ACL in transparent mode, and you need to apply the ACL to both interfaces. A bridge-group VLAN supports extended ACLs for IP traffic and EtherType ACLs for non-IP traffic. For non-IP traffic, you can configure an EtherType ACL. EtherType ACLs support Ethernet V2 frames. You can configure the ACE to pass one or any of the following non-IP EtherTypes: Multiprotocol Label Switching (MPLS), IP version 6 (IPv6), and bridge protocol data units (BDPUs). The output option is not allowed for EtherType ACLs. To apply an ACL globally to all interfaces in a context, use the (config) access-group command.
Examples
Related Commands
(config-if) alias
To configure an IP address that is shared between active and standby ACEs for a bridge-group virtual interface (BVI) or VLAN interface, use the alias command. Use the no form of this command to delete an alias IP address. alias {ipv6_address [/prefix_length] [eui64 | unique-local]} | {ip_address mask [secondary]} no alias {ipv6_address [/prefix_length] [eui64 | unique-local]} | {ip_address mask [secondary]}
Syntax Description
ipv6_address /prefix_length
IPv6 address of the interface. (Optional, except for EUI-64) Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter a a forward slash character (/) followed by an integer from 1 to 128. The default is /128. If you use the optional eui64 keyword, you must specify a prefix length and the prefix must be less than or equal to 64. (Optional) Specifies that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use this keyword, you must specify a prefix length, the prefix must be less than or equal to 64, and the host segment must be all zeros.
eui64
2-661
(Optional) Specifies that this address is globally unique and used only for local communications within a site or organization. IPv4 address of the interface. Subnet mask of the interface. (Optional) Configures the address as a secondary IPv4 address allowing multiple subnets under the same interface. You can configure a maximum of 15 secondary addresses per interface. The ACE has a system limit of 1,024 secondary addresses.
Command Modes
Command History
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. The number of secondary addresses decreased from 15 to 4. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
Usage Guidelines
You must configure redundancy (fault tolerance) on the ACE for the alias IP address to work. For more information on redundancy, see the Administration Guide, Cisco ACE Application Control Engine. For stealth firewalls, an ACE balances traffic among unique VLAN alias IP address interfaces on another ACE that provides paths through stealth firewalls. You configure a stealth firewall so that all traffic moving in both directions across that VLAN moves through the same firewall. For details about firewall load balancing (FWLB), see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. You cannot configure secondary IP addresses on FT VLANs.
Examples
2-662
OL-25339-01
Related Commands
show interface
(config-if) arp
To add a static ARP entry in the ARP table for a VLAN interface, use the arp command. Use the no form of this command to remove a static ARP entry. arp ip_address mac_address no arp ip_address mac_address
Syntax Description
ip_address mac_address
IP address for an ARP table entry. Enter the IP address in dotted-decimal notation (for example, 172.16.27.1). MAC address for the ARP table entry. Enter the MAC address in dotted-hexadecimal notation (for example, 00.02.9a.3b.94.d9).
Command Modes
Command History
Usage Guidelines
Static ARPs for bridged interfaces are configured on the specific interface.
Examples
To allow ARP responses from the router at 10.1.1.1 with the MAC address 00.02.9a.3b.94.d9, enter:
host1/Admin(config-if)# arp 10.1.1.1 00.02.9a.3b.94.d9
To remove a static ARP entry, use the no arp command. For example, enter:
host1/Admin(config-if)# no arp 10.1.1.1 00.02.9a.3b.94.d9
2-663
Related Commands
show arp
Syntax Description
validate src-mac
Instructs the ACE to check the source MAC address in an Ethernet header against the senders MAC address in an ARP payload for every ARP packet received by the ACE (Optional) Enables ARP forwarding for the interface and forwards ARP packets with nonmatching source MAC addresses to all interfaces in the bridge group. This is the default option when you enable dynamic ARP inspection. (Optional) Disables ARP forwarding for the interface and drops ARP packets with nonmatching source MAC addresses.
flood
no-flood
Command Modes
Command History
Usage Guidelines
The ACE does not learn or update the ARP or MAC tables for packets with different MAC addresses. By default, dynamic ARP inspection is disabled. If you enable this feature, the default option is flood. Use this feature for interoperability with third-party firewalls (for example, CheckPoint). If ARP inspection fails, then the ACE does not perform source MAC validation. For details about ARP inspection, see the (config) arp command. Regardless of whether you enter the flood or the no-flood option, if the source MAC address of the ARP packet does not match the MAC address of the Ethernet header, then the source MAC validation fails and the ACE increments the Smac-validation Failed counter of the show arp command.
2-664
OL-25339-01
Examples
To enable the ACE to check the source MAC address in an Ethernet header against the senders MAC address in an ARP payload for every ARP packet received by the ACE and to forward (flood) the packets, enter:
host1/Admin(config-if)# arp inspection validate src-mac
To restore the behavior of the ACE to the default of not validating source MAC addresses, enter the following command:
host1/Admin(config-if)# no arp inspection validate src-mac
Related Commands
show arp
2-665
(config-if) bridge-group
To assign the VLAN to a bridge group, use the bridge-group command. Use the no form of this command to remove the bridge group from the VLAN. bridge-group number no bridge-group
Syntax Description
number
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
In bridge mode, you can configure two interface VLANs into a group and bridge packets between them. All interfaces are in one broadcast domain and packets from one VLAN are switched to the other VLAN. The ACE bridge mode supports only two L2 VLANs per bridge group. In this mode, VLANs do not have configured IP addresses. To enable the bridge-group VLANs, you must configure a bridge-group virtual interface (BVI) that represents a corresponding bridge group.
Examples
Related Commands
show interface
2-666
OL-25339-01
(config-if) carrier-delay
(ACE appliance only) To add a configurable delay at the physical port level to address issues with transition time, based on the variety of peers, use the carrier-delay command. Use the no form of the command to remove the carrier delay for the Ethernet port. carrier-delay seconds no carrier-delay seconds
Syntax Description
seconds
The carrier transition delay in seconds. Valid values are 0 to 120 seconds. The default is 0 (no carrier delay).
Command Modes
Command History
Usage Guidelines
If you connect an ACE to a Catalyst 6500 series switch, your configuration on the Catalyst may include the Spanning Tree Protocol (STP). However, the ACE does not support STP. In this case, you may find that the Layer 2 convergence time is much longer than the physical port up time. For example, the physical port would normally be up within 3 seconds, but STP moving to the forward state may need approximately 30 seconds. During this transitional time, although the ACE declares the port to be up, the traffic will not pass. The carrier-delay command adds a configurable delay at the physical port level to address this transition time, based on the variety of peers.
Examples
To add a configurable delay of 60 seconds at the physical port level for Ethernet port 3, enter:
host1/Admin(config)# interface gigabitEthernet 1/3 host1/Admin(config-if)# carrier-delay 60
Related Commands
show interface
2-667
(config-if) channel-group
(ACE appliance only) To map the physical Ethernet port to a port channel when configuring Layer 2 EtherChannels, use the channel-group command. Use the no form of the command to remove the channel group assigned to the Ethernet port. channel-group channel_number no channel-group channel_number
Syntax Description
channel_number
Channel number assigned to this channel group. Valid values are from 1 to 255.
Command Modes
Command History
Usage Guidelines
You can group physical ports together on the ACE to form a logical Layer 2 interface called the EtherChannel (or port-channel). The channel-group command configures the Ethernet port in a port-channel group and automatically creates the port-channel logical interface. It is not necessary to configure a port-channel interface before assigning a physical Ethernet port to a channel group through the channel-group command. A port-channel interface is created automatically when the channel group receives its first physical interface, if it is not already created.
Examples
Related Commands
show interface
2-668
OL-25339-01
(config-if) description
To provide a description for a bridge-group virtual interface (BVI) or VLAN interface, use the description command. Use the no form of this command to delete the description. description text no description
Syntax Description
text
Description for the interface. Enter an unquoted text string that contains a maximum of 240 characters including spaces.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To provide the description of POLICY MAP 3 FOR INBOUND AND OUTBOUND TRAFFIC, enter:
host1/admin(config-if)# description POLICY MAP3 FOR INBOUND AND OUTBOUND TRAFFIC
Related Commands
show interface
2-669
(config-if) duplex
(ACE appliance only) To configure an Ethernet port for full- or half-duplex operation, use the duplex command in interface configuration mode. The default configuration for an ACE interface is autonegotiate. Use the no form of this command to revert to autonegotiation operation. duplex {full | half} no duplex
Syntax Description
full half
Configures the specified Ethernet port for full-duplex operation, which allows data to travel in both directions at the same time. Configures the specified Ethernet port for half-duplex operation. A half-duplex setting ensures that data travels only in one direction at any given time.
Command Modes
Command History
Usage Guidelines
If you configure the Ethernet port speed to auto on a 10/100/1000-Mbps Ethernet port, both speed and duplex are autonegotiated. The ACE prevents you from making a duplex setting when you configure the speed of an Ethernet port to auto. The speed command must be a non-auto setting of 10, 100, or 1000 Mbps to be able to configure the duplex setting for the Ethernet port.
Examples
Related Commands
(config-if) speed
2-670
OL-25339-01
Syntax Description
number
Maximum number of fragments that belong to the same packet. Enter an integer from 1 to 256. The default is 24.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To reset the maximum number of fragments in a packet to the default of 24, enter:
host1/C1(config-if)# no fragment chain
Related Commands
2-671
Syntax Description
number
Minimum fragment size. Enter an integer from 28 to 9216 bytes. The default is 576 bytes.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To reset the minimum fragment size to the default value of 576 bytes, enter:
host1/C1(config-if)# no fragment min-mtu
Related Commands
2-672
OL-25339-01
Syntax Description
seconds
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The IP reassembly timeout specifies the period of time after which the ACE abandons the fragment reassembly process if it does not receive any outstanding fragments for the current fragment chain (fragments that belong to the same packet).
Examples
Related Commands
2-673
Command Modes
Command History
Usage Guidelines
Peer ACE appliances communicate with each other over a dedicated FT VLAN. These redundant peers use the FT VLAN to transmit and receive heartbeat packets and state and configuration replication packets. On both peer ACE appliances, you must configure the same Ethernet port or the same port-channel interface as the FT VLAN port. For example, if you configure ACE appliance 1 to use Ethernet port 4 as the FT VLAN port, then be sure to configure ACE appliance 2 to use Ethernet port 4 as the FT VLAN port. It is not necessary to create an FT VLAN before designating an Ethernet port or port-channel interface as the FT VLAN port. When you specify the ft-port vlan command, the ACE modifies the associated Ethernet port or port-channel interface to a trunk port. We recommend that you enable QoS on the FT VLAN port to provide higher priority for FT traffic (see the (config-if) qos trust cos command). For details on configuring redundant ACE appliances, including an FT VLAN, see the Administration Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show interface
2-674
OL-25339-01
(config-if) icmp-guard
To enable the ICMP security checks in the ACE after they have been disabled, use the icmp-guard command. This feature is enabled by default. Use the no form of this command to disable the ICMP security checks. icmp-guard no icmp-guard
Syntax Description
Command Modes
Command History
Usage Guidelines
By default, the ACE provides several ICMP security checks by matching ICMP reply packets with request packets and using mismatched packets to detect attacks. Also, the ACE forwards ICMP error packets only if a connection record pertaining to the flow for which the error packet was received exists.
Caution
If you disable the ACE ICMP security checks, you may expose your ACE and your data center to potential security risks. After you enter the no icmp-guard command, the ACE no longer performs Network Address Translation (NAT) translations on the ICMP header and payload in error packets, which potentially can reveal real host IP addresses to attackers. If you want to operate your ACE as a load balancer only, use the no icmp-guard command to disable the ACE ICMP security checks. You must also disable TCP normalization by using the no normalization command. For details about operating your ACE for load balancing only, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To enable the ACE ICMP security checks after you have disabled them, enter:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)# icmp-guard
2-675
Related Commands
(config-if) normalization
2-676
OL-25339-01
(config-if) ip address
To assign an IPv6 or an IPv4 address to a bridge-group virtual interface (BVI) or a VLAN interface, use the ip address command. Use the no form of this command to remove an IP address from an interface. ip address {ipv6_address [/prefix_length] [eui64 | link-local | unique-local]} | {ipv4_address mask [secondary]} no ip address {ipv6_address [/prefix_length] [eui64 | link-local | unique-local]} | {ipv4_address mask [secondary]}
Syntax Description
ipv6_address /prefix_length
IPv6 address of the interface. (Optional, except for EUI-64) Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter a a forward slash character (/) followed by an integer from 1 to 128. The default is /128. If you use the optional eui64 keyword, you must specify a prefix length and the prefix must be less than or equal to 64. (Optional) Specifies that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use this keyword, you must specify a prefix length, the prefix must be less than or equal to 64, and the host segment must be all zeros. (Optional) Specifies that the address is valid only for the current link. (Optional) Specifies that this address is globally unique and used only for local communications within a site or organization. IPv4 address of the interface. Subnet mask of the interface. (Optional) Configures the address as a secondary IPv4 address allowing multiple subnets under the same interface. You can configure a maximum of 15 secondary addresses per interface. The ACE has a system limit of 1,024 secondary addresses.
eui64
Command Modes
Command History
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. The number of secondary addresses decreased from 15 to 4. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
2-677
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
Usage Guidelines
To process IPv6 traffic on an interface, you must configure the ipv6 enable command on that interface. You can configure one IPv6 link-local and one IPv6 local-unique address on an interface. If you configure additional addresses of either type, the existing address is overwritten.
Caution
Do not configure under a real server a peer IPv6 address that is calculated from EUI64. In a redundant configuration, if you configure a peer IPv6 address as EUI64 on an interface, the address will not be learned by the active member of an FT group because the address is calculated only on the peer. If you then configure the same calculated IPv6 address on the active under a real server, the CLI accepts it because it does not calculate it. This IPv6 address is not synced to the standby because it conflicts with the interface address. If you subsequently apply a probe to the real server, the state of the real server is PROBE-FAILED on the active and OUTOFSERVICE on the standby. This same check applies to VIPs, routes, interfaces, and probes. When you assign an IPv4 address to an interface, the ACE automatically makes the interface routed. You must configure a primary IPv4 address for the interface to allow a VLAN to become active. The primary address must be active before a secondary address can be active. An interface can have only one primary IPv4 address. When you configure access to an interface, the ACE applies it to all IPv4 addresses configured on the interface. The ACE treats the secondary addresses the same as a primary address and handles IP broadcasts and ARP requests for the subnet that is assigned to the secondary address as well as the interface routes in the IP routing table. The ACE accepts client, server, or remote access traffic on the primary and secondary addresses. When the destination for the control plane (CP)-originated packets is Layer 2 adjacent to either the primary subnet or one of the secondary subnets, the ACE uses the appropriate primary or secondary interface IP address for the destination subnet as the source IP address. For any destination that is not Layer 2 adjacent, the ACE uses the primary address as the source IP address. For packets destined to the secondary IP address, the ACE sends the response with the secondary IP address as the source address. SSL probes use the primary IP address as the source address for all the destinations. You cannot configure secondary IP addresses on FT VLANs. When you configure a query interface to assess the health of the active FT group member, it uses the primary IP address. You must configure static ARP entries for bridged interfaces on the specific interface. In a single context, you must configure each interface address on a unique subnet; the addresses cannot overlap. However, the IP subnet can overlap an interface in different contexts. You must configure a unique IP address across multiple contexts on a shared VLAN. On a nonshared VLAN, the IP address can be the same. No routing occurs across contexts even when shared VLANs are configured.
2-678
OL-25339-01
Examples
IPv6 Examples
To configure an IPv6 link-local address on VLAN 100, enter the following commands:
host1/Admin(config)# interface VLAN 100 host1/Admin(config-if)# ip address FE80:DB8:1::1 link-local
IPv4 Examples
To set the IPv4 address of 192.168.1.1 255.255.255.0 for VLAN interface 200, enter:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)# ip address 192.168.1.1 255.255.255.0
To assign a secondary IP address and mask 193.168.1.1 255.255.255.0 to VLAN interface 200, enter the following command:
host1/Admin(config-if)# ip address 192.168.1.2 255.255.255.0 secondary
Related Commands
2-679
(config-if) ip df
To configure how the ACE handles an IP packet that has its Dont Fragment (DF) bit set on a VLAN interface, use the ip df command. Use the no form of this command to instruct the ACE to ignore the DF bit. ip df {clear | allow} no ip df
Syntax Description
clear
Clears the DF bit and permits the packet. If the packet is larger than the next-hop maximum transmission unit (MTU), the ACE fragments the packet. Permits the packet with the DF bit set. This is the default. If the packet is larger than the next-hop MTU, the ACE discards the packet and sends an ICMP unreachable message to the source host.
allow
Command Modes
Command History
Usage Guidelines
Occasionally, an ACE may receive a packet that has its DF bit set in the IP header. This flag tells network routers and the ACE not to fragment the packet and to forward it in its entirety.
Examples
Related Commands
2-680
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
The DHCP relay starts forwarding packets to the DHCP server address specified in the ip dhcp relay server command for the associated interface or context.
Examples
Related Commands
2-681
Syntax Description
ip_address
IP address of the DHCP server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-682
OL-25339-01
(config-if) ip options
To configure how the ACE handles IP options and to perform specific actions when an IP option is set in a packet for a VLAN interface, use the ip options command. Use the no form of this command to instruct the ACE to ignore the IP option. ip options {allow | clear | clear-invalid | drop} no ip options
Syntax Description
Allows the packet with the IP options set. Clears the specified option from the packet and allows the packet. Clears all IP options from the packet if the ACE encounters one or more invalid or unsupported IP options and allows the packet. This option is the default. Causes the ACE to discard the packet.
drop
Command Modes
Command History
Usage Guidelines
Examples
To reset the ACE to its default of clearing all IP options if the ACE encounters one or more invalid or unsupported IP options, enter:
host1/Admin(config-if)# no ip options
Related Commands
2-683
Syntax Description
vlan_id
Interface shared between the supervisor and the intervening device. Enter the ID as an integer from 2 to 4090.
Command Modes
Command History
Usage Guidelines
Use this command when there is no directly shared VLAN between the ACE and the Catalyst 6500 series supervisor. This topology can occur when there is an intervening device, for example, a Cisco Firewall Services Module (FWSM), configured between the ACE and the supervisor. Be sure to configure this command on the VIP interface of the ACE.
Examples
To restore the ACE default behavior of advertising the VIP interface VLAN for RHI, enter:
host1/Admin(config-if)# no ip route inject vlan 200
Related Commands
2-684
OL-25339-01
Syntax Description
number
Minimum number of hops that a packet can take to reach its destination. Enter an integer from 1 to 255 seconds.
Command Modes
Command History
Usage Guidelines
Each router along the packets path decrements the TTL by one. If the packets TTL equals 0 before the packet reaches its destination, the packet is discarded. If the TTL value of the incoming packet is lower than the configured minimum value, the ACE rewrites the TTL with the configured value. Otherwise, the ACE transmits the packet with its TTL unchanged or discards the packet if the TTL equals zero. This command applies to both IPv4 and IPv6 flows. The configured value replaces the TTL in an IPv4 packet and the hop limit in an IPv6 packet if the original value is lower.
Examples
Related Commands
2-685
Syntax Description
Command Modes
Command History
Usage Guidelines
Unicast reverse-path forwarding (URPF) helps to mitigate problems caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by allowing the ACE to discard IP packets that lack a verifiable source IP address. This feature enables the ACE to filter both ingress and egress packets to verify addressing and route integrity. The route lookup is typically based on the destination address, not the source address. When you enable URPF, the ACE discards packets if no route is found or if the route does not match the interface on which the packet arrived. You cannot use this command when RPF based on the source MAC address for a VLAN interface is enabled through the (config-if) mac-sticky enable command.
Examples
Related Commands
2-686
OL-25339-01
Command Modes
Configuration mode and interface configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To enable the DHCP relay agent globally for all VLAN interfaces associated with a context, enter the following command:
host1/Admin(config)# ipv6 dhcp relay enable
To enable the DHCP relay agent at the VLAN interface level, enter the following command:
host1/Admin(config)# ipv6 dhcp relay enable host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 dhcp relay enable
To disable the DHCP relay agent globally for VLAN interfaces in a context where DHCP relay is not explicitly configured, enter the following command:
host1/Admin(config)# no ipv6 dhcp relay enable
To disable the DHCP relay agent on a VLAN interface, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# no ipv6 dhcp relay enable
Related Commands
show ipv6 (config-if) ipv6 dhcp relay fwd-interface (config-if) ipv6 dhcp relay server
2-687
Syntax Description
vlan vlan_id
Specifies the VLAN interface number that the ACE uses to forward DHCP requests. Enter the number of an existing VLAN interface as an integer from 2 to 4094.
Command Modes
Configuration mode and interface configuration mode Admin and user contexts
Command History
Usage Guidelines
When you configure this command, the ACE uses the specified VLAN interface to forward all client DHCP requests to the All_DHCP_Relay_Agents_and_Servers address of FF02::1:2.
Examples
To configure VLAN200 as the DHCP forwarding VLAN interface, enter the following command:
host1/Admin(config)# ipv6 dhcp relay fwd-interface vlan 200
To remove the forwarding VLAN interface from the configuration, enter the following command:
host1/Admin(config)# no ipv6 dhcp relay fwd-interface vlan 200
Related Commands
show ipv6 (config-if) ipv6 dhcp relay enable (config-if) ipv6 dhcp relay server
2-688
OL-25339-01
Syntax Description
Specifies the IPv6 address of the destination DHCPv6 server (Optional) Specifies the outgoing forwarding interface if the DHCP server address is a link-local address
Command Modes
Configuration mode and interface configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To set the IPv6 address of a DHCPv6 relay server globally for all interfaces associated with a context, enter:
host1/Admin(config)# ipv6 dhcp relay enable host1/Admin(config)# ipv6 dhcp relay server 2001:DB8:1::1/64
To set the IPv6 address of a DHCP relay server at the VLAN interface level, enter:
host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ipv6 dhcp relay enable host1/Admin(config-if)# ipv6 dhcp relay server 2001:DB8:1::1/64
To set the IPv6 address of a DHCPv6 server that is reachable on its link-local address, enter the following commands:
host1/Admin(config)# interface vlan 50 host1/Admin(config-if)# ipv6 dhcp relay enable host1/Admin(config-if)# ipv6 dhcp relay server fe80::250:56ff:fe90:2c fwd-interface vlan 100
2-689
Related Commands
show ipv6 (config-if) ipv6 dhcp relay enable (config-if) ipv6 dhcp relay fwd-interface
2-690
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
The interface cannot be in bridged mode. The interface may or may not have IPv4 addresses configured on it.
Examples
Related Commands
2-691
Syntax Description
If a packet contains an IPv6 extension header, the ACE allows the packet with all the header options If a packet contains an IPv6 extension header, the ACE clears all the IPv6 extension header options and allows the packet If a packet contains an IPv6 extension header and one of the header options is invalid, the ACE clears all the extension header options and allows the packet (Default) If the packet contains an IPv6 extension header and one of the header options is invalid, theACE drops the packet
Command Modes
Command History
Usage Guidelines
The default option is drop. There is no provision to selectively choose which extension header to act on.
Examples
To configure the ACE to clear IPv6 extension headers and allow the packet, enter the following commands:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)# ipv6 extension-header clear
To reset the behavior of the ACE to the default of dropping packets with invalid IPv6 extension headers, enter the following command:
host1/Admin(config-if)# no ipv6 extension-header
Related Commands
2-692
OL-25339-01
Syntax Description
number
Specifies the fragment chain limit as an integer from 1 to 256 fragments. The default is 24 fragments.
Command Modes
Command History
Usage Guidelines
The default option is drop. There is no provision to selectively choose which extension header to act on.
Examples
To set the IPv6 fragment chain limit as 48, enter the following command:
host1/C1(config-if)# ipv6 fragment chain 48
To reset the maximum number of fragments in a packet to the default of 24, enter the following command:
host1/C1(config-if)# no ipv6 fragment chain
Related Commands
2-693
Syntax Description
number
Specifies the minimum fragment size as an integer from 68 to 1280 bytes. The default is 1280 bytes.
Command Modes
Command History
Usage Guidelines
Examples
To configure the minimum IPv6 fragment size that the ACE accepts for reassembly, enter the following command:
host1/C1(config-if)# ipv6 fragment min-mtu 1024
To reset the minimum fragment size to the default value of 1280 bytes, enter the following command:
host1/C1(config-if)# no ipv6 fragment min-mtu
Related Commands
2-694
OL-25339-01
Syntax Description
seconds
Specifies the fragment reassembly timeout. Enter an integer from 1 to 60 seconds. The default is 60 seconds.
Command Modes
Command History
Usage Guidelines
The IPv6 reassembly timeout specifies the period of time after which the ACE abandons the fragment reassembly process if it does not receive any outstanding fragments for the current fragment chain (fragments that belong to the same packet).
Examples
To set the fragment reassembly timeout to 30 seconds, enter the following command:
host1/C1(config-if)# ipv6 fragment timeout 30
To reset the fragment timeout to the default value of 60 seconds, enter the following command:
host1/C1(config-if)# no ipv6 fragment timeout
Related Commands
2-695
Syntax Description
Command Modes
Command History
Usage Guidelines
Use the no form of this command as part of an overall strategy to operate the ACE as a pure server load balancer. For details, see Chapter 1, Overview, in the Server Load-Balancing Guide, Cisco ACE Application Control Engine. The ACE provides several ICMP security checks by matching ICMP reply packets with request packets and using mismatched packets to detect attacks. Also, the ACE forwards ICMP error packets only if a connection record exists pertaining to the flow for which the error packet was received. By default, the ACE ICMP security checks are enabled.
Caution
Disabling the ACE ICMPv6 security checks may expose your ACE and your data center to potential security risks. After you enter the no ipv6 icmp-guard command, the ACE no longer performs NAT translations on the ICMPv6 header and payload in error packets, which potentially can reveal real host IPv6 addresses to attackers. When the ipv6 icmp-guard command is enabled, only the "Packet Too Big ICMPv6 message is allowed. To allow other ICMPv6 error messages (for example, the Time Exceeded message or the Parameter Problem message), the ipv6 icmp-guard command should be disabled.
Examples
2-696
OL-25339-01
Related Commands
2-697
Syntax Description
bytes
Number of bytes in the MTU. Enter a number from 1280 to 9216 bytes. The default is 1500.
Command Modes
Command History
Usage Guidelines
The default MTU is a 1500-byte block for Layer 3 interfaces. This value is sufficient for most applications, but you can pick a lower number if network conditions require it. The ACE fragments packets that are larger than the MTU value before sending them to the next hop. This command is valid only for Layer 3 interfaces (VLANs or BVIs). The ACE will not recognize this command on a transparent (Layer 2) interface.
Examples
To specify the MTU data size of for a Layer 3 interface, enter the following command:
host1/admin(config-if)# ipv6 mtu 1300
To reset the MTU block size to the default value of 1500 for Layer 3 interfaces, enter:
host1/admin(config-if)# no ipv6 mtu
Related Commands
show interface
2-698
OL-25339-01
Syntax Description
number
Specifies the number of times that the ACE sends NS messages to its neighbors on the local link for DAD. Enter an integer from 0 to 255. The default is 1.
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to send NS messages three times for DAD, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd dad-attempts 3
To reset the ACE behavior to the default of sending NS messages for DAD once, enter the following command:
host1/Admin(config-if)# no ipv6 nd dad-attempts
Related Commands
2-699
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To restore the ACE default behavior of advertising the VIP interface VLAN for RHI, enter:
host1/Admin(config-if)# no ip route inject vlan 200
Related Commands
2-700
OL-25339-01
Syntax Description
ns-interval interval
Indicates the frequency of the neighbor solicitation (NS) messages that are sent by the ACE. Specifies the frequency in milliseconds (msecs) of the NS messages that are sent by the ACE. Enter an integer from 1000 to 2147483647. The default is 1000 msecs.
Command Modes
Command History
Usage Guidelines
The ACE sends neighbor solicitation messages via ICMPv6 on the local link to determine the IPv6 addresses of nearby nodes (hosts or routers).
Examples
To reset the NS interval to the default value of 1000 msecs, enter the following commands:
host1/Admin(config)# interface VLAN 100 host1/Admin(config-if)# no ipv6 nd ns-interval 36000
Related Commands
2-701
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To instruct hosts to use DHCP for nonaddress configurations, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd other-config-flag
To reset the ACE behavior to the default of not notifying hosts to use DHCP for nonaddress configurations, enter the following command:
host1/Admin(config-if)# no ipv6 nd other-config-flag
Related Commands
2-702
OL-25339-01
Syntax Description
Specifies the prefix that the ACE advertises in RA messages. (Optional) Instructs the ACE to not advertise the prefix. (Optional) Specifies that the prefix should not be used for autoconfiguration. (Optional) Flag related to the L-bit as defined in RFC 2461. When you specify the optional off-link keyword, the L-bit flag is turned off, which indicates that the specified prefix should not be used for onlink determination. However, when the L-bit is enabled (the default setting), it indicates in the router advertisement messages that the specified prefix is assigned to the local link. Therefore, nodes sending traffic to addresses that contain the specified prefix consider the destination to be locally reachable on the link. pref-lt number(Optional) Length of time in seconds that prefix is preferred. For the number argument, enter an integer from 0 to 2147483647 The default is 604800 (seven days). valid-lt number(Optional) Length of time in seconds that the prefix is valid. For the number argument, enter an integer from 0 to 2147483647. The default is 2592000 seconds (30 days). (Optional) Specified that the prefix never expires.
valid-lt number
valid-lt number
infinite
Command Modes
Command History
Usage Guidelines
Examples
To configure the prefixes that the ACE advertises in RA messages, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd prefix 2001:DB8:1::2/64 valid-lt 3000000
2-703
Related Commands
2-704
OL-25339-01
Syntax Description
number
Specifies the number of hops that neighbors should use when they originate IPv6 packets. Enter an integer from 0 to 255. The default is 64.
Command Modes
Command History
Usage Guidelines
Examples
To configure the number of hops that neighbors should use when originating IPv6 packets, enter the following command:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd ra hop-limit 32
To reset the hop limit to the default of 64, enter the following command:
host1/Admin(config-if)# no ipv6 nd ra hop-limit 32
Related Commands
2-705
Syntax Description
number
specifies the rate in seconds at which the ACE sends RA messages to other nodes on the local link. Enter an integer from 4 to 1800. The default is 600.
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to send RA messages every 900 seconds (15 minutes), enter the following command:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd ra interval 900
To reset the interval to the default of 600 seconds (10 minutes), enter the following command:
host1/Admin(config-if)# no ipv6 nd ra interval
Related Commands
2-706
OL-25339-01
Syntax Description
number
Specifies the length of time in seconds that the neighboring nodes should consider the ACE as the default router. Enter an integer from 0 to 9000. The default is 1800 seconds (30 minutes).
Command Modes
Command History
Usage Guidelines
Examples
To configure an RA lifetime of 2400 seconds (40 minutes), enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd ra lifetime 2400
To reset the RA lifetime to the default of 1800 seconds (30 minutes), enter the following command:
host1/Admin(config-if)# no ipv6 nd ra lifetime
Related Commands
2-707
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to not send RA messages to neighbors in response to RS messages, enter the following commands;
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd ra suppress
To reset the ACE behavior to the default of always sending RA messages in response to RS messages, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# no ipv6 nd ra suppress
Related Commands
2-708
OL-25339-01
Syntax Description
number
Specifies the length of time in milliseconds (msecs) after which a node is considered reachable. Enter an integer from 0 to 3600000 msecs. The default is 0.
Command Modes
Command History
Usage Guidelines
The reachable time parameter specifies the time in milliseconds during which a host considers a peer as reachable following the hosts receipt of a reachability confirmation from the peer. A reachability confirmation can be an NA or NS message or any upper protocol traffic. The ACE sends the reachable time value in RA messages in response to RS messages.
Examples
To configure the ACE to send a reachable time value of 2000 msecs, enter the following commands;
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd reachable-time 2000
To restore the reachable time value to the default of 1000 msecs, enter the following command:
host1/Admin(config-if)# no ipv6 nd reachable-time
Related Commands
2-709
Syntax Description
number
Specifies the time in seconds during which NS messages are retransmitted. Enter an integer from 0 to 3600000. The default is 0.
Command Modes
Command History
Usage Guidelines
Examples
To configure the NS retransmission time for hosts, enter the following commands:
host1/Admin(config)# interface vlan 100 host1/Admin(config-if)# ipv6 nd retransmission-time 1000
To restore the NS retransmission time value to the default of 0 msecs, enter the following command:
host1/Admin(config-if)# no ipv6 nd retransmission-time
Related Commands
2-710
OL-25339-01
Syntax Description
ipv6_address mac_address
IPv6 address of the host. Layer 2 media access control (MAC) address.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-711
Syntax Description
Command Modes
Command History
Usage Guidelines
Caution
By default, TCP normalization is enabled. If you disable TCP normalization, you may expose your ACE and your data center to potential security risks. TCP normalization helps protect the ACE and the data center from attackers by enforcing strict security policies that are designed to examine traffic for malformed or malicious segments. To operate your ACE for load balancing only, disable TCP normalization by entering the no ipv6 normalization command. You must also disable the ACE Internet Control Message Protocol (ICMP) security checks by using the no icmp-guard command. For details about operating your ACE as a load balancer only, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. Disabling TCP normalization affects only Layer 4 traffic. TCP normalization is always enabled for Layer 7 traffic. Use the no ipv6 normalization command when you encounter the following two types of asymmetric flows, which would otherwise be blocked by the normalization checks that the ACE performs:
ACE sees only the client-to-server traffic. For example, for a TCP connection, the ACE sees the SYN from the client, but not the SYN-ACK from the server. In this case, apply the no ipv6 normalization command to the client-side VLAN. ACE sees only the server-to-client traffic. For example, for a TCP connection, the ACE receives a SYN-ACK from the server without having received the SYN from the client. In this case, apply the no ipv6 normalization command to the server-side VLAN.
With TCP normalization disabled, the ACE still sets up flows for the asymmetric traffic described above and makes entries in the connection table. Note that the ACE does not check the TCP flags and TCP state of the connection. If a connection is in the half-closed state and a new SYN arrives, the connection is still used but the states do not change. Once the connection is closed properly, the extra ACK from the server goes through as a routed connection and the address is not masked to originate from the VIP.
2-712
OL-25339-01
With TCP normalization enabled, when the ACE receives the final ACK, the ACE removes the entry from the connection table. Even if FIN/ACK retransmission occurs, the ACE drops this packet due to TCP normalization feature. This means that the client cannot receive the final ACK and keeps the LAST_ACK state until half-close timeout occurs by the client.
Examples
Related Commands
2-713
Syntax Description
Command Modes
Command History
Usage Guidelines
URPF helps to mitigate problems caused by the introduction of malformed or forged (spoofed) IPv6 source addresses into a network by allowing the ACE to discard IPv6 packets that lack a verifiable source IP address. This feature enables the ACE to filter both ingress and egress packets to verify addressing and route integrity. The route lookup is typically based on the destination address, not the source address. When you enable URPF, the ACE discards packets if no route is found or if the route does not match the interface on which the packet arrived. You cannot use this command when URPF based on the source MAC address for a VLAN interface is enabled through the (config-if) mac-sticky enable command.
Examples
Related Commands
2-714
OL-25339-01
Syntax Description
Command Modes
Command HistoryA
Usage Guidelines
By default, the ACE does not allow traffic from one context to another context over a transparent firewall. The ACE assumes that VLANs in different contexts are in different Layer-2 domains, unless it is a shared VLAN. Thus the ACE allocates the same MAC address to them. When using a firewall service module (FWSM) to bridge traffic between two contexts on the ACE, two Layer-3 VLANs must be assigned to the same bridge domain. To support this configuration, these VLAN interfaces require different MAC addresses. When you issue the mac-address autogenerate command, the ACE assigns a MAC address from the bank of MAC address for shared VLANs. If you issue the no mac-address autogenerate command, the interface retains this address. To revert to a MAC address for an unshared VLAN, you must delete the interface and then readd it.
Examples
Related Commands
2-715
Syntax Description
Command Modes
Command History
Usage Guidelines
When you use this command to enable the mac-sticky feature, the ACE uses the source MAC address from the first packet of a new connection to determine the device to send the return traffic. This guarantees that the ACE sends the return traffic for load-balanced connections to the same device originating the connection. By default, the ACE performs a route lookup to select the next hop to reach the client. This feature is useful when the ACE receives traffic from Layer-2/Layer-3 adjacent stateful devices, like firewalls and transparent caches, guaranteeing that it sends return traffic to the correct stateful device that sourced the connection without any requirement for source NAT. For more information on firewall load balancing, see the Security Guide, Cisco ACE Application Control Engine. You cannot use this command when RPF based on the source IP address for a VLAN interface is enabled through the (config-if) ip verify reverse-path command.
Examples
2-716
OL-25339-01
Related Commands
2-717
(config-if) mtu
To specify the maximum transmission unit (MTU) for a VLAN interface, use the mtu command. This command allows you to set the data size that is sent on a connection. Use the no form of this command to reset the MTU block size to the default of 1280 (IPv6) or 1500 (IPv4) for Ethernet interfaces. mtu bytes no mtu
Syntax Description
bytes
Number of bytes in the MTU. For IPv6, enter a number from 1280 to 9216 bytes. The default is 1500. For IPv4, enter a number from 64 to 9216 bytes. The default is 1500.
Command Modes
Command History
Modification This command was introduced. Modified range and default for IPv6 support.
Modification This command was introduced. Modified range and default for IPv6 support.
Usage Guidelines
The default MTU is a 1500-byte block for Ethernet interfaces. This value is sufficient for most applications, but you can pick a lower number if network conditions require it. The ACE fragments packets that are larger than the MTU value before sending them to the next hop.
Examples
To specify the MTU data size of for an Ethernet interface, enter the following command:
host1/admin(config-if)# mtu 1300
To reset the MTU block size to the default value of 1500 for Ethernet interfaces, enter:
host1/admin(config-if)# no mtu
Related Commands
show interface
2-718
OL-25339-01
(config-if) nat-pool
To create a pool of IP addresses for dynamic Network Address Translation (NAT) for a VLAN interface, use the nat-pool command. Use the no form of this command to remove a NAT pool from the configuration. nat-pool nat_id {ipv6_address1[/prefix_length] [ipv6_address2[/prefix_length]]} | {ipv4_address1 [ipv4_address2] netmask mask} [pat] no nat-pool nat_id ip_address1 [ip_address2] netmask mask [pat]
Syntax Description
Identifier of the NAT pool of global IP addresses. Enter an integer from 1 to 2147483647. Single IPv6 address and optional prefix length, or if you are also using the ipv6_address2 argument, the first IP address in a range of global addresses used for NAT. (Optional) Highest IPv6 address and optional prefix length in a range of global IPv6 addresses used for NAT. You can configure a maximum of 64 K addresses in a NAT pool. Single IP address, or if also using the ip_address2 argument, the first IP address in a range of global addresses used for NAT. Enter an IP address in dotted-decimal notation (for example, 172.27.16.10). (Optional) Highest IP address in a range of global IP addresses used for NAT. Enter an IP address in dotted-decimal notation (for example, 172.27.16.109). Specifies the subnet mask for the IP address pool. Enter a mask in dotted-decimal notation (for example, 255.255.255.0). If you do not specify a network mask for the global IP addresses in the pool, the ACE, by default, uses the network mask of the interface to which the pool is attached. (Optional) Specifies that the ACE perform Port Address Translation (PAT) in addition to NAT.
ip_address2
netmask mask
pat
Command Modes
Command History
2-719
Usage Guidelines
Dynamic NAT uses a pool of global IP addresses that you specify. You can define either a single global IP address for a group of servers with PAT to differentiate between them or a range of global IP addresses when using dynamic NAT only. To use a single IP address or a range of addresses, you assign an identifier to the address pool. You then associate the NAT pool with a global interface that is different from the interface that you use to filter and receive NAT traffic. The ACE allows you to configure a virtual IP (VIP) address in the NAT pool for dynamic NAT and PAT. This action is useful when you want to source NAT real server originated connections (bound to the client) using the VIP address. This feature is specifically useful when there are a limited number of real world IP addresses on the client-side network. To perform PAT for different real servers that are source-NATed to the same IP address (VIP), you must configure the pat keyword in the nat-pool command. If a packet egresses an interface that you have not configured for NAT, the ACE transmits the packet untranslated. If the ACE runs out of IP addresses in a NAT pool, it can switch over to a PAT rule, if configured. For example, you can configure the following:
nat-pool 1 10.1.100.10 10.1.100.99 netmask 255.255.255.255 nat-pool 1 10.1.100.100 10.1.100.100 netmask 255.255.255.255 pat
Examples
IPv6 Example
To configure a NAT pool that consists of a range of global IPV6 addresses with PAT, enter:
host1/C1(config-if)# nat-pool 1 2001:DB8:1::/64 2001:DB8:1::1/64 pat
IPv4 Example
To configure a NAT pool that consists of a range of 100 global IPv4 addresses with PAT, enter:
host1/C1(config-if)# nat-pool 1 172.27.16.10 172.27.16.109 netmask 255.255.255.0 pat
Related Commands
(config-if) normalization
To enable TCP normalization, use the normalization command. This feature is enabled by default. Use the no form of this command to disable TCP normalization. normalization no normalization
Syntax Description
Command Modes
2-720
OL-25339-01
Command History
Usage Guidelines
Caution
By default, TCP normalization is enabled. If you disable TCP normalization, you may expose your ACE and your data center to potential security risks. TCP normalization helps protect the ACE and the data center from attackers by enforcing strict security policies that are designed to examine traffic for malformed or malicious segments. To operate your ACE for load balancing only, disable TCP normalization by entering the no normalization command. You must also disable the ACE Internet Control Message Protocol (ICMP) security checks by using the no icmp-guard command. For details about operating your ACE as a load balancer only, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. Disabling TCP normalization affects only Layer 4 traffic. TCP normalization is always enabled for Layer 7 traffic. Use the no normalization command when you encounter the following two types of asymmetric flows, which would otherwise be blocked by the normalization checks that the ACE performs:
ACE sees only the client-to-server traffic. For example, for a TCP connection, the ACE sees the SYN from the client, but not the SYN-ACK from the server. In this case, apply the no normalization command to the client-side VLAN. ACE sees only the server-to-client traffic. For example, for a TCP connection, the ACE receives a SYN-ACK from the server without having received the SYN from the client. In this case, apply the no normalization command to the server-side VLAN.
With TCP normalization disabled, the ACE still sets up flows for the asymmetric traffic described above and makes entries in the connection table. Note that the ACE does not check the TCP flags and TCP state of the connection. If a connection is in the half-closed state and a new SYN arrives, the connection is still used but the states do not change. Once the connection is closed properly, the extra ACK from the server goes through as a routed connection and the address is not masked to originate from the VIP. With TCP normalization enabled, when the ACE receives the final ACK, the ACE removes the entry from the connection table. Even if FIN/ACK retransmission occurs, the ACE drops this packet due to TCP normalization feature. This means that the client cannot receive the final ACK and keeps the LAST_ACK state until half-close timeout occurs by the client.
Examples
Related Commands
(config-if) icmp-guard
2-721
Syntax Description
Command Modes
Command History
Usage Guidelines
Ensure that TCP normalization is enabled through the normalization command and that the switch mode feature is disabled (the switch-mode command in configuration mode).
Examples
To enable sending a RST to the peer so it can reset its TCP connections for any non-SYN packets, enter:
host1/Admin(config)# interface vlan 200 host1/Admin(config-if)# normalization host1/Admin(config-if)# normalization send-reset
Related Commands
2-722
OL-25339-01
no peer ip address {ipv6_address [/prefix_length] [eui64 | link-local | unique-local]} {ipv4_address mask [secondary]}
Syntax Description
ipv6_address /prefix_length
IPv6 address of the interface. (Optional, except for EUI-64) Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter a a forward slash character (/) followed by an integer from 1 to 128. The default is /128. If you use the optional eui64 keyword, you must specify a prefix length and the prefix must be less than or equal to 64. (Optional) Specifies that the low order 64 bits are automatically generated in the IEEE 64-bit Extended Unique Identifier (EUI-64) format specified in RFC 2373. To use this keyword, you must specify a prefix length, the prefix must be less than or equal to 64, and the host segment must be all zeros. (Optional) Specifies that the address is valid only for the current link. (Optional) Specifies that this address is globally unique and used only for local communications within a site or organization. IPv4 address of the interface. Subnet mask of the interface. (Optional) Configures the address as a secondary IPv4 address allowing multiple subnets under the same interface. You can configure a maximum of 15 secondary addresses per interface. The ACE has a system limit of 1,024 secondary addresses.
eui64
Command Modes
Interface configuration mode for BVI and VLAN interfaces Admin and user contexts
Command History
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. The number of secondary addresses decreased from 15 to 4. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
Modification This command was introduced. The secondary option was added. The number of secondary addresses increased from 4 to 15. Added IPv6 support.
2-723
Usage Guidelines
When you configure redundancy, configuration mode on the standby ACE is disabled by default and changes on an active ACE are automatically synchronized to the standby ACE. However, interface IP addresses on the active and standby ACEs must be unique. To ensure that the addresses on the interfaces are unique, the interface IP address on the active ACE is synchronized to the standby ACE as the peer IP address. To configure an interface IP address on the standby ACE, use the peer ip address command. The peer IP address on the active ACE is synchronized on the standby ACE as the interface IP address. You must configure a unique IP address across multiple contexts on a shared VLAN. On a nonshared VLAN, the IP address can be the same. You can configure only one IPv6 peer link-local or IPv6 peer unique local address on an interface. Any additional peer link-local or peer unique local address that you configure will overwrite the existing one. When the destination for the control plane (CP)-originated packets is Layer 2 adjacent to either the primary subnet or one of the secondary subnets, the ACE always uses the appropriate primary or secondary interface IP address that belongs to the destination subnet as the source IP address. For any destination that is not Layer 2 adjacent, the ACE uses the primary address as the source IP address. SSL probes always uses the primary IP address as the source address for all destinations. You cannot configure secondary IPv4 addresses on FT VLANs.
Examples
To configure a secondary IP address and mask for the peer ACE ACE, enter:
host1/Admin(config-if)# peer ip address 12.0.0.81 255.0.0.0 secondary
To delete the secondary IP address for the peer ACE ACE, enter:
host1/Admin(config-if)# no peer ip address 12.0.0.81 255.0.0.0 secondary
Related Commands
show interface
2-724
OL-25339-01
Syntax Description
Loads the distribution on the destination IP address Loads the distribution on the destination MAC address Loads the distribution on the destination TCP or UDP port Loads the distribution on the source or destination IP address Loads the distribution on the source or destination MAC address Loads the distribution on the source or destination port Loads the distribution on the source IP address Loads the distribution on the source MAC address Loads the distribution on the TCP or UDP source port
Command Modes
Command History
Usage Guidelines
An EtherChannel balances the traffic load across the links in the EtherChannel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. EtherChannel load balancing can use MAC addresses or IP addresses, Layer 4 port numbers, source addresses, destination addresses, or both source and destination addresses. Use the option that provides the load-balance criteria with the greatest variety in your configuration. For example, if the traffic on an EtherChannel is going to a single MAC address only and you use the destination MAC address as the basis of EtherChannel load balancing, the EtherChannel always chooses the same link in the EtherChannel.
Examples
To configure an EtherChannel to balance the traffic load across the links using source or destination IP addresses, enter:
host1/Admin(config)# interface gigabitEthernet 1/1 host1/Admin(config-if)# port-channel load-balance src-dst-ip
Related Commands
2-725
Syntax Description
Command Modes
Command History
Usage Guidelines
QoS is configured at the physical port level. When you enable QoS on a trusted port, traffic is mapped into different ingress queues based on their VLAN CoS bits. If there are no VLAN CoS bits, or QoS is not enabled on the port (untrusted port), the traffic is then mapped into the lowest priority queue. You can enable QoS for an Ethernet port configured for fault tolerance (see (config-if) ft-port vlan). In this case, heartbeat packets are always tagged with COS bits set to 7 (a weight of High). We recommend that you enable QoS on the FT VLAN port to provide higher priority for FT traffic. QoS is configurable only for a physical Ethernet port and is not VLAN interface-based.
Examples
Related Commands
show interface
2-726
OL-25339-01
(config-if) remove-eth-pad
To enable an internal length check and remove a trailing byte appended to the end of an Ethernet IP packet coming into the ACE, use the remove-eth-pad command. This check is performed on the VLAN interface and is disabled by default. Use the no form of the command to disable an internal length check and the removal of the trailing byte. remove-eth-pad no remove-eth-pad
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To enable an internal length check and remove the trailing byte appended to the end of an Ethernet IP packet coming into the ACE, enter:
host1/Admin(config)# interface vlan 3 host1/Admin(config-if)# remove-eth-pad
To disable an internal length check and the removal of the trailing byte, enter:
host1/Admin(config-if)# no remove-eth-pad
Related Commands
show interface
2-727
Syntax Description
policy_name
Name of a previously defined policy map, configured with a previously created policy-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
When you enter the service-policy command in configuration mode, the policy maps that are applied globally in a context are applied on all interfaces that exist in the context. A policy activated on an interface overwrites any specified global policies for overlapping classifications and actions. The ACE allows only one policy of a specific feature type to be activated on a given interface.
Examples
Related Commands
2-728
OL-25339-01
(config-if) shutdown
To disable a bridge-group virtual interface (BVI) or VLAN interface, use the shutdown command. Use the no form of this command to enable the interface. shutdown no shutdown
Syntax Description
Command Modes
Command History
Usage Guidelines
When you create an interface, the interface is in the shutdown state until you enable it. If you disable or reenable the interface within a context, only that context interface is affected. To enable a bridge-group virtual interface (BVI), VLAN interface, VLAN trunking, or for an ACE Appliance, Ethernet port or port-channel interface, use the no shutdown command in interface configuration mode. This puts the interface in the Up administrative state. To disable a bridge-group virtual interface (BVI), VLAN interface, VLAN trunking, or for an ACE Appliance, Ethernet port or port-channel interface, use the shutdown command in interface configuration mode. This puts the interface in the Down administrative state. When you enable the interface, all of its configured primary and secondary addresses are enabled. You must configure a primary IP address to enable an interface. The ACE does not enable an interface with only secondary addresses. When you disable an interface, all of its configured primary and secondary addresses are disabled.
Examples
2-729
Related Commands
2-730
OL-25339-01
(config-if) speed
(ACE appliance only) To configure the Ethernet port speed for a setting of 10, 100, or 1000 Mbps, use the speed command in interface configuration mode. The default speed for an ACE interface is autonegotiate. Use the no form of the command to return to the default Ethernet port speed setting. speed {1000M | 100M | 10M | auto} no speed
Syntax Description
Initiates 1000-Mbps operation. Initiates 100-Mbps operation. Initiates 10-Mbps operation. Enables the ACE to autonegotiate with other devices for speeds of 10, 100, or 1000 Mbps. If you set the Ethernet port speed to auto, the ACE automatically sets the duplex mode to auto. This is the default setting.
Command Modes
Command History
Usage Guidelines
By default, the ACE automatically uses the autonegotiate setting for Ethernet port speed and duplex mode parameters to allow the ACE to negotiate the speed and duplex mode between ports. If you manually configure the port speed and duplex modes, follow these guidelines:
The ACE prevents you from making a duplex setting when you configure the speed of an Ethernet port to auto. The speed command must be a non-auto setting of 10, 100, or 1000 Mbps to be able to configure the duplex setting for the Ethernet port. If you configure an Ethernet port speed to a value other than auto (for example, 10, 100, or 1000 Mbps), ensure that you configure the connecting port to match. Do not configure the connecting port to negotiate the speed through the auto keyword. The ports on both ends of a link must have the same setting. The link will not come up if the port at each end of the connecting interface has a different setting. If you enter the no speed command, the ACE automatically configures both the speed and duplex settings to auto.
The ACE cannot automatically negotiate interface speed and duplex mode if you configure the connecting interface to a value other than auto. If you configure the Ethernet port speed to auto, the ACE automatically sets the duplex mode to auto.
2-731
Examples
Related Commands
(config-if) duplex
2-732
OL-25339-01
Command Modes
Command History
Usage Guidelines
On the ACE, ports are assigned to a single VLAN. These ports are referred to as access ports and provide a connection for end users or node devices, such as a router or server. By default, all devices are assigned to VLAN 1, known as the default VLAN. You can configure a trunk on a single Ethernet port or on a port-channel interface (EtherChannel). It is not necessary to create a VLAN interface before configuring an access VLAN. To configure a VLAN interface and access its mode to configure its attributes, use the interface vlan command in configuration mode for the context. When you assign a VLAN as the access port for a specific Ethernet port or port-channel interface, the VLAN is reserved and cannot be configured as a VLAN trunk. A VLAN access port and a VLAN trunk cannot coexist for the same Ethernet port or port-channel interface. If you specify both configurations for the same Ethernet port or port-channel interface, the most recent configuration will overwrite the older configuration. If you have QoS enabled for a physical Ethernet port (see the (config-if) qos trust cos command) that has been designated as an FT VLAN port (see the (config-if) ft-port vlan command), do not configure this Ethernet port as a VLAN access port. In this configuration, the QoS setting for redundancy traffic, such as heartbeat packets or TCP tracking probes, may not be handled properly by the ACE and FT traffic may be dropped when there is network congestion.
Examples
2-733
Related Commands
(config) interface
2-734
OL-25339-01
Syntax Description
vlan_list
The allowed VLANs that transmit this interface in tagged format when in trunking mode. The vlan_list argument can be one of the following:
Single VLAN number Range of VLAN numbers separated by a hyphen Specific VLAN numbers separated by commas
Valid entries are 1 through 4094. Do not enter any spaces between the dash-specified ranges or the comma-separated numbers in the vlan_list argument.
Command Modes
Command History
Usage Guidelines
You cannot remove VLAN 1. If you remove VLAN 1 from a trunk, the trunk interface continues to send and receive management traffic in VLAN 1. You can selectively allocate individual VLANs to a trunk link. All added VLANs are active on a trunk link, and as long as the VLAN is available for use, traffic for that VLAN is carried across the trunk link. It is not necessary to create a VLAN interface before you allocate a VLAN to an Ethernet port or port-channel interface (EtherChannel). To configure a VLAN interface and access its mode to configure its attributes, use the interface vlan command in configuration mode for the context. If you configure a VLAN on a trunk, you cannot configure the VLAN as the access port for a specific Ethernet port or port-channel interface. A VLAN access port and a VLAN trunk cannot coexist for the same Ethernet port or port-channel interface. If you specify both configurations for the same Ethernet port or port-channel interface, the most recent configuration will overwrite the older configuration. When allocating VLANs to ports, overlapping is not allowed. For example, if you associate VLAN 10 with Ethernet port 1, you cannot associate VLAN 10 with another Ethernet port. If you have QoS enabled for a physical Ethernet port (see the (config-if) qos trust cos command) that has been designated as an FT VLAN port (see the (config-if) ft-port vlan command), do not configure the FT VLAN as an 802.1Q native VLAN. In this configuration, the QoS setting for redundancy traffic, such as heartbeat packets or TCP tracking probes, may not be handled properly by the ACE and FT traffic may be dropped when there is network congestion.
2-735
Examples
To add VLANs 101, 201, and 250 through 260 to the defined list of VLANs currently set for Ethernet port 4, enter:
host1/Admin(config)# interface gigabitEthernet 1/4 host1/Admin(config-if)# switchport trunk allowed vlan 101,201,250-260
To remove VLANs 101 through 499 from the defined list of VLANs currently set for Ethernet port 4, enter:
host1/Admin(config)# interface gigabitEthernet 1/4 host1/Admin(config-if)# no switchport trunk allowed vlan 101-499
Related Commands
(config) interface
2-736
OL-25339-01
Syntax Description
number
VLAN number that you want to configure as the 802.1Q native VLAN when operating in trunking mode. Valid values are from 1 to 4094. The default is VLAN 1.
Command Modes
Command History
Usage Guidelines
You can only have one assigned native VLAN. The native VLAN is the VLAN that is assigned to all ports in the ACE. By default, all interfaces are in VLAN 1 on the ACE, and VLAN 1 is the native VLAN. Depending on your network needs, you may change the native VLAN to be other than VLAN 1. When configuring 802.1Q trunking, you must match the native VLAN across the link. Because the native VLAN is untagged, you must keep the native VLAN the same on each side of the trunk line. The native VLAN must match on both sides of the trunk link for 802.1Q; otherwise, the link will not work. It is not necessary to create a VLAN interface setting the 802.1Q native VLAN for a trunk. To configure a VLAN interface and access its mode to configure its attributes, use the interface vlan command in configuration mode for the context.
Examples
To specify VLAN 3 as the 802.1Q native VLAN for the trunk, enter:
host1/Admin(config)# interface port-channel 255 host1/Admin(config-if)# switchport trunk native vlan 3
Related Commands
(config) interface
2-737
(config-if) syn-cookie
To configure SYN-cookie-based DoS protection, use the syn-cookie command. Use the no form of this command to remove SYN-cookie DoS protection from the interface. syn-cookie number no syn-cookie
Syntax Description
number
Embryonic connection threshold above which the ACE applies SYN-cookie DoS protection. Enter an integer from 1 to 65535.
Command Modes
Command History
Modification This command was introduced. The embryonic connection threshold range changed to 1 to 65535 (from 2 to 65535).
Usage Guidelines
Keep in mind the following guidelines when you use the SYN cookie feature:
If the server drops the SYN that is sent by the ACE, the ACE resets the connection using the embryonic timeout. It does not retry the SYN packet. A SYN cookie supports only the MSS TCP option. The ACE ignores all other TCP options, even if there are problems with those other options. The ACE returns an MSS of 536 to the client, which is the RFC-specified default. If you use a parameter map to specify the minimum and maximum MSS values, the ACE ignores those values. Disabling normalization and using a SYN cookie concurrently may result in unpredictable behavior. The ACE does not generate any syslogs for a SYN cookie, even if the number of embryonic connections exceeds the configured threshold, which may indicate a SYN-flood attack. (ACE module only) When you configure SYN cookie protection, the ACE calculates the internal embryonic connection threshold value for each network processor (NP) as configured_threshold 4 (fractions are not disregarded). For example, if you configure the threshold as 6, the ACE applies the threshold to each NP in a round-robin fashion in the order shown, which results in the following threshold distribution:
NP1=2 NP2=2
2-738
OL-25339-01
NP3=1 NP4=1
Because of this internal division of the threshold value, you may occasionally observe that SYN cookie protection is applied before the embryonic connection count reaches the configured threshold value. For example, suppose that you configure a threshold value of 4. Because the threshold value is divided by four internally for each NP, the internally calculated threshold is 1. After one incomplete connection attempt (SYN) is sent to an NP, the ACE activates SYN cookie protection and intercepts the second SYN going to that same NP.
If you are configuring the SYN cookie feature on a bridged VLAN with non-loadbalanced flows, you must configure static routes for non-loadbalanced destinations that do not reside in the same subnet as the bridge-group virtual interface (BVI). IPv6 Configuration For example, assuming the following IPv6 configuration:
BVI IPv6 address is 2001:DB8:1::1 Gateway1 IPv6 address 2001:DB8:1::2 to reach external network 2001:DB8:2::1 Gateway2 IPv6 address 2001:DB8:1::3 to reach external network 2001:DB8:3::1
Examples
To configure SYN-cookie DoS protection for servers in a data center connected to VLAN 100, enter:
host1/C1(config)# interface vlan 100 host1/C1(config-if)# syn-cookie 4096
Related Commands
2-739
(config-if) udp
To enable the UDP booster feature for applications that require very high UDP connection rates, use the udp command in interface configuration mode. The syntax of this command is as follows: udp {ip-source-hash | ip-destination-hash} no udp
Syntax Description
ip-source-hash
Instructs the ACE to hash the source IP address of UDP packets that hit a source-hash VLAN interface prior to performing a connection match. Configure this keyword on a client-side interface. Instructs the ACE to hash the destination IP address of UDP packets that hit a destination-hash VLAN interface prior to performing a connection match. Configure this keyword on a server-side interface.
ip-destination-hash
Command Modes
Command History
Usage Guidelines
For the UDP booster feature to work, you must configure both command keywords on their respective interfaces. Do not configure this feature with NAT or with any Layer 7 feature, for example, per-packet UDP load balancing (also called UDP fast-age) using the loadbalance vip udp-fast-age command. Otherwise, unexpected results may occur. For detailed information concerning this feature and its configuration, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To configure the UDP booster feature on the client VLAN 100, enter:
host1/C1(config)# interface vlan 100 host1/C1(config-if)# udp ip-source-hash
To configure the UDP booster feature on the server VLAN 200, enter:
host1/C1(config)# interface vlan 200 host1/C1(config-if)# udp ip-destination-hash
2-740
OL-25339-01
host1/C1(config-if)# no udp
Related Commands
2-741
Syntax Description
Command Modes
Command History
Usage Guidelines
The ACE supports secure KAL-AP for MD5 encryption of data between the ACE and the GSS. For encryption, you must configure a shared secret as a key for authentication between the GSS and the ACE context.
Examples
Related Commands
2-742
OL-25339-01
(config-kalap-udp) ip address
To enable secure KAL-AP, you configure the VIP address to the GSS and the shared secret using the ip address command. Use the no form of this command to remove the VIP address and the shared secret from the configuration. ip address ip_address encryption md5 secret no ip address ip_address
Syntax Description
ip_address secret
VIP address for the GSS. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Shared secret between the GSS and the ACE. Enter the shared secret as a case-sensitive string with no spaces and a maximum of 31 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The ACE supports secure KAL-AP for MD5 encryption of data between the ACE and the Global Site Selector (GSS). For encryption, you must configure a shared secret as a key for authentication between the GSS and the ACE context.
Examples
To enable secure KAL-AP and configure the VIP address for the GSS and the shared secret, enter:
host1/Admin(config)# kalap udp host1/Admin(config-kalap-udp)# ip address 10.1.0.1 encryption md5 andromeda
Related Commands
2-743
Syntax Description
ldap group_name
Specifies an LDAP directory server group. Name for the group of LDAP servers. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a named server group. You group the different AAA server hosts into distinct lists. The ACE searches for the server hosts in the order in which you specify them within a group. You can configure a maximum of 10 server groups for each context in the ACE. You can configure LDAP server groups at any time, but you must enter the aaa authentication login command to apply the groups to the AAA service.
2-744
OL-25339-01
Examples
Related Commands
Syntax Description
text
User profile. The user profile is an unquoted text string of a maximum of 63 alphanumeric characters without spaces.
Command Modes
Command History
Usage Guidelines
The user profile attribute type is a mandatory configuration for an LDAP server group. Without this setting, the user profile attribute cannot be retrieved by the LDAP server. The user profile attribute type is a private attribute. In this case, the LDAP server database should use the same attribute type for the user profile. The LDAP client (the ACE) sends the search request with this attribute type as the attribute that it wants to download. If the lookup was successful, the search response contains this attribute value. The attribute value should contain a string that represents the user role and domain pair for this particular context.
Examples
To configure a user profile attribute for the LDAP server group, enter:
host1/Admin(config)# aaa group server ldap LDAP_Server_Group1
2-745
Related Commands
2-746
OL-25339-01
(config-ldap) baseDN
To configure the base distinguished name (DN) that you want to use to perform search operations in the LDAP directory tree, use the baseDN command. A baseDN can take a form such as dc=your,dc=domain, where the base DN uses the DNS domain name as its basis and is split into the domain components. Use the no form of this command to delete a configured baseDN for the LDAP server group. baseDN text no baseDN text
Syntax Description
text
Distinguished name of the search base. The baseDN name is a quoted text string of a maximum of 63 alphanumeric characters without spaces.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The base DN is a mandatory configuration for an LDAP server group. Without this setting, a user cannot be authenticated.
Examples
Related Commands
2-747
Syntax Description
text
Search request. The search filter is a quoted text string of a maximum of 63 alphanumeric characters without spaces.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The search filter is a mandatory configuration for an LDAP server group. Without this setting, a user cannot be authenticated. The search filter should follow the format defined in RFC 2254. The LDAP client sends the search request with the configured search filter after replacing the $userid and $contextid with the userid that the client is trying to authenticate and the associated virtual context name.The ACE allows $userid and $contextid to be used as placeholders for user ID and context ID.
Examples
Related Commands
2-748
OL-25339-01
(config-ldap) server
To specify the IP address of one or more previously configured Lightweight Directory Access Protocol (LDAP) servers that you want added to or removed from the AAA server group, use the server command. Use the no form of this command to remove the server from the AAA server group. server ip_address no server ip_address
Syntax Description
ip_address
IP address of the LDAP server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
Command Modes
Command History
Usage Guidelines
You can add multiple LDAP servers to the AAA server group by entering multiple server commands while in this mode. The same server can belong to multiple server groups.
Examples
Related Commands
2-749
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The commands in this mode have no user role feature restrictions. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-750
OL-25339-01
(config-line) session-limit
T o configure the maximum number of terminal sessions per line, use the session-limit command. Use the no form of this command to disable a setting for the configured virtual terminal line. session-limit number no session-limit number
Syntax Description
number
Maximum number of terminal sessions per line. Enter an integer from 1 to 251.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-751
Syntax Description
Specifies a group of hosts or subnet IP addresses. Specifies a group of TCP or UDP port specifications or ICMP types. Unique identifier of the object group. Enter the object group name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
You can create either network or service object groups. After you create these groups, you can use a single ACL entry to allow trusted hosts to make specific service requests to a group of public servers. If you add new members to an existing object group that is already in use by an entry in a large ACL, recommitting the ACL can take a long time, depending on the size of the ACL and the object group. In some cases, making this change can cause the ACE to devote over an hour to committing the ACL, during which time you cannot access the terminal. We recommend that you first remove the ACL entry that refers to the object group, make your change, and then add the ACL entry back into the ACL.
Examples
2-752
OL-25339-01
Related Commands
(config-objgrp-netw) description
To add an optional description to a network object group, use the description command. Use the no form of this command to remove a description from a network object group. description text no description text
Syntax Description
text
(Optional) Description of the network object group. Enter the description as an unquoted, alphanumeric, text string from 1 to 240 characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-753
(config-objgrp-netw) host
To associate a host IPv6 or IPv4 address with a network object group, use the host command. Use the no form of this command to remove a host from the network object group. host ip_address no host ip_address
Syntax Description
ip_address
Host IP address associated with the network object group. Enter an IP address in dotted-decimal notation (for example, 192.168.12.15).
Command Modes
Command History
Usage Guidelines
You cannot mix an IPv6 address and an IPv4 address in the same network object group.
Examples
IPv6 Example
To create a network object group that includes three IPv6 host addresses, enter:
host1/Admin(config)# object-group network NET_OBJ_GROUP1 host1/Admin(config-objgrp-netw)# description Administrator Addresses host1/Admin(config-objgrp-netw)# host 2001:DB8:1::/64 host1/Admin(config-objgrp-netw)# host 2001:DB8:2::/64 host1/Admin(config-objgrp-netw)# host 2001:DB8:3::/64
To remove host IPv6 address 2001:DB8:1::/64 from the network object group, enter:
host1/Admin(config-objgrp-netw)# no host 2001:DB8:1::/64
IPv4 Example
To create a network object group that includes three IPv4 host addresses, enter:
host1/Admin(config)# object-group network NET_OBJ_GROUP1 host1/Admin(config-objgrp-netw)# description Administrator Addresses host1/Admin(config-objgrp-netw)# host 192.168.12.15 host1/Admin(config-objgrp-netw)# host 192.168.12.21 host1/Admin(config-objgrp-netw)# host 192.168.12.27
2-754
OL-25339-01
To remove host IPv4 address 192.168.12.15 from the network object group, enter:
host1/Admin(config-objgrp-netw)# no host 192.168.12.15
Related Commands
2-755
(config-objgrp-netw) ip_address
To associate a network IP address with a network object group, use the ip_address command. Use the no form of this command to remove an IP address or host from the network object group. ip_address{/prefix_length | netmask} no ip_address{/prefix_length | netmask}
Syntax Description
IP address assigned to the network object group. For an IPv6 address, the length of the network prefix. Enter a / (forward slash) followed by an integer from 1 to 128. Network mask applied to the IP address. Enter a network mask in dotted decimal notation (for example, 255.255.255.0).
Command Modes
Command History
Usage Guidelines
You cannot mix an IPv6 address and an IPv4 address in the same network object group.
Examples
IPv6 Example
To add the IPv6 address and prefix length 2001:DB8:1::1/64 to a network object group, enter:
host1/Admin(config-objgrp-netw)# 2001:DB8:1::1/64
Enter additional object-group IP addresses as required. To remove an IP address from the network object group, enter:
host1/Admin(config-objgrp-netw)# no 2001:DB8:1::1/64
IPv4 Example
To add the IP address 192.168.12.15 and network mask 255.255.255.0 to a network object group, enter:
host1/Admin(config-objgrp-netw)# 192.168.12.15 255.255.255.0
2-756
OL-25339-01
Related Commands
2-757
(config-objgrp-serv) description
To add an optional description to a service object group, use the description command. Use the no form of this command to remove a description from a service object group. description text no description text
Syntax Description
text
(Optional) Description of the service object group. Enter the description as an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-758
OL-25339-01
(config-objgrp-serv) protocol
To associate a protocol and port designation with a service object group, use the protocol command. Use the no form of this command to remove the protocol and port designation from a service object group. protocol [source operator port1 [port2]] [operator port3 [port4]] [icmp-type type code operator code1 code2] no protocol [source operator port1 [port2]] [operator port3 [port4]] [icmp-type type code operator code1 code2]
Syntax Description
Name or number of an IP protocol. Enter a protocol name or an integer from 1 to 255 that represents an IP protocol number. See Table 1-12. Specifies a source port for TCP, TCP-UDP, or UDP. To specify a destination port, use the operator argument with no keyword. (Optional) Operand used to compare source and destination port numbers for TCP and UDP protocols, and message codes for ICMP. To specify a destination port, use the operator argument with no keyword.The operators are as follows:
ltLess than. gtGreater than. eqEqual to. neqNot equal to. rangeAn inclusive range of port values or ICMP message codes. If you enter this operator, enter a second port number value or second ICMP message code to define the upper limit of the range.
port1 [port2]
TCP or UDP source name or port number from which you permit or deny services access. Enter a port name or an integer from 0 to 65535. To enter an inclusive range of ports, enter two port numbers. Port2 must be greater than or equal to port1. See Table 1-13 for a list of well-known TCP keywords and port numbers and Table 1-14 for a list of well-known UDP key words and port numbers. TCP or UDP destination name or port number to which you permit or deny services access. To enter an optional inclusive range of ports, enter two port numbers. port4 must be greater than or equal to port3. See Table 1-13 for a list of well-known TCP keywords and port numbers and Table 1-14 for a list of well-known UDP keywords and port numbers. (Optional) If you entered ICMP as the protocol, specifies the type of ICMP messaging. Enter either an integer corresponding to the ICMP code number or one of the ICMP types listed in Table 1-15 (ICMPv4) or Table 1-16 (ICMPv6). (Optional) Specifies that a numeric operator and ICMP code follows. ICMP code number that corresponds to an ICMP type. See Table 1-15 (ICMPv4) or Table 1-16 (ICMPv6). If you entered the range operator, enter a second ICMP code value to define the upper limit of the range.
port3 [port4]
icmp-type type
2-759
Protocol Name ah eigrp esp gre icmp icmpv6 igmp ip ip-in-ip ospf pim tcp tcp-udp udp
Description Authentication Header Enhanced IGRP Encapsulated Security Payload Generic Routing Encapsulation Internet Control Message Protocol v4 Internet Control Message Protocol v6 Internet Group Management Protocol Internet Protocol IP-in-IP Layer 3 Tunneling Protocol Open Shortest Path First Protocol Independent Multicast Transmission Control Protocol TCP and UDP User Datagram Protocol
Keyword aol bgp chargen citrix-ica cmd ctiqbe daytime discard domain echo exec finger ftp ftp-data gopher h323
Description America-Online Border Gateway Protocol Character Generator Citrix Independent Computing Architecture Protocol Same as exec, with automatic authentication Computer Telephony Interface Quick Buffer Encoding Daytime Discard Domain Name System Echo Exec (RSH) Finger File Transfer Protocol FTP data connections Gopher H.323 call signaling
2-760
OL-25339-01
Keyword hostname http https ident imap4 irc kerberos klogin kshell ldap ldaps login lotusnotes lpd matip-a netbios-ssn nntp pim-auto-rp pop2 pop3 pptp rtsp sip skinny smtp sqlnet ssh sunrpc tacacs talk telnet
Port Number 101 80 443 113 143 194 88 543 544 389 636 513 1352 515 350 139 119 496 109 110 1723 554 5060 2000 25 1521 22 111 49 517 23
Description NIC hostname server Hypertext Transfer Protocol HTTP over TLS/SSL Ident Protocol Internet Message Access Protocol, version 4 Internet Relay Chat Kerberos Kerberos Login Kerberos Shell Lightweight Directory Access Protocol LDAP over TLS/SSL Login (rlogin) IBM Lotus Notes Printer Service Mapping of Airline Traffic over Internet Protocol Type A NetBIOS Session Service Network News Transport Protocol PC Anywhere data PIM Auto-RP Post Office Protocol v2 Post Office Protocol v3 Point-to-Point Tunneling Protocol, RFC 2637 Real-Time Streaming Protocol Session Initiation Protocol Cisco Skinny Client Control Protocol (SCCP) Simple Mail Transfer Protocol Structured Query Language Network Secure Shell Sun Remote Procedure Call Terminal Access Controller Access Control System Talk Telnet
pcanywhere-data 5631
2-761
Description Time Unix-to-Unix Copy Program Nicname World Wide Web (HTTP)
Keyword biff bootpc bootps discard dnsix domain echo isakmp kerberos mobile-ip nameserver netbios-dgm netbios-ns netbios-ssn ntp
Port Number 512 68 67 9 195 53 7 500 88 434 42 138 137 139 123
Description Mail notification Bootstrap Protocol client Bootstrap Protocol server Discard DNSIX Security protocol auditing (dn6-nlm-aud) Domain Name System Echo Internet Security Association Key Management Protocol Kerberos Mobile IP registration Host Name Server NetBIOS datagram service NetBIOS name service NetBIOS Session Service Network Time Protocol PC Anywhere status (ACE module only) Remote Authentication Dial-in User Service (ACE appliance only) Remote Authentication Dial-in User Service RADIUS Accounting Routing Information Protocol Simple Network Management Protocol SNMP Traps Sun Remote Procedure Call System Logger
pcanywhere-statu 5632 s radius-auth radius radius-acct rip snmp snmptrap sunrpc syslog 1812 1812 1813 520 161 162 111 514
2-762
OL-25339-01
Keyword tacacs talk tftp time who wsp wsp-wtls wsp-wtp wsp-wtp-wtls xdmcp
Description Terminal Access Controller Access Control System Talk Trivial File Transfer Protocol Time Who service (rwho) Connectionless Wireless Session Protocol Secure Connectionless WSP Connection-based WSP Secure Connection-based WSP X Display Manager Control Protocol
ICMP Type echo-reply unreachable source-quench redirect alternate-address echo router-advertisement router-solicitation time-exceeded parameter-problem timestamp-request timestamp-reply information-request information-reply mask-request mask-reply traceroute conversion-error mobile-redirect
2-763
Table 1-16
ICMPv6 Types
ICMPv6 Type unreachable time-exceeded parameter-problem traceroute echo echo-reply redirect information-request information-reply
Command Modes
Command History
Modification This command was introduced. The radius keyword is deprecated and is now the radius-auth keyword. Added IPv6 support.
Usage Guidelines
Examples
To create a service object group for TCP (source port only), UDP (source and destination ports), and ICMPv6, enter:
ISM/Admin(config)# object-group service TCP_UDP_ICMP ISM/Admin(config-objgrp-serv)# tcp source eq domain ISM/Admin(config-objgrp-serv)# udp source eq radius eq radius-acct ISM/Admin(config-objgrp-serv)# icmpv6 echo code eq 128
To remove the ICMP protocol from the above service object group, enter:
host1/Admin(config-objgrp-prot)# no icmpv6 echo code eq 128
2-764
OL-25339-01
Related Commands
2-765
2-766
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
show optimization-global
2-767
(config-optimize) appscope-log
(ACE appliance only) To configure the ACE to upload the application acceleration and optimization statistical log information to the optional Cisco AVS 3180A Management Station, use the appscope-log command. Use the no form of this command to disable sending statistical log information to a Management Station. appscope-log no appscope-log
Syntax Description
Command Modes
Command History
Usage Guidelines
The statistical log file contains an entry for each ACE optimization request to the server and is used for statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical log data and then sends it to the Management Station for loading into the management station database. For details about the optional Cisco AVS 3180A Management Station database, management, and reporting features, including AppScope reporting, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide. To enable the AppScope feature, use the appscope command in action list optimization configuration mode. See the (config-actlist-optm) appscope command. For each ACE request, information about the statistical log is written to the statlog.nnn file, where nnn is a three-digit number. Each entry in the statlog file is written in an XML-like syntax, where each element is opened with an angle-bracketed tag, and closed with a similar tag, and can contain several fields with nested elements.
Note
Statistical log information from active ACE nodes is carried by the syslog-ng daemon to the Cisco AVS 3180A Management Console and written to a file under the avs-log/syslog/ directory. The file is <optm-id>_<virtual-context-id>, which is unique across all ACE nodes. To specify the host (the syslog server on the Management Station) that receives the syslog messages sent by the ACE, use the logging host configuration command. See the (config) logging host command. This command allows you to identify the IP address of the Management Station that will be used as the syslog server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples
To specify that the information about statistical log is to be sent to a Management Station at 192.168.10.1 using TCP, enter:
host1/Admin(config)# optimize
2-768
OL-25339-01
To disable sending information about the statistical log information to an AVS 3180A Management Station, enter:
host1/Admin(config-optimize)# no appscope-log
Related Commands
(config-actlist-optm) appscope (config-parammap-optmz) appscope optimize-rate-percent (config-parammap-optmz) parameter-summary parameter-value-limit (config-parammap-optmz) request-grouping-string
(config-optimize) concurrent-connections
(ACE appliance only) To define the concurrent connection limit at which optimization will be disabled for all new connections that are received by the ACE, use the concurrent-connections command. Use the no form of this command to return to the default concurrent connection limit of 1000. concurrent-connections connection_limit no concurrent-connections Syntax Description connection_limit Maximum concurrent connection limit. Enter an integer from 100 to 9500. The default is 1000.
Command Modes
Command History
Modification This command was introduced. The limit keyword was removed. This command was deprecated. Application acceleration concurrent connections are now fixed at 100.
Usage Guidelines
When you use the ACE to perform a specific set of application acceleration and optimization functions, and the ACE reaches the maximum of 10,000 concurrent connections, the ACE stops accepting any additional concurrent connections until the count drops below 10,000. You can define the limit at which all new connections are directly sent to the real server without the ACE performing application acceleration and optimization. This user-defined limit bypasses application acceleration and optimization requests on a connection until the concurrent connection count is less than the allowed specified maximum of 9,500 concurrent connections. The ACE will always perform application acceleration and optimization for FlashForward URLs, AppScope URLs, and base file URLs in a new connection even if you have specified a concurrent connection limit.
2-769
Note
The show stats loadbalance command in Exec mode displays the optimized connection counter (maximum and concurrent) and the unoptimized connection counter for all application acceleration connections.
Examples
Related Commands
(config-optimize) debug-level
(ACE appliance only) To enable HTTP optimization logging and control the maximum level for system log messages sent to the host (the syslog server on the optional Cisco AVS 3180A Management Station), use the debug-level command. Use the no form of the command to disable the debug function for HTTP optimization. debug-level severity_level no debug-level severity_level Syntax Description severity_level Maximum level for system log messages sent to a syslog server. The severity level that you specify indicates that you want syslog messages at that level and messages lower than that level. For example, if the specified level is 3, the syslog displays level 3, 2, 1, and 0 messages. The severity level that you specify indicates that you want to log messages at that level and below. Allowable entries are as follows:
0emergencies (system unusable messages) 1alerts (take immediate action) 2critical (critical condition) 3errors (error message) 4warnings (warning message) 5notifications (normal but significant condition) 6informational (information message) 7debugging (debug messages)
Command Modes
2-770
OL-25339-01
Command History
Usage Guidelines
The debug-level command limits the HTTP optimization logging messages sent to a syslog server based on severity. To specify the host (the syslog server on the optional Management Station) that receives the syslog messages sent by the ACE, use the logging host configuration command. See the (config) logging host command. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples
To enable HTTP optimization logging and send informational system message logs to the syslog server, enter:
host1/Admin(config)# debug-level 6
Related Commands
Command Modes
Optimize mode
2-771
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you configure switch mode and you configure any connection parameter-map commands (for example, set tcp buffer-share, rate-limit, exceed-mss, nagle, random-sequence-number, reserved-bits, set tcp wan-optimization, timeout inactivity, slowstart, and so on) either locally on a specific interface or globally on all interfaces, switch mode will override these commands for certain types of traffic. This behavior applies only to non-VIP, non-inspection, non-NATed, and non-management traffic. The ACE continues to apply local, global, and VIP-specific connection parameter maps to load-balanced (VIP), inspected, NATed, and management traffic. For information about switch mode, see the (config) switch-mode command. After you create and configure a parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-pmap-c) connection advanced-options command in the Policy Map Configuration Mode Commands section.
Examples
2-772
OL-25339-01
host1/Admin(config-parammap-conn)#
Related Commands
2-773
(config-parammap-conn) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-774
OL-25339-01
(config-parammap-conn) exceed-mss
To configure the ACE to allow segments that exceed the maximum segment size (MSS), use the exceed-mss command. Use the no form of this command to reset the ACE to its default of discarding segments that exceed the MSS. exceed-mss {allow | drop} no exceed-mss
Syntax Description
allow drop
Permits segments that exceed the maximum segment size. Discards segments that exceed the maximum segment size. This is the default.
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to allow segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# exceed-mss allow
To configure the ACE to discard segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# exceed-mss drop
To reset the ACE behavior to the default of discarding segments that exceed the MSS, enter:
host1/Admin(config-parammap-conn)# no exceed-mss allow
Related Commands
2-775
(config-parammap-conn) nagle
To enable Nagles algorithm, use the nagle command. By default, this command is disabled. Nagles algorithm instructs a sender to buffer any data to be sent until all outstanding data has been acknowledged or until there is a full segment of data to send. Use the no form of this command to disable Nagles algorithm. nagle no nagle
Syntax Description
Command Modes
Command History
Usage Guidelines
Nagles algorithm automatically concatenates a number of small buffer messages that are transmitted over the TCP connection. This process increases throughput by decreasing the number of segments that need to be sent over the network. However, the interaction between Nagles algorithm and the TCP delay acknowledgment may increase latency in your TCP connection. You should disable Nagles algorithm if you notice delays in your TCP connection.
Examples
Related Commands
show parameter-map
2-776
OL-25339-01
(config-parammap-conn) random-sequence-number
To enable TCP sequence number randomization, use the random-sequence-number command. This feature is enabled by default. Use the no form of this command to disable sequence number randomization for Layer 4 flows only. random-sequence-number no random-sequence-number
Syntax Description
Command Modes
Command History
Usage Guidelines
Randomizing TCP sequence numbers makes it more difficult for a hacker to guess or predict the next sequence number in a TCP connection. This feature is enabled by default and you cannot disable it for Layer 7 flows.
Examples
Related Commands
show parameter-map
2-777
(config-parammap-conn) rate-limit
To limit the connection rate or the bandwidth rate of a policy, use the rate-limit command. Use the no form of this command to return the behavior of the ACE to the default of not limiting the policy bandwidth rate. rate-limit {connection number1 | bandwidth number2} no rate-limit {connection number1 | bandwidth number2}
Syntax Description
Specifies the connection-rate limit for a policy in connections per second. Enter an integer from 0 to 350000. There is no default value. Specifies the bandwidth-rate limit for a policy in bytes per second. Enter an integer from 0 to 300000000. There is no default value.
Command Modes
Command History
Usage Guidelines
In addition to preserving system resources by limiting the total number of active connections to a real server, the ACE allows you to limit the connection rate and the bandwidth rate of a policy map. The connection rate is the number of connections per second that match the policy. The bandwidth rate is the number of bytes per second that match the policy. The ACE applies these rate limits to each class map that you associate with the policy at the virtual server level. When the connection-rate limit or the bandwidth-rate limit is reached, the ACE blocks any further traffic that matches that policy until the connection rate or bandwidth rate drops below the configured limit. By default, the ACE does not limit the connection rate or the bandwidth rate of a policy. You can also limit the connection rate and the bandwidth rate of a real server in a server farm. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine
Examples
To limit the connection rate of a policy to 100000 connections per second, enter:
host1/Admin(config-parammap-conn)# rate-limit connection 100000
To return the behavior of the ACE to the default of not limiting the policy connection rate, enter:
host1/Admin(config-parammap-conn)# no rate-limit connection 100000
2-778
OL-25339-01
To limit the policy bandwidth rate to 5000000 bytes per second, enter:
host1/Admin(config-parammap-conn)# rate-limit bandwidth 50000000
To return the behavior of the ACE to the default of not limiting the policy bandwidth rate, enter:
host1/Admin(config-parammap-conn)# no rate-limit bandwidth 50000000
Related Commands
show parameter-map
(config-parammap-conn) reserved-bits
To configure how an ACE handles segments with the reserved bits set in the TCP header, use the reserved-bits command. Use the no form of this command to reset the ACE to its default of clearing reserved bits set in the TCP header of a segment. reserved-bits {allow | clear | drop} no reserved-bits
Syntax Description
Permits segments with the reserved bits set in the TCP header. Clears the reserved bits in the TCP header and allows the segment. This is the default. Discards segments with reserved bits set in the TCP header.
Command Modes
Command History
Usage Guidelines
The six reserved bits in the TCP header are for future use and have a value of 0.
Examples
To configure the ACE to allow segments with the reserved bits set in the TCP header, enter:
host1/Admin(config-parammap-conn)# reserved-bits allow
To reset the ACE to its default of clearing reserved bits set in the TCP header of a segment, enter:
host1/Admin(config-parammap-conn)# no reserved-bits allow
2-779
Related Commands
show parameter-map
Syntax Description
number
Command Modes
Command History
Usage Guidelines
The ToS for a packet determines how the network handles the packet and balances its precedence, delay, throughput, and reliability. This information resides in the IP header. For details about the ToS byte, see RFCs 791, 1122, 1349, and 3168.
Examples
Related Commands
show parameter-map
2-780
OL-25339-01
Syntax Description
number
Delay time for sending an ACK from a client to a server. Enter an integer from 0 to 400 ms. The default is 200 ms.
Command Modes
Command History
Usage Guidelines
Delaying the ACK can help reduce congestion by sending one ACK for multiple segments rather than sending an ACK for each segment.
Examples
To reset the ACK delay timer to the default of 200 ms, enter:
host1/Admin(config-parammap-conn)# no set tcp ack-delay
Related Commands
show parameter-map
2-781
Syntax Description
number
Maximum size of the receive or transmit buffer share in bytes for each TCP and UDP connection. Enter an integer from 8192 to 262143. The default is 32768 bytes.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced. This command now allows you to configure the buffer limit for UDP connections. Previously, the buffer limit was configurable only for TCP connections.
Usage Guidelines
To improve throughput and overall performance, the ACE checks the number of buffered bytes on a TCP and UDP connection against the configured buffer setting before accepting new receive or transmit data. By default, the maximum size of the receive or transmit buffer for each TCP or UDP connection is 32768 bytes. For large bandwidth and delay network connections, you may want to increase the default buffer size to improve your network performance. If you set the (config-parammap-http) set content-maxparse-length or (config-parammap-http) set header-maxparse-length command in HTTP parameter-map configuration mode to a value that is greater than 32 KB, you must configure the set tcp buffer-share command to a value that is greater than their values. If you do not, even if you configure (config-parammap-http) length-exceed continue command, the ACE may not completely parse a content string or a header packet that is greater than 32 KB. The reason is that the default value of the set tcp buffer-share command buffer size (32 KB) will not accommodate the larger content string size.
Examples
2-782
OL-25339-01
Related Commands
2-783
Syntax Description
min number1
Specifies the smallest segment size in bytes that the ACE will accept. Enter an integer from 0 to 65535. The default is 0 bytes. If the ACE receives a segment smaller than the configured minimum size, the ACE discards the segment. Specifies the largest segment size in bytes that the ACE will accept. Enter an integer from 0 to 65535. The default is 1460 bytes. If the ACE receives a segment larger than the configured maximum size, the ACE discards the segment.
max number2
Command Modes
Command History
Usage Guidelines
The MSS is the largest amount of TCP data that the ACE accepts in one segment. To prevent the transmission of many smaller segments or very large segments that may require fragmentation, you can set the minimum and maximum acceptable sizes of the MSS. Both the host and the server can set the MSS when they first establish a connection. If either maximum value exceeds the value that you set with the set tcp mss max command, then the ACE overrides the maximum value and inserts the value that you set. If either maximum value is less than the value that you set with the set tcp mss min command, then the ACE overrides the maximum value and inserts the minimum value (the minimum value is actually the smallest maximum allowed). For example, if you set a maximum value of 1200 bytes and a minimum value of 400 bytes, when a host requests a maximum value of 1300 bytes, then the ACE alters the packet to request 1200 bytes (the maximum). If another host requests a maximum value of 300 bytes, then the ACE alters the packet to request 400 bytes (the minimum). If the host or server does not request an MSS, the ACE assumes that the RFC 793 default value of 536 bytes is in effect.
2-784
OL-25339-01
Examples
To set the minimum acceptable MSS value to 768 bytes and the maximum acceptable MSS value to 1500, enter:
host1/Admin(config-parammap-conn)# set tcp mss min 768 max 1500
To reset the minimum MSS to the default of 0 bytes and the maximum MSS to the default of 1460, enter:
host1/Admin(config-parammap-conn)# no set tcp mss
Related Commands
2-785
Syntax Description
seconds
Time period in seconds after which the ACE stops reassembling TCP packets. Enter an integer from 1 to 255. The default is 60 seconds.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
show parameter-map
2-786
OL-25339-01
Syntax Description
number
Note
Number of SYN retries. Enter an integer from 1 to 15. The default is 4. NOTE: When you set the maximum number of TCP SYN retries using the above command, the syn-retry counter includes the initial SYN in the count of retries. If you set the number as 5, the ACE sends only 4 retries. Ensure that you increment the number of retries you want by 1. For example, to set the maximum TCP SYN retries to 5, enter:
host1/C1(config-parammap-conn)# set tcp syn-retry 6
Note
Command Modes
Command History
Usage Guidelines
Examples
To set the maximum number of attempts that the ACE takes to transmit a TCP segment to 3, enter:
host1/Admin(config-parammap-conn)# set tcp syn-retry 3
To reset the maximum number of TCP SYN retries to the default of 4, enter:
host1/Admin(config-parammap-conn)# no set tcp syn-retry
Related Commands
show parameter-map
2-787
Syntax Description
embryonic seconds
Specifies the timeout for embryonic connections. Time in seconds after which the ACE times out an embryonic connection. Enter an integer from 0 to 4294967295. The default is 5 seconds. A value of 0 specifies that the ACE never time out an embryonic connection. Specifies the timeout for half-closed connections. Time in seconds after which the ACE times out a half-closed connection. Enter an integer from 0 to 4294967295. The default is 3600 seconds (1 hour). A value of 0 specifies that the ACE never time out a half-closed TCP connection.
half-closed seconds
Command Modes
Command History
Usage Guidelines
The set tcp timeout embryonic command affects only Layer 4 flows and not Layer 7 flows.
Examples
To reset the TCP half-closed connection timeout to the default of 600 seconds, enter:
host1/Admin(config-parammap-conn)# no set tcp timeout half-closed
Related Commands
show parameter-map
2-788
OL-25339-01
Syntax Description
number
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command allows you to control how the ACE applies TCP optimizations to packets on a connection associated with a Layer 7 policy map using the following RTT values:
For a value of 0, the ACE applies TCP optimizations to packets for the life of a connection. For a value of 65535 (the default), the ACE performs normal operations (no optimizations) for the life of a connection. For values from 1 to 65534, the ACE applies TCP optimizations to packets based on the client RTT to the ACE as follows:
If the actual client RTT is less than the configured RTT, the ACE performs normal operations
optimizations on the packets for the life of a connection. TCP optimizations include the following connection parameter-map configuration mode operations:
Nagle optimization algorithm Slow-start connection behavior Acknowledgement (ACK) delay timer Window-scale factor Retry settings
Examples
To set the RTT to 0 to apply TCP optimizations to packets for the life of a connection, enter:
host1/C1(config-parammap-conn)# set tcp wan-optimization rtt 0
To restore the ACE behavior to the default of not optimizing TCP connections, enter:
host1/C1(config-parammap-conn)# no set tcp wan-optimization rtt
Related Commands
show parameter-map
2-789
Syntax Description
number
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The TCP window scaling feature adds support for the Window Scaling option in RFC 1323. We recommend increasing the window size to improve TCP performance in network paths with large bandwidth, long-delay characteristics. This type of network is called a long fat network (LFN). The window scaling extension expands the definition of the TCP window to 32 bits and then uses a scale factor to carry this 32-bit value in the 16-bit window field of the TCP header. You can increase the window size to a maximum scale factor of 14. Typical applications use a scale factor of 3 when deployed in LFNs.
Examples
Related Commands
show parameter-map
2-790
OL-25339-01
Syntax Description
inactivity seconds
Specifies the timeout for idle TCP connections. Time period after which the ACE disconnects idle established connections.
For the ACE module, enter an integer from 0 to 1608601. For the ACE appliance, enter an integer from 0 to 1638050.
A value of 0 specifies that the ACE never time out a TCP connection. Default settings are as follows:
ICMP2 seconds TCP3600 seconds (1 hour) HTTP/SSL300 seconds UDP120 seconds (2 minutes)
Command Modes
Command History
Usage Guidelines
The ACE uses the connection inactivity timer to disconnect established ICMP, TCP, and UDP connections that have remained idle for the duration of the specified timeout period. The ACE rounds up the configured timeout value to the nearest 30-second interval.
Examples
To specify that the ACE disconnect idle established TCP connections after 2400 seconds, enter:
host1/Admin(config-parammap-conn)# set timeout inactivity 2400
To reset the ICMP, TCP, and UDP inactivity timeout to the default values, enter:
host1/Admin(config-parammap-conn)# no set timeout inactivity
2-791
Related Commands
show parameter-map
(config-parammap-conn) slowstart
To enable the slow start algorithm, use the slowstart command. This feature is disabled by default. Use the no form of this command to disable the slow start algorithm after it has been enabled. slowstart no slowstart
Syntax Description
Command Modes
Command History
Usage Guidelines
The slow start algorithm is a congestion avoidance method in which TCP increases its window size as ACK handshakes arrive. It operates by observing that the rate at which new segments should be injected into the network is the rate at which the acknowledgments are returned by the host at the other end of the connection. For further details about the TCP slow start algorithm, see RFC 2581 and 3782.
Examples
Related Commands
show parameter-map
2-792
OL-25339-01
(config-parammap-conn) syn-data
To set the ACE to discard SYN segments with data, use the syn-data command. Use the no form of this command to reset the ACE to its default of allowing SYN segments that contain data. syn-data {allow | drop} no syn-data
Syntax Description
allow drop
Permits the SYN segments that contain data and flags them for data processing. This is the default. Discards the SYN segments that contain data.
Command Modes
Command History
Usage Guidelines
Occasionally, the ACE may receive a SYN segment that contains data. You can configure the ACE to either discard the segment or flag the segment for data processing.
Examples
To reset the ACE to its default of allowing SYN segments that contain data, enter:
host1/Admin(config-parammap-conn)# no syn-data
Related Commands
show parameter-map
2-793
(config-parammap-conn) tcp-options
To specify a range of TCP options not explicitly supported by the ACE, or allow or clear explicitly supported TCP options specified in a SYN segment, use the tcp-options command. Use the no form of this command to remove a TCP option range from the configuration or reset the ACE to its default of clearing the specific TCP options. tcp-options {range number1 number2 {allow | drop}} | {selective-ack | timestamp | window-scale {allow | clear | drop}} no tcp-options {range number1 number2 {allow | drop}} | {selective-ack | timestamp | window-scale {allow | clear | drop}}
Syntax Description
Specifies the TCP options not explicitly supported by the ACE using a range of option numbers. The arguments are as follows:
number1Specifies the lower limit of the TCP option range. Enter either 6 or 7 or an integer from 9 to 255. See the Usage Guidelines section for the available TCP options. number2Specifies the upper limit of the TCP option range. Enter 6 or 7 or an integer from 9 to 255. See the Usage Guidelines section for the available TCP options.
Allows any segment with the specified option set. Causes the ACE to discard any segment with the specified option set. Allows the ACE to inform the sender about all segments that it received. The sender needs to retransmit the lost segments, rather than wait for a cumulative acknowledgement or retransmit segments unnecessarily. Selective ACK (SACK) can reduce the number of retransmitted segments and increase throughput under some circumstances. Measures the round-trip time (RTT) of a TCP segment between two nodes on a network. Time stamps are always sent and echoed in both directions. Allows the ACE to use a window-scale factor that increases the size of the TCP send and receive buffers. The sender specifies a window-scale factor in a SYN segment that determines the send and receive window size for the duration of the connection. Clears the specified option from any segment that has it set and allows the segment. This is the default action on the explicitly supported options.
timestamp
window-scale
clear
Command Modes
Command History
2-794
OL-25339-01
Usage Guidelines
Using the tcp-options command, the ACE permits you to allow or clear the following explicitly supported TCP options specified in a SYN segment:
You can specify this command multiple times to configure different options and actions. If you specify the same option with different actions, the ACE uses the order of precedence to decide which action to use. The order of precedence for the actions in this command is as follows:
1. 2. 3.
Table 1-17 lists the TCP options not explicitly supported by the ACE.
Table 1-17 Unsupported TCP Options
Kind 6 7 9 10 11 12 13 14 15 16 17 18 19 20
Length 6 6 2 3
Meaning Echo Reply (obsoleted by option 8) Partial Order Connection Permitted CC CC.NEW CC.ECHO
Partial Order Service Profile RFC 1693 RFC 1644 RFC 1644 RFC 1644 RFC 1146 RFC 1146 [Knowles] [Knowles] [Subbu & Monroe] RFC 2385 [Scott]
3 N
TCP Alternate Checksum Request TCP Alternate Checksum Data Skeeter Bubba
3 18
2-795
Kind 21
Length
Meaning Selective Negative Acknowledgements (SNACK) Record Boundaries Corruption experienced SNAP Unassigned (released 12/18/00) TCP Compression Filter
Reference [Scott]
22 23 24 25 26
[Bellovin]
Table 1-18 lists the TCP options explicitly supported by the ACE.
Table 1-18 Supported TCP Options
Kind 0 1 3 4 5 8
Length 3 2 N 10
Selective Acknowledgement RFC 2018 (SACK) Permitted SACK Time Stamp Option (TSOPT) RFC 2018 RFC 1323
Examples
To reset the behavior of the ACE to the default of clearing the SACK option and allowing the segment, enter:
host1/Admin(config-parammap-conn)# no tcp-options selective-ack allow
You can specify a range of options for each action. If you specify overlapping option ranges with different actions, the ACE uses the order of precedence described in the Usage Guidelines section to decide which action to perform for the specified options. For example, to specify a range of options for each action, enter:
host1/Admin(config-parammap-conn)# tcp-options range 6 7 allow host1/Admin(config-parammap-conn)# tcp-options range 9 18 clear host1/Admin(config-parammap-conn)# tcp-options range 19 26 drop
2-796
OL-25339-01
Related Commands
show parameter-map
2-797
(config-parammap-conn) urgent-flag
To set the Urgent Pointer policy, use the urgent-flag command. Use the no form of this command to return to the default setting of clearing the Urgent flag. urgent-flag {allow | clear} no urgent-flag
Syntax Description
allow
Permits the status of the Urgent flag. This is the default. If the Urgent flag is set, the offset in the Urgent Pointer that indicates the location of the urgent data is valid. If the Urgent flag is not set, the offset in the Urgent Pointer is invalid. Sets the Urgent flag to 0, which invalidates the offset in the Urgent Pointer.
clear
Command Modes
Command History
Usage Guidelines
If the Urgent control bit (flag) is set in the TCP header, it indicates that the Urgent Pointer is valid. The Urgent Pointer contains an offset that indicates the location of the segment that follows the urgent data in the payload. Urgent data is data that should be processed as soon as possible, even before normal data is processed. The ACE permits you to allow or clear the Urgent flag. If you clear the Urgent flag, you invalidate the Urgent Pointer. The ACE clears the Urgent flag for any traffic above Layer 4. If you have enabled server connection reuse (see the Security Guide, Cisco ACE Application Control Engine), the ACE does not pass the Urgent flag value to the server.
Examples
To reset the ACE to its default of allowing the Urgent flag, enter:
host1/Admin(config-parammap-conn)# no urgent-flag
Related Commands
show parameter-map
2-798
OL-25339-01
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure a parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-pmap-c) appl-parameter dns advanced-options command in the Policy Map Configuration Mode Commands section.
Examples
Related Commands
2-799
(config-parammap-dns) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-800
OL-25339-01
Syntax Description
number
Specifies the length of time in seconds that the ACE keeps the query entries without answers in the hash table before timing them out. Enter an integer from 2 to 120 seconds. The default is 10 seconds.
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to time out DNS query entries with no corresponding server responses after 20 seconds, enter:
host1/Admin(config-parammap-dns)# timeout query 20
To reset the ACE behavior to the default of timing out DNS queries without server responses when the underlying UDP connection times out, enter:
host1/Admin(config-parammap-dns)# no timeout query 20
Related Commands
show parameter-map
2-801
parameter-map type generic command in configuration mode. The prompt changes to (config-parammap-generic). Use the no form of this command to remove the parameter map from the configuration. parameter-map type generic name no parameter-map type generic name
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure a parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-pmap-c) appl-parameter generic advanced-options command in the Policy Map Configuration Mode Commands section.
Examples
Related Commands
2-802
OL-25339-01
(config-parammap-generi) case-insensitive
To enable case-insensitive matching for generic matching only, use the case-insensitive command. With case-insensitive matching enabled, uppercase and lowercase letters are considered the same. By default, the ACE CLI is case sensitive. Use the no form of this command to reset the ACE to its default of case-sensitive generic matching. case-insensitive no case-insensitive
Syntax Description
Command Modes
Command History
Usage Guidelines
When enabled, case insensitivity applies to generic protocol regular expression matches.
Examples
Related Commands
show parameter-map
2-803
(config-parammap-generi) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-804
OL-25339-01
Syntax Description
bytes
Maximum number of bytes to parse. Enter an integer from 1 to 65535. The default is 2048 bytes.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To set the maximum parse length for generic protocols, enter the following command:
host1/Admin(config-parammap-generi)# set max-parse-length 8192
To reset the maximum parse length for generic protocols to the default value of 2048, enter the following command:
host1/Admin(config-parammap-generi)# no set max-parse-length
Related Commands
show parameter-map
2-805
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure a parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-pmap-c) appl-parameter http advanced-options command in the Policy Map Configuration Mode Commands section.
Examples
Related Commands
2-806
OL-25339-01
show parameter-map
2-807
(config-parammap-http) case-insensitive
To enable case-insensitive matching for HTTP matching only, use the case-insensitive command. With case-insensitive matching enabled, uppercase and lowercase letters are considered the same. By default, the ACE CLI is case sensitive. Use the no form of this command to reset the ACE to its default of case-sensitive HTTP matching. case-insensitive no case-insensitive
Syntax Description
Command Modes
Command History
Usage Guidelines
HTTP header names and values HTTP cookie names and values URL strings HTTP deep inspection
Examples
Related Commands
show parameter-map
2-808
OL-25339-01
(config-parammap-http) cookie-error-ignore
(ACE appliance only) This command has been deprecated in software version A4(1.1) and later. See the parsing non-strict command. To configure the ACE to ignore malformed cookies in a request and continue parsing the remaining cookies, use the cookie-error-ignore command. By default, when the ACE finds a malformed cookie in a flow, it stops parsing the remaining packets. Use the no form of this command to reset the default behavior. cookie-error-ignore no cookie-error-ignore
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To configure the ACE to ignore malformed cookies in a request and continue parsing the remaining cookies, enter:
host1/Admin(config)# parameter-map type http HTTP_MAP host1/Admin(config-parammap-http)# cookie-error-ignore
Related Commands
show parameter-map
2-809
(config-parammap-http) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-810
OL-25339-01
(config-parammap-http) compress
To define the parameters that the ACE uses when compressing HTTP traffic, use the compress command. Use the no form of this command to remove the HTTP compression. compress {mimetype type/subtype | minimum-size size | user-agent string} no compress {mimetype type/subtype | minimum-size size | user-agent string}
Syntax Description
mimetype type/subtype
Specifies the Multipurpose Internet Mail Extension (MIME) type to compress. The default is text/.* which includes all text MIME types, such as text/html, text/plain, and so on. Specifies the threshold at which compression occurs. The ACE compresses files that are the specified minimum size or larger. The default is 512 bytes. Specifies the text string in the request to match. The ACE does not compress the response to a request when the request contains the specified user agent string. The default is none.
minimum-size size
user-agent string
Command Modes
Command History
Modification This command was introduced. Additional error messages were added when removing a MIME type.
Usage Guidelines
When you attempt to remove a default Multipurpose Internet Mail Extension (MIME) type and no other MIME type is configured, the following error message is displayed:
Error: At least one user mimetype needs to be configured before removing the default mimetype
When you remove the only configured MIME type and the default MIME type was previously removed, the default MIME type is restored and the following information message is displayed:
The only user mimetype available is deleted so the default mimetype is configured
Examples
2-811
Related Commands
(config-pmap-lb-c) compress
2-812
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command has an effect only when persistence-rebalance is disabled. The header modify per-request command also causes the ACE to perform URL location header rewrite on every HTTP response if the ssl url rewrite location command is enabled. For more information about SSL URL rewrite, see the SSL Guide, Cisco ACE Application Control Engine.
Examples
To instruct the ACE to perform header modification on every HTTP request or response, enter the following command:
host1/Admin(config-parammap-http)# header modify per-request
To return the ACE behavior to the default of modifying headers only on the first HTTP request or response, enter the following command:
host1/Admin(config-parammap-http)# no header modify per-request
Related Commands
show parameter-map (config) action-list type modify http (config-actlist-modify) header delete (config-actlist-modify) header insert (config-actlist-modify) header rewrite (config-actlist-modify) ssl url rewrite location
2-813
2-814
OL-25339-01
(config-parammap-http) length-exceed
To configure how the ACE handles URLs or cookies that exceed the maximum parse length, use the length command. Use the no form of this command to reset the ACE to its default of stopping load balancing and discarding a packet when its URL or cookie exceeds the maximum parse length. length-exceed {continue | drop} no length-exceed
Syntax Description
continue drop
Specifies that the ACE continue load balancing when the maximum parse length is exceeded. Specifies that the ACE stop load balancing when the maximum parse length is exceeded. This is the default.
Command Modes
Command History
Usage Guidelines
When you specify the continue keyword, the (config-parammap-http) persistence-rebalance command is disabled if the total length of all cookies, HTTP headers, and URLs exceeds the maximum parse-length value.
Examples
To continue load balancing when the maximum parse length is exceeded, enter:
host1/Admin(config-parammap-http)# length-exceed continue
To reset the ACE to its default of stopping load balancing and discarding a packet when its URL or cookie exceeds the maximum parse length, enter:
host1/Admin(config-parammap-http)# no length-exceed
Related Commands
2-815
Syntax Description
Command Modes
Command History
Usage Guidelines
In software version A4(1.1) and later, the cookie-error-ignore command is deprecated. If you are upgrading from version A2(3.3) and have the cookie-error-ignore command in your configuration, you will receive a command exec error during the upgrade process. In a redundant configuration, the standby ACE will remain in the WARM_COMPATIBLE state until you manually change the command configuration to the new syntax that is described below. The functionality of this command has not changed; only the command name has changed.
Examples
To configure the ACE to ignore malformed cookies in a request and continue parsing the remaining cookies, enter:
host1/Admin(config)# parameter-map type http HTTP_MAP host1/Admin(config-parammap-http)# parsing non-strict
Related Commands
show parameter-map
2-816
OL-25339-01
(config-parammap-http) persistence-rebalance
To enable the ACE to check each GET request on a TCP connection and to load balance the request only if it matches a load-balancing class map that is different from the load-balancing class map matched by the previous request, use the persistence-rebalance command. By default, HTTP persistence is disabled. Use the no form of this command to reset persistence to the default setting of disabled. persistence-rebalance [strict] no persistence-rebalance
Syntax Description
strict
Allows you to configure the ACE to load balance each subsequent GET request on the same TCP connection independently. This option allows the ACE to load balance each HTTP request to a potentially different Layer 7 class and/or real server. The persistence-rebalance command without this option does not load balance successive GET requests on the same TCP connection unless it matches a load-balancing class map that is different from the load-balancing class map matched by the previous request.
Command Modes
Command History
Modification This command was introduced. This commands behavior was modified. This command was revised to include the strict option.
Modification This command was introduced. This command was revised to include the strict option.
Usage Guidelines
With persistence rebalance enabled, when successive GET requests result in load balancing that chooses the same class in the same policy, the ACE sends the requests to the real server that was used for the last GET request. This behavior prevents the ACE from load balancing every request and recreating the server-side connection on every GET request, producing less overhead and better performance. If a request matches a different policy, then the ACE rebalances the server-side connection. When persistence rebalance is disabled, the ACE load balances the first GET request on a new connection to a real server. The ACE sends successive requests on that same connection to the same server that serviced the first request because the ACE does not parse the Layer 7 information that is present in the request. In this case, load balancing is not involved after the initial load-balancing decision is made.
2-817
Another effect of persistence rebalance is that header insertion and cookie insertion, if enabled, occur for every request instead of only the first request. If a real server is enabled with the NTLM Microsoft authentication protocol, we recommend that you leave persistence rebalance disabled. NTLM is a security measure that is used to perform authentication with Microsoft remote access protocols. When a real server is enabled with NTLM, every connection to the real server must be authenticated; typically, each client user will see a pop-up window prompting for a username and password. Once the connection is authenticated, all subsequent requests on the same connection will not be challenged. However, when the server load balancing function is enabled and configured with persistence rebalance, a subsequent request may point to a different real server causing a new authentication handshake. The persistence-rebalance command is not compatible with generic protocol parsing. By default, persistence rebalance is enabled when you configure an HTTP parameter map. In the absence of an HTTP parameter map in the configuration, persistence rebalance will also be enabled by default when you configure a Layer 7 SLB policy map of type http or generic, associate it with a Layer 4 multi-match policy map, and any one of the following conditions exist:
Note
If you specify the default class map in the SLB policy map of type http or generic and no other Layer 7 features are configured, that policy becomes a Layer 4 policy and, in that case, persistence rebalance is disabled by default.
Any type of stickiness is configured except IP netmask stickiness The predictor is not based on the IP address You configure an action list, compression, HTTP header insertion, or an SSL proxy service
Note
If you configure SSL termination on the ACE with no other Layer 7 features (for example, compression, Layer 7 predictors, HTTP header insertion, and so on), persistence rebalance is disabled by default.
Examples
Related Commands
2-818
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
The ACE maintains a pool of TCP connections that can be reused if the client connection and the server connection share the same TCP options. For information about how the ACE handles TCP options, see the Security Guide, Cisco ACE Application Control Engine. For proper operation of this feature, follow these TCP server reuse configuration recommendations and restrictions:
Ensure that the ACE maximum segment size (MSS) is the same as the server MSS. Configure Port Address Translation (PAT) on the interface that is connected to the real server. PAT prevents collisions when a client stops using a server connection and then that connection is reused by another client. Without PAT, if the original client tries to reuse the original server connection, it is no longer available. For details about configuring PAT, see the Security Guide, Cisco ACE Application Control Engine. Configure the same TCP options that exist on the TCP server. Ensure that all real servers within a server farm have identical configurations.
Another effect of TCP server reuse is that header insertion and cookie insertion, if enabled, occur for every request instead of only the first request.
Examples
2-819
Related Commands
Syntax Description
bytes
Maximum number of bytes to parse in HTTP content. Enter an integer from 1 to 65535. The default is 4096 bytes.
Command Modes
Command History
Usage Guidelines
If you set the bytes argument to a value that is greater than 32 KB, you must configure the (config-parammap-conn) set tcp buffer-share command in a connection parameter map to a value that is greater than the bytes value. If you do not, even if you configure the (config-parammap-http) length-exceed continue command, the ACE may not completely parse a content string packet that is greater than 32 KB. The reason is that the default value of the (config-parammap-conn) set tcp buffer-share command buffer size (32 KB) will not accommodate the larger content string size.
Examples
To reset the maximum parse length to the default of 4096 bytes, enter:
host1/Admin(config-parammap-http)# no set content-maxparse-length
2-820
OL-25339-01
Related Commands
2-821
Syntax Description
bytes
Maximum number of bytes to parse for the total length of all cookies, HTTP headers, and URLs. Enter an integer from 1 to 65535. The default is 4096 bytes.
Command Modes
Command History
Modification This command was introduced. The default value increased from 2048 to 4096.
Usage Guidelines
If you set the bytes argument to a value that is greater than 32 KB, you must configure the (config-parammap-conn) set tcp buffer-share command in a connection parameter map to a value that is greater than the bytes value. If you do not, even if you configure the (config-parammap-http) length-exceed continue command, the ACE may not completely parse a header packet that is greater than 32 KB. The reason is that the default value of the (config-parammap-conn) set tcp buffer-share buffer size (32 KB) will not accommodate the larger header size.
Examples
To reset the HTTP header maximum parse length to the default of 4096 bytes, enter:
host1/Admin(config-parammap-http)# no set header-maxparse-length
Related Commands
2-822
OL-25339-01
Syntax Description
text
Delimiter string. Enter an unquoted text string with no spaces and a maximum of four characters. The order of the delimiters in the list does not matter. The default list of delimiters is /&#+.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Cookies and their delimiters appear in GET request lines. In the following example of a GET request line, the ampersand (&) that appears between name-value pairs is the secondary cookie delimiter. The question mark (?) begins the URL query and is not configurable.
GET /default.cgi?user=me&hello=world&id=2 HTTP/1.1
Examples
Related Commands
show parameter-map
2-823
Syntax Description
none
The secondary cookie start is not configured or the ACE ignores any start string of a secondary cookie in the URL and considers the secondary cookie as part of the URL. When you configure the none keyword to consider the entire URL query string as part of a URL, the commands that rely on the URL query, such as the match cookie secondary and predictor hash cookie secondary commands, do not work. Do not configure these commands under the same real server.
text
The start string of the secondary cookie. Enter a maximum of two characters. The default start character is ?.
Command Modes
Command History
ACE Module Release A2(1.5) and A2(2.1) ACE Appliance Release A3(2.3)
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To reset the secondary cookie start string to the default setting of ?, enter:
host1/Admin(config-parammap-http)# no set secondary-cookie-start
2-824
OL-25339-01
Related Commands
show parameter-map
Syntax Description
map_name
Enter a unique name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. An optimization HTTP parameter map can be optionally specified in an optimization HTTP policy map to identify the association between an optimization HTTP action list and the parameter map. The optimization HTTP action list defines what to do, while the optimization HTTP parameter map defines the specific details about how to accomplish the application acceleration action. For details, see the Policy Map Management Configuration Mode Commands section.
Examples
Related Commands
2-825
Syntax Description
value
Percentage of all requests (or sessions) to be sampled for performance with acceleration (optimization) applied. All applicable optimizations for the class will be performed. Valid values are from 0 to 100 percent. The default is 10 percent. This value plus the passthru-rate-percent value must not exceed 100. Percentage of all requests (or sessions) to be sampled for performance without optimization. No optimizations for the class will be performed. Valid values are from 0 to 100 percent. The default is 10 percent. This value plus the optimize-rate-percent value must not exceed 100.
passthru-rate-percent value
Command Modes
Command History
Usage Guidelines
The statistical log contains an entry for each ACE optimization request to the server and is used for statistical analysis by the optional Cisco AVS 3180A Management Station. The ACE collects statistical log and sends it to the Cisco AVS 3180A Management Station for loading into the database. For details about the use of the Cisco AVS 3180A Management Station for database, management, and reporting features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide. To control the AppScope features that measure application acceleration and optimization performance, use the appscope commands in action list optimization configuration mode. See the Action List Optimization Configuration Mode Commands section for details.
2-826
OL-25339-01
To specify the host (the syslog server on the Management Station) that receives the syslog messages sent by the ACE, use the logging host configuration command. See the (config) logging host command. This command allows you to identify the IP address of the Management Station that will be used as the syslog server. You can specify that the host uses either UDP or TCP to send messages to the syslog server.
Examples
To specify a percentage of all requests (or sessions) to be sampled for performance with acceleration and without optimization applied by AppScope, enter:
host1/Admin(config-parammap-optmz)# appscope optimize-rate-percent 50 passthru-rate-percent 50
To revert to the default rate AppScope performance rate settings of 10 percent, enter:
host1/Admin(config-parammap-optmz)# no appscope optimize-rate-percent 50 passthru-rate-percent 50
Related Commands
Syntax Description
value
Base file anonymity level for the all-user delta optimization method. Valid values are from 0 to 50. The default is a value of 0 (disables anonymity).
Command Modes
Command History
Usage Guidelines
The string can contain a URL regular expression that defines a set of URLs in which URLs that differ only by their query parameters are to be treated as separate URLs in AppScope reports.
2-827
Typically, in an AppScope report organized by URL, matching URLs that differ only in their query parameters are treated as the same URL and are not listed on separate lines. Use the request-grouping-string command to specify that all URL variations that are based on query parameters are to be treated as separate URLs for reporting purposes. Each variation will appear on a separate line in the report. For details about the optional Cisco AVS 3180A Management Station database, management, and reporting features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
Examples
Related Commands
Syntax Description
string
A regular expression. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. Alternatively, you can enter a text string with spaces provided that you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. The Usage Guidelines section lists the supported characters that you can use for matching string expressions.
parameter_expander_function A parameter expander function that evaluate to strings. The Usage Guidelines section lists the parameter expander functions that you can use.
Command Modes
2-828
OL-25339-01
Command History
Usage Guidelines
The key that the ACE uses for any given requesting URL comprises one or more of the following two components:
Query parametersThe URL portion after a question mark (?). You can modify query parameters by using the cache parameter command, which can be used to include selected query parameters, a cookie value, an HTTP header value, or other values. Canonical URLThe URL portion up to a question mark (?). You can modify the canonical URL by using the cache key-modifier command.
The expanded string that results from the cache key-modifier command replaces the default canonical URL portion of the cache key. If you do not specify the cache key-modifier command, the canonical URL is used as the default value for the URL portion of the cache key (there may also be a query parameter portion). For details on modifying the cache key, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide. The following table lists the supported characters that you can use for matching string expressions. Convention . .* \. [charset] [^charset] () (expr1 | expr2) (expr)* (expr)+ expr{m,n} expr{m} expr{m,} \a \b \f \n \r \t \v Description One of any character. Zero or more of any character. Period (escaped). Match any single character from the range. Do not match any character in the range. All other characters represent themselves. Expression grouping. OR of expressions. 0 or more of expression. 1 or more of expression. Repeat the expression between m and n times, where m and n have a range of 1 to 255. Match the expression exactly m times. The range for m is from 1 to 255. Match the expression m or more times. The range for m is from 1 to 255. Alert (ASCII 7). Backspace (ASCII 8). Form-feed (ASCII 12). New line (ascii 10). Carriage return (ASCII 13). Tab (ASCII 9). Vertical tab (ASCII 11).
2-829
Convention \0 \\ \x##
Description Null (ASCII 0). Backslash. Any ASCII character as specified in two-digit hexadecimal notation.
The following table lists the parameter expander functions that you can use. Variable
$(number)
Description Expands to the corresponding matching subexpression (by number) in the URL pattern. Subexpressions are marked in a URL pattern using parentheses (). The numbering of the subexpressions begins with 1 and is the number of the left-parenthesis ( counting from the left. You can specify any positive integer for the number. $(0) matches the entire URL. For example, if the URL pattern is ((http://server/.*)/(.*)/)a.jsp, and the URL that matched it is the following: http://server/main/sub/a.jsp?category=shoes&session=99999, then the following are correct: $(0) = http://server/main/sub/a.jsp $(1) = http://server/main/sub/ $(2) = http://server/main $(3) = sub If the specified subexpression does not exist in the URL pattern, then the variable expands to the empty string.
$http_query_string()
Expands to the value of the whole query string in the URL. For example, if the URL is http://myhost/dothis?param1=value1¶m2=value2 then the following is correct: $http_query_string() = param1=value1¶m2=value2 This function applies to both GET and POST requests. Expands to the value of the named query parameter (case sensitive). For example, if the URL is http://server/main/sub/a.jsp?category=shoes&session=99999 then the following are correct: $http_query_param(category) = shoes $http_query_param(session) = 99999 If the specified parameter does not exist in the query, then the variable expands to the empty string. This function applies to both GET and POST requests.
$http_query_param(query-param-name)
$http_cookie(cookie-name)
Evaluates to the value of the named cookie. For example, $http_cookie(cookiexyz). The cookie name is case sensitive.
2-830
OL-25339-01
Variable
$http_header(request-header-name)
Description Evaluates to the value of the specified HTTP request header. In the case of multivalued headers, it is the single representation as specified in the HTTP specification. For example, $http_header(user-agent). The HTTP header name is not case sensitive. Evaluates to the HTTP method used for the request, such as GET or POST. Evaluates to a Boolean value: True or False, depending on the presence or absence of the element in the request. The elements are a specific query parameter (query-param-name), a specific cookie (cookie-name), a specific request header (request-header-name), or a specific HTTP method (method-name). All identifiers are case sensitive except for the HTTP request header name.
$http_method()
Boolean Functions:
$http_query_param_present(query-param-name) $http_query_param_notpresent (query-param-name) $http_cookie_present(cookie-name) $http_cookie_notpresent(cookie-name) $http_header_present(request-header-name) $http_header_notpresent(request-header-name) $http_method_present(method-name) $http_method_notpresent(method-name)
Examples
Related Commands
Syntax Description
parameter_expander_function Parameter expander function that evaluates to strings. Use the forwardslash (/) character when combining multiple parameter expander functions (for example, cache parameter $http_cookie(ID)/$http_query_param(category)). The maximum string value is 255 characters. See the (config-parammap-optmz) cache key-modifier section for a listing of the parameter expander functions that you can use.
2-831
Command Modes
Command History
Usage Guidelines
The key that the ACE uses for any given requesting URL comprises one or more of the following two components:
Query parametersThe URL portion after a question mark (?). You can modify query parameters by using the cache parameter command, which can be used to include selected query parameters, a cookie value, an HTTP header value, or other values. Canonical URLThe URL portion up to a question mark (?). You can modify the canonical URL by using the cache key-modifier command.
The cache parameter command specifies an expression that includes one or more parameter expander functions if you want to modify the parameter portion of the cache key. This command specifies one or more parameter expander functions that evaluate to strings. These strings are appended to the canonical URL to form the last portion of the cache key. The parameter expander functions are listed in the (config-parammap-optmz) cache key-modifier command. The string specified in the cache parameter command replaces the default query parameter that is used in the cache key. If you do not specify the cache parameter command, the query parameter portion of the URL is used as the default value for this portion of the cache key. The canonical URL, possibly modified by the cache key-modifier command, is the first part of the cache key. For details on modifying the cache key, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
Examples
To set the value of the query parameter portion of the cache key, enter:
host1/Admin(config-parammap-optmz)# cache parameter $http_query_param (version)
Related Commands
2-832
OL-25339-01
Syntax Description
min time
Minimum time in seconds that an object without an explicit expiration time should be considered fresh. The min keyword specifies the minimum time that the content can be cached for, which corresponds to the time-to-live value of the content. In the case of a new item that is valid for three hours, this value would be 3 x 60 x 60 = 10800 seconds. If you perform static caching (the flashforward-object action), this value should normally be 0. If you perform dynamic caching (the cache dynamic action) this value should be set to indicate how long the ACE should cache the page. Valid values are from 0 to 2147483647 seconds. The default is 0. Maximum time in seconds than an object without an explicit expiration time should be considered fresh. The max keyword determines how the ACE handles the case when the object has passed its cache minimum time-to-live value.Valid values are from 0 to 2147483647 seconds. The default is 300 seconds. Percent of an objects age at which an embedded object without an explicit expiration time is considered fresh. Valid values are from 0 to 100 percent. The default is 0 percent.
max time
percent value
Command Modes
Command History
Usage Guidelines
This command sets the maximum time (max keyword) or the minimum time (min keyword) in seconds that an object without an explicit expiration time should be considered fresh. The percent keyword sets the percent of an object's age at which an embedded object without an explicit expiration time is considered fresh.
Examples
To specify a minimum time-to-live value of 1000 seconds in which the content can be cached, enter:
host1/Admin(config-parammap-optmz)# cache ttl min 1000
2-833
Related Commands
Syntax Description
override-all override-cache-ctl-no-cache
Specifies that all cache request headers are ignored. Overrides the Cache-Control: no cache HTTP header from a request. This keyword is used for a flashforward-object command action (see the (config-actlist-optm) flashforward-object section). Typically, if there is a cache control request header stating no cache, the ACE will not cache this object. The override-cache-ctl-no-cache keyword instructs the ACE to ignore the Cache-Control: no cache header from the request side.
Command Modes
Command History
Usage Guidelines
Examples
To instruct the ACE that all cache request headers are ignored, enter:
host1/Admin(config-parammap-optmz)# cache-policy request override-all
Related Commands
(config-actlist-optm) flashforward-object
2-834
OL-25339-01
Syntax Description
override-all override-cache-ctl-private
Specifies that all cache response headers are ignored. Overrides the Cache-Control: private HTTP header from a response. This keyword is used for a flashforward-object command action (see the (config-actlist-optm) flashforward-object section) and is equivalent to static object caching. Typically, if there is a cache control response header stating private, these response headers will make the object not cacheable. The override-cache-ctl-private keyword instructs the ACE to ignore the Cache-Control: private HTTP header from a response.
Command Modes
Command History
Usage Guidelines
Examples
To instruct the ACE that all cache response headers are ignored, enter:
host1/Admin(config-parammap-optmz)# cache-policy response override-all
Related Commands
(config-actlist-optm) flashforward-object
2-835
(config-parammap-optmz) canonical-url
(ACE appliance only) To specify a string containing a canonical URL regular expression that defines a set of URLs to which the parameter map applies, use the canonical-url command. Use the no form of the command to delete the string that contains a canonical URL regular expression. canonical-url {parameter-expander-function} no canonical-url {parameter-expander-function}
Syntax Description
parameter-expander-function
Parameter expander function that evaluates to strings. See the (config-parammap-optmz) cache key-modifier section for a listing of the parameter expander functions that you can use.
Command Modes
Command History
Usage Guidelines
At least one URL must be specified using the canonical-url command. Use the canonical URL function in a parameter map to specify a base file selection policy. The canonical URL function specifies a regular expression that is used to match a variety of actual URLs. All matched URLs share a single base file. The ACE uses the canonical URL feature to modify a parameterized request to eliminate the question mark (?) and the characters that follow to identify the general part of the URL. This general URL is then used to create the base file. The ACE uses this feature to map multiple parameterized URLs to a single canonical URL.
Examples
To delete the string that contains a canonical URL regular expression, enter:
host1/Admin(config-parammap-optmz)# no canonical-url
Related Commands
(config-parammap-optmz) basefile anonymous-level (config-parammap-optmz) cache key-modifier (config-parammap-optmz) cache parameter (config-parammap-optmz) expires-setting
2-836
OL-25339-01
(config-parammap-optmz) clientscript-default
(ACE appliance only) To configure the ACE to recognize the scripting language used on delta optimized content pages, either JavaScript or Visual Basic, use the clientscript-default command. Use the no form of the command to revert to the default JavaScript scripting language. clientscript-default {javascript | vbscript} no clientscript-default {javascript | vbscript}
Syntax Description
javascript vbscript
Sets the default scripting language to JavaScript (default). Sets the default scripting language to Visual Basic.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-837
(config-parammap-optmz) description
(ACE appliance only) To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
show parameter-map
2-838
OL-25339-01
(config-parammap-optmz) delta
(ACE appliance only) To control the delta optimization mode used by the ACE and to configure the delta optimization operating parameters on the ACE, use the delta command. Use the no form of the command to revert to the default all-user delta optimization mode. delta {all-user | cacheable-content | exclude {iframes | mime-type mime-type | non-ascii | scripts} | first-visit | page-size {min value | max value} | per-user} no delta {all-user | cacheable-content | exclude {iframes | mime-type mime-type | non-ascii | scripts} | first-visit | page-size {min value | max value} | per-user}
Syntax Description
Specifies the corresponding URLs are to be delta optimized using the all-user delta optimization mode. This is the default. Enables delta optimization of cacheable content. Typically, the ACE detects cacheable content and prevents its delta optimization. Defines the cacheable objects that should not be delta optimized. Specifies that IFrames should not be delta optimized. Specifies the Multipurpose Internet Mail Extension (MIME)-type messages that should not be delta optimized (such as image/Jpeg, text/html, application/msword, audio/mpeg). Specifies that non-ASCII data should not to be delta optimized. Specify this keyword if the content has UTF8 characters. Using this keyword excludes such UTF8 characters from delta optimization but the remainder of that page can still have delta optimization. Specifies that JavaScript should not to be delta optimized. Enables delta optimization on the first visit to a web page. Sets the minimum and maximum page size, in bytes, that can be delta optimized. Specifies the minimum page size, in bytes, that can be delta optimized. Valid values are from 1 to 250000 bytes. The default is 1024 bytes. Specifies the maximum page size, in bytes, that can be delta optimized. Valid values are 1024 to 250000 bytes. The default is 250000 bytes. Specifies the corresponding URLs are to be delta optimized using the per-user delta optimization mode.
non-ascii
max value
per-user
Command Modes
Command History
2-839
Usage Guidelines
Delta optimization mode specifies whether the web pages to be delta optimized are common to all users or personalized for individual users, which determines what kind of page deltas are generated by the ACE. The ACE supports two delta optimization modes:
In the all-user delta optimization mode, the delta is generated against a single base file that is shared by all users of the URL. The all-user delta optimization mode is usable in most cases, even in the case of dynamic personalized content if the structure of a page is common across users. The disk space overhead is minimal (the disk space requirements are determined by the number of delta optimized pages, not the number of users). In the per-user delta optimization mode, when a specific user requests a URL, the delta for the response is generated against a base file that is created specifically for that user. The per-user delta optimization mode is useful in situations where the contents of a page (including layout elements) are different for each user. This mode delivers the highest level of delta optimization. However, a copy of the base page that is delivered to each user has to be kept in the ACE cache which increases the requirements on disk space for the ACE cache. The per-user delta optimization mode is useful for content privacy because base pages are not shared among users.
Examples
To specify that the corresponding URLs are to be delta optimized using the per-user delta optimization mode, enter:
host1/Admin(config-parammap-optmz)# delta per-user
To specify the MIME-type messages that should not be delta optimized, enter:
host1/Admin(config-parammap-optmz)# delta exclude mime-type audio/mpeg
Related Commands
2-840
OL-25339-01
(config-parammap-optmz) expires-setting
(ACE appliance only) To control the period of time that objects in the clients browser remain fresh, use the expires-setting command. Use the no form of the command to remove an expiration setting. expires-setting {cachettl | time-to-live seconds | unmodified) no expires-setting {cachettl | time-to-live seconds | unmodified)
Syntax Description
cachettl
Sets the freshness similar to FlashForwarded objects and uses the minimum and maximum settings configured by the cache ttl command (if set). See the (config-parammap-optmz) cache ttl section. The duration that objects in the clients browser remain fresh. Valid entries are from 0 to 2147483647 seconds. Disables browser object freshness control (default).
Command Modes
Command History
Usage Guidelines
The expires-setting command instructs the ACE to insert an Expires response header with a time value for an object. It is not necessary to configure this command when specifying the flashforward command in an action list because, in this case, the ACE always inserts a long time value in the Expires header for the transformed object. The expires-setting command is typically used when you are not using FlashForward but want to achieve the FlashForward affect by making all of the embedded objects perceived as being fresh by the browser.
Examples
To specify that the ACE use the settings configured by the cache ttl command, enter:
host1/Admin(config-parammap-optmz)# expires-setting cachettl
Related Commands
2-841
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-842
OL-25339-01
Syntax Description
all direct
Allows FlashForward to indirectly refresh embedded objects (default). Bypasses FlashForward for stale embedded objects so that they are directly refreshed.
Command Modes
Command History
Usage Guidelines
Request headers that the ACE sends to the origin server for stale embedded objects (indirect GET) may not be accepted by the origin server and cause errors. In this case, specify direct to prevent this behavior. FlashForward is disabled by default; you must enable it by specifying the following commands in action list optimization mode: flashforward and flashforward-object (for embedded objects).
Examples
To revert to the default of allowing FlashForward to indirectly refresh embedded objects, enter:
host1/Admin(config-parammap-optmz)# no flashforward refresh-policy
Related Commands
2-843
(config-parammap-optmz) ignore-server-content
(ACE appliance only) To specify a comma-separated list of HTTP response codes for which the response body must not be read (ignored), use the ignore-server-content command. Use the no form of the command to remove one or more response codes to ignore. ignore-server-content value no ignore-server-content value
Syntax Description
value
The response code as an unquoted text string with a maximum of 64 alphanumeric characters. For example, a response code value of 302 directs the ACE to ignore the response body in the case of a 302 (redirect) response from the origin server.
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-844
OL-25339-01
Syntax Description
bytes
Maximum number of bytes that are logged for each parameter value in the parameter summary of a transaction log entry in the statistical log. If a parameter value is longer than this limit, it is truncated at the specified parameter limit. Valid values are from 0 to 10,000 bytes. The default is 100 bytes.
Command Modes
Command History
Usage Guidelines
Examples
To revert to the default of 100 bytes as the value of the parameter summary, enter:
host1/Admin(config-parammap-optmz)# no parameter-summary parameter-value-limit
Related Commands
(config) logging host (config-actlist-optm) appscope (config-parammap-optmz) appscope optimize-rate-percent (config-parammap-optmz) request-grouping-string
2-845
(config-parammap-optmz) post-content-buffer-limit
(ACE appliance only) To set the buffer size of an HTTP POST to a maximum number of kilobytes, use the post-content-buffer-limit command. Use the no form of the command to revert to the default buffer size of 40K. post-content-buffer-limit value no post-content-buffer-limit value
Syntax Description
value
The buffer size for POST data for the purpose of logging transaction parameters in the statistics log. Valid values are 0 to 1000 KB. The default is 40 KB. Parameters beyond this limit will not be logged by the ACE.
Command Modes
Command History
Usage Guidelines
An HTTP POST can send a very large (effectively unlimited) amount of data; in an extreme case, the client can keep sending a stream of data for the server to handle. In order to parse and inspect the POST data, the ACE needs to load the data into a buffer in memory. Two types of standard HTTP form POST operations are as follows (they are distinguished by the value in the Content-Type header):
application/x-www-form-urlencodedThis type represents the majority of all HTTP POSTs. This type is just a standard POST of a webpage form. multipart/form-dataThis type is much less common. It allows browser users to upload files to a website or application. For example, if you use a web-based email program, and you want to attach a file to an e-mail that you are sending, the upload of the file is done using this type. Another usage (even less common) of this type of HTTP POST is to send binary data (for example, from a custom browser plug-in, or from a non-browser HTTP client).
Examples
Related Commands
2-846
OL-25339-01
(config-parammap-optmz) rebase
(ACE appliance only) To control the rebasing of base files by the ACE, use the rebase command. Use the no form of the command to revert to a default rebase setting. rebase {delta-percent value | flashforward-percent value | history-size value | modification-cooloff-period value | reset-period value} no rebase {delta-percent value | flashforward-percent value | history-size value | modification-cooloff-period value | reset-period value}
Syntax Description
delta-percent value
Specifies the delta threshold at which rebasing is triggered. This number represents the size of a page delta relative to the page total size, expressed as a percentage. Valid values are from 0 to 10000 percent. The default threshold is 50 percent. Specifies a rebase, based on the percent of FlashForwarded URLs in the response. Rebasing is triggered when the difference between the percentages of FlashForwarded URLs in the delta response and the base file exceed the threshold. Valid values are from 0 to 10000 percent. The default is 50 percent. The flashforward-percent keyword provides a threshold control for rebasing based on the percent of FlashForwarded URLs in the response. Where the delta-percent keyword triggers rebasing when the delta response size exceeds the threshold as a percentage of base file size; the flashforward-percent keyword triggers rebasing when the difference between the percentages of FlashForwarded URLs in the delta response and the base file exceed the threshold. Controls how much history is stored before resetting. Once the sample collection reaches the specified history size, the ACE resets all rebase control parameters to zero and starts over. Using the history-size keyword prevents the base file from becoming too rigid. That is, if a base file has served approximately one million pages, then it would take another half million unfavorable responses before the base file can be rebased. Valid values are from 10 to 2147483647 pages. The default value for this parameter is 1000 pages. Specifies the time, in seconds, after the last modification before performing a rebase. Valid values are from 1 to 14400 seconds (4 hours).The default is 14400 seconds. Specifies the period for performing a meta data refresh Valid values are from 1 to 900 seconds (15 minutes). The default is 900 seconds.
flashforward-percent value
history-size value
Command Modes
Command History
2-847
Usage Guidelines
Rebasing refers to the process of updating the base file that is used for generating deltas between subsequent content retrievals. Because the base content of a site often changes over a period of time, the size of the generated deltas can grow relatively large. To maintain the effectiveness of the delta optimization process, the base files are automatically updated as required.
Examples
To specify a rebase, based on a percentage of 1000 FlashForwarded URLs in the response, enter:
host1/Admin(config-parammap-optmz)# rebase flashforward-percent 1000
Related Commands
(config-parammap-optmz) request-grouping-string
(ACE appliance only) To define a string to sort requests for AppScope reporting by the optional Cisco AVS 3180A Management Station, use the request-grouping-string command. Use the no form of the command to re move a request grouping string. request-grouping-string string no request-grouping-string string
Syntax Description
string
URL regular expression that defines a set of URLs. The string can contain the parameter expander functions listed in the (config-parammap-optmz) cache key-modifier section.
Command Modes
Command History
Usage Guidelines
The string can contain a URL regular expression that defines a set of URLs in which URLs that differ only by their query parameters are to be treated as separate URLs in AppScope reports. Typically, in an AppScope report organized by URL, matching URLs that differ only in their query parameters are treated as the same URL and are not listed on separate lines. Use the request-grouping-string command to specify that all URL variations that are based on query parameters are to be treated as separate URLs for reporting purposes. Each variation will appear on a separate line in the report.
2-848
OL-25339-01
For details about the Cisco AVS 3180A Management Station database, management, and reporting features for the ACE optimization functionality, including AppScope reporting, see the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide.
Examples
To define a string that is used to make the URLs http://server/catalog.asp?region=asia and http://server/catalog.asp?region=america into two separate reporting categories, enter:
host1/Admin(config-parammap-optmz)# request-grouping-string http_query_param(region)
Related Commands
(config-parammap-optmz) server-header
(ACE appliance only) To define a user-specified string to be sent in the server header for an HTTP response, use the server-header command in parameter map optimization configuration mode. Use the no form of the command to delete the server header string. server-header string no server-header srting
Syntax Description
string
A particular string to be included in the server header. Enter a quoted text string. A maximum of 64 alphanumeric characters are allowed.
Command Modes
Command History
Usage Guidelines
This command provide you with a method to uniquely tag the context or URL match statement by setting server header value to a particular string. The server header string can be used in cases where a particular URL is not being transmitted to the correct target context or the match statement.
Examples
2-849
Related Commands
(config-parammap-optmz) server-load
(ACE appliance only) To control load-based expiration for the cache, use the server-load command. Use the no form of the command to revert to a default setting of 20 percent. server-load {trigger-percent value | ttl-change-percent value} no server-load {trigger-percent value | ttl-change-percent value}
Syntax Description
trigger-percent value
Defines the threshold that triggers a change in the cache TTL. This keyword enables the ACE to monitor server load in real time and make intelligent closed loop content expiration decisions so that site performance is maximized and existing hardware resources are used most efficiently, even during periods of peak traffic load. Valid values are from 0 to 100 percent. The default is 20 percent. Defines the percentage by which the cache TTL is increased or decreased in response to a change in the server load. For example, if you set this value to 20 and the current TTL for a particular response is 300 seconds, and if the current server response time exceeds the trigger threshold, then the cache TTL for the response is raised to 360 seconds (20 percent increase). Valid values are from 0 to 100 percent. The default is 20 percent.
ttl-change-percent value
Command Modes
Command History
Usage Guidelines
Performance assurance with load-based expiration allows an object in the cache to expire (excluding the natural process of cache pruning). The origin servers load determines when the object expires. This type of expiration allows you to dynamically increase the time to live (TTL) of cached responses if the current response time (average computed over a short time window) from the origin servers is larger than the average response time (average computed over a longer time window) by a threshold amount. Similarly, the TTL is dynamically decreased if the reverse holds true. The starting value for the cache
2-850
OL-25339-01
TTL is the cache ttl min value (see the (config-parammap-optmz) cache ttl section) or 0 if you do not specify a value. Moving average-based calculation allows the cache to respond to trends in usage patterns, smoothing out uncharacteristic spikes.
Examples
Related Commands
2-851
Syntax Description
value
Number of UTF-8 characters on a page that constitute a UTF-8 character set page. Valid values are from 1 to 1,000,000 characters. The default is 5 characters.
Command Modes
Command History
Usage Guidelines
This threshold adjusts the detection of multibyte UTF-8 character set pages.
Examples
Related Commands
2-852
OL-25339-01
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The commands in this mode require the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure a parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-pmap-c) appl-parameter rtsp advanced-options command in the Policy Map Configuration Mode Commands section.
Examples
Related Commands
2-853
(config-parammap-rtsp) case-insensitive
To disable case-sensitivity matching for RTSP, use the case-insensitive command. Use the no form of this command to reset the ACE to its default of case-sensitive RTSP matching. case-insensitive no case-insensitive
Syntax Description
Command Modes
Command History
Usage Guidelines
By default, the ACE CLI is case sensitive. With case-insensitive matching enabled, uppercase and lowercase letters are considered the same. When case sensitivity is disabled, it applies to the following:
RTSP header names and values RTSP URL strings RTSP inspection (for details, see the Security Guide, Cisco ACE Application Control Engine)
Examples
Related Commands
show parameter-map
2-854
OL-25339-01
(config-parammap-rtsp) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-855
Syntax Description
bytes
Maximum number of bytes to parse for the total length of all RTSP headers. Enter an integer from 1 to 65535. The default is 2048 bytes.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To set the RTSP header maximum parse length to 16,384 bytes, enter:
host1/Admin(config-parammap-rtsp)# set header-maxparse-length 16384
To reset the RTSP header maximum parse length to the default of 2048 bytes, enter:
host1/Admin(config-parammap-rtsp)# no set header-maxparse-length 8192
Related Commands
show parameter-map
2-856
OL-25339-01
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 32 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Note the following considerations when you configure SCCP inspection on the ACE:
If the IP address of an internal Cisco CallManager (CCM) is configured for Network Address Translation (NAT) or Port Address Translation (PAT) to a different IP address or port, registrations for external IP phones fail because the ACE does not support NAT or PAT of the file content transferred over TFTP. Although the ACE supports NAT of TFTP messages and opens a secure port for the TFTP file, the ACE cannot translate the CCM IP address and port that are embedded in the IP phone configuration files. The configuration files are transferred using TFTP during phone registration. If a Skinny phone is in a low security zone and the TFTP server is in a high security zone, the ACE cannot translate the TFTP server IP address. In this case, the ACE opens the TFTP port (69) for Skinny phones.
Examples
2-857
Related Commands
2-858
OL-25339-01
(config-parammap-skinny) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-859
(config-parammap-skinny) enforce-registration
To enable registration enforcement, use the enforce-registration command. Use the no form of this command to disable registration enforcement. enforce-registration no enforce-registration
Syntax Description
Command Modes
Command History
Usage Guidelines
You can configure the ACE to allow only registered Skinny clients to make calls. To accomplish this task, the ACE maintains the state of each Skinny client. After a client registers with CCM, the ACE opens a secure port (pinhole) to allow that client to make a call. By default, this feature is disabled.
Examples
Related Commands
2-860
OL-25339-01
Syntax Description
number
Largest value for the station message ID in hexadecimal that the ACE accepts. Enter a hexadecimal value from 0 to 4000. If a packet arrives with a station message ID greater than the maximum configured value or greater than the default value, the ACE drops the packet and generates a syslog message.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-861
(config-parammap-skinny) sccp-prefix-len
To set the minimum and maximum SCCP prefix length, use the sccp-prefix-len command. Use the no form of this command to reset the minimum prefix length to the default behavior. sccp-prefix len {max number | min number} no sccp-prefix len {max number | min number}
Syntax Description
Enables the check of the maximum SCCP prefix length. Enter an integer from 4 to 4000 bytes. The default is 4 bytes. Specifies the minimum SCCP prefix length. Enter an integer from 4 to 4000 bytes.
Command Modes
Command History
Usage Guidelines
By default, the ACE drops SCCP messages that have an SCCP Prefix length that is less than the message ID. You can configure the ACE to check for a specific minimum prefix length. You can also configure the ACE to check for a maximum prefix length, but this check is disabled by default. The ACE drops any Skinny message packets that fails these checks and generates a syslog message.
Examples
To reset the minimum SCCP prefix length to the default behavior, enter:
host1/Admin(config-parammap-skinny)# no sccp-prefix-len min 4
Related Commands
2-862
OL-25339-01
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 32 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Note the following considerations when you configure SIP inspection on the ACE:
If the IP address in the owner field (o=) is different from the IP address in the connection field (c=) of the Session Description Protocol (SDP) portion of a SIP packet, the ACE may not translate the IP address properly. This improper IP address translation is caused by a limitation of the SIP protocol, which does not provide a port value in the owner field (o=). If a remote endpoint attempts to register with a SIP proxy server on a network protected by the ACE, the registration fails under the following conditions:
PAT is configured on the remote endpoint The SIP registration server is on the outside network
The port value is missing in the contact field of the REGISTER message that the endpoint sends to the proxy server.
Examples
2-863
Related Commands
2-864
OL-25339-01
(config-parammap-sip) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
(config-parammap-sip) im
To enable instant messaging (IM) over SIP, use the im command. Use the no form of this command to disable instant messaging. im no im
2-865
Syntax Description
Command Modes
Command History
Usage Guidelines
Disabling IM results in the ACE dropping all messages belonging to the IM.
Examples
Related Commands
(config-parammap-sip) max-forward-validation
To instruct the ACE to validate the value of the Max-Forwards header field, use the ACE max-forward-validation command. Use the no form of this command to disable maximum forward field validation. max-forward-validation {log} | {{drop| reset} [log]} no max-forward-validation {log} | {{drop| reset} [log]}
Syntax Description
Specifies that the ACE log a max forward validation event. Specifies that the ACE drop the SIP message. Specifies that the ACE reset the SIP connection.
2-866
OL-25339-01
Command Modes
Command History
Usage Guidelines
The Max-Forwards header field limits the number of hops that a SIP request can take on the way to its destination. This header field contains an integer that is decremented by one at each hop. If the Max-Forwards value reaches zero before the request reaches its destination, the request is rejected with a 483 Too Many Hops error response. You can instruct the ACE to validate the Max-Forwards header field value and to take appropriate action if the validation fails.
Examples
Related Commands
(config-parammap-sip) software-version
To enable user agent (UA) software version options, use the software-version command. Use the no form of this command to reset the software version to the default behavior. software-version {log} | {mask [log]} no software-version {log} | {mask [log]}
Syntax Description
log mask
Specifies that the ACE log the UA software version. Specifies that the ACE mask the UA software version.
2-867
Command Modes
Command History
Usage Guidelines
If the software version of a user agent (UA) were exposed, the UA may be more vulnerable to attacks from hackers who exploit the security holes present in that particular version of software. To protect the UA from such attacks, the ACE allows you to log or mask the UA software version.
Examples
To return the ACE behavior to the default of not masking the UA software version, enter:
host1/Admin(config-parammap-sip)# no software-version mask
Related Commands
(config-parammap-sip) strict-header-validation
To enable strict header validation and the action that you want the ACE to perform if a SIP header does not meet the validation requirements, use the strict-header-validation command. Use the no form of this command to disable strict header validation. strict-header-validation {log} | {{drop | reset} [log]} no strict-header-validation {log} | {{drop| reset} [log]}
Syntax Description
Specifies that the ACE drop the SIP message. Specifies that the ACE reset the connection. Specifies that the ACE log the header validation event.
2-868
OL-25339-01
Command Modes
Command History
Usage Guidelines
You can ensure the validity of SIP packet headers by configuring the ACE to check for the presence of the following mandatory SIP header fields:
If one of these header fields is missing in a SIP packet, the ACE considers that packet invalid. The ACE also checks for forbidden header fields, according to RFC 3261. Use care if you plan to enable the drop option to ensure the validity of SIP packet headers. The drop option results in dropping requests which do not include the mandatory headers of that request. In some cases, the use of the drop option can lead to problems with some phones which do not utilize the mandatory headers in the request. For example, when a call is made and then cancelled, the phone receives a 487 Request Terminated cancel status request and transmits an ACK. However, for the Cisco IP Phone 7960, the transmitted ACK does not contain the MAX-FORWARDS header, which is a mandatory header for ACK. The ACE will then drop this packet, which can result in operational issues with the phone.
Examples
To enable strict header validation, instruct the ACE to drop the connection if the packet header does not meet the header validation requirements, and log the event, enter:
host1/Admin(config-parammap-sip)# strict-header-validation drop log
Related Commands
2-869
(config-parammap-sip) timeout
To prevent a hacker from exploiting this port, set a timeout for SIP media by using the timeout command in parameter map SIP configuration mode. Use the no form of this command to return the streaming media port timeout value to the default of 5 seconds. timeout sip-media number no timeout sip-media number
Syntax Description
number
The timeout in seconds for the media port. Enter an integer from 1 to 65535 seconds. The default is 5 seconds. Be sure to provide a timeout value that is large enough for streaming media applications to complete.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To return the streaming media port timeout value to the default of 5 seconds, enter:
host1/Admin(config-parammap-sip)# no timeout sip-media 3600
Related Commands
2-870
OL-25339-01
(config-parammap-sip) uri-non-sip
To enable the detection of non-SIP URIs in SIP messages, use the uri-non-sip command. Use the no form of this command to disable the detection of non-SIP URIs. uri-non-sip {log} | {mask [log]} no uri-non-sip {log} | {mask [log]}
Syntax Description
log mask
Specifies the ACE log the non-SIP URI. Specifies that the ACE mask the non-SIP URI.
Command Modes
Command History
Usage Guidelines
Examples
To enable the detection of non-SIP URIs in SIP messages and log the event, enter:
host1/Admin(config-parammap-sip)# uri-non-sip log
Related Commands
2-871
Syntax Description
name
Name assigned to the parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the connection or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure an SSL parameter map, you must associate the parameter map with a policy map to activate it. For details, see the (config-ssl-proxy) ssl advanced-options command in the SSL Proxy Configuration Mode Commands section.
Examples
Related Commands
2-872
OL-25339-01
(config-parammap-ssl) authentication-failure
To configure the ACE to continue an SSL handshake when certificate failure occurs, use the authentication-failure command. This command applies when client or server authentication is enabled. Use the no form of this command to reset the default behavior of terminating an SSL handshake when a certificate failure occurs. authentication-failure {ignore | redirect reason {serverfarm serverfarm_name | url URL_string {301|302}}} no authentication-failure
Syntax Description
ignore
Ignores any client or server certificate failure during the SSL handshake in a SSL termination or initiation configuration, respectively. (SSL termination only) Performs a redirect to the specified redirect server farm or URL when the ACE encounters a client certificate failure. When you configure this keyword, after the handshake is completed, the redirect occurs to the redirect server farm or the URL. If multiple failures cause a redirect, the ACE performs a redirect on the first failure that it encounters. If that failure is corrected, the ACE performs a redirect on the next failure that it encounters. For the reason argument, enter of the following to associate the client certificate failure with a redirect:
redirect reason
cert-not-yet-validAssociates a certificate that is not yet valid failure with the redirect. cert-expiredAssociates an expired certificate failure with a redirect. unknown-issuerAssociates an unknown issuer certificate failure with a redirect. cert-revokedAssociates a revoked certificate failure with a redirect. no-client-certAssociates no client certificate failure with a redirect. crl-not-availableAssociates a CRL that is not available failure with a redirect. crl-has-expiredAssociates an expired CRL failure with a redirect. cert-signature-failureAssociates a certificate signature failure with a redirect. cert-other-errorAssociates a all other certificate failures with a redirect. anyAssociates any of the certificate failures with the redirect.
2-873
serverfarm serverfarm_name Specifies the name of a configured server farm for the redirect as follows:
ACE software version A4(1.0) or laterEnter the name of a configured host or redirect server farm. All earlier ACE software versionsEnter the name of a configured redirect server farm only.
Specifies the static URL path for the redirect. Enter a string with a maximum of 255 characters and no spaces. Specifies the redirect code that is sent back to the client. Enter one of the following:
301, the status code for a resource permanently moving to a new location. 302, the status code for a resource temporarily moving to a new location.
Command Modes
Command History
Modification This command was introduced. Added the ignore keyword for client authentication and the redirect keyword.
Usage Guidelines
By default, when the ACE encounters one of the following certificate failures during the setup of the front-end connection in an SSL termination configuration or back-end connection in an SSL initiation configuration when authentication is enabled, it terminates the SSL handshake:
Certificate is not yet valid Certificate has expired Unable to get issuer certificate Certificate is revoked No client certificate is sent Certificate signature failure CRL is not available during the revocation check CRL is expired during revocation check All other certificate errors
2-874
OL-25339-01
For client certificate failures, you can configure the ACE to either ignore these failures or perform a redirect to a server farm or URL. For server certificate failures, you can only configure the ACE to ignore these failures.
Examples
For example, to ignore all certificate failures during the SSL handshake, enter:
host1/Admin(config)# parameter-map type ssl SSL_PARAMMAP_SSL host1/Admin(config-parammap-ssl)# authentication-failure ignore
To perform a redirect to the INVALID-CERT server farm when a cert-not-yet-valid failure occurs with a client certificate, enter:
host1/Admin(config-parammap-ssl)# authentication-failure redirect cert-not-yet-valid serverfarm INVALID-CERT
To perform a redirect to a static URL with a 302 status code when an unknown-issuer failure occurs with a client certificate, enter:
host1/Admin(config-parammap-ssl)# authentication-failure redirect unknown-issuer url https://www.example.com/NewCertRequest.html 302
To reset the default behavior of terminating an SSL handshake when a certificate failure occurs, use the no form of the command:
host1/Admin(config-parammap-ssl)# no authentication-failure redirect unknown-issuer
Related Commands
(config-ssl-proxy) authgroup
2-875
Syntax Description
Command Modes
Command History
Usage Guidelines
By default, when you configure the crl best-effort command for client or server certificate revocation checks, if the ACE detects CRL distribution point (CDP) errors in the presented certificates or errors occur during a CRL download, the ACE rejects the SSL connection. The cdp-errors ignore command allows you to configure the ACE to ignore CDP errors when the crl best-effort command is configured. When you configure the cdp-errors ignore command, the ACE allows SSL connections when it detects CDP errors in the presented certificates or it could not download a valid certificate revocation list (CRL) from valid CDPs on the certificates.
Examples
For example, to configure the ACE to ignore CDP or CRL-download errors, enter:
host1/Admin(config)# parameter-map type ssl PARAMMAP_SSL host1/Admin(config-parammap-ssl)# cdp-errors ignore
To reset the default behavior where the ACE rejects an SSL connection when CDP or CRL-download errors occur, enter:
host1/Admin(config-parammap-ssl)# no cdp-errors ignore
Related Commands
2-876
OL-25339-01
(config-parammap-ssl) cipher
To define each of the cipher suites that you want the ACE to support during a secure session, use the cipher command. Use the no form of this command to delete a cipher suite from the SSL parameter map. cipher cipher_name [priority cipher_priority] no cipher cipher_name
Syntax Description
cipher_name
Name of the cipher suite. See the Usage Guidelines section for the TCP options available for the available cipher suites that the ACE supports. Enter one of the supported cipher suites from Table 1-19. The default setting is all. (Optional) Assigns a priority level to the cipher suite. The priority level represents the preference-for-use ranking of the cipher suite, with 10 being the most preferred and 1 being the least preferred. By default, all configured cipher suites have a priority level of 1. Priority level of the cipher suite. Enter a value from 1 to 10. The default priority value is 1.
priority
cipher_priority
Command Modes
Command History
Usage Guidelines
Table 1-19 lists the available cipher suites that the ACE supports and indicates which of the supported cipher suites are exportable from the ACE. Table 1-19 also lists the authentication certificate and encryption key required by each cipher suite.
Exportable No No No No Yes
Authentication Certificate Used RSA certificate RSA certificate RSA certificate RSA certificate RSA certificate
Key Exchange Algorithm Used RSA key exchange RSA key exchange RSA key exchange RSA key exchange RSA key exchange
2-877
Authentication Certificate Used RSA certificate RSA certificate RSA certificate RSA certificate RSA certificate RSA certificate
Key Exchange Algorithm Used RSA key exchange RSA key exchange RSA key exchange RSA key exchange RSA key exchange RSA key exchange
Repeat the cipher command for each cipher suite that you want to include in the SSL parameter map. The ACE chooses a cipher suite with the highest priority level from the client list. For SSL termination applications, the ACE uses the priority level to match cipher suites in the clients ClientHello handshake message. For SSL initiation applications, the priority level represents the order in which the ACE places the cipher suites in its ClientHello handshake message to the server. The default all cipher suites setting works only when you do not configure the SSL parameter map with any specific ciphers. To return to using the all cipher suites setting, you must delete each of the specifically defined ciphers from the parameter map using the no form of the command.
Examples
To add the cipher suite RSA_WITH _AES_128_CBC_SHA and assign it a priority 2 level, enter:
host1/Admin(config-parammap-ssl)# cipher RSA_WITH_AES_128_CBC_SHA priority 2
To delete the cipher suite RSA_WITH _AES_128_CBC_SHA from the SSL parameter map, enter:
host1/Admin(config-parammap-ssl)# no cipher RSA_WITH_AES_128_CBC_SHA
Related Commands
(config-parammap-ssl) queue-delay timeout (config-parammap-ssl) session-cache timeout (config-parammap-ssl) version show parameter-map
2-878
OL-25339-01
(config-parammap-ssl) close-protocol
To configure how the ACE handles the sending of close-notify messages, use the close-protocol command. By default, the ACE sends a close-notify alert message to its peer when closing a session but has no expectation of receiving one back from the peer. Use the no form of this command to reset the the default behavior. close-protocol {disabled | none} no close-protocol
Syntax Description
disabled
Configures the ACE not to send a close-notify alert message to its peer when closing a session with no expectation of receiving one back from the peer. Configures the ACE to send a close-notify alert message to its peer when closing a session, but the ACE has no expectation of receiving one back from the peer.
none
Command Modes
Command History
Usage Guidelines
Examples
To configure the close-protocol command with the default setting of none, enter:
host1/Admin(config-parammap-ssl)# no close-protocol
Related Commands
show parameter-map
2-879
(config-parammap-ssl) description
To add a description for the parameter map, use the description command. Use the no form of this command to remove the description from the parameter map. description text_string no description
Syntax Description
text_string
Description for the action list. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
show parameter-map
2-880
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
When you configure certificate revocation lists (CRLs) on the ACE, the CRLs contain an update field that specifies the date when a new version would be available. By default, the ACE does not continue to use CRLs that contain an update field with an expired date and, thus, does not reject incoming certificates using the CRL.
Examples
To configure the ACE to reject a client certificate when the CRL in use has expired, enter:
host1/Admin(config-parammap-ssl)# expired-crl reject
To reset the default behavior of the ACE accepting a client certificate after the CRL in use has expired, enter:
host1/Admin(config-parammap-ssl)# no expired-crl reject
Related Commands
2-881
The client or server certificate has a CA FALSE setting. The intermediate certificates have the CA TRUE setting.
If the field does not have these settings, the certificate fails authentication. Use the no form of this command to reset the default behavior. purpose-check disabled no purpose-check disabled
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
show parameter-map
2-882
OL-25339-01
Syntax Description
milliseconds
Delay time in milliseconds before the data is emptied from the queue. Enter an integer from 0 to 10000. A value of 0 disables the delay timer, causing the ACE to encrypt data from the server as it arrives and then sends the encrypted data to the client.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The queue delay applies only to data that the ACE sends to the client.
Examples
Related Commands
show parameter-map
2-883
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The crypto rehandshake enabled configuration mode command to enable SSL rehandshake in all contexts overrides the rehandshake enable parameter map command.
Examples
Related Commands
2-884
OL-25339-01
Syntax Description
seconds
Time in seconds that the ACE reuses the key stored in the cache before removing the session IDs. Enter an integer from 0 to 72000 (20 hours). By default, session ID reuse is disabled. A value of 0 causes the ACE to remove the session IDs from the cache when the cache is full and to implement the least-recently-used (LRU) timeout policy.
Command Modes
Command History
Usage Guidelines
A SSL session ID is created every time the client and the ACE perform a full SSL key exchange and establish a new master secret key. To quicken the SSL negotiation process between the client and the ACE, the SSL session ID reuse feature allows the ACE to reuse the secret key information in the session cache. On subsequent connections with the client, the ACE reuses the key stored in the cache from the last negotiated session. You can enable session ID reuse by setting a session cache timeout value for the total amount of time that the SSL session ID remains valid before the ACE requires a full SSL handshake to establish a new session.
Examples
To disable the timer and ensure that the full SSL handshake occurs for each new connection with the ACE, enter:
host1/Admin(config-parammap-ssl)# no session-cache timeout
2-885
Related Commands
show parameter-map
2-886
OL-25339-01
(config-parammap-ssl) version
To specify the versions of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) that the ACE supports when it uses the SSL proxy parameter map during the handshake process, use the version command. Use the no form of the command to remove a version from the SSL proxy parameter map. version {all | ssl3 | tls1} no version
Syntax Description
Specifies that the ACE supports both SSL (version SSL3) and TLS (version TLS1). This is the default setting. Specifies that the ACE supports only SSL version SSL3. Specifies that the ACE supports only TLS version TLS1.
Command Modes
Command History
Usage Guidelines
Examples
To remove the version TLS1 from the SSL proxy parameter map, enter:
host1/Admin(config-parammap-ssl)# no version
Related Commands
(config-parammap-ssl) cipher (config-parammap-ssl) queue-delay timeout (config-parammap-ssl) session-cache timeout show parameter-map
2-887
Server load balancing based on Layer 3 and Layer 4 connection information (virtual IP address) (ACE appliance only) Application acceleration and optimization Secure Sockets Layer (SSL) security services between a web browser (the client) and the HTTP connection (the server) Static or dynamic Network Address Translation (NAT) Application protocol inspection (also known as protocol fixup) TCP termination, normalization, and reuse IP normalization and fragment reassembly
Use the no form of the policy-map multimatch command to remove a policy map from the ACE. policy-map multi-match map_name no policy-map multi-match map_name
Syntax Description
map_name
Name assigned to the Layer 3 and Layer 4 policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-888
OL-25339-01
Usage Guidelines
The commands in this mode require the loadbalance, inspect, connection, NAT, or SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To perform HTTP load balancing, HTTP deep packet inspection, or FTP command inspection functions, you associate a previously created Layer 7 policy map within a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies and can be associated only within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. For example, to associate a Layer 7 HTTP load-balancing policy map, you nest the Layer 7 load-balancing policy map by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command. The ACE supports a system-wide maximum of 4096 policy maps.
Examples
To create a Layer 3 and Layer 4 server load balancing (SLB) policy map named L4_SLB_POLICY, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY host1/Admin(config-pmap)#
To create a Layer 3 and Layer 4 application protocol inspection policy map named L4_HTTP_APP_INSPECTION_POLICY, enter:
host1/Admin(config)# policy-map multi-match L4_HTTP_APP_INSPECTION_POLICY host1/Admin(config-pmap)#
Related Commands
2-889
(config-pmap) class
To associate a Layer 3 and Layer 4 class map with a Layer 3 and Layer 4 policy map, use the class command. The prompt changes from (config-pmap) to (config-pmap-c). For information about commands in this mode, see the Policy Map Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default-v6 | class-default} no class {name1 [insert-before name2] | class-default-v6 | class-default}}
Syntax Description
name1
Name of a previously defined Layer 3 and Layer 4 traffic class configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy-map configuration. The ACE does not save the sequence reordering as part of the configuration. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. class-default-v6Specifies the reserved, well-known IPv6 class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications match the traffic, then the ACE performs the action specified under the class class-default-v6 command. The class-default-v6 class map has an implicit match any statement in it enabling it to match all IPv6 traffic. Associates the reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default-v6
class-default
Command Modes
Command History
2-890
OL-25339-01
Usage Guidelines
Examples
To associate a Layer 3 and Layer 4 class map with a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY host1/Admin(config-pmap)# class L4_SLB_CLASS host1/Admin(config-pmap-c)#
Related Commands
(config-pmap) description
(config-pmap) description
To provide a brief summary about the Layer 3 and Layer 4 policy map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
To add a description that the class map is to perform Layer 3 and Layer 4 server load balancing, enter:
host1/Admin(config)# policy-map multi-match L4_SLB_POLICY host1/Admin(config-pmap)# description Policy map for L3/L4 SLB
Related Commands
(config-pmap) class
2-891
2-892
OL-25339-01
Syntax Description
name
Name of an existing DNS parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To associate a DNS parameter map with a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match DNS_INSPECT_L4POLICY host1/Admin(config-pmap)# class DNS_INSPECT_L4CLASS host1/Admin(config-pmap-c)# appl-parameter dns advanced-options DNS_PARAM_MAP1
To disassociate the DNS parameter map from the Layer 3 and Layer 4 policy map, enter:
host1/Admin(config-pmap-c)# no appl-parameter dns advanced-options DNS_PARAM_MAP1
Related Commands
2-893
Syntax Description
name
Name of an existing generic Layer 7 parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To associate a generic Layer 7 parameter map with the Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match GEN_L7_INSPECT_L4POLICY host1/Admin(config-pmap)# class GEN_L7_INSPECT_L4CLASS host1/Admin(config-pmap-c)# appl-parameter generic advanced-options GEN_L7_PARAM_MAP1
To disassociate the generic Layer 7 parameter map from the Layer 3 and Layer 4 policy map, enter:
host1/Admin(config-pmap-c)# no appl-parameter generic advanced-options GEN_L7_PARAM_MAP1
Related Commands
2-894
OL-25339-01
Syntax Description
name
Name of an existing HTTP parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the loadbalance and inspect features in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To associate an HTTP parameter map with a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY host1/Admin(config-pmap)# class FILTERHTTP host1/Admin(config-pmap-c)# appl-parameter http advanced-options http_param_map1
Related Commands
2-895
Syntax Description
name
Name of an existing RTSP parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the loadbalance and inspect features in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To associate an RTSP parameter map with a Layer 3 and Layer 4 policy map, enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY host1/Admin(config-pmap)# class FILTERHTTP host1/Admin(config-pmap-c)# appl-parameter rtsp advanced-options rtsp_param_map1
Related Commands
2-896
OL-25339-01
Syntax Description
name
Name of an existing SIP parameter map. Parameter maps aggregate SIP traffic-related actions together. Enter the name of an existing SIP parameter map as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To associate a SIP parameter map with a SIP packet inspection policy map, enter:
host1/Admin(config)# policy-map multi-match SIP_INSPECT_L4POLICY host1/Admin(config-pmap)# class SIP_INSPECT_L4CLASS host1/Admin(config-pmap-c)# appl-parameter sip advanced-options SIP_PARAM_MAP1
To disassociate the SIP parameter map from the SIP packet inspection policy map, enter:
host1/Admin(config-pmap-c)# no appl-parameter sip advanced-options SIP_PARAM_MAP1
Related Commands
2-897
Syntax Description
name
Name of an existing SCCP parameter map. Parameter maps aggregate SCCP traffic-related actions together. Enter the name of an existing SCCP parameter map as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To associate an SCCP parameter map with the SCCP deep packet inspection policy map, enter:
host1/Admin(config)# policy-map multi-match SCCP_INSPECT_L4POLICY host1/Admin(config-pmap)# class SCCP_INSPECT_L4CLASS host1/Admin(config-pmap-c)# appl-parameter skinny advanced-options SCCP_PARAM_MAP1
To disassociate the SCCP parameter map from the SCCP packet inspection policy map, enter:
host1/Admin(config-pmap-c)# no appl-parameter skinny advanced-options SCCP_PARAM_MAP1
Related Commands
2-898
OL-25339-01
Syntax Description
name
Name of an existing connection parameter map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the connection feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. For details about configuring a connection parameter map, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To associate the connection parameter map IP_MAP with a Layer 3 and Layer 4 TCP/IP policy map:
host1/Admin(config)# policy-map multi-match TCPIP_POLICY host1/Admin(config-pmap)# class TCP_CLASS host1/Admin(config-pmap-c)# connection advanced-options IP_MAP
Related Commands
2-899
(config-pmap-c) inspect
To define the Layer 3 and Layer 4 HTTP deep packet inspection, File Transfer Protocol (FTP) command inspection, or application protocol inspection policy actions, use the inspect command. Application inspection involves the examination of protocols such as Domain Name System (DNS), FTP, HTTP, Internet Control Message Protocol (ICMP), and Real Time Streaming Protocol (RTSP) to verify the protocol behavior and identify unwanted or malicious traffic that passes through the ACE. Use the no form of this command to remove an associated class map from a policy map. inspect {dns [maximum-length bytes]} | {ftp [strict policy name1 | sec-param conn_parammap_name1]} | {http [policy name4 | url-logging]} | {icmp [error]} | ils | {rtsp [sec-param conn_parammap_name3]} | {sip [sec-param conn_parammap_name4] [policy name5]} | {skinny [sec-param conn_parammap_name5] [policy name6]} no inspect {dns [maximum-length bytes]} | {ftp [strict policy name1 | sec-param conn_parammap_name1]} | {http [policy name4 | url-logging]} | {icmp [error]} | ils | {rtsp [sec-param conn_parammap_name3]} | {sip [sec-param conn_parammap_name4] [policy name5]} | {skinny [sec-param conn_parammap_name5] [policy name6]}
Syntax Description
dns
Enables DNS query inspection. DNS requires application inspection so that DNS queries will not be subject to the generic UDP handling based on activity timeouts. Instead, the UDP connections associated with DNS queries and responses are torn down as soon as a reply to a DNS query has been received. The ACE performs the reassembly of DNS packets to verify that the packet length is less than the configured maximum length. (Optional) Sets the maximum length of a DNS reply. Valid entries are from 512 to 65535 bytes. The default is 512 bytes. Enables FTP inspection. The ACE inspects FTP packets, translates the address and the port that are embedded in the payload, and opens up a secondary channel for data. (Optional) Checks for protocol RFC compliance and prevents web browsers from sending embedded commands in FTP requests. The strict keyword prevents an FTP client from determining valid usernames that are supported on an FTP server. When an FTP server replies to the USER command, the ACE intercepts the 530 reply code from the FTP server and replaces it with the 331 reply code. Specifying an FTP inspection policy allows selective command filtering and also prevents the display of the FTP server system type to the FTP client. The ACE intercepts the FTP server 215 reply code and message to the SYST command, and then replaces the text following the reply code with asterisks. Specifies the name assigned to a previously created Layer 7 FTP command inspection policy map to implement the inspection of Layer 7 FTP commands by the ACE. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Use the inspect ftp command in policy map class configuration mode to define the FTP command request inspection policy.
Note
strict
policy name1
If you do not specify a Layer 7 policy map, the ACE performs a general set of Layer 3 and Layer 4 FTP fixup actions.
2-900
OL-25339-01
(Optional) Specifies the name of a previously created connection parameter map used to define parameters for FTP inspection. Enables enhanced Hypertext Transfer Protocol (HTTP) inspection on the HTTP traffic. The inspection checks are based on configured parameters in an existing Layer 7 policy map and internal RFC compliance checks performed by the ACE. By default, the ACE allows all request methods. (Optional) Specifies the name assigned to a previously created Layer 7 HTTP application inspection policy map to implement the deep packet inspection of Layer 7 HTTP application traffic by the ACE. The inspection checks are based on configured parameters in an existing Layer 7 policy map and internal RFC compliance checks performed by the ACE. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Note
policy name4
If you do not specify a Layer 7 policy map, the ACE performs a general set of Layer 3 and Layer 4 HTTP fixup actions and internal RFC compliance checks.
url-logging
(Optional) Enables the monitoring of Layer 3 and Layer 4 traffic. This function logs every URL request that is sent in the specified class of traffic, including the source or destination IP address and the URL that is accessed. Enables ICMP payload inspection. ICMP inspection allows ICMP traffic to have a session so it can be inspected similarly to TCP and UDP traffic. (Optional) Performs a Network Address Translation (NAT) of ICMP error messages. The ACE creates translation sessions for intermediate or endpoint nodes that send ICMP error messages based on the NAT configuration. The ACE overwrites the packet with the translated IP addresses. Enables Internet Locator Service (ILS) protocol inspection. Enables RTSP packet inspection. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. The ACE monitors Setup and Response (200 OK) messages in the control channel established using TCP port 554 (no UDP support). (Optional) Specifies the name of a previously created connection parameter map used to define parameters for RTSP inspection. Enables Session Initiation Protocol (SIP) inspection. SIP is used for call handling sessions and instant messaging. The ACE inspects signaling messages for media connection addresses, media ports, and embryonic connections. The ACE also uses NAT to translate IP addresses that are embedded in the user-data portion of the packet. (Optional) Specifies the name of a previously created connection parameter map used to define parameters for SIP inspection.
icmp
error
ils rtsp
sec-param conn_parammap_name4
2-901
policy name5
(Optional) Specifies the name of a previously created Layer 7 SIP application inspection policy map to implement packet inspection of Layer 7 SIP application traffic by the ACE. The inspection checks are based on configured parameters in an existing Layer 7 policy map and internal RFC compliance checks performed by the ACE. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Note
If you do not specify a Layer 7 policy map, the ACE performs a general set of Layer 3 and Layer 4 HTTP fixup actions and internal RFC compliance checks.
skinny
Enables Cisco Skinny Client Control Protocol (SCCP) inspection. The SCCP is a Cisco proprietary protocol that is used between Cisco CallManager and CIsco VOiP phones. The ACE uses NAT to translate embedded IP addresses and port numbers in SCCP packet data. (Optional) Specifies the name of a previously created connection parameter map used to define parameters for SCCP inspection. (Optional) Specifies the name of a previously created deep packet inspection of Layer 7 SCCP application traffic by the ACE. The inspection checks are based on configured parameters in an existing Layer 7 policy map and internal RFC compliance checks performed by the ACE. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Note
If you do not specify a Layer 7 policy map, the ACE performs a general set of Layer 3 and Layer 4 HTTP fixup actions and internal RFC compliance checks.
Command Modes
Command History
Usage Guidelines
This command requires the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To perform the deep packet inspection of Layer 7 HTTP application traffic by the ACE, you should create a Layer 7 HTTP deep packet inspection policy using the policy-map type inspect http command (see the Security Guide, Cisco ACE Application Control Engine). Nest the Layer 7 deep packet inspection
2-902
OL-25339-01
policy using the Layer 3 and Layer 4 inspect http command. If you do not specify a Layer 7 HTTP policy map, the ACE performs a general set of Layer 3 and Layer 4 HTTP fixup actions and internal RFC compliance checks. To perform checks for protocol RFC compliance and to prevent web browsers from sending embedded commands in FTP requests, you should create a Layer 7 FTP policy using the policy-map type inspect ftp command (see the Security Guide, Cisco ACE Application Control Engine). Nest the Layer 7 FTP inspection traffic policy using the Layer 3 and Layer 4 inspect ftp command. If you do not specify a Layer 7 FTP policy map, the ACE performs a general set of Layer 3 and Layer 4 FTP fixup actions.
Examples
To specify the inspect http command as an action for an HTTP application protocol inspection policy map, enter:
host1/Admin(config)# policy-map multi-match HTTP_INSPECT_L4POLICY host1/Admin(config-pmap)# class HTTP_INSPECT_L4CLASS host1/Admin(config-pmap-c)# inspect http policy HTTP_DEEPINSPECT_L7POLICY
Related Commands
2-903
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you configure a server farm as a backup server farm on the ACE and the primary server farm fails, the backup server farm redirects the client requests to another data center. However, the VIP remains in the INSERVICE state. When you configure the ACE to communicate with a GSS, the ACE reports the availability of the server to a GSS by sending a load number. To inform the GSS that the primary server farm is down and a backup server farm is in use, the ACE needs to send a load value that the server is unavailable. When you configure the kal-ap primary-oos command, the ACE reports a load value of 255 when the primary server is down and the backup server is in use. When the GSS receives the load value of 255, it recognizes that the primary server farm is down and sends future DNS requests with the IP address of the other data center.
Examples
To enable the reporting of a load value of 255 when the primary server is down and the backup server is in use, enter:
host1/Admin(config-pmap-c)# kal-ap primary-oos
To disable the reporting of a load value of 255 when the primary server is down and the backup server is in use, enter:
host1/Admin(config-pmap-c)# no kal-ap primary-oos
2-904
OL-25339-01
Related Commands
2-905
(config-pmap-c) kal-ap-tag
To associate a KAL-AP tag to a VIP address in a Layer 3 and Layer 4 SLB policy map configuration, use the kal-ap-tag command. Use the no form of this command to disassociate the KAL-AP tag from the Layer 3 and Layer 4 SLB policy map. kal-ap-tag tag_name no kal-ap-tag
Syntax Description
tag_name
Name of the KAL-AP tag. Enter the name as an unquoted text string with no spaces and a maximum of 76 alphanumeric characters. Note the following restrictions:
You cannot configure a tag name for a VIP address that is already configured in a different policy map. You cannot associate the same tag name to a domain and a VIP address.
Command Modes
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-906
OL-25339-01
Syntax Description
name
Name of an existing Layer 7 SLB policy map. Enter the name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE treats all Layer 7 policy maps as child policies, so you must always associate a Layer 7 SLB policy map with a Layer 3 and Layer 4 SLB policy map.
Examples
To reference the Layer 7 L7SLBPOLICY policy map within the Layer 3 and Layer 4 L4SLBPOLICY policy map, enter:
host1/Admin(config)# policy-map type loadbalance first-match L7SLBPOLICY host1/Admin(config-pmap)# class L7SLBCLASS host1/Admin(config-pmap-c)# serverfarm FARM2 host1/Admin(config)# policy-map multi-match L4SLBPOLICY host1/Admin(config-pmap)# class L4SLBCLASS host1/Admin(config-pmap-c)# loadbalance policy L7SLBPOLICY
Related Commands
2-907
Syntax Description
active
(Optional) Allows the ACE to advertise the IP address of the virtual server (VIP) as the host route only if there is at least one active real server in the server farm. Without the active option, the ACE always advertises the VIP whether or not there is any active real server associated with this VIP. (Optional) Specifies the distance metric for the route. Enter the metric value that needs to be entered in the routing table. Valid values are from 1 through 254. The default is 77.
metric number
Command Modes
Command History
Usage Guidelines
This command requires the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You must enable the advertising of a VIP using the loadbalance vip advertise command before you can enter a distance metric value for the route. Otherwise, the ACE returns an error message. If you configured the loadbalance vip advertise metric command and then you enter the no loadbalance vip advertise [active] command, the ACE resets the metric value to the default of 77.
Examples
Related Commands
2-908
OL-25339-01
Syntax Description
active
(Optional) Instructs the ACE to reply to an ICMP request only if the configured VIP is active. If the VIP is not active and the active option is specified, the ACE discards the ICMP request and the request times out. (Optional) Instructs the ACE to reply to an ICMP ping only if the primary server farm state is UP, regardless of the state of the backup server farm. If this option is enabled and the primary server farm state is DOWN, the ACE discards the ICMP request and the request times out.
primary-inservice
Command Modes
Command History
Modification This command was introduced. The primary-inservice option was added.
Usage Guidelines
This command requires the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To complete the configuration when you configure the active option of this command, be sure to configure a Telnet probe and associate it with the server farm. The probe monitors the health of all the real servers in the server farm and ensures that the VIP responds with an ICMP ECHO REPLY only if the server port is active. If the server port is down or unreachable, the probe fails and the VIP stops responding to the ECHO request. For details about configuring probes, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. The loadbalance vip icmp-reply active command alone controls a ping to a VIP on the ACE. This command implicitly downloads an ICMP access control list entry for the VIP. When you configure this command on the ACE, any configured ACLs that deny ICMP traffic have no effect on a clients ability to ping the VIP.
2-909
Examples
Related Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To specify the loadbalance vip inservice command as an action for a server load-balancing policy map, enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY host1/Admin(config-pmap)# class FILTERHTTP host1/Admin(config-pmap-c)# loadbalance vip oos-arpreply enable host1/Admin(config-pmap-c)# loadbalance vip inservice
Related Commands
2-910
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you use this command, the ACE load balances all new requests to a new real server in the server farm according to the predictor algorithm. All retransmitted UDP packets from the client go to the same real server. By default, the ACE load balances UDP packets using the same tuple to the same real server on an existing connection.
Examples
To configure the ACE to perform per-packet load balancing for UDP traffic, enter:
host1/Admin(config)# policy-map multi-match L4SLBPOLICY host1/Admin(config-pmap)# class FILTERHTTP host1/Admin(config-pmap-c)# loadbalance vip udp-fast-age
Related Commands
2-911
Syntax Description
Refers to a global pool of IP addresses that exists under the VLAN number. Dynamic NAT translates a group of local source IP addresses to a pool of global IP addresses that are routable on the destination network. All packets going from the interface attached to the traffic policy have their source address translated to one of the available addresses in the global pool. Enter an integer from 1 to 2147483647. Specifies the VLAN number of an existing interface for which you are configuring NAT. Enter an integer from 2 to 4094.
vlan number
Command Modes
Command History
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If a packet egresses an interface that you have not configured for NAT, the ACE transmits the packet untranslated.
Examples
To specify the nat dynamic command as an action for a dynamic NAT policy map, enter:
host1/Admin(config)# policy-map multi-action NAT_POLICY host1/Admin(config-pmap)# class NAT_CLASS host1/Admin(config-pmap-c)# nat dynamic 1 vlan 200
Related Commands
2-912
OL-25339-01
Syntax Description
ipv6_address
IPv6 address for a single static translation. This argument establishes the globally unique IP address of a host as it appears to the outside world. The policy map performs the global IP address translation for the source IP address specified in the ACL (as part of the class map traffic classification). Prefix length of the IPv6 address. IP address for a single static translation. This argument establishes the globally unique IP address of a host as it appears to the outside world. The policy map performs the global IP address translation for the source IP address specified in the ACL (as part of the class map traffic classification). Specifies the subnet mask for the IP address. Enter a subnet mask in dotted-decimal notation (for example, 255.255.255.0). Global TCP or UDP port for static port redirection. Enter an integer from 0 to 65535. Specifies a TCP port name or number. Enter an integer from 0 to 65535. A value of 0 instructs the ACE to match any port. Alternatively, you can enter a protocol keyword that corresponds to a TCP port number. See the Usage Guidelines section for a list of supported well-known TCP port names and numbers. Specifies a UDP port name or number. Enter an integer from 0 to 65535. A value of 0 instructs the ACE to match any port. Alternatively, you can enter a protocol keyword that corresponds to a UDP port number. See the Usage Guidelines section for a list of supported well-known UDP port names and numbers. Specifies the interface for the global IP address. This interface must be different from the interface that the ACE uses to filter and receive traffic that requires NAT.
/prefix_length ip_address
udp eq port3
vlan number
Command Modes
2-913
Command History
Usage Guidelines
This command requires the NAT feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The ACE supports static NAT only for IPv6 to IPv6 and IPv4 to IPv4 translations. Mixed mode is not supported. Table 1-20 provides a list of supported well-known TCP and UDP port names and numbers.
Table 1-20 Supported TCP and UDP Ports Well-Known TCP Port Numbers and Keywords
Keyword ftp http https irc matip-a nntp pop2 pop3 rtsp smtp telnet dns wsp wsp-wtls wsp-wtp wsp-wtp-wtls
Port Number 21 80 443 194 350 119 109 110 554 25 23 53 9200 9202 9201 9203
Description File Transfer Protocol Hyper Text Transfer Protocol HTTP over TLS/SSL Internet Relay Chat Mapping of Airline Traffic over Internet Protocol (MATIP) Type A Network News Transport Protocol Post Office Protocol v2 Post Office Protocol v3 Real Time Streaming Protocol Simple Mail Transfer Protocol Telnet Domain Name System Connectionless Wireless Session Protocol (WSP) Secure Connectionless WSP Connection-based WSP Secure Connection-based WSP
Examples
To specify the nat command as an action for a static NAT and port redirection policy map, enter:
host1/Admin(config)# policy-map multi-action NAT_POLICY host1/Admin(config-pmap)# class NAT_CLASS host1/Admin(config-pmap-c)# nat static 192.168.12.15 255.255.255.0 8080 vlan 200
2-914
OL-25339-01
Related Commands
2-915
(config-pmap-c) ssl-proxy
To associate the Secure Sockets Layer (SSL) client or server proxy service with the policy map, use the ssl-proxy command. Use the no form of this command to remove the SSL proxy service from the policy map. ssl-proxy {client | server} ssl_service_name no ssl-proxy {client | server} ssl_service_name
Syntax Description
client
Associates an SSL client proxy service with the policy map. This keyword is available only when building a Layer 7 policy map, where the ACE acts as an SSL client device. Associates an SSL server proxy service with the policy map. This keyword is available only when building a Layer 2 or Layer 3 policy map, where the ACE acts as an SSL server device. Name of an existing SSL proxy service. Enter the name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
server
ssl_service_name
Command Modes
Command History
Usage Guidelines
This command requires the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To associate the SSL proxy service with the policy map, enter:
host1/C1(config-pmap-c)# ssl-proxy server SSL_SERVER_PROXY_SERVICE host1/C1(config-pmap-c)#
Related Commands
2-916
OL-25339-01
Chapter 2 CLI Commands Policy Map FTP Inspection Configuration Mode Commands
Syntax Description
map_name
Name assigned to the Layer 7 FTP command request class map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 FTP command request inspection policy map within a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies and can be associated only within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 FTP inspection policy map, you nest it by using the Layer 3 and Layer 4 inspect ftp strict command (see the (config-pmap-c) inspect command).
Examples
2-917
Chapter 2 CLI Commands Policy Map FTP Inspection Configuration Mode Commands
Related Commands
2-918
OL-25339-01
Chapter 2 CLI Commands Policy Map FTP Inspection Configuration Mode Commands
(config-pmap-ftp-ins) class
To associate a Layer 7 File Transfer Protocol (FTP) inspection class map with a Layer 7 FTP inspection policy map, use the class command. The prompt changes from (config-pmap-ftp-ins) to (config-pmap-ftp-ins-c). For information about commands in this mode, see the Policy Map FTP Inspection Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class name no class name
Syntax Description
name
Name of a previously defined Layer 7 FTP command inspection class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map FTP inspection configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 FTP inspection class map with a Layer 7 FTP inspection policy map, enter:
host/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY host/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS host1/Admin(config-pmap-ftp-ins-c)#
Related Commands
(config-pmap-ftp-ins) description
2-919
Chapter 2 CLI Commands Policy Map FTP Inspection Configuration Mode Commands
(config-pmap-ftp-ins) description
To provide a brief summary about the Layer 7 File Transfer Protocol (FTP) command inspection policy map, use the description command. Use the no form of this command to remove the description from the class map. description text no description text
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform FTP command inspection, enter:
host1/Admin(config-pmap-ftp-ins)# description FTP command inspection of incoming traffic
Related Commands
(config-pmap-ftp-ins) class
2-920
OL-25339-01
Chapter 2 CLI Commands Policy Map FTP Inspection Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). FTP command in the class map to be subjected to FTP inspection by the ACE. The FTP commands are as follows:
ftp_command
appeAppends to a file. cdChange to the specified directory. cdupChanges to the parent of the current directory. deleDeletes a file at the server side. getRetrieves a file. helpRetrieves Help information from the server. mkdCreates a directory. putStores a file. rmdRemoves a directory. rnfrRenames from. rntoRenames to. siteSpecifies the server-specific command. stouStores a file with a unique name. systGets system information.
Command Modes
Policy map FTP inspection configuration mode Admin and user contexts
Command History
2-921
Chapter 2 CLI Commands Policy Map FTP Inspection Class Configuration Mode Commands
Usage Guidelines
The match command identifies the FTP command that you want filtered by the ACE. You can specify multiple match request-method commands within a class map.
Examples
To add an inline match command to a Layer 7 FTP command policy map, enter:
host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method mkdir host/Admin(config-pmap-ftp-ins-m)#
Related Commands
2-922
OL-25339-01
Chapter 2 CLI Commands Policy Map FTP Inspection Class Configuration Mode Commands
(config-pmap-ftp-ins-c) deny
To deny the FTP request commands specified in the class map by resetting the FTP session, use the deny command. Use the no form of this command to return to the default state and permit all FTP request commands to pass. deny no deny
Command Modes
Policy map FTP inspection class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to deny the FTP request commands specified in the Layer 7 FTP inspection class map by resetting the FTP session, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY host1/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS host1/Admin(config-pmap-ftp-ins-c)# deny
Related Commands
2-923
Chapter 2 CLI Commands Policy Map FTP Inspection Match Configuration Mode Commands
(config-pmap-ftp-ins-c) mask-reply
To instruct the ACE to mask the reply to the FTP SYST command by filtering sensitive information from the command output, use the mask-reply command. Use the no form of this command to disable the masking of the system reply to the FTP SYST command. mask-reply no mask-reply
Syntax Description
Command Modes
Policy map FTP inspection class configuration mode Admin and user contexts
Command History
Usage Guidelines
The mask-reply command is applicable only to the FTP SYST command and its associated reply. The SYST command is used to find out the FTP servers operating system type.
Examples
To instruct the ACE to mask the reply to the FTP SYST command, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY host1/Admin(config-pmap-ftp-ins)# class FTP_INSPECT_L7CLASS host1/Admin(config-pmap-ftp-ins-c)# mask-reply
Related Commands
2-924
OL-25339-01
Chapter 2 CLI Commands Policy Map FTP Inspection Match Configuration Mode Commands
The inline Layer 7 policy map match commands allow you to include a single inline match criteria in the policy map without specifying a traffic class. The match commands function the same as with the Layer 7 class map match commands. However, when you use an inline match command, you can specify an action for only a single match command in the Layer 7 policy map. The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-925
Chapter 2 CLI Commands Policy Map FTP Inspection Match Configuration Mode Commands
(config-pmap-ftp-ins-m) deny
To deny the FTP request commands specified in the inline match command by resetting the FTP session, use the deny command. By default, the ACE allows all FTP commands to pass. Use the no form of this command to return to the default state and permit all FTP request commands to pass. deny no deny
Syntax Description
Command Modes
Policy map FTP inspection match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to deny the FTP request commands specified in the Layer 7 FTP inspection class map by resetting the FTP session, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method mkdir host/Admin(config-pmap-ftp-ins-m)# deny
Related Commands
2-926
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
(config-pmap-ftp-ins-m) mask-reply
To instruct the ACE to mask the systems reply to the FTP SYST command by filtering sensitive information from the command output, use the mask-reply command. Use the no form of this command to disable the masking of the system reply to the FTP SYST command. mask-reply no mask-reply
Syntax Description
Command Modes
Policy map FTP inspection match configuration mode Admin and user contexts
Command History
Usage Guidelines
The mask-reply command is applicable only to the FTP SYST command and its associated reply. The SYST command is used to find out the FTP servers operating system type.
Examples
To instruct the ACE to mask the systems reply to the FTP SYST command, enter:
host1/Admin(config)# policy-map type inspect ftp first-match FTP_INSPECT_L7POLICY host/Admin(config-pmap-ftp-ins)# match FTP_REQUEST_MATCH request-method syst host/Admin(config-pmap-ftp-ins-m)# mask-reply
Related Commands
2-927
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
To create an HTTP deep packet inspection policy map and access policy map inspection HTTP configuration mode, use the policy-map type inspect http all-match command in configuration mode. When you access the policy map inspection HTTP configuration mode, the prompt changes to (config-pmap-ins-http). Use the no form of this command to remove an HTTP deep packet inspection policy map from the ACE. policy-map type inspect http all-match map_name no policy-map type inspect http all-match map_name
Syntax Description
map_name
Name assigned to the Layer 7 HTTP deep packet inspection policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 HTTP deep packet inspection policy map within a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies and can only be associated within a Layer 3 and Layer 4 policy map. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 HTTP inspection policy map, you nest it by using the Layer 3 and Layer 4 inspect http command (see the (config-pmap-c) inspect command).
Examples
Related Commands
2-928
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
(config-pmap-ins-http) class
To associate a Layer 7 HTTP inspection class map with a Layer 7 HTTP inspection policy map, use the class command. The prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-c). Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 HTTP inspection class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Associates a reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
Note
insert-before name2
class-default
By default, all matches are applied to both HTTP request and response messages, but the class class-default command is applied only to HTTP requests.
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 HTTP inspection class map with a Layer 7 HTTP inspection policy map, enter:
host/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# class HTTP_INSPECT_L7CLASS
2-929
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
host1/Admin(config-pmap-ins-http-c)#
Related Commands
(config-pmap-ins-http) description
2-930
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
(config-pmap-ins-http) description
To provide a brief summary about the Layer 7 HTTP inspection policy map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform HTTP deep packet inspection, enter:
host1/Admin(config-pmap-ins-http)# description HTTP protocol deep inspection of incoming traffic
Related Commands
(config-pmap-ins-http) class
2-931
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Content expression contained within the HTTP entity body. The range is from 1 to 255 alphanumeric characters. See the Usage Guidelines section for a list of the supported characters that you can use in regular expressions. (Optional) Provides an absolute offset where the content expression search string starts. The offset starts at the first byte of the message body, after the empty line (CR, LF, CR, LF) between the headers and the body of the message. The offset value is from 1 to 4000 bytes. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
offset number
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match content command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section.
2-932
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
The ACE supports regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces, if the spaces are escaped or quoted. Table 1-21 lists the supported characters that you can use in regular expressions.
Table 1-21 Characters Supported in Regular Expressions
Convention .* . \. \xhh () Bracketed range [for example, 0-9] A leading ^ in a range [^charset] (expr1 | expr2) (expr)* (expr)+ (expr{m,n} (expr{m} (expr{m,} \a \b \f \n \r \t \v \0 .\\
Description Zero or more characters. Exactly one character. Escaped character. Any ASCII character as specified in two-digit hex notation. Expression grouping. Matches any single character from the range. Does not match any character in the range; all other characters represent themselves. OR of expressions. 0 or more of expressions. 1 or more of expressions. Matches the previous item between m and n times; valid entries are from 0 to 255. Matches the previous item exactly m times; valid entries are from 1 to 255. Matches the previous item m or more times; valid entries are from 1 to 255. Alert (ASCII 7). Backspace (ASCII 8). Form-feed (ASCII 12). New line (ASCII 10). Carriage return (ASCII 13). Tab (ASCII 9). Vertical tab (ASCII 11). Null (ASCII 0). Backslash.
Examples
To specify a content expression contained within the entity body sent with an HTTP request, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH1 content .*newp2psig host1/Admin(config-pmap-ins-http-m)
Related Commands
2-933
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies a value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length equal to the specified value. Valid entries are from 1 to 65535 bytes. Specifies a minimum value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length greater than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a maximum value for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the content parse length in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a content length within this range. The range is from 1 to 65535 bytes. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
eq bytes
gt bytes
lt bytes
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
2-934
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Usage Guidelines
Messages that meet the specified criteria will be either allowed or denied based on the Layer 7 HTTP deep packet inspection policy map action. When you use the match content length command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section.
Examples
To define application inspection decisions in the HTTP content up to the configured maximum content parse length, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH2 content length eq 3495 host1/Admin(config-pmap-ins-http-m)
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
2-935
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Command History
Usage Guidelines
When you use the match content-type-verification command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. This inline match condition limits the MIME types in HTTP messages allowed through the ACE. It verifies that the header MIME-type value is in the internal list of supported MIME types and that the header MIME type matches the actual content in the data or entity body portion of the message. If they do not match, the ACE performs either the permit or reset policy map action. The MIME-type HTTP inspection process searches the entity body of the HTTP message, which may degrade performance of the ACE.
Examples
To verify the content MIME-type messages with the header MIME type, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH3 content-type-verification host1/Admin(config-pmap-ins-http-m)
Related Commands
2-936
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Identifier of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Prefix of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Regular expression of the secondary cookie to match. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
The following configuration guidelines apply when you configure a secondary cookie inline match statement for HTTP inspection:
Ensure that secondary cookie names do not overlap with other secondary cookie names in the same match-all class map. For example, the following configuration is not allowed because the two match statements have overlapping cookie names:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-insp-http)# match cookie secondary prefix id value .* host1/Admin(config-pmap-insp-http-m)# exit host1/Admin(config-pmap-insp-http)# match cookie secondary name identity value bob
When you configure a secondary cookie value match across all secondary cookie names in a match-all class map, you cannot configure any other secondary cookie match in the same class map. That is because a secondary cookie match on value alone is equivalent to a wildcard match on name. In the following example, the second match statement is not allowed:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-insp-http)# match cookie secondary value bob host1/Admin(config-pmap-insp-http-m)# exit host1/Admin(config-pmap-insp-http)# match cookie secondary name identity value jane
2-937
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Examples
To match a secondary cookie called matchme with a regular expression value of .*abc123, enter the following commands:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-insp-http)# match cookie secondary name matchme value .*abc123
Related Commands
2-938
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Name of the HTTP header to match (for example, www.example1.com). The range is from 1 to 64 alphanumeric characters.
Note
header_name
The header_name argument cannot include the colon in the name of the HTTP header; the ACE rejects the colon as an invalid token.
2-939
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
header_field
Standard HTTP/1.1 header field. Valid selections include request-header fields, general-header fields, and entity-header fields. Selections also include two lower-level header-matching commands: length and mime-type. The supported selections are as follows:
AcceptSemicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request. Accept-CharsetCharacter sets that are acceptable for the response. This field allows clients capable of understanding more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Accept-EncodingRestricts the content encoding that a user will accept from the server. Accept-LanguageISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO639 country code to specify a national variant. AuthorizationSpecifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Cache-ControlDirectives that must be obeyed by all caching mechanisms along the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. ConnectionAllows the sender to specify connection options. Content-MD5MD5 digest of the entity body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. ExpectUsed by a client to inform the server about the behaviors that the client requires. FromContains the e-mail address of the person that controls the requesting user agent. HostInternet host and port number of the resource being requested, as obtained from the original URI given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL. If-MatchUsed with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used on updating requests to prevent inadvertent modification of the wrong version of a resource. As a special case, the value * matches any current entity of the resource.
2-940
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
length See the (config-pmap-ins-http) match header length command for details. mime-typeSee the (config-pmap-ins-http) match header mime-type command for details. PragmaPragma directives that are understood by servers to whom the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP. For example, the accept field is a comma-separated list of entries for which the optional parameters are separated by semicolons. RefererAddress (URI) of the resource from which the URI in the request was obtained. Transfer-EncodingIndicates what (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient. User-AgentInformation about the user agent (for example, a software program that originates the request). This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents. ViaUsed by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
header-value expression
Specifies the header value expression string to compare against the value in the specified field in the HTTP header. The range is from 1 to 255 alphanumeric characters. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
2-941
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Usage Guidelines
When you use the match header command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces, if the spaces are escaped or quoted. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command.
Examples
To filter on the content and allow HTTL headers that contain the expression html, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH4 header accept header-value html host1/Admin(config-pmap-ins-http-m)
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies the size of the HTTP header request message that can be received by the ACE. Specifies the size of the HTTP header response message sent by the ACE. Specifies a value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size equal to the specified value. Valid entries are from 1 to 65535 bytes.
2-942
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
gt bytes
Specifies a minimum value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size greater than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a maximum value for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with an entity body size less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the entity body in an HTTP message received by the ACE. Based on the policy map action, the ACE allows or denies messages with a entity body size within this range. The range is from 1 to 65535 bytes. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
lt bytes
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match header length command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. By default, the maximum header length for HTTP deep packet inspection is 2048 bytes. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section.
Examples
To specify that the policy map match on HTTP traffic received with a length less than or equal to 3600 bytes in the entity body of the HTTP message, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-http-insp)# match MATCH4 header length request eq 3600 host1/Admin(config-pmap-ins-http-m)
Related Commands
2-943
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
2-944
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). MIME type. The ACE includes a predefined list of MIME types, such as image\Jpeg, text\html, application\msword, or audio\mpeg. Choose whether only the MIME types included in this list are permitted through the ACE firewall or whether all MIME types are acceptable. The default behavior is to allow all MIME types. The supported MIME types are as follows:
mime_type
application\msexcel application\mspowerpoint application\msword application\octet-stream application\pdf application\postscript application\x-gzip application\x-java-archive application\x-java-vm application\x-messenger application\zip audio\* audio\basic audio\midi audio\mpeg audio\x-adpcm audio\x-aiff audio\x-ogg audio\x-wav image \* image\gifimage\jpeg image\png
2-945
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
image\tiff image\x-3ds image\x-bitmap image\x-niff image\x-portable-bitmap image\x-portable-greymap image\x-xpm text\* text\css text\html text\plain text\richtext text\sgml text\xmcd text\xml video\* video\flc video\mpeg video\quicktime video\sgi video\x-fli
insert-before map_name
(Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
2-946
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Usage Guidelines
When you use the match header mime-type command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. MIME-type validation extends the format of Internet mail to allow non-US-ASCII textual messages, nontextual messages, multipart message bodies, and non-US-ASCII information in message headers.
Examples
To specify that the policy map permits MIME-type audio/midi messages through the ACE, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH5 header mime-type audio\midi host1/Admin(config-pmap-ins-http-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Defines the instant messaging application category. The ACE checks for the Yahoo Messenger instant messaging application. Defines the peer-to-peer application category. The applications checked include Kazaa and Gnutella. (ACE appliance only) The applications checked also include GoToMyPC.
im p2p
Defines the tunneling application category. The applications checked include HTTPort/HTTHost, GNU httptunnel, and FireThru. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
2-947
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
The policy map detects the misuse of port 80 (or any other port running HTTP) for tunneling protocols such as peer-to-peer (p2p) applications, tunneling applications, and instant messaging. When you use the match port-misuse command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. The port misuse application inspection process searches the entity body of the HTTP message, which may degrade performance of the ACE. The ACE disables the match port-misuse command by default. If you do not configure a restricted HTTP application category, the default action by the ACE is to allow the applications without generating a log.
Examples
To specify that the policy map identifies peer-to-peer applications as restricted HTTP traffic, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH6 port-misuse p2p host1/Admin(config-pmap-ins-http-m)#
Related Commands
2-948
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies an HTTP extension method. If the RFC request messages does not contain one of the RFC 2616 HTTP request methods, the ACE verifies if it is an extension method. The ACE supports the inspection of the following HTTP request extension methods: bcopy, bdelete, bmove, bpropfind, bproppatch, copy, edit, getattr, getattrname, getprops, index, lock, mkcol, mkdir, move, propfind, proppatch, revadd, revlabel, revlog, revnum, save, search, setattr, startrev, stoprev, unedit, and unlock. (ACE module only) The ACE also supports the inspection of the following HTTP request extension methods: notify, poll, subscribe, unsubscribe, and x-ms-emumatts.
ext method
rfc method
Specifies an RFC 2616 HTTP request method that you want to perform an RFC compliance check. The ACE supports the inspection of the following RFC 2616 HTTP request methods: connect, delete, get, head, options, post, put, and trace. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
When you use the match request-method command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. For unsupported HTTP request methods, include the inspect http strict command as an action in the Layer 3 and Layer 4 policy map (see (config-pmap-c) inspect command). The ACE disables the match request-method command by default. If you do not configure a request method, the default action by the ACE is to allow the RFC 2616 HTTP request method without generating a log. By default, the ACE allows all request and extension methods.
2-949
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Examples
To specify that the policy map identifies the index HTTP RFC 2616 protocol for application inspection, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH7 request-method ext index host1/Admin(config-pmap-ins-http-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
2-950
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Examples
When you use the match strict-http command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. To configure the policy map to ensure that the internal compliance checks verify message compliance with the HTTP RFC standard, RFC 2616, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH8 strict-http host1/Admin(config-pmap-ins-http-m)#
Related Commands
2-951
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Descriptionh
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies the HTTP transfer-encoding type for the class map. The possible values for coding_types are as follows:
transfer-encoding coding_types
chunkedMessage body transferred as a series of chunks. compressEncoding format produced by the common UNIX file compression program compress. This format is an adaptive Lempel-Ziv-Welch coding (LZW). deflate.zlib format defined in RFC 1950 with the deflate compression mechanism described in RFC 1951. gzipEncoding format produced by the file compression program gzip (GNU zip) as described in RFC 1952. This format is a Lempel-Ziv coding (LZ77) with a 32-bit CRC. identityDefault (identity) encoding, which does not require the use of transformation.
insert-before map_name
(Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
2-952
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Usage Guidelines
When you use the match transfer-encoding command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. The transfer-encoding general-header field indicates the type of transformation, if any, that has been applied to the HTTP message body to safely transfer it between the sender and the recipient. When an HTTP request message contains the configured transfer-encoding type, the ACE performs the configured action in the policy map. Each match transfer-encoding command configures a single application type. The ACE disables the match transfer-encoding command by default.
Examples
To configure the policy map to specify a chunked HTTP transfer encoding type to limit the HTTP traffic that flows through the ACE, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH9 transfer-encoding chunked host1/Admin(config-pmap-ins-http-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). URL, or portion of a URL, to match. The URL string range is from 1 to 256 characters. Include only the portion of the URL that follows www.hostname.domain in the match statement. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
insert-before map_name
2-953
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
When you use the match url command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section. Include only the portion of the URL that follows www.hostname.domain in the match statement. For example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html. To match the www.anydomain.com portion, the URL string can take the form of a URL regular expression. The ACE supports the use of regular expressions for matching. For a list of the supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the backslash (\) character to match this symbol. For example, specify www[.]xyz[.]com instead of www.xyz.com.
Examples
To configure the policy map to define application inspection decisions based on a URL, enter
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH_URL url whatsnew/latest.* host1/Admin(config-pmap-ins-http-m)#
Related Commands
2-954
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies a value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length equal to the specified value. Valid entries are from 1 to 65535 bytes. Specifies a minimum value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length greater than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a maximum value for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length less than the specified value. Valid entries are from 1 to 65535 bytes. Specifies a size range for the HTTP URL length received by the ACE. Based on the policy map action, the ACE allows or denies messages with an HTTP URL length within this range. The range is from 1 to 65535 bytes. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
eq bytes
gt bytes
lt bytes
insert-before map_name
Command Modes
Policy map inspection HTTP configuration mode Admin and user contexts
Command History
2-955
Chapter 2 CLI Commands Policy Map Inspection HTTP Class Configuration Mode Commands
Usage Guidelines
When you use the match url length command, you access the policy map inspection HTTP match configuration mode and the prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). You can then specify the actions that the ACE should take when network traffic matches the specified inline match command. For information about commands in this mode, see the Policy Map Inspection HTTP Match Configuration Mode Commands section.
Examples
To specify that the policy map is to match on a URL with a length less than or equal to 10,000 bytes in the request message, enter:
(config)# policy-map type inspect http all-match HTTP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH10 url length eq 10000 host1/Admin(config-pmap-ins-http-m)#
Related Commands
2-956
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Class Configuration Mode Commands
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
By default, with HTTP 1.1, the ACE performs strict header parsing, which may cause a reset (RST) to be sent to the client and the server when the ACE is unable to parse the encrypted packet over a CONNECT request. This issue is not seen with HTTP 1.0 because the ACE skips the header parsing.
Examples
Create a Layer 7 class map for tunneling protocols and the policy-map action as pass through using the passthrough log command as follows: class-map type http inspect match-any c2 2 match port-misuse tunneling policy-map type inspect http all-match SECURITY class c2 passthrough log
Related Commands
2-957
Chapter 2 CLI Commands Policy Map Inspection HTTP Class Configuration Mode Commands
(config-pmap-ins-http-c) permit
To allow the specified HTTP traffic to be received by the ACE if it passes the HTTP deep packet inspection match criteria specified in the class map, use the permit command. Use the no form of this command to disallow the specified HTTP traffic to be received by the ACE. permit [log] no permit
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
By default, HTTP inspection allows traffic that does not match any of the configured Layer 7 HTTP deep packet inspection matches. You can modify this behavior by including the class class-default command with the reset action to deny the specified Layer 7 HTTP traffic. In this case, if none of the class matches configured in the Layer 7 HTTP deep packet inspection policy map are hit, the class-default action will be taken by the ACE. For example, you can include a class map to allow the HTTP GET method and use the class class-default command to block all of the other requests.
Note
By default, all matches are applied to both HTTP request and response messages, but the class class-default command is applied only to HTTP requests.
Examples
To allow the specified HTTP traffic to be received by the ACE if the class map match criteria in class map L7HTTP_CHECK are met, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_DEEPINSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# class L7HTTP_CHECK host1/Admin(config-pmap-ins-http-c)# permit
Related Commands
2-958
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Match Configuration Mode Commands
(config-pmap-ins-http-c) reset
To deny the specified HTTP traffic by sending a TCP reset message to the client or server to close the connection, use the reset command. Use the no form of this command to allow the specified HTTP traffic to be received by the ACE. reset [log] no reset
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection HTTP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To deny the specified HTTP traffic to be received by the ACE if the class map match criteria in class map L7HTTP_CHECK are met, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_DEEPINSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# class http_check host1/Admin(config-pmap-ins-http-c)# reset
Related Commands
2-959
Chapter 2 CLI Commands Policy Map Inspection HTTP Match Configuration Mode Commands
inspection HTTP configuration mode (see the Policy Map Inspection HTTP Configuration Mode Commands section for command details). The prompt changes from (config-pmap-ins-http) to (config-pmap-ins-http-m). The inline Layer 7 policy map match commands allow you to include a single inline match criteria in the policy map without specifying a traffic class. The match commands function the same as with the Layer 7 class map match commands. However, when you use an inline match command, you can specify an action for only a single match command in the Layer 7 policy map. The default of the ACE is to permit HTTP traffic. For example, if a policy map explicitly permits the HTTP GET method, other methods such as PUT will also be permitted. Only an explicit deny through the reset command is capable of dropping traffic. The commands in this mode requires the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-960
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Match Configuration Mode Commands
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
By default, with HTTP 1.1, the ACE performs strict header parsing, which may cause a reset (RST) to be sent to the client and the server when the ACE is unable to parse the encrypted packet over a CONNECT request. This issue is not seen with HTTP 1.0 because the ACE skips the header parsing.
Examples
Create a Layer 7 class map for tunneling protocols and the policy-map action as pass through using the passthrough log command as follows: class-map type http inspect match-any c2 2 match port-misuse tunneling policy-map type inspect http all-match SECURITY class c2 passthrough log
Related Commands
2-961
Chapter 2 CLI Commands Policy Map Inspection HTTP Match Configuration Mode Commands
(config-pmap-ins-http-m) permit
To allow the specified HTTP traffic to be received by the ACE if it passes inspection of the match criteria in an inline match condition, use the permit command. Use the no form of this command to disallow the specified HTTP traffic to be received by the ACE. permit [log] no permit
Syntax Description
log
(Optional) Generates a log message for traffic that matches the inline match command.
Command Modes
Policy map inspection HTTP match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The default of the ACE is to permit HTTP traffic. For example, if a policy map explicitly permits the HTTP GET method, other methods such as PUT will also be permitted. Only an explicit deny through the reset command is capable of dropping traffic.
Examples
To allow the specified HTTP traffic to be received by the ACE if the match criteria are met, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_DEEPINSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH5 transfer-encoding chunked host1/Admin(config-pmap-ins-http-m)# permit
Related Commands
2-962
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection HTTP Match Configuration Mode Commands
(config-pmap-ins-http-m) reset
To deny the specified HTTP traffic by sending a TCP reset message to the client or server to close the connection, use the reset command. Use the no form of this command to allow the specified HTTP traffic to be received by the ACE. reset [log] no reset
Syntax Description
log
(Optional) Generates a log message for traffic that matches the inline match command.
Command Modes
Policy map inspection HTTP match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To deny the specified HTTP traffic to be received by the ACE if the match criteria are met, enter:
host1/Admin(config)# policy-map type inspect http all-match HTTP_DEEPINSPECT_L7POLICY host1/Admin(config-pmap-ins-http)# match MATCH5 transfer-encoding chunked host1/Admin(config-pmap-ins-http-m)# reset
Related Commands
2-963
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Syntax Description
sip all-match
Specifies the policy map that initiates the inspection of the SIP protocol packets by the ACE. The ACE attempts to match all specified conditions against the matching classification and executes the actions of all matching classes until it encounters a deny for a match request. Name assigned to the Layer 7 SIP inspection policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
map_name
Command Modes
Command History
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The Layer 7 policy map configures the applicable SIP inspection actions executed on the network traffic that match the classifications defined in a class map. You then associate the completed Layer 7 SIP inspection policy with a Layer 3 and Layer 4 policy map to activate the operation on a VLAN interface.
Examples
2-964
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
To remove the SIP inspection policy map from the configuration, enter:
host1/Admin(config)# no policy-map type inspect sip all-match SIP_INSPECT_L7POLICY
Related Commands
show startup-config
2-965
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
(config-pmap-ins-sip) class
To associate a Layer 7 SIP inspection class map with a Layer 7 SIP inspection policy map, use the class command. The prompt changes from (config-pmap-sip-ins) to (config-pmap-sip-ins-c). Use the no form of this command to remove an associated class map from a policy map. class map_name [insert-before map_name] no class map_name
Syntax Description
map_name
Name of a previously defined Layer 7 SIP inspection class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the class map ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 SIP inspection class map with a Layer 7 SIP inspection policy map, enter:
host/Admin(config-pmap-ins-sip)# class SIP_INSPECT_L7CLASS host/Admin(config-pmap-ins-sip-c)#
Related Commands
(config-pmap-ins-sip) description (config-pmap-ins-sip-c) drop (config-pmap-ins-sip-c) log (config-pmap-ins-sip-c) permit (config-pmap-ins-sip-c) reset
2-966
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
(config-pmap-ins-sip) description
To provide a brief summary about the Layer 7 SIP inspection policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
Related Commands
(config-pmap-ins-sip) class
2-967
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Called party in the URI of the SIP To header. Enter a regular expression from 1 to 255 alphanumeric characters. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
You can filter SIP traffic based on the called party (callee or destination) as specified in the URI of the SIP To header. The ACE does not include the display name or tag part of the field. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. Table 1-21 lists the supported characters that you can use in regular expressions.
Examples
2-968
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Related Commands
(config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Calling party in the URI of the SIP From header. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
insert-before map_name
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
2-969
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Usage Guidelines
You can filter SIP traffic based on the calling party (caller or source) as specified in the URI of the SIP From header. The ACE does not include the display name or tag part of the field. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-21 for a list of the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies the SIP message body length. Specifies the greater than operator. Maximum size of a SIP message body that the ACE allows. Enter an integer from 0 to 65534 bytes. If the message body is greater than the configured value, the ACE performs the action that you configure in the policy map. Specifies a content type check.
length gt number
type
2-970
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
sdp expression
Specifies that the traffic must be of type Session Description Protocol (SDP) to match the policy map. Regular expression that identifies the content type in the SIP message body that is required to match the policy map. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching. See Table 1-21 for a list of the supported characters that you can use in regular expressions. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
You can configure the ACE to perform SIP content checks based on content length or content type. By default, the ACE allows all content types.
Examples
To configure the ACE to drop SIP packets that have content with a length greater than 4000 bytes in length, enter:
host1/Admin(config)# class-map type sip inspect match-all SIP_INSP_CLASS host1/Admin(config-pmap-ins-sip)# match MATCH_CONTENT content length gt 200 host1/Admin(config)# policy-map type inspect sip all-match SIP_INSP_POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSP_CLASS host1/Admin(config-pmap-ins-sip-c)# deny
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
2-971
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Calling party. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
insert-before map_name
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-21 for a list of the supported characters that you can use in regular expressions.
Examples
2-972
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). SIP proxy server. Enter a regular expression from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
insert-before map_name
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
SIP inspection allows you to filter messages coming from or transiting through certain SIP proxy servers. The ACE maintains a list of unauthorized SIP proxy IP addresses or URIs in the form of regular expressions and then checks this list against the VIA header field in each SIP packet. The default action is to drop SIP packets with VIA fields that match regex list.
2-973
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-21 for a list of the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
2-974
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Syntax Description
method_name
ack bye cancel info invite message notify options prack refer register subscribe unknown update
Use the unknown keyword to permit or deny unknown or unsupported SIP methods. insert-before map_name (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
2-975
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match third-party registration (config-pmap-ins-sip) match uri
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Privileged user that is authorized for third-party registrations. Enter a regular expression from 1 to 255 alphanumeric characters. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
SIP allows users to register other users on their behalf by sending REGISTER messages with different values in the From and To header fields. This process may pose a security threat if the REGISTER message is actually a DEREGISTER message. A malicious user could cause a Denial of Service (DoS) attack by deregistering all users on their behalf. To prevent this security threat, you ACE can specify a
2-976
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
list of privileged users who can register or unregister someone else on their behalf. The ACE maintains the list as a regex table. If you configure this policy, the ACE drops REGISTER messages with mismatched From and To headers and a From header value that does not match any of the privileged user IDs. The ACE supports the use of regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. See Table 1-21 for a list of the supported characters that you can use in regular expressions.
Examples
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match uri
2-977
Chapter 2 CLI Commands Policy Map Inspection SIP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies that the ACE validates the length of a SIP URI. Specifies that the ACE validates the length of a Tel URI. Specifies the length of the SIP or Tel URI. Specifies the greater than operator. Maximum value for the length of the SIP URI or Tel URI in bytes. Enter an integer from 0 to 254 bytes. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map inspection SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
You can configure the ACE to validate the length of SIP URIs or Tel URIs. A SIP URI is a user identifier that a calling party (source) uses to contact the called party (destination). A Tel URI is a telephone number that identifies the endpoint of a SIP connection. For more information about SIP URIs and Tel URIs, see RFC 2534 and RFC 3966, respectively.
Examples
2-978
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Class Configuration Mode Commands
Related Commands
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path (config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration
2-979
Chapter 2 CLI Commands Policy Map Inspection SIP Class Configuration Mode Commands
(config-pmap-ins-sip-c) drop
To discard the SIP traffic that matches the traffic specified in the class map, use the drop command. Use the no form of this command to return the ACE behavior to the default of permitting all SIP traffic to pass. drop [log] no drop
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection SIP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To discard the SIP traffic that matches the class map, enter:
host1/Admin(config)# policy-map type inspect sip first-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSPECT_L7CLASS host1/Admin(config-pmap-ins-sip-c)# drop
Related Commands
(config-pmap-ins-sip-c) log
To log all SIP traffic that matches the class map, use the log command. Use the no form of this command to return the ACE behavior to the default of not logging SIP traffic. log no log
2-980
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Class Configuration Mode Commands
Syntax Description
Command Modes
Policy map inspection SIP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To log the SIP traffic that matches the class map, enter:
host1/Admin(config)# policy-map type inspect sip first-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSPECT_L7CLASS host1/Admin(config-pmap-ins-sip-c)# log
Related Commands
(config-pmap-ins-sip-c) permit
To permit the SIP traffic that matches the class map to pass through the ACE, use the permit command. Use the no form of this command to return the ACE behavior to the default of permitting all SIP traffic to pass. permit [log] no permit
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection SIP class configuration mode Admin and user contexts
2-981
Chapter 2 CLI Commands Policy Map Inspection SIP Class Configuration Mode Commands
Command History
Usage Guidelines
Examples
To permit the SIP traffic that matches the class map to pass through the ACE, enter:
host1/Admin(config)# policy-map type inspect sip first-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSPECT_L7CLASS host1/Admin(config-pmap-ins-sip-c)# permit
Related Commands
(config-pmap-ins-sip-c) reset
To instruct the ACE to deny the SIP traffic that matches the class map and to reset the connection using the TCP RESET message, use the reset command. Use the no form of this command to return the ACE behavior to the default of permitting all SIP traffic to pass. reset [log] no reset
Syntax Description
log
(Optional) Generates a log message for traffic that matches the class map.
Command Modes
Policy map inspection SIP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
2-982
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Match Configuration Mode Commands
Usage Guidelines
Examples
To instruct the ACE to deny the traffic that matches the class map and to reset the connection, enter:
host1/Admin(config)# policy-map type inspect sip first-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# class SIP_INSPECT_L7CLASS host1/Admin(config-pmap-ins-sip-c)# reset
Related Commands
2-983
Chapter 2 CLI Commands Policy Map Inspection SIP Match Configuration Mode Commands
(config-pmap-ins-sip-m) drop
To discard the SIP traffic that matches the traffic specified in the single inline match command, use the drop command. Use the no form of this command to return the ACE behavior to the default of permitting all SIP traffic to pass. drop [log] no drop
Syntax Description
log
(Optional) Generates a log message for traffic that matches the single inline match command.
Command Modes
Policy map inspection SIP match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To discard the SIP traffic that matches the traffic specified in the single inline match command, enter:
host1/Admin(config)# policy-map type inspect sip all-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# match MATCH_URI uri sip length gt 100 host1/Admin(config-pmap-ins-sip-m)# drop
Related Commands
2-984
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection SIP Match Configuration Mode Commands
(config-pmap-ins-sip-m) permit
To permit the SIP traffic that matches the traffic specified in the single inline match command to pass through the ACE, use the permit command. Use the no form of this command to return to the default state and permit all SIP traffic to pass. permit [log] no permit
Syntax Description
log
(Optional) Generates a log message for traffic that matches the inline match command.
Command Modes
Policy map inspection SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To permit the SIP traffic specified in the single inline match command to pass through the ACE, enter:
host1/Admin(config)# policy-map type inspect sip all-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# match MATCH_URI uri sip length gt 100 host1/Admin(config-pmap-ins-sip-m)# permit
Related Commands
2-985
Chapter 2 CLI Commands Policy Map Inspection Skinny Configuration Mode Commands
(config-pmap-ins-sip-m) reset
To instruct the ACE to deny SIP traffic that matches the single inline match command and to reset the connection using the TCP RESET message, use the reset command. Use the no form of this command to return the ACE behavior to the default of permitting all SIP traffic to pass. reset [log] no reset
Syntax Description
log
(Optional) Generates a log message for traffic that matches the single inline match command.
Command Modes
Policy map inspection SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to deny the traffic that matches the single inline match command and to reset the connection, enter:
host1/Admin(config)# policy-map type inspect sip all-match SIP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-sip)# match MATCH_URI uri sip length gt 100 host1/Admin(config-pmap-ins-sip-m)# reset
Related Commands
2-986
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection Skinny Configuration Mode Commands
To create an SCCP inspection policy map and access policy map inspection Skinny configuration mode, use the policy-map type inspect skinny command in configuration mode. When you access the policy map inspection skinny configuration mode, the prompt changes to (config-pmap-ins-skinny). Use the no form of this command to remove an SCCP inspection policy map from the ACE. policy-map type inspect skinnny map_name no policy-map type inspect skinny map_name
Syntax Description
map_name
Name assigned to the Layer 7 SCCP inspection policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the inspect feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-987
Chapter 2 CLI Commands Policy Map Inspection Skinny Configuration Mode Commands
(config-pmap-ins-skinny) description
To provide a brief summary about the Layer 7 SCCP inspection policy map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map inspection Skinny configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To remove the inline match statement from the policy map, enter:
host1/Admin(config-pmap-ins-skinny)# no match SCCP_MATCH message-id range 100 500
Related Commands
2-988
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection Skinny Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Numerical identifier of the SCCP message. Enter an integer from 0 to 65535. Specifies a range of SCCP message IDs. Enter an integer from 0 to 65535 for the lower and the upper limits of the range. The upper limit must be greater than or equal to the lower limit. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map inspection skinny configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use an inline match command, you can specify an action for only a single match statement in the Layer 7 policy map.
Examples
To specify an inline match command for a Layer 7 SCCP inspection policy map, enter:
host1/Admin(config-pmap-ins-skinny)# match SCCP_MATCH message-id range 100 500 host1/Admin(config-pmap-ins-skinny-m)#
Related Commands
(config-pmap-ins-skinny) description
Command Reference, Cisco ACE Application Control Engine
OL-25339-01
2-989
Chapter 2 CLI Commands Policy Map Inspection Skinny Match Configuration Mode Commands
2-990
OL-25339-01
Chapter 2 CLI Commands Policy Map Inspection Skinny Match Configuration Mode Commands
(config-pmap-ins-skinny-m) reset
To instruct the ACE to deny SCCP traffic that matches the single inline match command and to reset the connection using the TCP RESET message, use the reset command as the policy map action. By default, the ACE allows all SCCP packets to pass through it. Use the no form of this command to reset the ACE behavior to the default of allowing all SCCP traffic to pass. reset [log] no reset
Syntax Description
log
(Optional) Generates a log message for traffic that matches the single inline match command.
Command Modes
Policy map inspection Skinny match configuration mode Admin and user contexts
Command History
Usage Guidelines
You apply the specified action against the single inline match command. The reset command causes the ACE to drop the SCCP traffic that matches the inline match command and reset the connection.
Examples
To specify that the ACE drop SCCP traffic that matches the match message-id inline command, enter:
host1/Admin(config)# policy-map type inspect sccp SCCP_INSPECT_L7POLICY host1/Admin(config-pmap-ins-skinny)# match SCCP_MATCH message-id range 100 500 host1/Admin(config-pmap-ins-skinny-m)# reset
Related Commands
2-991
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
Syntax Description
map_name
Name assigned to the generic SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
2-992
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
Related Commands
2-993
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
(config-pmap-lb-generic) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb-generic) to (config-pmap-lb-generic-c). For information about commands in this mode, see the Policy Map Load Balancing Generic Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Policy map load balancing generic configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7LOADBALNCE_CLASS
2-994
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
Related Commands
(config-pmap-lb-generic) description
2-995
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
(config-pmap-lb-generic) description
To provide a brief description of the generic server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing generic configuration mode Admin role in any user context
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host/Admin(config-pmap-lb-generic)# description GENERIC_LOAD_BALANCE_PROTOCOL
Related Commands
(config-pmap-lb-generic) class
2-996
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). (Optional) Specifies an absolute offset in the data where the Layer 4 payload expression search string starts. The offset starts at the first byte of the TCP or UDP body. Enter an integer from 0 to 999. The default is 0. Specifies the Layer 4 payload expression that is contained within the TCP or UDP entity body. Enter a string from 1 to 255 alphanumeric characters. For a list of the supported characters that you can use in regular expression strings, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map or other match statement specified by the map_name argument. The ACE does not save the sequence reordering as part of the configuration.
offset bytes
regex expression
insert-before map_name
Command Modes
Policy map load balancing generic configuration mode Admin and user contexts
Command History
Usage Guidelines
To specify actions for multiple match statements, use a class map as described in the Class Map Generic Configuration Mode Commands section. Generic data parsing begins at Layer 4 with the TCP or UDP payload, which allows you the flexibility to match Layer 5 data (in the case of the Lightweight Directory Access Protocol (LDAP) or the Domain Name System (DNS) or any Layer 7 header or payload (for example, HTTP).
2-997
Chapter 2 CLI Commands Policy Map Load Balancing Generic Configuration Mode Commands
When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?). When you use the match layer4-payload command, you access the policy map load balancing generic match configuration mode and the prompt changes to (config-pmap-lb-generic-m). For information about commands in this mode, see the Policy Map Load Balancing Generic Match Configuration Mode Commands section.
Examples
To define Layer 4 payload match criteria for a generic policy map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match L4_MATCH layer4-payload offset 10 regex abc12.* host1/Admin(config-pmap-lb-generic-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map load balancing generic configuration mode Admin and user contexts
2-998
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Class Configuration Mode Commands
Command History
Usage Guidelines
When you use the match source-address command, you access the policy map load balancing generic match configuration mode and the prompt changes from (config-pmap-lb-generic) to (config-pmap-lb-generic-m). For information about commands in this mode, see the Policy Map Load Balancing Generic Match Configuration Mode Commands section.
Examples
To specify that the Layer 7 SLB policy map matches on source IP address 192.168.10.1 255.255.0.0, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match match3 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-generic-m)#
Related Commands
2-999
Chapter 2 CLI Commands Policy Map Load Balancing Generic Class Configuration Mode Commands
(config-pmap-lb-generic-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criterion in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing generic class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7SLBCLASS host1/Admin(config-pmap-lb-generic-c)# drop
Related Commands
2-1000
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Class Configuration Mode Commands
(config-pmap-lb-generic-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing generic class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7SLBCLASS host1/Admin(config-pmap-lb-generic-c)# forward
Related Commands
2-1001
Chapter 2 CLI Commands Policy Map Load Balancing Generic Class Configuration Mode Commands
(config-pmap-lb-generic-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2] [aggregate-state] no serverfarm name1 [backup name2] [aggregate-state]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing generic class configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7SLBCLASS host1/Admin(config-pmap-lb-generic-c)# serverfarm FARM2 backup FARM3
2-1002
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Class Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing generic class configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of L7SLBCLASS are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7SLBCLASS host1/Admin(config-pmap-lb-generic-c)# set ip tos 8
Related Commands
2-1003
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
(config-pmap-lb-generic-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing generic class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a generic Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# class L7SLBCLASS host1/Admin(config-pmap-lb-generic-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1004
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
map load balancing generic configuration mode (see the Policy Map Load Balancing Generic Configuration Mode Commands section for details). The prompt changes to (config-pmap-lb-generic-m). The inline Layer 7 policy map match commands allow you to include a single inline match criteria in the policy map without specifying a traffic class. The inline match commands function the same way as the Layer 7 server load balancing (SLB) class map match commands. However, when you use an inline match command, you can specify an action for only a single match command in the generic SLB policy map. The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-1005
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
(config-pmap-lb-generic-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match command, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing generic match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the inline match command, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match MATCH_SLB1 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-generic-m)# drop
Related Commands
(config-pmap-lb-generic-m) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
2-1006
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
Syntax Description
Command Modes
Policy map load balancing generic match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match MATCH_SLB1 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-generic-m)# forward
Related Commands
(config-pmap-lb-generic-m) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load balancing policy map. serverfarm name1 [backup name2] [aggregate-state] no serverfarm name1 [backup name2] [aggregate-state]
Syntax Description
name1
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-1007
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
backup name2
(Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing generic match configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0 host1/Admin(config-pmap-lb-generic-m)# serverfarm FARM2 backup FARM3
Related Commands
2-1008
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
Syntax Description
value
Command Modes
Policy map load balancing generic match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match MATCH_SLB1 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-generic-m)# set ip tos 8
Related Commands
2-1009
Chapter 2 CLI Commands Policy Map Load Balancing Generic Match Configuration Mode Commands
(config-pmap-lb-generic-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing generic match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance generic first-match L7SLBPOLICY host1/Admin(config-pmap-lb-generic)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0 host1/Admin(config-pmap-lb-generic-m)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1010
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Syntax Description
http
(Optional) Specifies an HTTP Layer 7 load-balancing policy map. HTTP is the default type of load-balancing policy map. If you enter policy-map type loadbalance first-match map_name, the ACE creates an HTTP load-balancing policy map. Name assigned to the HTTP SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
map_name
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
2-1011
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Related Commands
(config-pmap-lb) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb) to (config-pmap-lb-c). For information about commands in this mode, see the Policy Map Load Balancing HTTP Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
2-1012
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Usage Guidelines
Examples
To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7LOADBALNCE_CLASS
Related Commands
(config-pmap-lb) description
(config-pmap-lb) description
To provide a brief description of the HTTP server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing HTTP configuration mode Admin role in any user context
Command History
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host/Admin(config-pmap-lb)# description HTTP LOAD BALANCE PROTOCOL
Related Commands
(config-pmap-lb) class
2-1013
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies the SSL cipher. The possible values for cipher are as follows:
equal-to cipher
RSA_EXPORT1024_WITH_DES_CBC_SHA RSA_EXPORT1024_WITH_RC4_56_MD5 RSA_EXPORT1024_WITH_RC4_56_SHA RSA_EXPORT_WITH_DES40_CBC_SHA RSA_EXPORT_WITH_RC4_40_MD5 RSA_WITH_3DES_EDE_CBC_SHA RSA_WITH_AES_128_CBC_SHA RSA_WITH_AES_256_CBC_SHA RSA_WITH_DES_CBC_SHA RSA_WITH_RC4_128_MD5 RSA_WITH_RC4_128_SHA
less-than cipher_strength
Specifies a noninclusive minimum SSL cipher bit strength. For example, if you specify a cipher strength value of 128, any SSL cipher that was no greater than 128 would hit the traffic polkcy. If the SSL cipher was 128-bit or greater, the connection would miss the policy. The possible values for cipher_strength are as follows:
Command Modes
2-1014
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Command History
Usage Guidelines
To specify actions for multiple match statements, use a class map as described in the Class Map HTTP Load Balancing Configuration Mode Commands section. When you use the match cipher command, you access the policy map load balancing match configuration mode and the prompt changes to (config-pmap-lb-generic-m). For information about commands in this mode, see the Policy Map Load Balancing Generic Match Configuration Mode Commands section.
Examples
To specify that the Layer 7 SLB policy map load balances on a specific SSL cipher, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 cipher equal-to RSA_WITH_RC4_128_CBC_SHA host1/Admin(config-pmap-lb-m)#
Related Commands
2-1015
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Regular expression content to match. Enter a string from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching data strings. For a list of the supported characters that you can use in regular expressions, see Table 1-21. (Optional) Specifies the byte at which the ACE begins parsing the packet data. Enter an integer from 1 to 255. The default is 0. (Optional) Places the inline match command ahead of an existing class map or other match statement specified by the map_name argument. The ACE does not save the sequence reordering as part of the configuration.
expression
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
To specify actions for multiple match statements, use a class map as described in the Class Map HTTP Load Balancing Configuration Mode Commands section. When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
2-1016
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
The ACE can perform regular expression matching against the received packet data from a particular connection based on a regular expression string in HTTP packet data (not the header). When you use the match http content command, you access the policy map load balancing match configuration mode and the prompt changes to (config-pmap-lb-generic-m). For information about commands in this mode, see the Policy Map Load Balancing Generic Match Configuration Mode Commands section.
Examples
To specify that the Layer 7 SLB policy map load balances on a specific URL, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 http content abc*123 offset 50 host1/Admin(config-pmap-lb-m)#
Related Commands
Syntax Description
name1
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Unique cookie name. Enter an unquoted text string with no spaces and a maximum of 63 alphanumeric characters. Specifies a cookie in a URL string. You can specify the delimiters for cookies in a URL string using a command in an HTTP parameter map. Specifies a unique cookie value expression. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. The ACE supports regular expressions for matching string expressions. For a list of supported characters that you can use for matching string expressions, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
cookie-value expression
insert-before map_name
2-1017
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match http cookie command, you access the policy map load balancing HTTP match configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For information about commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section. The ACE performs regular expression matching against the received packet data from a particular connection based on the cookie expression. You can configure a maximum of five cookie names per VIP. The ACE supports regular expressions for matching string expressions. For a list of supported characters that you can use for matching string expressions, see Table 1-21. For details on defining a list of ASCII-character delimiter strings that you can use to separate the cookies in a URL string, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that the Layer 7 SLB policy map load balances on a cookie with the name of testcookie1, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host/Admin(config-pmap-lb)# match MATCH2 http cookie testcookie1 cookie-value 123456 host1/Admin(config-pmap-lb-m)#
Related Commands
2-1018
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Name of the HTTP header to match (for example, www.example1.com.) The range is from 1 to 64 alphanumeric characters.
Note
header_name
The header_name argument cannot include the colon in the name of the HTTP header; the ACE rejects the colon as an invalid token.
header_field
A standard HTTP/1.1 header field. Valid selections include request-header fields, general-header fields, and the entity-header field. The supported selections are the following:
AcceptSemicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request.
2-1019
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Accept-CharsetCharacter sets that are acceptable for the response. This field allows clients capable of understanding more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Accept-EncodingRestricts the content encoding that a user will accept from the server. Accept-LanguageISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO639 country code to specify a national variant. AuthorizationSpecifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Cache-ControlDirectives that must be obeyed by all caching mechanisms along the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. ConnectionAllows the sender to specify connection options. Content-MD5MD5 digest of the entity body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. ExpectUsed by a client to inform the server about the behaviors that the client requires. FromContains the e-mail address of the person that controls the requesting user agent. HostInternet host and port number of the resource being requested, as obtained from the original URI given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL. If-MatchUsed with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used on updating requests to prevent inadvertent modification of the wrong version of a resource. As a special case, the value * matches any current entity of the resource. PragmaPragma directives that are understood by servers to whom the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP. For example, the Accept field is a comma-separated list of entries for which the optional parameters are separated by semicolons.
2-1020
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
RefererAddress (URI) of the resource from which the URI in the request was obtained. Transfer-EncodingIndicates what (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient. User-AgentInformation about the user agent (for example, a software program that originates the request). This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents. ViaUsed by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
header-value expression
Specifies the header value expression string to compare against the value in the specified field in the HTTP header. The range is from 1 to 255 alphanumeric characters. For a list of supported characters that you can use in regular expressions, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match http header command, you access the policy map load balancing HTTP match configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For information about commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section. The ACE supports regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. For a list of supported characters that you can use in regular expressions, see Table 1-21.
Examples
To specify that the Layer 7 SLB policy map load balances on an HTTP header named Host, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 http header Host header-value .*cisco.com host1/Admin(config-pmap-lb-m)#
2-1021
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Related Commands
2-1022
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). URL, or portion of a URL, to match. Enter a URL string from 1 to 255 alphanumeric characters. Include only the portion of the URL that follows www.hostname.domain in the match statement. For a list of supported characters that you can use in regular expressions, see Table 1-21. (Optional) Specifies the HTTP method to match. Enter a method name as an unquoted text string with no spaces and a maximum of 15 alphanumeric characters. The method can either be one of the standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, or CONNECT) or a text string that must be matched exactly (for example, PROTOPLASM). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
method name
insert-before map_name
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
2-1023
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Configuration Mode Commands
Usage Guidelines
When you use the match http url command, you access the policy map load balancing HTTP match configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For information about commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section. Include only the portion of the URL that follows www.hostname.domain in the match statement. For example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html. To match the www.anydomain.com portion, the URL string can take the form of a URL regular expression. For a list of supported characters that you can use in regular expressions, see Table 1-21. When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
Examples
To specify that the Layer 7 SLB policy map load balances on a specific URL, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 http url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif file, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 http url .*.gif host1/Admin(config-pmap-lb-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1).
ip_address
2-1024
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map load balancing HTTP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match source-address command, you access the policy map load balancing HTTP match configuration mode and the prompt changes from (config-pmap-lb) to (config-pmap-lb-m). For information about commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section.
Examples
To specify that the Layer 7 SLB policy map matches on source IP address 192.168.10.1 255.255.0.0, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match match3 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-m)#
Related Commands
2-1025
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) action
To associate an action list with an HTTP load-balancing policy map, use the action command. Use the no form of this command to remove the action list association. action name no action
Syntax Description
name
Identifier of an existing action list. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You use action lists to group several ACE actions (for example, HTTP header insert, rewrite, or delete) together in a named list under a Layer 7 policy map. For information about action list commands, see the Action List Modify Configuration Mode Commands section.
Examples
Related Commands
2-1026
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) compress
To instruct the ACE to compress and encode packets that match a Layer 7 SLB policy map, use the compress command. Use the no form of this command to disable HTTP compression. compress default-method {deflate | gzip} no compress default-method {deflate | gzip}
Syntax Description
deflate
Specifies the deflate compression method as the method to use when the client browser supports both deflate and gzip compression methods. Specifies the gzip compression method as the method to use when the client browser supports both deflate and gzip compression methods.
gzip
Command Modes
Policy map load balancing class configuration mode Admin and user contexts
Command History
Usage Guidelines
The compress command option displays only when you associate an HTTP-type class map with a policy map. When a client request specifies deflate or gzip encoding in the Accept-Encoding field, the ACE uses either deflate or gzip to compress and encode the response content to the client. If both encoding formats are specified in the Accept-Encoding field, the response from the ACE will be encoded according to the compress default-method command in the Layer 7 SLB policy map. HTTP compression is intended primarily for text-based content types. For example, the following are text-based content types:
(ACE module only) By default, the ACE supports HTTP compression at a rate of 1 Gbps. Installing an optional license bundle allows you to increase this value to a maximum of 6 Gbps. See the Administration Guide, Cisco ACE Application Control Engine for information on ACE licensing options.
2-1027
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(ACE appliance only) By default, the ACE supports HTTP compression at a rate of 100 megabits per second (Mbps). Installing an optional HTTP compression license allows you to increase this value to a maximum of 2 Gbps. See the Administration Guide, Cisco ACE Application Control Engine for information on ACE licensing options. When you enable HTTP compression, the ACE compresses the packets using the following default compression parameter values:
Multipurpose Internet Mail Extension (MIME) typeAll text formats (text/.*) Minimum content length size512 bytes User agent exclusionNo user agent is excluded
You can create an HTTP parameter map to modify the compression parameters that the ACE uses (see the Parameter Map Connection Configuration Mode Commands section).
Examples
To enable compression and specify gzip as the HTTP compression method when both formats are included in the Accept-Encoding client request, enter, enter:
host1/Admin(config-pmap-lb-c)# compress default-method gzip
Related Commands
(config-parammap-http) compress
2-1028
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# drop
Related Commands
2-1029
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# forward
Related Commands
2-1030
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) insert-http
To specify the name and value of a generic header field that you want the ACE to insert in the HTTP header, use the insert-http command. Use the no form of this command to delete the HTTP header name and value from the policy map. insert-http name header-value expression no insert-http name header-value expression
Syntax Description
name
Name of the generic header field that you want the ACE to insert in the HTTP header. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. Specifies the header-value expression string to insert in the specified field in the HTTP header. Enter a text string with a maximum of 255 alphanumeric characters. See the Server Load-Balancing Guide, Cisco ACE Application Control Engine for details.
header-value expression
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Usage Guidelines
To identify a client whose source IP address has been mapped to another IP address using NAT, you can instruct the ACE to insert a generic header and string value in the client HTTP request. (For information about NAT, see the Security Guide, Cisco ACE Application Control Engine.) For the name argument, you can specify any custom header name that you want, subject to the maximum character length. You can also enter any of the predefined header names described for the (config-pmap-lb) match http header command, regardless of whether that header name already exists in the client request header. The ACE does not overwrite any existing header information in the client request. You can enter a maximum of 255 bytes of data for the header expression. If you enter more than 255 bytes, the ACE does not insert the header name and expression in the client request. You can also specify the following special header-value expressions by using the following special parameter values:
%isInserts the source IP address in the HTTP header. %idInserts the destination IP address in the HTTP header. %psInserts the source port in the HTTP header.
2-1031
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
For IPv6 to IPv4 and Ipv4 to IPv6 load balancing, use the X-FORWARDED-FOR header. For details, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. For Microsoft Outlook Web Access (OWA), specify the field name as HTTP_FRONT_END_HTTPS with a value of ON. If either TCP server reuse or persistence rebalance is enabled, the ACE inserts a header in every client request.
Examples
For example, to specify the insert-http command as an action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# insert-http Host header-value www.cisco.com
Related Commands
Syntax Description
Identifier of the NAT pool of global IP addresses. Enter an integer from 1 to 2147483647. Specifies the server interface for the global IP address. This interface must be different from the interface that the ACE uses to filter and receive traffic that requires NAT, unless the network design operates in one-arm mode. In that case, the VLAN number is the same. Specifies that the dynamic NAT applies to either the primary server farm or the backup server farm.
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
2-1032
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
Usage Guidelines
Typically, you use dynamic NAT for SNAT. Dynamic NAT allows you to identify local traffic for address translation by specifying the source and destination addresses in an extended ACL, which is referenced as part of the class map traffic classification. The ACE applies dynamic NAT from the interface to which the traffic policy is attached (through the service-policy interface configuration command) to the interface specified in the nat dynamic command.
Examples
For example, to specify the nat-dynamic command as an action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# nat dynamic serverfarm primary 1 vlan 200
Related Commands
(config-pmap-lb-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
2-1033
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. The aggregate-state option was deprecated.
Modification This command was introduced. The aggregate-state option was deprecated.
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. By default, the ACE takes into account the state of all the real servers in the backup server farm before taking the VIP out of service. If all the real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# serverfarm FARM2 backup FARM3
Related Commands
2-1034
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
Syntax Description
value
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of L7SLBCLASS are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# set ip tos 8
Related Commands
2-1035
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
Syntax Description
name
Name of an existing SSL proxy service. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For more information about configuring SSL, see the SSL Guide, Cisco ACE Application Control Engine.
Examples
To associate an SSL proxy service with a Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# ssl-proxy client SSL_SERVER_PROXY_SERVICE
Related Commands
2-1036
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Class Configuration Mode Commands
(config-pmap-lb-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# class L7SLBCLASS host1/Admin(config-pmap-lb-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1037
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
(config-pmap-lb-m) action
To associate an action list with an HTTP load-balancing policy map, use the action command. Use the no form of this command to remove the action list association. action name no action
Syntax Description
name
Identifier of an existing action list. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
Usage Guidelines
You use action lists to group several ACE actions (for example, HTTP header insert, rewrite, or delete) together in a named list under a Layer 7 policy map. For information about action list commands, see the Action List Modify Configuration Mode Commands section.
2-1038
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
Examples
Related Commands
2-1039
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
(config-pmap-lb-m) compress
To instruct the ACE to compress and encode packets that match a Layer 7 SLB policy map, use the compress command. Use the no form of this command to disable HTTP compression. compress default-method {deflate | gzip} no compress default-method {deflate | gzip}
Syntax Description
deflate
Specifies the deflate compression method as the method to use when the client browser supports both deflate and gzip compression methods. Specifies the gzip compression method as the method to use when the client browser supports both deflate and gzip compression methods.
gzip
Command Modes
Policy map load balancing class configuration mode Admin and user contexts
Command History
Usage Guidelines
The compress command option displays only when you associate an HTTP-type class map with a policy map. When a client request specifies deflate or gzip encoding in the Accept-Encoding field, the ACE uses either deflate or gzip to compress and encode the response content to the client. If both encoding formats are specified in the Accept-Encoding field, the response from the ACE will be encoded according to the compress default-method command in the Layer 7 SLB policy map. HTTP compression is intended primarily for text-based content types. For example, the following are text-based content types:
By default, the ACE supports HTTP compression at rates of 100 megabits per second (Mbps). Installing an optional HTTP compression license allows you to increase this value to a maximum of 2 Gbps. See the Administration Guide, Cisco ACE Application Control Engine for information on ACE licensing options.
2-1040
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
When you enable HTTP compression, the ACE compresses the packets using the following default compression parameter values:
Multipurpose Internet Mail Extension (MIME) typeAll text formats (text/.*) Minimum content length size512 bytes User agent exclusionNo user agent is excluded
You can create an HTTP parameter map to modify the compression parameters that the ACE uses (see the Parameter Map Connection Configuration Mode Commands section).
Examples
To enable compression and specify gzip as the HTTP compression method when both formats are included in the Accept-Encoding client request, enter, enter:
host1/Admin(config-pmap-lb-c)# compress default-method gzip
Related Commands
(config-parammap-http) compress
(config-pmap-lb-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match command, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
Usage Guidelines
2-1041
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the inline match command, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com host1/Admin(config-pmap-lb-m)# drop
Related Commands
2-1042
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
(config-pmap-lb-m) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com host1/Admin(config-pmap-lb-m)# forward
Related Commands
2-1043
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
(config-pmap-lb-m) insert-http
To specify the name and value of a generic header field that you want the ACE to insert in the HTTP header, use the insert-http command. Use the no form of this command to delete the HTTP header name and value from the policy map. insert-http name header-value expression no insert-http name header-value expression
Syntax Description
name
Name of the generic header field that you want the ACE to insert in the HTTP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Specifies the header-value expression string to insert in the specified field in the HTTP header. Enter a text string with a maximum of 255 alphanumeric characters. See the Server Load-Balancing Guide, Cisco ACE Application Control Engine for details.
header-value expression
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
Usage Guidelines
To identify a client whose source IP address has been mapped to another IP address using NAT, you can instruct the ACE to insert a generic header and string value in the client HTTP request. (For information about NAT, see the Security Guide, Cisco ACE Application Control Engine.) For the name argument, you can specify any custom header name that you want, subject to the maximum character length. You can also enter any of the predefined header names described for the (config-pmap-lb) match http header command, regardless of whether that header name already exists in the client request header. The ACE does not overwrite any existing header information in the client request. You can enter a maximum of 255 bytes of data for the header expression. If you enter more than 255 bytes, the ACE does not insert the header name and expression in the client request. You can also specify the following special header-value expressions by using the following special parameter values:
%isInserts the source IP address in the HTTP header. %idInserts the destination IP address in the HTTP header. %psInserts the source port in the HTTP header.
2-1044
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
For Microsoft Outlook Web Access (OWA), specify the field name as HTTP_FRONT_END_HTTPS with a value of ON. If either TCP server reuse or persistence rebalance is enabled, the ACE inserts a header in every client request.
Examples
For example, to specify the insert-http command as an action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*test.com host1/Admin(config-pmap-lb-m)# insert-http Host header-value .*cisco.com
The header name and value will appear in the HTTP header as follows:
Host: www.cisco.com
Related Commands
(config-pmap-lb-m) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
2-1045
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
Command History
Modification This command was introduced. The aggregate-state option was deprecated.
Modification This command was introduced. The aggregate-state option was deprecated.
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0 host1/Admin(config-pmap-lb-m)# serverfarm FARM2 backup FARM3
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
2-1046
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Via header-value 192.* host1/Admin(config-pmap-lb-m)# set ip tos 8
Related Commands
Syntax Description
name
Name of an existing SSL proxy service. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
2-1047
Chapter 2 CLI Commands Policy Map Load Balancing HTTP Match Configuration Mode Commands
Usage Guidelines
For more information about configuring SSL, see the SSL Guide, Cisco ACE Application Control Engine.
Examples
To associate an SSL proxy service with a Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 http header Host header-value .*cisco.com host1/Admin(config-pmap-lb-m)# ssl-proxy client SSL_SERVER_PROXY_SERVICE
Related Commands
(config-pmap-lb-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing HTTP match configuration mode Admin and user contexts
Command History
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance http first-match L7SLBPOLICY host1/Admin(config-pmap-lb)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0
2-1048
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
Related Commands
Syntax Description
map_name
Name assigned to the RADIUS SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface.
2-1049
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
Related Commands
2-1050
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
(config-pmap-lb-radius) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb-radius) to (config-pmap-lb-radius-c). For information about commands in this mode, see the Policy Map Load Balancing RADIUS Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Policy map load balancing RADIUS configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match L7SLBPOLICY host1/Admin(config-pmap-lb-radius)# class L7LOADBALNCE_CLASS host1/Admin(config-pmap-lb-radius-c)#
2-1051
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
Related Commands
(config-pmap-lb-radius) description
2-1052
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
(config-pmap-lb-radius) description
To provide a brief description of the RADIUS server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing RADIUS configuration mode Admin role in any user context
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host/Admin(config-pmap-lb-radius)# description RADIUS_LOAD_BALANCE_PROTOCOL
Related Commands
(config-pmap-lb-radius) class
2-1053
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Specifies the unique identifier of the calling station. Specifies the name of the RADIUS user who initiated the connection. Calling station ID or username to match. Enter a string from 1 to 64 alphanumeric characters. The ACE supports the use of regular expressions for matching strings. For a list of the supported characters that you can use in regular expressions, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map or other match statement specified by the map_name argument. The ACE does not save the sequence reordering as part of the configuration.
insert-before map_name
Command Modes
Policy map load balancing RADIUS configuration mode Admin and user contexts
Command History
Usage Guidelines
To specify actions for multiple match statements, use a class map as described in the Class Map RADIUS Load Balancing Configuration Mode Commands section. When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
2-1054
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Class Configuration Mode Commands
When you use the match radius attribute command, you access the policy map load balancing RADIUS match configuration mode and the prompt changes to (config-pmap-lb-radius-m). For information about commands in this mode, see the Policy Map Load Balancing RADIUS Match Configuration Mode Commands section.
Examples
To configure RADIUS match criteria for a RADIUS policy map based on the calling station ID attribute, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)#
To remove the RADIUS attribute match statement from the RADIUS policy map, enter:
host1/Admin(config-pmap-lb-radius)# no match CALL_ID radius attribute calling-station-id 122*
Related Commands
2-1055
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Class Configuration Mode Commands
(config-pmap-lb-radius-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criterion in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing RADIUS class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RAD_POLICY host1/Admin(config-pmap-lb-radius)# class RAD_CLASS host1/Admin(config-pmap-lb-radius-c)# drop
Related Commands
2-1056
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Class Configuration Mode Commands
(config-pmap-lb-radius-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing RADIUS class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RAD_POLICY host1/Admin(config-pmap-lb-radius)# class RAD_CLASS host1/Admin(config-pmap-lb-radius-c)# forward
Related Commands
2-1057
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Class Configuration Mode Commands
(config-pmap-lb-radius-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing RADIUS class configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RAD_POLICY host1/Admin(config-pmap-lb-radius)# class RAD_CLASS host1/Admin(config-pmap-lb-radius-c)# serverfarm FARM2 backup FARM3
2-1058
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Class Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing RADIUS class configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of the class map RAD_CLASS are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance radius first-match RAD_POLICY host1/Admin(config-pmap-lb-radius)# class RAD_CLASS host1/Admin(config-pmap-lb-radius-c)# set ip tos 8
Related Commands
2-1059
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
(config-pmap-lb-radius-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing RADIUS class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a RADIUS Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RAD_POLICY host1/Admin(config-pmap-lb-radius)# class RAD_CLASS host1/Admin(config-pmap-lb-radius-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1060
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
in policy map load balancing RADIUS configuration mode (see the Policy Map Load Balancing RADIUS Configuration Mode Commands section for details). The prompt changes to (config-pmap-lb-radius-m). The inline Layer 7 policy map match commands allow you to include a single inline match criteria in the policy map without specifying a traffic class. The inline match commands function the same way as the Layer 7 server load balancing (SLB) class map match commands. However, when you use an inline match command, you can specify an action for only a single match command in the RADIUS SLB policy map. The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-1061
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
(config-pmap-lb-radius-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match command, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing RADIUS match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the inline match command, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)# drop
Related Commands
2-1062
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
(config-pmap-lb-radius-m) forward
To instruct the ACE to forward requests that match a particular load-balancing criteria in an inline match command without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing RADIUS match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)# forward
Related Commands
2-1063
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
(config-pmap-lb-radius-m) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing RADIUS match configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the RADIUS load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)# serverfarm FARM2 backup FARM3
2-1064
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RADIUS Match Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing RADIUS match configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)# set ip tos 8
Related Commands
2-1065
Chapter 2 CLI Commands Policy Map Load Balancing RDP Configuration Mode Commands
(config-pmap-lb-radius-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing RADIUS match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a RADIUS policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance radius first-match RADIUS_POLICY host1/Admin(config-pmap-lb-radius)# match CALL_ID radius attribute calling-station-id 122* host1/Admin(config-pmap-lb-radius-m)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1066
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RDP Configuration Mode Commands
To create an RDP Layer 7 server load balancing (SLB) policy map and access policy map load balancing RDP configuration mode, use the policy-map type loadbalance rdp first-match command. When you access the policy map load balancing RDP configuration mode, the prompt changes to (config-pmap-lb-rdp). Use the no form of this command to remove an RDP Layer 7 SLB policy map from the ACE. policy-map type loadbalance rdp first-match map_name no policy-map type loadbalance rdp first-match map_name
Syntax Description
map_name
Name assigned to the RDP SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
Related Commands
2-1067
Chapter 2 CLI Commands Policy Map Load Balancing RDP Configuration Mode Commands
(config-pmap-lb-rdp) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb-rdp) to (config-pmap-lb-rdp-c). For information about commands in this mode, see the Policy Map Load Balancing RDP Class Configuration Mode Commands section. Use the no form of this command to remove the associated class map from a policy map. class class-default no class class-default
Syntax Description
class-default
Reserved, well-known class map created by the ACE. You cannot delete or modify this class map. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
Command Modes
Policy map load balancing RDP configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For RDP load-balancing policy maps, you can only assign the class-default class map.
Examples
To associate the Layer 7 class-default class map with the RDP SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host/Admin(config-pmap-lb-rdp)# class class-default host/Admin(config-pmap-lb-rdp-c)#
Related Commands
(config-pmap-lb-rdp) description
2-1068
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
(config-pmap-lb-rdp) description
To provide a brief description of the RDP server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing RDP configuration mode Admin role in any user context
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host/Admin(config-pmap-lb-rdp)# description RDP_LOAD_BALANCE_PROTOCOL
Related Commands
(config-pmap-lb-rdp) class
2-1069
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-1070
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
(config-pmap-lb-rdp-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criterion in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing RDP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host1/Admin(config-pmap-lb-rdp)# class class-default host1/Admin(config-pmap-lb-rdp-c)# drop
Related Commands
2-1071
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
(config-pmap-lb-rdp-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing RDP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host1/Admin(config-pmap-lb-rdp)# class class-default host1/Admin(config-pmap-lb-rdp-c)# forward
Related Commands
2-1072
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
(config-pmap-lb-rdp-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing RDP class configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host1/Admin(config-pmap-lb-rdp)# class class-default host1/Admin(config-pmap-lb-rdp-c)# serverfarm FARM2 backup FARM3
2-1073
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing RDP class configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of the class-default class map are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host1/Admin(config-pmap-lb-rdp)# class class-default host1/Admin(config-pmap-lb-rdp-c)# set ip tos 8
Related Commands
2-1074
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RDP Class Configuration Mode Commands
(config-pmap-lb-rdp-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing RDP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match an RDP Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance rdp first-match RDP_POLICY host1/Admin(config-pmap-lb-rdp)# class class-default host1/Admin(config-pmap-lb-rdp-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1075
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Syntax Description
map_name
Name assigned to the RTSP SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
2-1076
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Related Commands
2-1077
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
(config-pmap-lb-rtsp) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb-rtsp) to (config-pmap-lb-rtsp-c). For information about commands in this mode, see the Policy Map Load Balancing RTSP Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Policy map load balancing RTSP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7LOADBALNCE_CLASS host1/Admin(config-pmap-lb-rtsp-c)#
2-1078
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Related Commands
(config-pmap-lb-rtsp) description
(config-pmap-lb-rtsp) description
To provide a brief description of the RTSP server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing RTSP configuration mode Admin role in any user context
Command History
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host/Admin(config-pmap-lb-rtsp)# description RTSP_LOAD_BALANCE_PROTOCOL
Related Commands
(config-pmap-lb-rtsp) class
2-1079
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Name of the field in the RTSP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can enter a text string with spaces if you enclose the entire string in quotation marks ( ). You can enter any header field name, including a standard RTSP header field name or any user-defined header field name. Because RTSP is similar in syntax and operation to HTTP/1.1, you can use any HTTP header listed in Table 1-10 if the RTSP server supports it. For a complete list of RTSP headers, see RFC 2326. Specifies the expression string to compare against the value in the specified field in the RTSP header. Enter a text string with a maximum of 255 alphanumeric characters. The ACE supports the use of regular expressions for header matching. Header expressions allow spaces if the entire string that contains spaces is quoted. For a list of the supported characters that you can use in regular expressions, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
header_name
header-value expression
insert-before map_name
Command Modes
Policy map load balancing RTSP configuration mode Admin and user contexts
Command History
2-1080
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Usage Guidelines
When you use the match rtsp header command, you access the policy map load balancing RTSP match configuration mode and the prompt changes from (config-pmap-lb-rtsp) to (config-pmap-lb-rtsp-m). For information about commands in this mode, see the Policy Map Load Balancing RTSP Match Configuration Mode Commands section. The ACE supports regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. For a list of supported characters that you can use in regular expressions, see Table 1-21.
Examples
To specify that the Layer 7 SLB policy map load balances on an RTSP header named Host, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match match3 rtsp header Host header-value .*cisco.com host1/Admin(config-pmap-lb-rtsp-m)#
Related Commands
2-1081
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map load balancing RTSP configuration mode Admin and user contexts
Command History
Usage Guidelines
When you use the match rtsp source-address command, you access the policy map load balancing RTSP match configuration mode and the prompt changes from (config-pmap-lb-rtsp) to (config-pmap-lb-rtsp-m). For information about commands in this mode, see the Policy Map Load Balancing RTSP Match Configuration Mode Commands section.
2-1082
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Configuration Mode Commands
Examples
To specify that the Layer 7 SLB policy map matches on source IP address 192.168.10.1 255.255.0.0, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match match3 rtsp source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-rtsp-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). URL, or portion of a URL, to match. Enter a URL string from 1 to 255 alphanumeric characters. The ACE supports the use of regular expressions for matching URL strings. For a list of supported characters that you can use in regular expressions, see Table 1-21. (Optional) Specifies the RTSP method to match. Enter a method name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. The method can either be one of the standard RTSP method names (OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, or CONNECT) or it can be a text string that must be matched exactly (for example, STINGRAY). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
method name
insert-before map_name
Command Modes
Policy map load balancing RTSP configuration mode Admin and user contexts
2-1083
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
Command History
Usage Guidelines
When you use the match rtsp url command, you access the policy map load balancing RTSP match configuration mode and the prompt changes from (config-pmap-lb-rtsp) to (config-pmap-lb-rtsp-m). For information about commands in this mode, see the Policy Map Load Balancing RTSP Match Configuration Mode Commands section. When matching data strings, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
Examples
To specify that the Layer 7 SLB policy map load balances on a specific URL, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match match3 rtsp url whatsnew/latest.* host1/Admin(config-pmap-lb-rtsp-m)#
To use regular expressions to emulate a wildcard search to match on any .gif file, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match match3 rtsp url .*.gif
Related Commands
2-1084
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
(config-pmap-lb-rtsp-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing RTSP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7SLBCLASS host1/Admin(config-pmap-lb-rtsp-c)# drop
Related Commands
2-1085
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
(config-pmap-lb-rtsp-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing RTSP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7SLBCLASS host1/Admin(config-pmap-lb-rtsp-c)# forward
Related Commands
2-1086
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
(config-pmap-lb-rtsp-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing RTSP class configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7SLBCLASS host1/Admin(config-pmap-lb-rtsp-c)# serverfarm FARM2 backup FARM3
2-1087
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing RTSP class configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of L7SLBCLASS are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7SLBCLASS host1/Admin(config-pmap-lb-rtsp-c)# set ip tos 8
Related Commands
2-1088
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands
(config-pmap-lb-rtsp-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing RTSP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# class L7SLBCLASS host1/Admin(config-pmap-lb-rtsp-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1089
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Match Configuration Mode Commands
2-1090
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Match Configuration Mode Commands
(config-pmap-lb-rtsp-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match command, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing RTSP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the inline match command, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match MATCH_SLB1 rtsp header Host header-value .*cisco.com host1/Admin(config-pmap-lb-rtsp-m)# drop
Related Commands
2-1091
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Match Configuration Mode Commands
(config-pmap-lb-rtsp-m) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing RTSP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match the criteria in the inline match command without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match MATCH_SLB1 rtsp header Host header-value .*cisco.com host1/Admin(config-pmap-lb-rtsp-m)# forward
Related Commands
2-1092
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Match Configuration Mode Commands
(config-pmap-lb-rtsp-m) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load balancing policy map. serverfarm name1 [backup name2] [aggregate-state] no serverfarm name1 [backup name2] [aggregate-state]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing RTSP match configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match MATCH_SLB1 rtsp source-address 192.168.11.2 255.255.255.0
2-1093
Chapter 2 CLI Commands Policy Map Load Balancing RTSP Match Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing RTSP match configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match MATCH_SLB1 rtsp header Via header-value 192.* host1/Admin(config-pmap-lb-rtsp-m)# set ip tos 8
Related Commands
2-1094
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
(config-pmap-lb-rtsp-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing RTSP match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance rtsp first-match L7SLBPOLICY host1/Admin(config-pmap-lb-rtsp)# match MATCH_SLB1 rtsp source-address 192.168.11.2 255.255.255.0 host1/Admin(config-pmap-lb-rtsp-m)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1095
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
To create a SIP Layer 7 server load balancing (SLB) policy map and access policy map load balancing SIP configuration mode, use the policy-map type loadbalance sip first-match command. When you access the policy map load balancing SIP configuration mode, the prompt changes to (config-pmap-lb-sip). Use the no form of this command to remove a SIP SLB policy map from the ACE. policy-map type loadbalance sip first-match map_name no policy-map type loadbalance sip first-match map_name
Syntax Description
map_name
Name assigned to the SIP SLB policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You associate the Layer 7 load balancing policy map with a Layer 3 and Layer 4 policy map to provide an entry point for the traffic classification. Layer 7 policy maps are considered to be child policies. Only a Layer 3 and Layer 4 policy map can be activated on a VLAN interface. A Layer 7 policy map cannot be directly applied on a VLAN (or any) interface. To associate the Layer 7 load-balancing policy map, you nest it by using the Layer 3 and Layer 4 (config-pmap-c) loadbalance policy command.
Examples
Related Commands
2-1096
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
(config-pmap-lb-sip) class
To associate a Layer 7 server load balancing (SLB) class map with a Layer 7 SLB policy map, use the class command. The prompt changes from (config-pmap-lb-sip) to (config-pmap-lb-sip-c). For information about commands in this mode, see the Policy Map Load Balancing SIP Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current named class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Policy map load balancing SIP configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To associate a Layer 7 SLB class map with a Layer 7 SLB policy map, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7LOADBALNCE_CLASS host1/Admin(config-pmap-lb-sip-c)#
2-1097
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
Related Commands
(config-pmap-lb-sip) description
2-1098
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
(config-pmap-lb-sip) description
To provide a brief description of the SIP server load balancing (SLB) policy map, use the description command. Use the no form of this command to remove the description from the policy map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Policy map load balancing SIP configuration mode Admin role in any user context
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to perform server load balancing, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host/Admin(config-pmap-lb-sip)# description SIP_LOAD_BALANCE_PROTOCOL
Related Commands
(config-pmap-lb-sip) class
2-1099
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Name of the field in the SIP header. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can enter a text string if you enclose the entire string in quotation marks ( ). You can enter any header field name, including a standard SIP header field name or any user-defined header field name. For a list of standard SIP header field names, see Table 1-11. Because SIP is similar in syntax and operation to HTTP/1.1, you can use any HTTP header listed in Table 1-10 if the SIP server supports it. For a complete list of SIP headers, see RFC 3261. Specifies the expression string to compare against the value in the specified field in the SIP header. Enter a text string with a maximum of 255 alphanumeric characters. The ACE supports the use of regular expressions for header matching. Header expressions allow spaces if the entire string that contains spaces is quoted. For a list of the supported characters that you can use in regular expressions, see Table 1-21. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
header_name
header-value expression
insert-before map_name
Command Modes
Policy map load balancing SIP configuration mode Admin and user contexts
Command History
2-1100
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Configuration Mode Commands
Usage Guidelines
When you use the match sip header command, you access the policy map load balancing SIP match configuration mode and the prompt changes from (config-pmap-lb-sip) to (config-pmap-lb-sip-m). For information about commands in this mode, see the Policy Map Load Balancing SIP Match Configuration Mode Commands section. The ACE supports regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces if the spaces are escaped or quoted. For a list of supported characters that you can use in regular expressions, see Table 1-21.
Examples
To specify that the Layer 7 SLB policy map load balances on the standard SIP header Via, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match SIP_MATCH sip header Via header-value 192.* host1/Admin(config-pmap-lb-sip-m)#
Related Commands
Syntax Description
name
Name of the inline match condition. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Source IP address of the client. Enter the IP address in dotted-decimal notation (for example, 192.168.11.1). Subnet mask of the client entry in dotted-decimal notation (for example, 255.255.255.0). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
Command Modes
Policy map load balancing SIP configuration mode Admin and user contexts
2-1101
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
Command History
Usage Guidelines
When you use the match source-address command, you access the policy map load balancing SIP match configuration mode and the prompt changes from (config-pmap-lb-sip) to (config-pmap-lb-sip-m). For information about commands in this mode, see the Policy Map Load Balancing SIP Match Configuration Mode Commands section.
Examples
To specify that the Layer 7 SLB policy map matches on source IP address 192.168.10.1 255.255.0.0, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match match3 source-address 192.168.10.1 255.255.0.0 host1/Admin(config-pmap-lb-sip-m)#
Related Commands
2-1102
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
(config-pmap-lb-sip-c) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in the class map, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing SIP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the class map, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7SLBCLASS host1/Admin(config-pmap-lb-sip-c)# drop
Related Commands
2-1103
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
(config-pmap-lb-sip-c) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing SIP class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7SLBCLASS host1/Admin(config-pmap-lb-sip-c)# forward
Related Commands
2-1104
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
(config-pmap-lb-sip-c) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load-balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing SIP class configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7SLBCLASS host1/Admin(config-pmap-lb-sip-c)# serverfarm FARM2 backup FARM3
2-1105
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing SIP class configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
The following example specifies the set ip tos command as a QoS action in the Layer 7 load-balancing policy map. All packets that satisfy the match criteria of L7SLBCLASS are marked with the IP DSCP value of 8. How packets marked with the IP DSCP value of 8 are treated is determined by the network configuration.
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7SLBCLASS host1/Admin(config-pmap-lb-sip-c)# set ip tos 8
Related Commands
2-1106
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Class Configuration Mode Commands
(config-pmap-lb-sip-c) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing SIP class configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# class L7SLBCLASS host1/Admin(config-pmap-lb-sip-c)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1107
Chapter 2 CLI Commands Policy Map Load Balancing SIP Match Configuration Mode Commands
2-1108
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Match Configuration Mode Commands
(config-pmap-lb-sip-m) drop
To instruct the ACE to discard packets that match a particular load-balancing criteria in an inline match command, use the drop command. Use the no form of this command to reset the ACE to its default of accepting packets from the policy map. drop no drop
Syntax Description
Command Modes
Policy map load balancing SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to discard packets that match the load-balancing criteria in the inline match command, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match SIP_MATCH sip header Via header-value 192.* host1/Admin(config-pmap-lb-sip-m)# drop
Related Commands
2-1109
Chapter 2 CLI Commands Policy Map Load Balancing SIP Match Configuration Mode Commands
(config-pmap-lb-sip-m) forward
To instruct the ACE to forward requests that match a particular policy map without performing load balancing on the request, use the forward command. Use the no form of this command to reset the ACE to its default of load balancing packets from the policy map. forward no forward
Syntax Description
Command Modes
Policy map load balancing SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
To instruct the ACE to forward requests that match the criteria in the inline match command without performing load balancing on the request, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match SIP_MATCH sip header Via header-value 192.* host1/Admin(config-pmap-lb-sip-m)# forward
Related Commands
2-1110
OL-25339-01
Chapter 2 CLI Commands Policy Map Load Balancing SIP Match Configuration Mode Commands
(config-pmap-lb-sip-m) serverfarm
To load balance a client request for content to a server farm, use the serverfarm command. Server farms are groups of networked real servers that contain the same content and reside in the same physical location. Use the no form of this command to remove the server-farm action from the Layer 7 load balancing policy map. serverfarm name1 [backup name2 [aggregate-state]] no serverfarm name1 [backup name2 [aggregate-state]]
Syntax Description
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm goes down, the ACE sends all connections to the configured backup server farm. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. This option has been deprecated and no longer has an effect on the state of the VIP. By default, the ACE takes into account the state of all real servers in the backup server farm before taking the VIP out of service. If all real servers in the primary server farm fail, but there is at least one real server in the backup server farm that is operational, the ACE keeps the VIP in service.
aggregate-state
Command Modes
Policy map load balancing SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
If all servers in the server farm fail and you do not configure a backup server farm, the ACE sends a reset (RST) to a client in response to a content request. If all real servers in the primary server farm fail, the ACE sends client requests to the backup server farm.
Examples
To specify the serverfarm command as an action in the load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0
2-1111
Chapter 2 CLI Commands Policy Map Load Balancing SIP Match Configuration Mode Commands
Related Commands
Syntax Description
value
Command Modes
Policy map load balancing SIP match configuration mode Admin and user contexts
Command History
Usage Guidelines
For details about the ToS byte, see RFC 791, RFC 1122, RFC 1349, and RFC 3168.
Examples
To specify the set ip tos command as a QoS action in the Layer 7 load-balancing policy map, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match MATCH_SLB1 sip header Via header-value 192.* host1/Admin(config-pmap-lb-sip-m)# set ip tos 8
Related Commands
2-1112
OL-25339-01
(config-pmap-lb-sip-m) sticky-serverfarm
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, use the sticky-serverfarm command. Use the no form of this command to remove a sticky group from the policy map. sticky-serverfarm name no sticky-serverfarm name
Syntax Description
name
Name of an existing sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Policy map load balancing SIP match configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
For information about sticky groups, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that all requests that match a Layer 7 policy map are load balanced to a sticky server farm, enter:
host1/Admin(config)# policy-map type loadbalance sip first-match L7SLBPOLICY host1/Admin(config-pmap-lb-sip)# match MATCH_SLB1 source-address 192.168.11.2 255.255.255.0 host1/Admin(config-pmap-lb-sip-m)# sticky-serverfarm STICKY_GROUP1
Related Commands
2-1113
To create a Layer 3 and Layer 4 network management policy map and access the policy map management configuration mode, use the policy-map type management first-match command in configuration mode. You can classify network traffic based on the following management protocols: HTTP, HTTPS, ICMP, SNMP, SSH, or Telnet. When you access this mode, the prompt changes to (config-pmap-mgmt). Use the no form of this command to remove a Layer 3 and Layer 4 network management policy map from the ACE. policy-map type management first-match map_name no policy-map type management first-match map_name
Syntax Description
map_name
Name assigned to the Layer 3 and Layer 4 network management policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the context Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To create a Layer 3 and Layer 4 network traffic management policy map, enter:
host1/Admin(config)# policy-map type management first-match L4_REMOTE_MGMT_ALLOW_POLICY host1/Admin(config-pmap-mgmt)#
Related Commands
(config) class-map
2-1114
OL-25339-01
(config-pmap-mgmt) class
To associate a Layer 3 and Layer 4 management protocol class map with a Layer 3 and Layer 4 traffic management policy map, use the class command. The prompt changes from (config-pmap-mgmt) to (config-pmap-mgmt-c). For information about commands in this mode, see the Policy Map Management Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 3 and Layer 4 management protocol class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it enabling it to match all traffic.
insert-before name2
class-default
Command Modes
Command History
Usage Guidelines
Examples
2-1115
Related Commands
2-1116
OL-25339-01
Chapter 2 CLI Commands Policy Map Management Class Configuration Mode Commands
(config-pmap-mgmt) description
To provide a brief summary about the Layer 3 and Layer 4 management protocol policy map, use the description command. Use the no form of this command to remove the description from the class map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To add a description that the policy map is to allow remote Telnet access, enter:
host1/Admin(config-pmap-mgmt)# description Allow Telnet access to the ACE
Related Commands
(config-pmap-mgmt) class
2-1117
Chapter 2 CLI Commands Policy Map Management Class Configuration Mode Commands
(config-pmap-mgmt-c) deny
To deny the specified IP network management protocol, use the deny command. Use the no form of this command to allow the specified IP network management protocol to be received by the ACE. deny no deny
Syntax Description
Command Modes
Policy map management class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
Related Commands
2-1118
OL-25339-01
(config-pmap-mgmt-c) permit
To allow the IP network management protocols listed in the associated Layer 3 and Layer 4 management class map to be received by the ACE, use the permit command. Use the no form of this command to disallow the specified IP network management protocols to be received by the ACE. permit no permit
Syntax Description
Command Modes
Policy map management class configuration mode Admin and user contexts
Command History
Usage Guidelines
Examples
Related Commands
2-1119
policy-map type optimization http first-match map_name no policy-map type optimization http first-match map_name
Syntax Description
map_name
Name assigned to the Layer 7 optimization HTTP policy map. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
(config) class-map
2-1120
OL-25339-01
(config-pmap-optmz) class
(ACE appliance only) To associate a Layer 7 SLB class map with a Layer 7 optimization HTTP policy map, use the class command. The prompt changes from (config-pmap-optmz) to (config-pmap-optmz-c). For information on commands in this mode, see the Policy Map Optimization Class Configuration Mode Commands section. Use the no form of this command to remove an associated class map from a policy map. class {name1 [insert-before name2] | class-default} no class {name1 [insert-before name2] | class-default}
Syntax Description
name1
Name of a previously defined Layer 7 SLB class map configured with the class-map command. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Places the current class map ahead of an existing class map or inline match condition specified by the name2 argument in the policy map configuration. The ACE does not save the sequence reordering as part of the configuration. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Reserved, well-known class map created by the ACE. You cannot delete or modify this class. All traffic that fails to meet the other matching criteria in the named class map belongs to the default traffic class. If none of the specified classifications matches the traffic, then the ACE performs the action specified under the class class-default command. The class-default class map has an implicit match any statement in it that enables it to match all traffic.
insert-before name2
class-default
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-1121
(config-pmap-optmz) description
(ACE appliance only) To provide a brief summary about the Layer 7 optimization HTTP policy map, use the description command. Use the no form of the command to remove the description from the class map. description text no description
Syntax Description
text
Description for the policy map. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
Examples
To add a description that the policy map is to perform delta optimization, enter:
host1/Admin(config-pmap-optmz)# description This policy map performs delta optimization
Related Commands
(config-pmap-mgmt) class
2-1122
OL-25339-01
Syntax Description
name1
Name assigned to the inline match command. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). A unique cookie name. Enter an unquoted text string with no spaces and a maximum of 63 alphanumeric characters. Specifies a cookie in a URL string. You can specify the delimiters for cookies in a URL string using a command in an HTTP parameter map. Specifies a unique cookie value expression. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. The ACE supports regular expressions for matching string expressions. For a list of supported characters that you can use for matching string expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
cookie-value expression
insert-before map_name
Command Modes
Command History
Usage Guidelines
When you use the match http cookie command, you access the policy map optimization match configuration mode and the prompt changes from (config-pmap-optmz) to (v-m). For information on the load-balancing commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section. The ACE performs regular expression matching against the received packet data from a particular connection based on the cookie expression. You can configure a maximum of five cookie names per VIP.
2-1123
The ACE supports regular expressions for matching string expressions. For a list of supported characters that you can use for matching string expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. For details on defining a list of ASCII-character delimiter strings that you can use to separate the cookies in a URL string, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To specify that the Layer 7 optimization policy map load balances on a cookie with the name of testcookie1, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host/Admin(config-pmap-optmz)# match MATCH2 http cookie testcookie1 cookie-value 123456
Related Commands
Syntax Description
name
Name assigned to the inline match command. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). Name of the HTTP header to match (for example, www.example1.com.) The range is from 1 to 64 alphanumeric characters.
Note
header_name
The header_name argument cannot include the colon in the name of the HTTP header; the ACE rejects the colon as an invalid token.
header_field
A standard HTTP/1.1 header field. Valid selections include request-header fields, general-header fields, and the entity-header field. Selections also include two lower-level header-matching commands: length and mime-type. The supported selections are the following:
AcceptSpecifies a semicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request.
2-1124
OL-25339-01
Accept-CharsetSpecifies the character sets that are acceptable for the response. This field allows clients capable of understanding more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Accept-EncodingRestricts the content encoding that a user will accept from the server. Accept-LanguageSpecifies the ISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO639 country code to specify a national variant. AuthorizationSpecifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Cache-ControlSpecifies the directives that must be obeyed by all caching mechanisms in the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. ConnectionAllows the sender to specify connection options. Content-MD5Specifies the MD5 digest of the entity body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. ExpectUsed by a client to inform the server about the behaviors that the client requires. FromContains the e-mail address of the person who controls the requesting user agent. HostSpecifies the internet host and port number of the resource that is requested, as obtained from the original URI given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL. If-MatchUsed with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used on updating requests to prevent inadvertent modification of the wrong version of a resource. As a special case, the value * matches any current entity of the resource. PragmaSpecifies the pragma directives that are understood by servers to whom the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP. For example, the Accept field is a comma-separated list of entries for which the optional parameters are separated by semicolons.
2-1125
RefererSpecifies the address (URI) of the resource from which the URI in the request was obtained. Transfer-EncodingIndicates what (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient. User-AgentSpecifies the information about the user agent (for example, a software program that originates the request). This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents. ViaUsed by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
header-value expression
Specifies the header value expression string to compare against the value in the specified field in the HTTP header. The range is from 1 to 255 alphanumeric characters. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
insert-before map_name
Command Modes
Command History
Usage Guidelines
The ACE performs regular expression matching against the received packet data from a particular connection based on the HTTP header expression. When you use the match http header command, you access the policy map optimization match configuration mode and the prompt changes from (config-pmap-optmz) to (config-pmap-optmz-m). For information on the load-balancing commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section. The ACE supports regular expressions for matching. Expressions are stored in a header map in the form header-name: expression. Header expressions allow spaces, if the spaces are escaped or quoted. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command.
Examples
To specify that the Layer 7 optimization policy map load balances on an HTTP header named Host, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host1/Admin(config-pmap-optmz)# match match3 http header Host header-value .*cisco.com
Related Commands
2-1126
OL-25339-01
Syntax Description
name
Name assigned to the inline match command. Enter an unquoted text string with no spaces. The length of the inline match statement name plus the length of the policy map name with which it is associated cannot exceed a total maximum of 64 alphanumeric characters. For example, if the policy map name is L7_POLICY (nine characters), an inline match statement name under this policy cannot exceed 55 alphanumeric characters (64 - 9 = 55). URL, or portion of a URL, to match. Enter a URL string from 1 to 255 alphanumeric characters. Include only the portion of the URL that follows www.hostname.domain in the match statement. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. (Optional) Specifies the HTTP method to match. Enter a method name as an unquoted text string with no spaces and a maximum of 15 alphanumeric characters. The method can either be one of the standard HTTP 1.1 method names (OPTIONS, GET, HEAD, POST, PUT, DELETE, TRACE, or CONNECT) or a text string that must be matched exactly (for example, PROTOPLASM). (Optional) Places the inline match command ahead of an existing class map in the policy map configuration.
expression
method name
insert-before map_name
Command Modes
Command History
Usage Guidelines
The ACE performs regular expression matching against the received packet data from a particular connection based on the HTTP URL string. When you use the match http url command, you access the policy map optimization match configuration mode and the prompt changes from (config-pmap-optmz) to (config-pmap-optmz-m). For information on the load-balancing commands in this mode, see the Policy Map Load Balancing HTTP Match Configuration Mode Commands section.
2-1127
Chapter 2 CLI Commands Policy Map Optimization Class Configuration Mode Commands
Include only the portion of the URL that follows www.hostname.domain in the match statement. For example, in the URL www.anydomain.com/latest/whatsnew.html, include only /latest/whatsnew.html. To match the www.anydomain.com portion, the URL string can take the form of a URL regular expression. For a list of supported characters that you can use in regular expressions, see the Usage Guidelines section for the (config-pmap-ins-http) match content command. The period (.) does not have a literal meaning in regular expressions. Use either brackets ([]) or the backslash (\) character to match this symbol. For example, specify www[.]xyz[.]com instead of www.xyz.com.
Examples
To specify that the Layer 7 optimization policy map load balances on a specific URL, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host1/Admin(config-pmap-optmz)# match match3 http url whatsnew/latest.*
To use regular expressions to emulate a wildcard search to match on any .gif file, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host1/Admin(config-pmap-optmz)# match match3 http url .*.gif
Related Commands
(config-pmap-optmz-c) action
(ACE appliance only) To perform a specific set of application acceleration actions, use the action command. The Layer 7 optimization HTTP policy map activates the use of an optimization HTTP action list to configure the specified application acceleration and optimization actions. See Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide for details on creating an optimization HTTP action list. Use the no form of the command to remove the action list from the policy map. action list_name [parameter map_name] no action list_name [parameter map_name]
2-1128
OL-25339-01
Chapter 2 CLI Commands Policy Map Optimization Match Configuration Mode Commands
Syntax Description
list_name
Unique name of an existing action list as an unquoted text string with a maximum of 64 alphanumeric characters. The action command groups the application acceleration functions associated with the specified action list that apply to a specific type of operation. (Optional) Specifies optimization-related commands that pertain to application acceleration performed by the ACE. A parameter map groups the application acceleration functions that adjust or control the actions specified in an associated action list. The map_name argument specifies a unique name of an existing parameter map as an unquoted text string with a maximum of 64 alphanumeric characters.
parameter map_name
Command Modes
Policy map optimization class configuration mode Admin and user contexts
Command History
Usage Guidelines
Optionally, you can specify an optimization HTTP parameter list in an optimization HTTP policy map to identify the association between the action list and the parameter map. The optimization HTTP action list defines what to do while the optimization HTTP parameter map defines the specific details about how to accomplish the application acceleration action. Refer to Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide for details on creating an optimization HTTP parameter map.
Examples
To associate an existing action list with an existing parameter map to control the actions in the Layer 7 HTTP optimization policy map, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY host1/Admin(config-pmap-optmz)# class L7SLBCLASS host1/Admin(config-pmap-optmz-c)# action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
To remove the action list from the Layer 7 HTTP optimization policy map, enter:
host1/Admin(config-pmap-optmz-c)# no action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
Related Commands
2-1129
Chapter 2 CLI Commands Policy Map Optimization Match Configuration Mode Commands
The commands in this mode require the loadbalance feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
(config-pmap-optmz-m) action
(ACE appliance only) To perform a specific set of application acceleration actions, use the action command. The Layer 7 optimization HTTP policy map activates the use of an optimization HTTP action list to configure the specified application acceleration optimization actions. Refer to the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide for details on creating an optimization HTTP action list. Use the no form of the command to remove the action list from the policy map. action list_name [parameter map_name] no action list_name [parameter map_name]
Syntax Description
list_name
Unique name of an existing action list as an unquoted text string with a maximum of 64 alphanumeric characters. The action command groups the application acceleration functions associated with the specified action list that apply to a specific type of operation. (Optional) Specifies optimization-related commands that pertain to application acceleration performed by the ACE. A parameter map groups the application acceleration functions that adjust or control the actions specified in an associated action list. The map_name argument specifies a unique name of an existing parameter map as an unquoted text string with a maximum of 64 alphanumeric characters.
parameter map_name
Command Modes
Policy map optimization match configuration mode Admin and user contexts
Command History
Usage Guidelines
Optionally, you can specify an optimization HTTP parameter list in an optimization HTTP policy map to identify the association between the action list and the parameter map. In this case, the optimization HTTP action list defines what to do while the optimization HTTP parameter map defines the specific details about how to accomplish the application acceleration action. Refer to the Cisco 4700 Series Application Control Engine Appliance Application Acceleration and Optimization Configuration Guide for details on creating an optimization HTTP parameter map.
Examples
To associate an existing action list with an existing parameter map to control the match command action in the Layer 7 HTTP optimization policy map, enter:
host/Admin(config)# policy-map type optimization http first-match L7OPTIMIZATION_POLICY
2-1130
OL-25339-01
Chapter 2 CLI Commands Policy Map Optimization Match Configuration Mode Commands
host1/Admin(config-pmap-optmz)# match match3 http url .*.gif host1/Admin(config-pmap-optmz-m)# action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
To remove the action list from the Layer 7 HTTP optimization policy map, enter:
host1/Admin(config-pmap-optmz-m)# no action ACT_LIST1 parameter OPTIMIZE_PARAM_MAP
Related Commands
2-1131
PassedThe server returns a valid response. FailedThe server fails to provide a valid response to the ACE or the ACE is unable to reach a server for a specified number of retries.
By configuring the ACE for health monitoring, the ACE sends active probes periodically to determine the server state. The ACE supports 4096 (ACE module) or 1000 (ACE appliance) unique probe configurations, which includes ICMP, TCP, HTTP, and other predefined health probes. The ACE can execute only up to 200 concurrent script probes at a time. The ACE also allows the opening of 2048 sockets simultaneously. You can associate the same probe with multiple real servers or server farms. Each time that you use the same probe again, the ACE counts it as another probe instance. You can allocate a maximum of 16 K (ACE module) or 4000 (ACE appliance) probe instances. To configure probes and access probe configuration mode for that probe type, use the probe command. The CLI prompt changes to (config-probe- probe_type). For information about the commands in all probe configuration modes, see the commands in this section. See the Command Modes section for each command to find out to which probe-type configuration modes a specific command applies. Use the no form of this command to remove a probe from the configuration. probe probe_type probe_name no probe probe_type probe_name
Syntax Description
probe_type
Type of probe to configure. The probe type determines what the probe sends to the server. Enter one of the following types:
dnsSends a request to a DNS server that passes a configured domain to the server (by default, the domain is www.cisco.com). To determine whether the server is up, the ACE must receive one of the configured IP addresses for that domain. echo {tcp | udp}Sends a specified string to the server and compares the response to the original string. You must configure the string that needs to be echoed. If the response string matches the original string, the server is marked as passed. If you do not configure a string, the probe behaves like a TCP or UDP probe. fingerUses a Finger query to a server for an expected response string. The ACE searches the response for the configured string. If the ACE finds the expected response string, the server is marked as passed. If you do not configure an expected response string, the ACE ignores the server response.
2-1132
OL-25339-01
ftp Establishes a TCP connection to the server and then issues a quit command. httpEstablishes a TCP connection and issues an HTTP request to the server for an expected string and status code. The ACE can compare the received response with configured codes, looking for a configured string in the received HTTP page, or verifying hash for the HTTP page. If any of these checks fail, the server is marked as failed. For example, if you configure an expected string and status code and the ACE finds them both in the server response, the server is marked as passed. However, if the ACE does not receive either the server response string or the expected status code, it marks the server as failed. If you do not configure a status code, any response code from the server is marked as failed.
httpsSimilar to an HTTP probe except that it uses Secure Sockets Layer (SSL) to generate encrypted data. icmpSends an ICMP echo request and listens for a response. If a server returns a response, the ACE marks the server as passed. If the server does not send a response, causing the probe to time out, or if the server sends an unexpected ICMP echo response type, the ACE marks the probe as failed. imapMakes a server connection and sends user credential (login, password, and mailbox) information. The ACE can send a configured command. Based on the server response, the ACE marks the probe as passed or failed. popInitiates a session and sends the configured credentials. The ACE can send a configured command. Based on the server response, the ACE marks the probe as passed or failed. radiusSends a query using a configured username, password, and shared secret to a RADIUS server. If the server is up, it is marked as passed. If you configure a Network Access Server (NAS) address, the ACE uses it in the outgoing packet. Otherwise, the ACE uses the IP address associated with the outgoing interface as the NAS address. rtspEstablishes a TCP connection and sends a request packet to the server. The ACE compares the response with the configured response code to determine whether the probe has succeeded. scriptedAllows you to run a script to execute the probe that you created for health monitoring. You can author specific scripts with features not present in standard health probes. sip {tcp | udp}Establishes a TCP or UDP connection and sends an OPTIONS request packet to the user agent on the server. The ACE compares the response with the configured response code or expected string, or both, to determine whether the probe has succeeded. If you do not configure an expected status code, any response from the server is marked as failed. smtpInitiates an SMTP session by logging into the server, sends a HELLO message, and then disconnects from the server.
2-1133
snmpEstablishes a UDP connection and sends a maximum of eight SMNP OID queries to probe the server. The ACE weighs and averages the load information that is retrieved and uses it as input to the least-loaded algorithm for load-balancing decisions. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed. tcpInitiates a TCP 3-way handshake (SYN, SYN-ACK, ACK) and expects the server to send a response. By default, a successful response causes the probe to mark the server as passed and send a FIN to end the session. If the response is not valid or if there is no response, the probe marks the server as failed. telnetEstablishes a connection to the server and verifies that a greeting from the application was received. udpSends a UDP packet to a server and marks the server as failed only if the server returns an ICMP Port Unreachable message. If the ACE does not receive any ICMP errors for the UDP request that was sent, the probe is marked as passed. Optionally, you can configure this probe to send specific data and expect a specific response to mark the server as passed. If the IP interface of the server is down or disconnected, the UDP probe by itself would not know that the UDP application is not reachable.
vmSends a query to the VM controller (Vcenter) to obtain the load information of the local VMs.
probe_name
Identifier for the probe. Use the probe name to associate the probe to the server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. This command was revised. Added the VM probe type. Added IPv6 support.
Modification This command was introduced. This command was revised. Added the VM probe type. Added IPv6 support.
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
2-1134
OL-25339-01
You can associate only IPv4 probes with IPv4 real servers and only IPv6 probes wth IPv6 real servers. For IPv6, the ACE supports the following probe types:
Examples
To define a TCP probe named PROBE, and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1 host1/Admin(config-probe-tcp)#
To delete the TCP probe named PROBE1 for TCP and access its mode, enter:
host1/Admin(config)# probe tcp PROBE1
Related Commands
(config-probe-probe_type) append-port-hosttag
(ACE appliance only) To append port information in the HTTP Host header when you configure a non-default destination port for an HTTP or HTTPS probe, use the append-port-hosttag command.Use the no form of this command to reset the default behavior of not appending the port information in the HTTP Host header. append-port-hosttag no append-port-hosttag
Syntax Description
Command Modes
HTTP and HTTPS probe configuration mode Admin and user contexts
Command History
2-1135
Usage Guidelines
Examples
To configure the ACE to append the port information, enter the following command:
host1/Admin(config-probe-http)# append-port-hosttag
Related Commands
2-1136
OL-25339-01
(config-probe-probe_type) community
To change the community string used by an SNMP probe, use the community command. Use the no form of this command to remove the community string. community text no community
Syntax Description
text
Name of the SNMP community string for the server. Enter a text string with a maximum of 255 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
An ACE Simple Network Management Protocol (SNMP) probe accesses the server through its community string. By default, the community string is not set.
Examples
Related Commands
show probe
2-1137
Syntax Description
Command Modes
ECHO TCP, Finger, FTP, HTTP, HTTPS, IMAP, POP, RTSP, SIP TCP, SMTP, TCP, and Telnet probe configuration modes Admin and user contexts
Command History
Usage Guidelines
This command applies only to TCP-based probes. By default, the ACE terminates a TCP connection gracefully by sending a FIN to the server.
Examples
Related Commands
show probe
2-1138
OL-25339-01
(config-probe-probe_type) credentials
To configure the credentials for username and password authentication of a probe to access a server, use the credentials command. For a Remote Authentication Dial-In User Service (RADIUS) probe, a shared secret may also be required. For an Internet Message Access Protocol (IMAP) probe, you can provide a mailbox username. Use the no form of this command to remove the credentials from the configuration. For HTTP, HTTPS, and POP probes, the syntax is as follows: credentials username [password] For RADIUS probes, the syntax is as follows: credentials username password [secret shared_secret] For IMAP probes, the syntax is as follows: credentials {username password} | {mailbox name} For HTTP, HTTPS, POP, and RADIUS probes, the syntax is as follows: no credentials For IMAP probes, the syntax is as follows: no credentials {username | mailbox}
Syntax Description
username password
User identifier used for authentication. Enter an unquoted text string with a maximum of 64 alphanumeric characters. (Optional except for RADIUS and IMAP probes) Password used for authentication. Enter an unquoted text string with a maximum of 64 alphanumeric characters. (IMAP probe) Specifies the user mailbox name from which to retrieve e-mail for an IMAP probe. Enter an unquoted text string with a maximum of 64 alphanumeric characters. (RADIUS probe) Specifies the password used for the MD5 hash encryption algorithm. Enter an unquoted text string with a maximum of 64 alphanumeric characters.
mailbox name
secret shared_secret
Command Modes
HTTP, HTTPS, IMAP, POP, and RADIUS probe configuration modes Admin and user contexts
Command History
2-1139
Usage Guidelines
You must configure the credentials for an IMAP probe using the credentials command before you configure the mailbox or the ACE will ignore the specified user mailbox name.
Examples
To configure the username ENG1 and a password TEST for an HTTP probe, enter:
host1/Admin(config-probe-http)# credentials ENG1 TEST
Related Commands
show probe
(config-probe-probe_type) description
To provide a description for a probe, use the description command. Use the no form of this command to remove the description for the probe. description text no description
Syntax Description
text
Description for the probe. Enter a text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
2-1140
OL-25339-01
Examples
To configure a description THIS PROBE IS FOR TCP SERVERS for a TCP probe, enter:
host1/Admin(config-probe-tcp)# description THIS PROBE IS FOR TCP SERVERS
To remove the description THIS PROBE IS FOR TCP SERVERS for a TCP probe, enter:
host1/Admin(config-probe-tcp)# no description
Related Commands
show probe
2-1141
(config-probe-probe_type) domain
To configure the domain name that the probe sends to the DNS server to resolve, use the domain command. Use the no form of this command to reset the default domain (www.cisco.com) that the probe sends to the server. domain name no domain
Syntax Description
name
Domain that the probe sends to the DNS server. Enter an unquoted text string with a maximum of 255 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The DNS probe sends a domain name for the DNS server to resolve. By default, the probe uses the www.cisco.com domain name.
Examples
To reset the default domain that the probe sends to the DNS server, enter:
host1/Admin(config-probe-dns)# no domain
Related Commands
show probe
2-1142
OL-25339-01
Syntax Description
ip_address
IPv6 or IPv4 address expected from the DNS server in response to the DNS probe request for a domain.
Command Modes
Command History
Usage Guidelines
A DNS probe sends a request for a domain to a DNS server. The ACE uses the IP address specified in the expect address command to decide whether to pass or fail the DNS probe for the server based on the server response. You can specify multiple IP addresses with this command by entering the command with a different address separately.
Examples
IPv6 Example
To remove an IPv6 address, use the no expect address command. For example, enter:
host1/Admin(config-probe-dns)# no expect address 2001:DB8:15::/64
IPv4 Example
To remove an IPv4 address, use the no expect address command. For example, enter:
2-1143
Related Commands
show probe
2-1144
OL-25339-01
Syntax Description
string
Expected response string from the probe destination. Enter an unquoted text string with no spaces. If the string includes spaces, enclose the string in quotes. The string can be a maximum of 255 alphanumeric characters. (Optional) Sets the number of characters into the received message or buffer where the probe starts searching for the defined expression. Enter an number from 1 to 4000. (ACE appliance only) If you do not include the cache keyword when entering this command, the number argument is from 1 to 4000. However, if you include the cache keyword, the offset maximum number is 163840.
offset number
cache
(ACE appliance only, Optional for HTTP and HTTPS probes only) Enables caching when regex parsing long web pages . By default, when you configure the expect regex command for HTTP or HTTPS probes in probe configuration mode, the ACE does not cache the web page parsed by the probes. If the web page is longer than 4kBytes and the regex matching string exceeds this length, the probe fails. (ACE appliance only, Optional) Cache length. Enter a number from 1 to 1000. The default cache length is 1000.
length
Command Modes
Finger, HTTP, HTTPS, SIP, TCP, and UDP probe configuration modes Admin and user contexts
Command History
ACE Module Release 3.0(0)A1(2) ACE Appliance Release A1(7) A3(2.7). Not applicable to A4(1.0) or A4(2.0).
Modification This command was introduced. Modification This command was introduced. Added the cache [length] option for regex parsing of long web pages.
2-1145
Usage Guidelines
When you configure a probe to expect a string from a server, it searches the response for a configured string. If the ACE finds the expected string, the server is marked as passed. If you do not configure an expected string, the ACE ignores the server response. If you configure the expect regex command for TCP probes, you must configure the send-data command. Otherwise, the probe performs a connection open and close without checking the response from the server. For HTTP or HTTPS probes, the server response must include the Content-Length header for the expect regex command to function. Otherwise, the probe does not attempt to parse the regex. (ACE appliance only) For the cache option, consider the following:
The HTML file configured with the request method command cannot exceed the length of the offset plus the length of the cache. If the file exceeds this length, the probes fail. For HTTP and HTTPS probes with active and standby ACEs that are running different software versions, any incremental changes made for the expect regex command are not synchronized. Any synchronization changes to the other ACE occur through bulk synchronization. Bulk synchronization takes place as expected.
Examples
(ACE appliance only) To configure the expected response string with caching with the default cache length of 1000, enter:
host1/Admin(config-probe-http)# expect regex test cache
Related Commands
show probe
2-1146
OL-25339-01
Syntax Description
min_number max_number
Single status code or the lower limit of a range of status codes. Enter an integer from 0 to 999. Upper limit of a range of status codes. Enter an integer from 0 to 999. When configuring a single code, reenter the min_number value.
Command Modes
FTP, HTTP, HTTPS, RTSP, SIP, and SMTP probe configuration modes Admin and user contexts
Command History
Usage Guidelines
When the ACE receives a response from the server, it expects a status code to mark a server as passed. By default, no status codes are configured on the ACE. If you do not configure a status code, any response code from the server is marked as failed. For HTTP and HTTPS, if you configure the expect-regex command without configuring a status code, the probe will pass if the regular expresion response string is present. You can specify multiple status code ranges with this command by entering the command with different ranges one at a time. Both the min_number and the max_number values can be any integer between 0 and 999 if the max_number is greater than or equal to the min_number. When the min_number and max_number values are the same, the ACE uses a single status code number.
Examples
To configure an expected status code of 200 that indicates that the HTTP request was successful, enter:
host1/Admin(config-probe-http)# expect status 200 200
2-1147
To configure multiple ranges of expected status codes from 200 to 202 and 204 to 205, configure each range separately. Enter:
host1/Admin(config-probe-http)# expect status 200 202 host1/Admin(config-probe-http)# expect status 204 205
To remove multiple ranges of expected status codes, you must remove each range separately. If you have set two different ranges (200 to 202 and 204 to 205), enter:
host1/Admin(config-probe-http)# no expect status 200 202 host1/Admin(config-probe-http)# no expect status 204 205
Related Commands
show probe
(config-probe-probe_type) faildetect
To change the number of consecutive failed probes, use the faildetect command. Use the no form of this command to reset the number of probe retries to its default. faildetect retry-count no faildetect
Syntax Description
retry_count
Consecutive number of failed probes before marking the server as failed. Enter a number from 1 to 65535. The default is 3.
Command Modes
Command History
Usage Guidelines
Before the ACE marks a server as failed, it must detect that probes have failed a consecutive number of times. By default, when three consecutive probes have failed, the ACE marks the server as failed.
2-1148
OL-25339-01
Examples
To set the number of failed probes to 5 before declaring the server as failed for a TCP probe, enter:
host1/Admin(config-probe-tcp)# faildetect 5
Related Commands
show probe
(config-probe-probe_type) hash
To configure the ACE to dynamically generate the MD5 hash value or manually configure the value, use the hash command. By default, no hash value is configured on the ACE. Use the no form of this command to configure the ACE to no longer compare the referenced hash value to the computed hash value. hash [value] no hash
Syntax Description
value
(Optional) The MD5 hash value that you want to manually configure. Enter the MD5 hash value as a hexadecimal string with exactly 32 characters (16 bytes).
Command Modes
HTTP and HTTPS probe configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
If you do not use this command to configure the hash value, the ACE does not calculate a hash value on the HTTP data returned by the probe. When you enter this command with no argument, the ACE generates the hash on the HTTP data returned by the first successful probe. If subsequent HTTP server hash responses match the generated hash value, the ACE marks the server as passed. If a mismatch occurs due to changes to the HTTP data, the probe fails and the show probe ... detail command displays an MD5 mismatch error in the Last disconnect error field. To clear the reference hash and have the ACE recalculate the hash value at the next successful probe, change the URL or method by using the request method command.
2-1149
The server response must include the Content-Length header for the hash command to function. Otherwise, the probe does not attempt to parse the hash value. You can configure the hash command on a probe using the HEAD method, however there is no data to hash and has no effect causing the probe to always succeed.
Examples
To configure the ACE to generate the hash on the HTTP data returned by the first successful probe, enter:
host1/Admin(config-probe-http)# hash
To configure the ACE to no longer compare the referenced hash value to the computed hash value, enter:
host1/Admin(config-probe-http)# no hash
Related Commands
(config-probe-probe_type) header
To configure a header field value for a probe, use the header command. Use the no form of this command to remove the header field from the probe configuration. For HTTP and HTTPS probes, the syntax is as follows: header field_name header-value field_value no header field_name For RTSP probes, the syntax is as follows: header {require | proxy-require} header-value field_value no header {require | proxy-require}
Syntax Description
field_name
(HTTP and HTTPS probes) Identifier for a standard header field. Enter a text string with a maximum of 64 alphanumeric characters. If the header field includes spaces, enclose the string in quotation marks (). You can also enter one of the following header keywords:
AcceptAccept request header Accept-CharsetAccept-Charset request header Accept-EncodingAccept-Encoding request header Accept-LanguageAccept-Language request header AuthorizationAuthorization request header Cache-ControlCache-Control general header ConnectionConnection general header
2-1150
OL-25339-01
Content-MD5Content-MD5 entity header ExpectExpect request header FromFrom request header HostHost request header If-MatchIf-Match request header PragmaPragma general header RefererReferer request header Transfer-EncodingTransfer-Encoding general header User-AgentUser-Agent request header ViaVia general header
(HTTP and HTTPS probes) Specifies the value assigned to the header field. Enter a text string with a maximum of 255 alphanumeric characters. If the value string includes spaces, enclose the string in quotation marks (). (RTSP probes) Specifies the Require header. (RTSP probes) Specifies the Proxy-Require header. (RTSP probes) Specifies the value assigned to the header field. Enter an alphanumeric string with no spaces and a maximum of 255 characters.
Command Modes
HTTP, HTTPS, and RTSP probe configuration mode Admin and user contexts
Command History
Usage Guidelines
For each HTTP or HTTPS probe in your configuration, you can configure multiple header fields.
Examples
To remove the header with the Accept-Encoding field name from the probe, enter:
host1/Admin(config-probe-http)# no header Accept-Encoding
To configure the RTSP REQUIRE header with a field value of implicit-play, enter:
host1/Admin(config-probe-rtsp)# header require header-value implicit-play
2-1151
Related Commands
show probe
2-1152
OL-25339-01
(config-probe-probe_type) interval
To change the time interval between probes, use the interval command. The time interval between probes is the frequency that the ACE sends probes to the server marked as passed. Use the no form of this command to reset the default time interval of 15 seconds. interval seconds no interval
Syntax Description
seconds
Time interval in seconds. Enter a number from 2 to 65535. The default is 15.
Command Modes
Command History
Modification This command was introduced. The default is 15. Previously, it was 120. Added the interval command for VM probes.
Modification This command was introduced. Added the interval command for VM probes.
Usage Guidelines
The open timeout value for TCP-based probes and the receive timeout value can impact the execution time for a probe. When the probe interval is less than or equal to these timeout values and the server takes a long time to respond or it fails to reply within the timeout values, the probe is skipped. When the probe is skipped, the No. Probes skipped counter through the show probe detail command increments.
Examples
Related Commands
show probe
2-1153
(config-probe-probe_type) ip address
To override the destination address that the probe uses, use the ip address command. By default, the probe uses the IP address from the real server or server farm configuration for the destination IP address. Use the no form of this command to reset the default of the probe. ip address ip_address [routed] no ip address
Syntax Description
ip_address
Destination IP address. The default is the IP address from the real server or server farm configuration. Enter a unique IPv4 address in dotted-decimal notation (for example, 192.168.12.15). (Optional) Routes the address according to the ACE internal routing table. If you are configuring a probe under a redirect server, you must configure this option. (ACE module only) Hardware-initiated SSL probes do not support this option.
routed
Command Modes
All probe-type configuration modes except scripted probe configuration mode Admin and user contexts
Command History
ACE Appliance Release A1(7) A3(2.7). Not applicable for A4(1.0). A5(1.0)
Modification This command was introduced. Support added to configure a probe under a redirect server or server farm. Added IPv6 support.
Usage Guidelines
Examples
IPv6 Example
To reset the default behavior of the probe using the IPv6 address from the real server or server farm configuration, use the no ip address command. For example, enter:
host1/Admin(config-probe-type)# no ip address
2-1154
OL-25339-01
IPv4 Example
To reset the default behavior of the probe using the IP address from the real server or server farm configuration, use the no ip address command. For example, enter:
host1/Admin(config-probe-type)# no ip address
Related Commands
show probe
2-1155
Syntax Description
ip_address
NAS IP address. Enter a unique IPv4 address in dotted-decimal notation (for example, 192.168.12.15). By default, if a NAS address is not configured for the Remote Authentication Dial-In User Service (RADIUS) probe, the ACE uses the IP address associated with the outgoing interface as the NAS address.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
If a NAS address is not configured for the RADIUS probe, the ACE performs a route lookup on the RADIUS server IP address.
Examples
Related Commands
show probe
2-1156
OL-25339-01
(config-probe-probe_type) oid
To configure an Object Identifier (OID) for an SNMP probe, use the oid command. When you enter this command, the CLI prompt changes to (config-probe-snmp-oid). For information about the commands available in probe SNMP OID configuration mode, see the Probe SNMP OID Configuration Mode Commands section. Use the no form of this command to remove the OID from the probe configuration. oid string no oid string
Syntax Description
string
OID that the probe uses to query the server for a value. Enter an unquoted string with a maximum of 255 alphanumeric characters in dotted-decimal notation. The OID string is based on the server type.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
When the ACE sends a probe with an SNMP OID query, the ACE uses the retrieved value as input to the least-loaded algorithm for load-balancing decisions. Least-loaded load balancing bases the server selection on the server with the lowest load value. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed. You can configure a maximum of eight OID queries to probe the server.
Examples
To configure the OID string .1.3.6.1.4.1.2021.10.1.3.1 and access probe SNMP OID configuration mode, enter:
host1/Admin(config-probe-snmp)# oid .1.3.6.1.4.1.2021.10.1.3.1 host1/Admin(config-probe-snmp-oid)#
2-1157
Related Commands
show probe (config-probe-snmp-oid) threshold (config-probe-snmp-oid) type absolute max (config-probe-snmp-oid) weight
2-1158
OL-25339-01
(config-probe-probe_type) open
To configure the time interval for a connection to be established through a TCP three-way handshake, use the open command. By default, when the ACE sends a probe, it waits 1 second to open and establish the connection with the server. Use the no form of this command to reset its default of 1 second. open timeout no open
Syntax Description
timeout
Command Modes
Echo TCP, Finger, FTP, HTTP, HTTPS, IMAP, POP, RTSP, scripted, SIP TCP, SMTP, TCP, and Telnet probe configuration mode Admin and user contexts
Command History
Modification This command was introduced. The default is 1. Previously, it was 10.
Usage Guidelines
The open timeout value for TCP-based probes and the receive timeout value can impact the execution time for a probe. When the probe interval is less than or equal to these timeout values and the server takes a long time to respond or it fails to reply within the timeout values, the probe is skipped. When the probe is skipped, the No. Probes skipped counter increments through the show probe detail command.
Examples
To configure the wait time interval to 25 seconds for a TCP probe, enter:
host1/Admin(config-probe-tcp)# open 25
Related Commands
show probe
2-1159
(config-probe-probe_type) passdetect
To configure the time interval to send a probe to a failed server and the number of consecutive successful probe responses required to mark the server as passed, use the passdetect command. Use the no form of this command to reset the default of waiting 60 seconds before sending out a probe to a failed server and marking a server as passed if it receives 3 consecutive successful responses. passdetect {interval seconds | count number} no passdetect {interval | count}
Syntax Description
Specifies the wait time interval in seconds. Enter a number from 2 to 65535. The default is 60. Specifies the number of successful probe responses from the server. Enter a number from 1 to 65535. The default is 3.
Command Modes
All probe-type configuration modes except scripted probe configuration mode Admin and user contexts
Command History
Modification This command was introduced. The default is 60. Previously, it was 300.
Usage Guidelines
For best results, we recommend that you do not configure a passdetect interval value of less than 30 seconds. If you configure a passdetect interval value of less than 30 seconds, the open timeout and receive timeout values are set to their default values, and a real server fails to respond to a probe, overlapping probes may result, which can cause management resources to be consumed unnecessarily and the No. Probes skipped counter to increase. After the ACE marks a server as failed, it waits a period of time and then sends a probe to the failed server. When the ACE receives a number of consecutive successful probes, it marks the server as passed. By default, the ACE waits 60 seconds before sending out a probe to a failed server and marks a server as passed if it receives 3 consecutive successful responses. The receive timeout value can impact the execution time for a probe. When the probe interval is less than or equal to this timeout value and the server takes a long time to respond or it fails to reply within the timeout value, the probe is skipped. When the probe is skipped, the No. Probes skipped counter increments through the show probe detail command.
Examples
2-1160
OL-25339-01
To configure five success probe responses from the server before declaring it as passed, enter:
host1/Admin(config-probe-tcp)# passdetect count 5
Related Commands
show probe
2-1161
(config-probe-probe_type) port
To configure the port number that the probe uses, use the port command. Use the no form of this command to reset the port number based on the probe type. port port-number no port
Syntax Description
port-number
Command Modes
All probe-type configuration modes except ICMP probe configuration mode Admin and user contexts
Command History
Modification This command was introduced. This command was revised to support probe port inheritance.
Usage Guidelines
Table 1-22 lists the default port numbers for each probe type.
Table 1-22 Default Port Numbers for Probe Types
Probe Type DNS Echo Finger FTP HTTP HTTPS ICMP IMAP POP RADIUS RTSP SIP (TCP and UDP) SMTP
Default Port Number 53 7 79 21 80 443 Not applicable 143 110 1812 554 5060 25
2-1162
OL-25339-01
If you choose not to specify a port number for a probe, the ACE can dynamically inherit the port number specified:
From the real server specified in a server farm (see the (config-sfarm-host) rserver command). From the VIP specified in a Layer 3 and Layer 4 class map (see the (config-cmap) match virtual-address command).
In this case, all you need is a single probe configuration, which will be sufficient to probe a real server on multiple ports or on all VIP ports. The same probe inherits all of the real servers ports or all of the VIP ports and creates probe instances for each port.
Note
Probe port inheritance is not applicable for the server farm predictor method, a probe assigned to a standalone real server, or a probe configured on the active FT group member in a redundant configuration. For a Layer 3 and Layer 4 class map, a VIP port will be inherited only if a match command consists of a single port. If you specify a wildcard value for the IP protocol value (the any keyword) or a port range for the port, port inheritance does not apply for those match statements. The order of precedence for inheriting the probe's port number is as follows:
1. 2. 3. 4.
Probe's configured port Server farm real server's configured port VIP's configured port Probe's default port
For example, if the configured probe does not contain a specified port number, the ACE will look for the configured port associated with the real server specified in a server farm. If a port number is not configured, the ACE looks for the configured port associated with the VIP specified in a Layer 3 and Layer 4 class map. If a port number is also not configured, the ACE then uses the probe's default port to perform health monitoring on the back-end real server.
Examples
To reset the port number to its default, in this case, port 80 for an HTTP probe, enter:
host1/Admin(config-probe-HTTP)# no port
Related Commands
show probe
2-1163
(config-probe-probe_type) receive
To configure the time period that the ACE expects to receive a server response to the probe, use the receive command. Use the no form of this command to reset its default of 10 seconds. receive seconds no receive
Syntax Description
seconds
Time to wait in seconds. Enter an integer from 1 to 65535. The default is 10.
Command Modes
Command History
Usage Guidelines
By default, when the ACE sends a probe, it expects a response within a time period of 10 seconds. For example, for an HTTP probe, the timeout period is the number of seconds to receive an HTTP reply for a GET or HEAD request. If the server fails to respond to the probe, the ACE marks the server as failed. The open timeout value for TCP-based probes and the receive timeout value can impact the execution time for a probe. When the probe interval is less than or equal to these timeout values and the server takes a long time to respond or it fails to reply within the timeout values, the probe is skipped. When the probe is skipped, the No. Probes skipped counter increments through the show probe detail command.
Examples
To configure the timeout period for a response at 5 seconds for a TCP probe, enter:
host1/Admin(config-probe-TCP)# receive 5
To reset the time period to receive a response from the server to its default of 10 seconds, enter:
host1/Admin(config-probe-TCP)# no receive
Related Commands
show probe
2-1164
OL-25339-01
Syntax Description
command
Request command for the probe. Enter a text string with a maximum of 32 alphanumeric characters with no spaces.
Command Modes
IMAP and POP probe configuration modes Admin and user contexts
Command History
Usage Guidelines
You must configure the name of the mailbox using the (config-probe-probe_type) credentials command before you configure the request command used by an IMAP probe or the ACE will ignore the specified request command.
Examples
Related Commands
show probe
2-1165
Syntax Description
(HTTP or HTTPS probe) Configures the HTTP GET request method to direct the server to get the page. This method is the default. (HTTP or HTTPS probe) Configures the HTTP HEAD request method to direct the server to get only the header for the page. (HTTP or HTTPS probe) Specifies the URL string used by the probe. Enter an alphanumeric string with a maximum of 255 characters. The default string is a forward slash (/). (RTSP or SIP probe) Specifies the OPTIONS request method. This is the default method. The ACE uses the asterisk (*) request URL for this method. (RTSP probe) Specifies the DESCRIBE request method. The url_string is the URL request for the RTSP media stream on the server. Enter an alphanumeric string with a maximum of 255 characters.
options
Command Modes
HTTP, HTTPS, RTSP, and SIP probe configuration modes Admin and user contexts
Command History
2-1166
OL-25339-01
Usage Guidelines
By default, the HTTP request method is a GET with the URL of a forward slash (/). If you do not configure a URL, the HTTP or HTTPS probe functions as a TCP probe. By default, the RTSP request method is the OPTIONS method. You can also configure the DESCRIBE method. By default, the SIP request method is the OPTIONS method; this method is the only method available for SIP probes.
Examples
To configure the HTTP HEAD request method and the /digital/media/graphics.html URL used by an HTTP probe, enter:
host1/Admin(config-probe-http)# request method head url /digital/media/graphics.html
To reset the HTTP method for the probe to HTTP GET with a URL of /, enter:
host1/Admin(config-probe-http)# no request method head url /digital/media/graphics.html
To reset the default RTSP request method (OPTIONS), use the no request method or the request method options command. For example, enter:
host1/Admin(config-probe-rtsp)# no request method
Related Commands
(config-probe-probe_type) script
To specify the script name and the arguments to be passed to a scripted probe, use the script command. Use the no form of this command to remove the script and its arguments from the configuration. script script_name [script_arguments] no script
2-1167
Syntax Description
script_name script_arguments
Name of the script. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. (Optional) Data sent to the script. Enter a text string with a maximum of 255 alphanumeric characters including spaces and quotes. Separate each argument by a space. If a single argument contains spaces, enclose the argument string in quotes.
Command Modes
Command History
Usage Guidelines
Scripted probes run probes from a configured script to perform health probing. You can also configure arguments that are passed to the script. Before you can associate a script file with a probe, you must copy and load the script on the ACE. For information about TCL scripts and instructions for copying and loading script files on the ACE, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine. The ACE allows the configuration of 256 unique script files. The ACE can simultaneously execute only 200 scripted probe instances. When this limit is exceeded, the show probe detail command displays the Out-of Resource: Max. script-instance limit reached error message in the Last disconnect err field and the out-of-sockets counter increments.
Examples
To configure the script name of PROBE-SCRIPT and arguments of double question marks (??), enter:
host1/Admin(config-probe-scrptd)# script PROBE-SCRIPT ??
To remove the script and its arguments from the configuration, enter:
host1/Admin(config-probe-scrptd)# no script
Related Commands
(config-probe-probe_type) send-data
To configure the ASCII data that the probe sends when the ACE connects to the server, use the send-data command. Use the no form of this command to remove the data from the configuration.
2-1168
OL-25339-01
Syntax Description
expression
ASCII data that the probe sends. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters.
Command Modes
ECHO, Finger, TCP, and UDP probe configuration modes Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
If you do not configure the send-data command for a UDP probe, the probe sends one byte, 0x00. When you configure the expect regex command for a TCP probe, you must configure the send-data command for the expect function to work. Otherwise, the TCP probe makes a socket connection and disconnects without checking the data.
Examples
Related Commands
show probe
2-1169
Syntax Description
RSA_ANY cipher_suite
Specifies that the probe accepts any of the RSA configured cipher suites. This is the default. RSA cipher suite that the probe expects from the back-end server. Enter one of the following keywords: RSA_EXPORT1024_WITH_DES_CBC_SHA RSA_EXPORT1024_WITH_RC4_56_MD5 RSA_EXPORT1024_WITH_RC4_56_SHA RSA_EXPORT_WITH_DES40_CBC_SHA RSA_EXPORT_WITH_RC4_40_MD5 RSA_WITH_3DES_EDE_CBC_SHA RSA_WITH_AES_128_CBC_SHA RSA_WITH_AES_256_CBC_SHA RSA_WITH_DES_CBC_SHA RSA_WITH_RC4_128_MD5 RSA_WITH_RC4_128_SHA
Command Modes
Command History
Usage Guidelines
Examples
To configure the HTTPS probes with the RSA_WITH_RC4_128_SHA cipher suite, enter:
host1/Admin(config-probe-https)# ssl cipher RSA_WITH_RC4_128_SHA
To reset the default of the HTTPS probes accepting any RSA cipher suite, enter:
host1/Admin(config-probe-https)# ssl cipher RSA_ANY
Related Commands
show probe
2-1170
OL-25339-01
Syntax Description
Configures the probe to support all SSL versions. Configures the probe to support SSL version 3. This is the default. Configures the probe to support TLS version 1.
Command Modes
Command History
Usage Guidelines
The version in the ClientHello message sent to the server indicates the highest supported version.
Examples
Related Commands
show probe
(config-probe-probe_type) version
To configure the version of SNMP that the probe supports, use the version command. Use the no form of this command to reset the version to its default value of SNMP version 1. version {1 | 2c} no version
2-1171
Syntax Description
1 2c
Configures the probe to support SNMP version 1. This is the default. Configures the probe to support SNMP version 2c.
Command Modes
Command History
Usage Guidelines
The version in the SNMP OID query sent to the server indicates the supported SNMP version. By default, the probe supports SNMP version 1.
Examples
To reset the version of SNMP to the default value, SNMP version 1, enter:
host1/Admin(config-probe-snmp)# no version
Related Commands
show probe
2-1172
OL-25339-01
Syntax Description
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To force the SIP server to send the 200 OK message from the destination port of the probe request OPTIONS method, enter:
host1/Admin(config-probe-sip-udp)# rport enable
Related Commands
show probe
2-1173
Syntax Description
string
OID that the probe uses to query the server for a value. Enter an unquoted string with a maximum of 255 alphanumeric characters in dotted-decimal notation. The OID string is based on the server type.
Command Modes
Command History
Usage Guidelines
When the ACE sends a probe with an SNMP OID query, the ACE uses the retrieved value as input to the least-loaded algorithm for load-balancing decisions. Least-loaded load balancing bases the server selection on the server with the lowest load value. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed. You can configure a maximum of eight OID queries to probe the server.
Examples
To configure the OID string .1.3.6.1.4.2021.10.1.3.1 and access probe SNMP OID configuration mode, enter:
host1/Admin(config-probe-snmp)# oid .1.3.6.1.4.2021.10.1.3.1 host1/Admin(config-probe-snmp-oid)#
2-1174
OL-25339-01
Related Commands
show probe (config-probe-snmp-oid) threshold (config-probe-snmp-oid) type absolute max (config-probe-snmp-oid) weight
2-1175
(config-probe-snmp-oid) threshold
To specify the threshold value for an OID, use the threshold command. Use the no form of this command to remove the threshold value. threshold integer no threshold integer
Syntax Description
integer
Threshold value to take the server out of service. When the OID value is based on a percentile, enter an integer from 0 to 100, with a default value of 100. When the OID is based on an absolute value, the threshold range is from 1 to the maximum value specified using the type absolute max command.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can configure a threshold for an OID value so that when the threshold is exceeded, the server is taken out of service. When the ACE sends a probe with an SNMP OID query, the ACE uses the retrieved value as input to the least-loaded algorithm for load-balancing decisions. Least-loaded load balancing bases the server selection on the server with the lowest load value. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed. By default, the OID value is based on a percentile. If you use the type absolute maximum command to base the OID on an absolute value, the threshold range is from 1 to the maximum value specified with the type absolute maximum command.
Examples
2-1176
OL-25339-01
Related Commands
show probe (config-probe-probe_type) oid (config-probe-snmp-oid) type absolute max (config-probe-snmp-oid) weight
2-1177
Syntax Description
integer
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
When the ACE sends a probe with an SNMP OID query, the ACE uses the retrieved value as input to the least-loaded algorithm for load-balancing decisions. By default, the ACE assumes that the retrieved OID value is a percentile value. Least-loaded load balancing bases the server selection on the server with the lowest load value. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed. When you configure the type absolute max command, we recommend that you also configure the value for the threshold command because the default threshold value is 100 and is not automatically adjusted with respect to the type absolute max value. The no type command resets the values of both the type absolute max command and the threshold command to a value of 100.
Examples
To remove the OID value and reset the expected OID to a percentile, enter:
host1/Admin(config-probe-snmp-oid)# no type
2-1178
OL-25339-01
Related Commands
2-1179
(config-probe-snmp-oid) weight
To configure the weight to be assigned to this OID for the SNMP probe, use the weight command. Use the no form of this command to remove the weight. weight number no weight
Syntax Description
number
Weight value assigned to this OID for the SNMP probe. Enter an integer from 0 to 16000.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
If you configure more than one OID and they are used in a load-balancing decision, you must configure a weight value. When the ACE sends a probe with an SNMP OID query, the ACE uses the retrieved value as input to the least-loaded algorithm for load-balancing decisions. Least-loaded load balancing bases the server selection on the server with the lowest load value. If the retrieved value is within the configured threshold, the server is marked as passed. If the threshold is exceeded, the server is marked as failed.
Examples
Related Commands
show probe (config-probe-probe_type) oid (config-probe-snmp-oid) threshold (config-probe-snmp-oid) type absolute max
2-1180
OL-25339-01
Syntax Description
probe_name
Unique identifier of the probe that the ACE uses to poll the vCenter for the load of the local VMs. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When the ACE sends a VM probe to a VM controller to retrieve the load of the local VMs, the ACE uses the retrieved load value to make a decision about bursting traffic to the remote data center. If the retrieved load equals or exceeds the configured load threshold, the ACE bursts traffic to the remote data center while it continues to load balance traffic to the local data center. When the VM load drops below the configured threshold for CPU and memory usage, the ACE load balances traffic only to the local data center. The VM probe is not supported with IPv6.
Examples
To remove the VM probe and all its attributes from the ACE configuration, enter the following command:
host1/Admin(config)# no probe vm
2-1181
Related Commands
(config-probe-vm) interval
To specify the frequency with which the ACE sends probes to the VM controller, use the interval command. Use the no form of this command to remove the threshold value. interval value no interval value
Syntax Description
value
Specifies the elapsed time between probes. Enter the time interval in seconds as an integer from 300 to 65535. The default is 300 seconds (5 minutes).
Command Modes
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To configure the ACE to send a probe to the VM controller every 420 seconds (7 minutes), enter the following command:
host1/Admin(config-probe-vm)# interval 420
To reset VM probe interval to the default value of 300 seconds (5 minutes), enter the following command:
host1/Admin(config-probe-vm)# no interval
Related Commands
2-1182
OL-25339-01
(config-probe-vm) load
To specify the interesting load of the local VMs, use the load command. You can specify CPU usage, memory usage, or both. Use the no form of this command to remove the load from the configuration. load {cpu | mem} burst-threshold {max value min value} no load {cpu | mem} burst-threshold {max value min value}
Syntax Description
Specifies the type of load information that the VM controller sends back to the ACE in response to the VM probe. You can specify that the probe poll the VM controller for load information based on CPU usage, memory usage, or both. The default behavior is for the probe to check either the CPU usage or the memory usage against the maximum threshold value. Whichever load type reaches its maximum threshold value first causes the ACE to burst traffic to the remote data center. The VM controller returns the load information of each VM in the local data center to the probe. The ACE ignores any physical servers in the server farm. Specifies the threshold values that determine when the ACE starts and stops bursting traffic through the local DCI device over the DCI link to the remote data center. Enter a maximum and a minimum threshold value as a load percentage from 1 to 99. The default value is 99 percent for both the max and the min keywords. A maximum burst threshold value of 1 percent instructs the ACE to always burst traffic to the remote data center. A maximum burst threshold value of 99 percent instructs the ACE to always load balance traffic to the local VMs unless the load value is equal to 100 percent or the VMs are not in the OPERATIONAL state. If the average load value returned by the VM controller is greater than or equal to the maximum threshold value, the ACE starts bursting traffic to the remote data center. When the load value returned by the VM controller is less than the minimum threshold value, the ACE stops bursting traffic to the remote data center and load balances traffic to the local VMs. Any active connections to the remote data center are allowed to complete.
Command Modes
Command History
2-1183
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To instruct the ACE to start bursting traffic to the remote datacenter when the local average VM load exceeds 80 percent CPU usage and to stop bursting traffic when the local average CPU usage drops below 50 percent, enter the following command:
host1/Admin(config-probe-vm)# load cpu burst-threshold max 80 min 50
You can configure an additional load command under the same VM probe to create an OR statement between the CPU usage and the memory usage of the local VMs. Whichever load type reaches its maximum threshold first will cause the ACE to burst traffic to the remote data center. For example, enter the following commands:
host1/Admin(config-probe-vm)# load cpu burst-threshold max 80 min 50 host1/Admin(config-probe-vm)# load mem burst-threshold max 70 min 40
In this case, if the average CPU usage reaches 80 percent or the average memory usage reaches 70 percent, the ACE bursts traffic to the remote data center. The ACE does not stop bursting traffic to the remote data center until both the CPU load and the memory load drop below their respective minimum configured values. To reset the VM probe behavior to the default of checking the average VM CPU usage and memory usage against the maximum and minimum threshold values of 99 percent each, enter the following command:
host1/Admin(config-probe-vm)# no load cpu burst-threshold max 80 min 50 host1/Admin(config-probe-vm)# no load mem burst-threshold max 70 min 40
Related Commands
2-1184
OL-25339-01
(config-probe-vm) vm-controller
To identify the VM controller for the probe, use the vm-controller command . Use the no form of this command to remove the VM controller name from the VM probe configuration. vm-controller name no vm-controller name
Syntax Description
name
Identifier of the existing VM controller that you previously configured. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the probe feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To remove the VM controller name from the VM probe configuration, enter the following command:
host1/Admin(config-probe-vm)# no vm-controller VCENTER_1
Related Commands
2-1185
Syntax Description
group_name
Group of RADIUS servers. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a named server group. You group the different AAA server hosts into distinct lists. The ACE searches for the server hosts in the order in which you specify them within a group. You can configure a maximum of 10 server groups for each context in the ACE. You can configure server groups at any time, but you must enter the aaa authentication login or the aaa accounting default command to apply them to the AAA service.
Examples
2-1186
OL-25339-01
Related Commands
2-1187
(config-radius) deadtime
To specify a dead-time interval for the Remote Authentication Dial-In User Service (RADIUS) server group, use the deadtime command. Use the no form of this command to reset the RADIUS server group dead-time request to its default of 0. deadtime minutes no deadtime minutes
Syntax Description
minutes
Length of time that the ACE skips a nonresponsive RADIUS server for transaction requests. Valid entries are from 0 to 1440 (24 hours). The default is 0.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Use of the deadtime command causes the ACE to mark as dead any RADIUS servers that fail to respond to authentication requests. Entering this command prevents the wait for the request to time out before trying the next configured server. The ACE skips a RADIUS server that is marked as dead by additional requests for the duration of minutes. During the dead-time interval, the ACE sends probe access-request packets to verify that the RADIUS server is available and can receive authentication requests. The dead-time interval starts when the server does not respond to an authentication request transmission. When the server responds to a probe access-request packet, the ACE retransmits the authentication request to the server.
Examples
To globally configure a 15-minute dead-time interval for RADIUS servers that fail to respond to authentication requests, enter:
host1/Admin(config) aaa group server radius RADIUS_Server_Group1 host1/Admin(config-radius)# deadtime 15
Related Commands
2-1188
OL-25339-01
(config-radius) server
To specify the IP address of one or more previously configured Remote Authentication Dial-In User Service (RADIUS) servers that you want added to or removed from a server group, use the server command. Use the no form of this command to remove the RADIUS server from the AAA server group. server ip_address no server ip_address
Syntax Description
ip_address
IP address of the RADIUS server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can add multiple RADIUS servers to the AAA server group by entering multiple server commands in this mode. The same server can belong to multiple server groups.
Examples
Related Commands
2-1189
Syntax Description
name host
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the real server is a typical server that provides web services and content.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the rserver feature in your user role unless otherwise specified. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. All servers in a server farm should be of the same type: host or redirect.
Examples
2-1190
OL-25339-01
Related Commands
(config-sfarm-host) rserver
(config-rserver-host) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a host real server, use the conn-limit command. Use the no form of this command to reset the maximum number of connections and the minimum connection threshold for a real server to the default of 4000000. conn-limit max max-conns min min-conns no conn-limit max
Syntax Description
max maxconns
Specifies the maximum number of connections allowed for this real server.
For the ACE module, enter an integer from 2 to 4000000. For the ACE appliance, enter an integer from 1 to 4000000.
The default is 4000000. min minconns Specifies the connection threshold below which the real server will start accepting connections again after the number of connections exceeds the configured maximum number of connections.
For the ACE module, enter an integer from 2 to 4000000. For the ACE appliance, enter an integer from 1 to 4000000.
Command Modes
Command History
Usage Guidelines
Use this command to specify the maximum number of connections and the minimum connection threshold for a real server. The minconns value must be less than or equal to the maxconns value. When the number of connections to a real server reaches the maxconns value, the ACE stops sending connections to that server and assigns it a state of OUTOFSERVICE. The ACE uses the minconns value as a threshold for load balancing to start accepting connections again after the maxconns limit is reached.
2-1191
Examples
To configure the maximum number of connections and the minimum connection threshold for a real server, enter:
host1/Admin(config-rserver-host)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a real server to the default of 4000000, enter:
host1/Admin(config-rserver-host)# no conn-limit
Related Commands
(config-rserver-host) rate-limit
2-1192
OL-25339-01
(config-rserver-host) description
To configure a description for a real server, use the description command. Use the no form of this command to remove the real server description from the configuration. description text no description
Syntax Description
text
User-defined description of the real server and related information. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1193
(config-rserver-host) fail-on-all
To configure a real server to remain in the OPERATIONAL state unless all probes associated with it fail (AND logic), use the fail-on-all command in real server host configuration mode. This command is applicable to all probe types. The syntax of this command is: fail-on-all no fail-on-all
Syntax Description
Command Modes
Command History
Usage Guidelines
Examples
To configure the SERVER1 real server to remain in the OPERATIONAL state unless all associated probes fail, enter the following commands:
host1/Admin(config)# rserver SERVER1 host1/Admin(config-rserver-host)# ip address 2001:DB8:1::1 or host1/Admin(config-rserver-host)# ip address 192.168.12.15 host1/Admin(config-rserver-host)# probe HTTP_PROBE host1/Admin(config-rserver-host)# probe ICMP_PROBE host1/Admin(config-rserver-host)# fail-on-all
To remove the AND probe logic from the real server and return the behavior to the default of OR logic, enter the following command:
host1/Admin(config-rserver-host)# no fail-on-all
Related Commands
2-1194
OL-25339-01
(config-rserver-host) inservice
To place a real server in service, use the inservice command in real server host configuration mode. Use the no form of this command to gracefully shut down a real server. inservice no inservice
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the real-inservice feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the no form of this command to shut down a real server gracefully for maintenance or software upgrades. When you enter this command, the ACE tears down all non-TCP connections. For TCP connections, the ACE allows existing connections to end before taking the server out of service. No new connections are allowed. To place the real server back in service, use the inservice command. The ACE resets all SSL connections to a particular real server when you enter the no inservice command for that server.
Examples
Related Commands
2-1195
(config-rserver-host) ip address
To configure an IPv6 or an IPv4 address for a real server, use the ip address command in real server host configuration mode. Use the no form of this command to remove the real server IP address from the configuration. ip address ip-address no ip address
Syntax Description
ip-address
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Use this command to provide a unique IP address for a real server. The address that you choose must not be a VIP of an existing virtual server.
Caution
Do not configure under a real server a peer IPv6 address that is calculated from EUI64. In a redundant configuration, if you configure a peer IPv6 address as EUI64 on an interface, the address will not be learned by the active member of an FT group because the address is calculated only on the peer. If you then configure the same calculated IPv6 address on the active under a real server, the CLI accepts it because it does not calculate it. This IPv6 address is not synced to the standby because it conflicts with the interface address. If you subsequently apply a probe to the real server, the state of the real server is PROBE-FAILED on the active and OUTOFSERVICE on the the standby. This same check applies to VIPs, routes, interfaces, and probes.
Examples
IPv6 Example
To delete the real server IPv6 address from the configuration, enter:
host1/Admin(config-rserver-host)# no ip address 2001:DB8:1::1
IPv4 Example
2-1196
OL-25339-01
To delete the real server IPv4 address from the configuration, enter:
host1/Admin(config-rserver-host)# no ip address 192.168.12.6
Related Commands
2-1197
(config-rserver-host) probe
To configure a probe to monitor the health of a real server, use the probe command. Use the no form of this command to remove the probe from the real server. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to assign to a real server to monitor its health. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1198
OL-25339-01
(config-rserver-host) rate-limit
To configure a limit for the connection rate and the bandwidth rate of a real server, use the rate-limit command. The connection rate is the number of connections per second received by the ACE and applies only to the new connections destined to a real server. The bandwidth rate is the number of bytes per second and applies to the network traffic exchanged between the ACE and the real server in both directions. Use the no form of this command to revert to the ACE default of not limiting the connection rate or bandwidth rate of real servers. rate-limit {connection number1 | bandwidth number2} no rate-limit {connection | bandwidth}
Syntax Description
connection number1
For the ACE module, enter an integer from 2 to 350000. For the ACE appliance, enter an integer from 1 to 350000.
There is no default value. bandwidth number2 Specifies the real server bandwidth-rate limit in bytes per second.
For the ACE module, enter an integer from 4 to 300000000. For the ACE appliance, enter an integer from 1 to 300000000.
Command Modes
Command History
Modification This command was introduced. The lowest real server bandwidth-rate limit was changed from 2 to 4.
Usage Guidelines
For a real server that is associated with more than one server farm, the ACE uses the aggregated connection rate or bandwidth rate to determine whether the real server has exceeded its rate limits. If the connection rate or the bandwidth rate of incoming traffic destined for a particular server exceeds the configured rate of the server, the ACE blocks any further traffic destined to that real server until the connection rate or bandwidth rate drops below the configured limit. Also, the ACE removes the blocked real server from future load-balancing decisions. You can also limit the connection rate and the bandwidth rate at the virtual server level in a connection parameter map. For details, see the Security Guide, Cisco ACE Application Control Engine.
2-1199
Examples
To limit the connection rate of a real server to 100,000 connections per second, enter:
host1/Admin(config-rserver-host)# rate-limit connection 100000
To revert to the ACE default of not limiting the real-server connection rate, enter:
host1/Admin(config-rserver-host)# no rate-limit connection
To limit the real-server bandwidth rate to 5,000,000 bytes per second, enter:
host1/Admin(config-rserver-host)# rate-limit bandwidth 5000000
Related Commands
(config-rserver-host) conn-limit
2-1200
OL-25339-01
(config-rserver-host) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight command. The weight value that you specify for a server is used in the weighted round-robin and least-connections predictor load-balancing methods. Use the no form of this command to reset the real server weight to the default. weight number no weight
Syntax Description
number
Weight value assigned to a real server in a server farm. This value is used in the weighted round-robin and least-connections predictor load-balancing algorithms. Enter an integer from 0 to 100. The default is 8.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Servers with a higher configured weight value have a higher priority with respect to connections than servers with a lower weight. For example, a server with a weight of 5 would receive five connections for every one connection received by a server with a weight of 1. To specify different weight values for a real server in a server farm, you can assign multiple IP addresses to the server. You can also use the same IP address of a real server with different port numbers. Server weights take effect only when there are open connections to the servers. When there are no sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin method.
Examples
Related Commands
2-1201
Syntax Description
name
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Real feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. All servers in a server farm should be of the same type: host or redirect.
Examples
2-1202
OL-25339-01
Related Commands
(config-rserver-redir) webhost-redirection
2-1203
(config-rserver-redir) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a real server, use the conn-limit command. Use the no form of this command to reset the maximum number of connections and the minimum connection threshold for a real server to the default of 4000000. conn-limit max max-conns min min-conns no conn-limit max
Syntax Description
max max-conns
Specifies the maximum number of connections allowed for this real server.
For the ACE module, enter an integer from 2 to 4000000. For the ACE appliance, enter an integer from 1 to 4000000.
The default is 4000000. min min-conns Specifies the connection threshold below which the real server will start accepting connections again after the number of connections exceeds the configured maximum number of connections.
For the ACE module, enter an integer from 2 to 4000000. For the ACE appliance, enter an integer from 1 to 4000000.
Command Modes
Command History
Usage Guidelines
Use this command to specify the maximum number of connections and the minimum connection threshold for a real server. The minconns value must be less than or equal to the maxconns value. When the number of connections to a real server reaches the maxconns value, the ACE stops sending connections to that server and assigns it a state of OUTOFSERVICE. The ACE uses the minconns value as a threshold for load balancing to start accepting connections again after the maxconns limit is reached.
Examples
To configure the maximum number of connections and the minimum connection threshold for a real server, enter:
host1/Admin(config-rserver-redir)# conn-limit maxconns 65535 minconns 40000
2-1204
OL-25339-01
To reset the maximum number of connections and the minimum connection threshold for a real server of type redirect to the default of 4000000, enter:
host1/Admin(config-rserver-redir)# no conn-limit
Related Commands
2-1205
(config-rserver-redir) description
To configure a description for a real server, use the description command. Use the no form of this command to remove the real server description from the configuration. description text no description
Syntax Description
text
User-defined description of the real server and related information. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Use this command to provide a unique description for the real server with a maximum of 240 characters.
Examples
Related Commands
2-1206
OL-25339-01
(config-rserver-redir) inservice
To place a real server in service, use the inservice command. Use the no form of this command to remove the real server from service. inservice no inservice
Syntax Description
Command Modes
Command History
Usage Guidelines
This command requires the real-inservice feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. Use the no form of this command to shut down a real server gracefully for maintenance or software upgrades. When you enter this command, the ACE tears down all non-TCP connections. For TCP connections, the ACE allows existing connections to end before taking the server out of service. No new connections are allowed. To place the real server back in service, use the inservice command.
Examples
Related Commands
2-1207
(config-rserver-redir) probe
To configure a probe to monitor the health of a real server, use the probe command. Use the no form of this command to remove the probe from the real server. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to assign to a real server to monitor its health. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
ACE Module Release A2(3.2). Not applicable for A4(1.0). ACE Appliance Release A3(2.7). Not applicable for A4(1.0).
Usage Guidelines
You can associate multiple probes with each real server. You can only configure probes with an IP address in routed mode under a redirect server. You cannot associate a scripted probe with a redirect server.
Examples
Related Commands
(config-probe-probe_type) ip address
2-1208
OL-25339-01
(config-rserver-redir) rate-limit
To configure a limit for the connection rate and the bandwidth rate of a real server, use the rate-limit command. The connection rate is the number of connections per second received by the ACE and applies only to the new connections destined to a real server. The bandwidth rate is the number of bytes per second and applies to the network traffic exchanged between the ACE and the real server in both directions. Use the no form of this command to revert to the ACE default of not limiting the connection rate or bandwidth rate of real servers. rate-limit {connection number1 | bandwidth number2} no rate-limit {connection | bandwidth}
Syntax Description
Specifies the real server connection-rate limit in connections per second. Enter an integer from 2 to 350000. There is no default value. Specifies the real server bandwidth-rate limit in bytes per second. Enter an integer from 2 to 300000000. There is no default value.
Command Modes
Command History
Usage Guidelines
For a real server that is associated with more than one server farm, the ACE uses the aggregated connection rate or bandwidth rate to determine whether the real server has exceeded its rate limits. If the connection rate or the bandwidth rate of incoming traffic destined for a particular server exceeds the configured rate of the server, the ACE blocks any further traffic destined to that real server until the connection rate or bandwidth rate drops below the configured limit. Also, the ACE removes the blocked real server from future load-balancing decisions. You can also limit the connection rate and the bandwidth rate at the virtual server level in a connection parameter map. For details, see the Security Guide, Cisco ACE Application Control Engine.
Examples
To limit the connection rate of a real server to 100,000 connections per second, enter:
host1/Admin(config-rserver-redir)# rate-limit connection 100000
To revert to the ACE default of not limiting the real-server connection rate, enter:
host1/Admin(config-rserver-redir)# no rate-limit connection
2-1209
To limit the real-server bandwidth rate to 5,000,000 bytes per second, enter:
host1/Admin(config-rserver-redir)# rate-limit bandwidth 5000000
Related Commands
(config-rserver-redir) conn-limit
(config-rserver-redir) webhost-redirection
To configure the relocation URL string used for redirection, use the webhost-redirection command. You can configure a port number to redirect a request in the relocation string. Use the no form of this command to remove the real server redirection URL string from the configuration. webhost-redirection relocation_string [301 | 302] no webhost-redirection
Syntax Description
relocation_string
URL string used to redirect requests to another server. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. The redirection string supports the following special characters:
%hInserts the hostname from the request Host header %pInserts the URL path string from the request
Note
To insert a question mark (?) in the relocation string, press Ctrl-v before you type the question mark.
[301 | 302]
(Optional) Specifies the redirection status code returned to a client. The codes indicate the following:
301The requested resource has been moved permanently. For future references to this resource, the client should use one of the returned URIs. 302(Default) The requested resource has been found but has been moved temporarily to another location. For future references to this resource, the client should continue to use the request URI because the resource may be moved to other locations from time to time.
For more information about redirection status codes, see RFC 2616.
Command Modes
2-1210
OL-25339-01
Command History
Usage Guidelines
Enter this command only on a real server that you have configured as a redirection server.
Examples
Related Commands
2-1211
Syntax Description
name
Name assigned to the new resource class. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. You can also use the resource class called default.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. After you create and configure the class, use the (config-context) member command in context configuration mode to assign a context to the class.
Examples
To create a resource-class called RC1 and enter resource configuration mode, enter:
host1/C1(config)# resource-class RC1 host1/C1(config-resource)
Related Commands
(config-context) member
2-1212
OL-25339-01
(config-resource) limit-resource
To limit system resources for all members of a resource class, use the limit-resource command. Use the no form of this command to restore the default resource settings for all resources or individual resources for all members (contexts) of a resource class. limit-resource {acl-memory | all | buffer syslog | conc-connections | http-comp | mgmt-connections | proxy-connections | rate {bandwidth | connections | inspect-conn | mac-miss | mgmt-traffic | ssl-connections | syslog} | regexp | sticky | xlates} {minimum number} {maximum {equal-to-min | unlimited}} no limit-resource {acl-memory | all | buffer {syslog} | conc-connections | http-comp | mgmt-connections | proxy-connections | rate {bandwidth | connections | inspect-conn | mac-miss | mgmt-traffic | ssl-connections | syslog | to-cp-ipcp} | regexp | sticky | xlates}
Syntax Description
Limits memory allocated for ACLs. Limits all resources to the specified value for all contexts assigned to this resource class. Limits the amount of buffering for syslog messages. Limits the number of simultaneous connections. Limits the HTTP compression rate. Limits the number of management connections. Limits the number of proxy connections. Limits the resource as a number per second for the following:
bandwidthLimits context throughput in bytes per second. connectionsLimits the number of connections of any kind per second. inspect connLimits the number of application protocol inspection connections per second for Domain Name System (DNS), File Transfer Protocol (FTP), HTTP Deep Packet, Internet Control Message Protocol (ICMP), Internet Locator Service (ILS), Real-Time Streaming Protocol (RTSP)Skinny Client Control Protocol (SCCP), and Session Initiation Protocol (SIP). mac-missLimits the ACE traffic sent to the control plane when the encapsulation is not correct in packets per second. mgmt-trafficLimits the management traffic in bytes per second. ssl-connectionsLimits the number of SSL connections per second. syslogLimits the number of syslog messages per second. to-cp-ipcp(ACE module only) Limits the IPCP traffic from the DP to the CP in packets per second. This keyword prevents the overwhelming of the CP under high syslog rate conditions (for example, level 7 messages).
regexp
2-1213
sticky
Limits the number of entries in the sticky table. You must configure a minimum value for sticky to allocate resources for sticky entries, because the sticky software receives no resources under the unlimited setting. Limits the number of network and port address translations entries. Specifies the lowest acceptable value. Enter an integer from 0.00 to 100.00 percent (two-decimal places of granularity). The number argument specifies a percentage value for all contexts that are members of the class. When used with the rate keyword, the number argument specifies a value per second. Specifies the maximum resource value: either the same as the minimum value or no limit.
Command Modes
Command History
Modification This command was introduced. This command was modified to add the http-comp keyword for compression. Also, added the rate to-cp-ipcp keyword. Modification This command was introduced. Added the rate to-cp-ipcp keyword.
Usage Guidelines
You can limit all resources or individual resources for all members (contexts) of a resource class. For example, you can limit only concurrent connections, probes, or sticky table entries. For details about the system resource maximum values when you use the limit-resource command, see the Virtualization Guide, Cisco ACE Application Control Engine If you lower the limits for one context (context A) to increase the limits of another context (context B), you may experience a delay in the configuration change because the ACE will not lower the limits of context A until the resources are no longer being used by the context. The limit that you set for individual resources when you use the limit-resource command overrides the limit that you set for all resources when you use the limit-resource all command. When you enter the no limit-resource all command, all ACE contexts associated with the resource class are left without resources that are not separately configured with a minimum limit in the resource class. The CLI displays the following message:
Warning: The context(s) associated with this resource-class will be denied of all the resources that are not explicitly configured with minimum limit in this resource-class
2-1214
OL-25339-01
Examples
To allocate 20 percent of all resources (minimum and maximum) to all member contexts of the resource class, enter:
(config-resource)# limit-resource all minimum 20% maximum equal-to-min
To restore resource allocation to the default of 0 percent minimum and 100 percent maximum for all resources to all member contexts, enter:
(config-resource)# no limit-resource all
Related Commands
2-1215
Syntax Description
name
Identifier associated with a user role. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the context Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. If you do not assign a user role to a new user, the default user role is Network-Monitor. For users that you create in the Admin context, the default scope of access is the entire device. For users that you create in other contexts, the default scope of access is the entire context. If you need to restrict a users access, you must assign a role-domain pair using the (config) username command.
Examples
Related Commands
2-1216
OL-25339-01
(config-role) description
To enter a description for the role, use the description command. Use the no form of this command to remove the role description from the configuration. description text no description
Syntax Description
text
Description for the role. Enter a description as an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1217
(config-role) rule
To assign privileges on a per-feature basis to a role, use the rule command. You can limit the features that a user has access to and the commands that the user can enter for that feature by configuring rules for roles. Use the no form of this command to remove the rule from a user role. rule number {{permit | deny} {create | debug | modify | monitor} [feature {AAA | access-list | changeto | config-copy | connection | dhcp | exec-commands | fault-tolerant | inspect | interface | loadbalance | nat | pki | probe | real-inservice | routing | rserver | serverfarm | ssl | sticky | syslog | vip}]} no rule number
Syntax Description
number
Identifier of the rule and order of precedence. Enter a unique integer from 1 to 16. The rule number determines the order in which the ACE applies the rules, with a higher-numbered rule applied after a lower-numbered rule. Allows the role to perform the operations defined by the rest of the command keywords. Disallows the role to perform the operations defined by the rest of the command keywords. Specifies commands for the creation of new objects or the deletion of existing objects (includes modify, debug, and monitor commands). Specifies commands for debugging problems (includes monitor commands). Specifies commands for modifying existing configurations (includes debug and monitor commands). Specifies commands for monitoring resources and objects (show commands). (Optional) Specifies a particular ACE feature for which you are configuring this rule. The available features are listed below. Specifies commands for authentication, authorization, and accounting. Specifies commands for access control lists (ACLs). Includes ACL configuration, class maps for ACLs, and policy maps that contain ACL class maps. Specifies the changeto command for user-defined roles. Users retain their privileges when accessing different contexts. By default, this command is disabled for user-defined roles. Specifies commands for copying the running-config to the startup-config, startup-config to the running-config, and copying both config files to the Flash disk (disk0:) or a remote server. Specifies commands for network connections. Specifies commands for Dynamic Host Configuration Protocol (DHCP). Specifies the following command for user-defined roles: capture, debug, delete, gunzip, mkdir, move, rmdir, set, setup, system, tac-pac, untar, write, and undebug commands. By default, these command are disabled for user-defined roles. Specifies commands for redundancy. Specifies commands for packet inspection used in data-center security.
changeto
config-copy
fault-tolerant inspect
2-1218
OL-25339-01
interface loadbalance
Specifies all interface commands. Specifies commands for load balancing (for the ACE appliance, this includes the application acceleration and optimization functions). Allows adding a load-balancing action in a policy map. Specifies commands for Network Address Translation (NAT) associated with a class map in a policy map used in data-center security. Specifies commands for Public Keyword Infrastructures (PKIs). Specifies commands for keepalives for real servers. Specifies commands for placing a real server in service. Specifies all commands for routing, both global and per interface. Specifies commands for physical servers. Specifies commands for server farms. Specifies commands for SSL. Specifies commands for server persistence. Specifies the system logging facility setup commands. Specifies commands for virtual IP addresses.
nat pki probe real-inservice routing rserver serverfarm ssl sticky syslog vip
Command Modes
Command History
Modification This command was introduced. The changeto and exec-commands options were added to this command.
Modification This command was introduced. The changeto and exec-commands options were added to this command.
Usage Guidelines
(ACE appliance only) To allow a user with a customized role to work from the ACE Appliance Device Manager, you must configure the role with rules that permit the create operation for the config-copy and exec-commands features.
Examples
To configure a rule that allows a role to create and configure real servers, enter:
host1/C1(config-role)# rule 1 permit create rserver
2-1219
Related Commands
2-1220
OL-25339-01
Syntax Description
host name
(Optional) Specifies a server farm of mirrored real servers that provide web content or services. Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the server-farm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
2-1221
Related Commands
2-1222
OL-25339-01
(config-sfarm-host) description
To configure the description of a server farm, use the description command. Use the no form of this command to delete the description of a server farm. description text no description
Syntax Description
text
Text description of a server farm. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1223
(config-sfarm-host) dws
To enable a server farm for the dynamic workload scaling (DWS) feature, use the dws command. Use the no form of this command to disable the DWS feature on a server farm. dws {local | burst probe name} no dws {local | burst probe name}
Syntax Description
local burst
Specifies that only the local pool of VMs are taken into account for load balancing decisions Specifies that remote VMs are taken into account for load balancing decisions when the configured threshold for the load of the local pool of VMs is reached or exceeded. Existing VM probe associated with this server farm. For details about configuring a VM probe, see the (config-sfarm-host) probe command.
probe name
Command Modes
Command History
Usage Guidelines
Examples
Related Commands
2-1224
OL-25339-01
(config-sfarm-host) failaction
To configure the action that the ACE takes if a real server in a server farm goes down, use the failaction command. Use the no form of this command to reset the ACE to its default of taking no action when a server fails. failaction {purge | reassign [across-interface]} no failaction When the failaction purge command is present in a server farm, and if the probe fails or the real server is taken out of service with the "no inservice" configuration command, the ACE immediately purges all connections to this real server by sending a reset (RST) both to the client and server.
Syntax Description
purge
Specifies that the ACE remove the connections to a real server if that real server in the server farm fails after you configure this command. The ACE sends a reset (RST) both to the client and to the server that failed. Specifies that the ACE reassigns existing server connections to the backup real server, if a backup real server is configured. If no backup real server is configured, this keyword has no effect. (Optional) Instructs the ACE to reassign all connections from the failed real server to a backup real server on a different VLAN that is commonly referred to as a bypass VLAN. By default, this feature is disabled.
reassign
across-interface
Command Modes
Command History
Modification This command was introduced. This command was revised (reassign keyword added). The across-interface option was added.
Modification This command was introduced. This command was revised (reassign keyword added). The across-interface option was added.
2-1225
Usage Guidelines
If you do not configure this command, the ACE takes the real server out of rotation for new connections and allows existing connections to complete. The ACE does not send the connections to a backup server in the server farm or to a backup server farm if all servers in the primary server farm fail. To clear connections to servers that have failed prior to entering the failaction command, use the clear conn command. This feature is required for stateful firewall load balancing (FWLB). For details about FWLB, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine The use of the failaction reassign command requires that you enable the transparent command (see (config-sfarm-host) transparent) to instruct the ACE not to use NAT to translate the ACE VIP address to the server IP address. The failaction reassign command is intended for use in FWLB where the destination IP address for the connection coming in to the ACE is for the end-point real server, and the ACE reassigns the connection so that it is transmitted through a different next hop. Follow these configuration requirements and restrictions when you use the across-interface option:
You must configure identical policies on the primary interface and the backup-server interface. The backup interface must have the same feature configurations as the primary interface. If you configure a policy on the backup-server interface that is different from the policies on the primary-server interface, that policy will be effective only for new connections. The reassigned connection will always have only the primary-server interface policies. Interface-specific features (for example, NAT, application protocol inspection, outbound ACLs, or SYN cookie) are not supported. You cannot reassign connections to the failed real server after it comes back up. This restriction also applies to same-VLAN backup servers. You must connect real servers directly to the ACE. This requirement also applies to same-VLAN backup servers. You must disable sequence number randomization on the firewall. Probe configurations should be similar on both ACEs and the interval values should be low. For example, if you configure a high interval value on ACE1 and a low interval value on ACE2, the reassigned connections may become stuck because of the probe configuration mismatch. ACE2 with the low interval value will detect the primary server failure first and will reassign all its incoming connections to the backup-server interface VLAN. ACE1 with the high interval value may not detect the failure before the primary server comes back up and will still point to the primary server. To minimize packet loss, we recommend the following probe parameter values on both ACEs:
Interval: 2 Faildetect: 2 Passdetect interval: 2 Passdetect count: 5
Examples
To instruct the ACE to remove connections from a failed server in the server farm, enter:
host1/Admin(config-sfarm-host)# failaction purge
To specify that the ACE reassign the existing server connections to a backup real server in a different VLAN, enter:
host1/Admin(config-sfarm-host)# failaction reassign across-interface host1/Admin(config-sfarm-host)# transparent
2-1226
OL-25339-01
To specify that the ACE reassign the existing server connections to the backup real server, enter:
host1/Admin(config-sfarm-host)# failaction reassign host1/Admin(config-sfarm-host)# transparent
To reset the ACE to its default of taking no action if a real server fails, enter:
host1/Admin(config-sfarm-host)# no failaction
Related Commands
(config-sfarm-host) transparent
2-1227
(config-sfarm-host) fail-on-all
To configure the real servers in a server farm to use AND logic with respect to multiple server farm probes, use the fail-on-all command in server farm host configuration mode. This command is applicable to all probe types. The syntax of this command is: fail-on-all no fail-on-all
Syntax Description
Command Modes
Command History
Usage Guidelines
By default, real servers that you configure in a server farm inherit the probes that you configure directly on that server farm. When you configure multiple probes on a server farm, the real servers in the server farm use an OR logic with respect to the probes. This means that if one of the probes configured on the server farm fails, all the real servers in that server farm fail and enter the PROBE-FAILED state. With AND logic, if one server farm probe fails, the real servers in the server farm remain in the OPERATIONAL state. If all the probes associated with the server farm fail, then all the real servers in that server farm fail and enter the PROBE-FAILED state. You can also configure AND logic for probes that you configure directly on real servers in a server farm. For more information, see the command in server farm host real server configuration mode.
Examples
To configure the SERVER1 real server to remain in the OPERATIONAL state unless all associated probes fail, enter the following commands:
host1/Admin(config)# rserver SERVER1 host1/Admin(config-rserver-host)# ip address 192.168.12.15 host1/Admin(config-rserver-host)# probe HTTP_PROBE host1/Admin(config-rserver-host)# probe ICMP_PROBE host1/Admin(config-rserver-host)# fail-on-all
To remove the AND probe logic from the real server and return the behavior to the default of OR logic, enter the following command:
host1/Admin(config-rserver-host)# no fail-on-all
2-1228
OL-25339-01
Related Commands
2-1229
Syntax Description
count
Tracks the total number of TCP or UDP failures, and increments the counters as displayed by the show serverfarm name inband command. Logs a syslog error message when the number of events reaches the configured connection failure threshold. Specifies a syslog error message when the number of events reaches the threshold specified by the threshold_number argument and the ACE removes the server from service. The maximum number of connection failures that a real server can have during the configurable reset-time interval before the ACE marks the real server as failed.
log remove
fail-threshold
For the ACE module, enter an integer from 4 to 4294967295. For the ACE appliance, enter an integer from 1 to 4294967295.
reset milliseconds
Specifies the reset-time interval in milliseconds. For the milliseconds argument, enter an integer from 100 to 300000. The default interval is 100. This interval starts when the ACE detects a connection failure. If the connection failure threshold is reached during this interval, the ACE generates a syslog message. If you configure the remove keyword, the ACE also removes the real server from service.
Logs a syslog error message when the number of events reaches the configured threshold and removes the real server from service. (Optional) Specifies the number of seconds after a server has been marked as failed for the ACE to reconsider sending live connections. For the seconds argument, enter an integer from 30 to 3600. The default setting is 0.
Command Modes
Command History
2-1230
OL-25339-01
Usage Guidelines
By default, the ACE monitors the health of all real servers in a configuration through the use of ARPs and health probes. However, there is latency period between when the real server goes down and when the ACE becomes aware of the state. When you configure the inband health monitoring feature, it informs the ACE load balancer of connection failures on the real servers in a server farm. These connection failures are as follows:
For TCP, resets (RSTs) from the server or SYN timeouts For UDP, ICMP Host, Network, Port, Protocol, and Source Route unreachable messages
When you configure the failure-count threshold and the number of these failures exceeds the threshold within the reset-time interval, the ACE immediately marks the server as failed, takes it out of service, and removes it from load balancing. The server is not considered for load balancing until the optional resume-service interval expires. Inband health monitoring has the following considerations and restrictions:
When you configure inband health monitoring, the setting of the resume-service option for the inband-health check command affects the behavior of the real server in the INBAND-HM-FAILED state. Inband health monitoring works with connection reuse only when the ACE to server connection is torn down, not for every request that is sent out on the reused connection. The state of the real server is not synchronized to the standby ACE when the state of the real server changes due to inband health monitoring. If you configure a different port for probes than what is used for traffic forwarding (for example, when you configure port inheritance or specify the port under the probe configuration), out-of-band and inband health monitoring monitor different ports. If a server farm is attached to two different VIPs, one servicing TCP and the other servicing UDP requests, and both TCP and UDP inband health monitoring are enabled on that server farm, the inband probe that goes down first takes the real server down. We recommend that you configure two different server farms, and enable both with inband health monitoring. When you configure inband health monitoring with a Layer 7 configuration containing a Layer 4 or Layer 7 class map, you must configure the inactivity timeout using the set timeout inactivity command to a time greater than the time to teardown the connection. The teardown time is based on the number of SYN retries configured by the set tcp syn-retry command. Otherwise, inband health monitoring does not track the syn-timeout failures. For example, if you configure the set tcp syn-retry command to 4, the connection teardown takes 45 seconds. You must configure the set timeout inactivity command to greater than 45 seconds. You can configure inband health monitoring to work with health probes to monitor a server. If you do, both sets of health checks are required to keep a real server in service within a server farm. If either detects a server is out of service, the ACE does not select the server for load balancing. You can configure inband health monitoring with HTTP return codes under the same server farm.
The reset interval starts when the ACE detects a connection failure. If the connection failure threshold is reached during this interval, the ACE generates a syslog message. If you configure the remove keyword, the ACE also removes the real server from service. Changing the setting of the reset option affects the behavior of the real server, as follows:
When the real server is in the OPERATIONAL state, even if several connection failures have occurred, the new reset-time interval takes effect the next time that a connection error occurs. When the real server in the INBAND-HM-FAILED state, the new reset-time interval takes effect the next time that a connection error occurs after the server transitions to the OPERATIONAL state.
2-1231
The default setting is 0. The setting of this option affects the behavior of the real server in the INBAND-HM-FAILED state, as follows:
When the resume-service option is not configured and has the default setting of 0, the real
server remains in the failed state until you manually enter the no inservice command followed by the inservice command.
When this option is not configured and has the default setting of 0 and then you configure this
option with an integer between 30 and 3,600, the failed real server immediately transitions to the Operational state.
When you configure this option and then increase the value, the real server remains in the failed
state for the duration of the previously-configured value. The new value takes effect the next time the real server transitions to the failed state. When you configure the resume-service option and then decrease the value, the failed real server immediately transitions to the Operational state.
When you configure this option with an integer between 30 and 3,600 and then reset it to the default of 0, the real server remains in the failed state for the duration of the previously-configured value. The default setting takes effect the next time the real server transitions to the failed state. Then the real server remains in the failed state until you manually enter the no inservice command followed by the inservice command. When you change this option within the reset-time interval and the real server is in the OPERATIONAL state with several connection failures, the new threshold interval takes effect the next time that a connection error occurs, even if it occurs within the current reset-time interval.
Examples
To track the total number of TCP or UDP failures for the real servers on a server farm and increment the show serverfarm name inband command counters, enter:
host1/Admin(config)# serverfarm host SF1 host1/Admin(config-sfarm-host)# inband-health check count
To configure the ACE to remove a real server at a failure threshold of 400, and resume service to it after 300 seconds, enter:
host1/Admin(config-sfarm-host)# inband-health check remove 400 resume-service 300
Related Commands
show serverfarm
2-1232
OL-25339-01
(config-sfarm-host) partial-threshold
By default, if you configured a backup server farm and all real servers in the primary server farm go down, the primary server farm fails over to the backup server farm. Partial server farm failover allows you to specify a failover threshold. If the percentage of active real servers in a server farm falls below the specified threshold, the primary server farm fails over to the backup server farm (if configured). To enable partial server farm failover, use the partial-threshold command in server farm host configuration mode. Use the no form of this command to disable partial server farm failover. partial-threshold percentage1 back-inservice percentage2 no partial-threshold
Syntax Description
percentage1
Minimum percentage of real servers in the primary server farm that must remain active for the server farm to stay up. If the percentage of active real servers falls below this threshold, the ACE takes the server farm out of service. Enter an integer from 0 to 99. Specifies the percentage of real servers in the primary server farm that must be active again for the ACE to place the server farm back into service. Enter an integer from 0 to 99. The percentage configured with the back-inservice keyword must be greater than or equal to the percentage1 value.
back-inservice percentage2
Command Modes
Command History
Usage Guidelines
Each time that a server is taken out of service (for example, by an administrator using the CLI, because of a probe failure, or because the retcode threshold is exceeded), the ACE is updated. If the percentage of active real servers in a server farm falls below the specified threshold, the primary server farm fails over to the backup server farm (if a backup server farm is configured). With partial server farm failover configured, the ACE allows current connections on the remaining active servers in the failed primary server farm to complete. The ACE redirects any new connection requests to the backup server farm.
Examples
2-1233
Related Commands
show serverfarm
(config-sfarm-host) predictor
To configure the load-balancing algorithm for the server farm, use the predictor command. Use the no form of this command to revert to the default load-balancing algorithm (the round-robin algorithm). predictor {hash {address [destination | source] [v6-prefix prefix-length | netmask]} | {content [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2]} | {cookie [secondary] name1} | {header name2} | {layer4-payload [offset number3] [length number4] [begin-pattern expression3] [end-pattern expression4]} | {url [begin-pattern expression5] [end-pattern expression6]}} | {least-bandwidth [samples number5] [assess-time seconds]} | {least-loaded probe name3 [samples number6]} | {leastconns [slowstart seconds]} | {response {app-req-to-resp | syn-to-close | syn-to-synack} [samples number7]} | {roundrobin} no predictor
Syntax Description
hash address
Selects the server using a hash value based on the source and destination IP addresses. Use the hash address source and hash address destination methods for firewall load balancing (FWLB). (Optional) Selects the server using a hash value based on the destination IP address. (Optional) Selects the server using a hash value based on the source IP address. (Optional) Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter an integer from 1 to 128. (Optional) Bits in the IP address to use for the hash. If not specified, the default is 255.255.255.255. Selects the server using a hash value based on the specified content string of the HTTP packet body. (Optional) Specifies the portion of the content that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the payload. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the content.
2-1234
OL-25339-01
length number2
(Optional) Specifies the length of the portion of the content (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire payload. The offset and length can vary from 0 to 1000 bytes. If the payload is longer than the offset but shorter than the offset plus the length of the payload, the ACE sticks the connection based on that portion of the payload starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. Note: You cannot specify both the length and the end-pattern options in the same hash content command.
begin-pattern expression1
(Optional) Specifies the beginning pattern of the content string and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing the HTTP body immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
end-pattern expression2
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an end pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. Note: You cannot specify both the length and the end-pattern options in the same hash content command.
Selects the server using a hash value based on the cookie name or based on the name in the cookie name of the URL query string. (Optional) Selects the server by using the hash value based on the specified name in the cookie name in the URL query string, not the cookie header. If you do not include this option, the ACE selects a real server using the hash value of the cookie name. Cookie name. Enter a cookie name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
name1
2-1235
Selects the server using a hash value based on the header name. Enter a header name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters, or enter one of the following standard headers:
Accept Accept-Charset Accept-Encoding Accept-Language Authorization Cache-Control Connection Content-MD5 Expect From Host If-Match Pragma Referrer Transfer-Encoding User-Agent Via
hash layer4-payload
Specifies a Layer 4 generic protocol load-balancing method. Use this predictor to load balance packets from protocols that are not explicitly supported by the ACE. (Optional) Specifies the portion of the payload that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the payload. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the payload. (Optional) Specifies the length of the portion of the payload (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire payload. The offset and length can vary from 0 to 1000 bytes. If the payload is longer than the offset but shorter than the offset plus the length of the payload, the ACE sticks the connection based on that portion of the payload starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. Note: You cannot specify both the length and the end-pattern options in the same hash layer4-payload command.
offset number3
length number4
2-1236
OL-25339-01
begin-pattern expression3
(Optional) Specifies the beginning pattern of the Layer 4 payload and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing the HTTP body immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
end-pattern expression4
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an end pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. Note: You cannot specify both the length and the end-pattern options in the same hash layer4-payload command.
hash url
Selects the server using a hash value based on the requested URL. Use this predictor method to load balance cache servers. Cache servers perform better with the URL hash method because you can divide the contents of the caches evenly if the traffic is random enough. In a redundant configuration, the cache servers continue to work even if the active ACE switches over to the standby ACE. For information about configuring redundancy, see the Administration Guide, Cisco ACE Application Control Engine. (Optional) Specifies the beginning pattern of the URL and the pattern string to match before hashing. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. If you want to match a URL that contains spaces, you must use \x20 for each space character.
begin-pattern expression5
2-1237
end-pattern expression6
(Optional) Specifies the pattern that marks the end of hashing. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. If you want to match a URL that contains spaces, you must use \x20 for each space character. Selects the server that processed the least amount of network traffic over a specified sampling period. Use this predictor for heavy traffic use, such as downloading a video clip. The ACE measures traffic statistics between itself and the real servers in the server farm in both directions and calculates the bandwidth over the sampling period. Then, it creates an ordered list of real servers based on the sampling results and selects the server that used the least amount of bandwidth during the sampling period. (Optional) Specifies the number of samples over which you want to weight and average the results of the probe query to calculate the final load value. Enter an integer from 1 to 16. Each value must be a power of 2, so the valid values are as follows: 1, 2, 4, 8, and 16. The default is 8. (Optional) Specifies the sampling period over which the ACE measures traffic for all the servers in the server farm. Enter an integer from 1 to 10. The default is 2 seconds. Selects the server with the lowest load based on information obtained from SNMP probes. To use this predictor, you must associate an SNMP probe with the server farm. The ACE queries one user-specified OID (for example, CPU utilization or memory utilization). The ACE uses the retrieved value directly to determine the server with the lowest load. Specifies the name of the SNMP probe that you want to query. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the number of samples over which you want to weight and average the results of the probe query to calculate the final load value. Enter an integer from 1 to 16. Each value must be a power of 2, so the valid values are as follows: 1, 2, 4, 8, and 16. The default is 8. Selects the real server with the fewest number of active connections based on the server weight. Use this predictor for processing light user requests (for example, browsing simple static web pages). For information about setting real server weight, see the (config-sfarm-host-rs) weight section. (Optional) Specifies that the connections to the real server be in a slow-start mode for the duration indicated by the seconds value. Use the slow-start mechanism to avoid sending a high rate of new connections to servers that you have recently put into service. Enter an integer from 1 to 65535, where 1 is the slowest ramp-up value. By default, slowstart is disabled.
least-bandwidth
samples number5
assess-time seconds
least-loaded
probe name3
samples number6
leastconns
slowstart seconds
2-1238
OL-25339-01
response
Selects the server with the lowest response time for the requested response-time measurement. If you do not specify a response-time measurement method, the ACE uses the HTTP app-req-to-response method. (Default) Measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request. The ACE does not allow you to configure this predictor response in a generic load-balancing policy map. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives a CLOSE from the server. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives the SYN-ACK from the server. (Optional) Number of samples over which you want to average the results of the response time measurement. Enter an integer from 1 to 16 in powers of 2. Valid values are: 1, 2, 4, 8, and 16. The default is 8. (Default) Selects the next server in the list of real servers based on server weight (weighted round-robin). For information about setting real server weight, see the (config-sfarm-host-rs) weight section.
app-req-to-resp
syn-to-close syn-to-synack
samples number7
roundrobin
Command Modes
Command History
Modification This command was introduced. This command was revised. This secondary option for the hash cookie keywords was added.
Modification This command was introduced. This command was revised. This secondary option for the hash cookie keywords was added.
Usage Guidelines
Use this command to specify the load-balancing algorithm that the ACE uses in choosing a real server in the server farm. If you do not specify the predictor command, the default algorithm is roundrobin. Using the no form of this command changes the configured predictor algorithm to the default algorithm. The weight assigned to the real servers is used only in the roundrobin and leastconns predictor methods. The hash and the response predictor methods do not recognize the weight for the real servers. For information about setting real server weight, see the (config-sfarm-host-rs) weight section.
2-1239
If you configure the leastconns predictor, you can use a slowstart mechanism (ramp-up) to avoid sending a high rate of new connections to the servers that have just been put in service. The real server with the fewest number of active connections will get the next connection request for the server farm with the leastconns predictor. The ramp-up stops when the duration timer that you specify expires. The only time that the sequence of servers starts over at the beginning (with the first server) is when there is a configuration or server state change (for example, a probe failure). Server weights take effect only when there are open connections to the servers. When there are no sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin method. The secondary option allows the ACE to correctly load balance in cases when the query string identifies the actual resource, instead of the URL.
Examples
To configure the ACE to select the real server with the lowest number of connections in the server farm, enter:
host1/Admin(config-sfarm-host)# predictor leastconns slowstart 300
Related Commands
(config-sfarm-host-rs) weight
(config-sfarm-host) probe
Use probes to monitor the health of real servers in a server farm. To associate a probe with a server farm, use the probe command. Use the no form of this command to dissociate a probe from a server farm. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to associate with a server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-1240
OL-25339-01
Usage Guidelines
The probe must already exist. (To create a probe, see the (config) probe command.) You can associate multiple probes of the same or different protocols with each server farm.
Examples
Related Commands
(config) probe
2-1241
(config-sfarm-host) retcode
To configure HTTP return-code checking (retcode map) for a server farm, use the retcode command. Use the no form of this command to dissociate a return code map. You can specify a single return code number or a range of return code numbers. For example, you can instruct the ACE to check for and count the number of occurrences of such return codes as HTTP/1.1 200 OK, HTTP/1.1 100 Continue, or HTTP/1.1 404 Not Found. retcode number1 number2 check {count | {log threshold_number reset seconds1 | {remove threshold_number reset seconds1 [resume-service seconds2]}} no retcode number1 number2
Syntax Description
number1
Minimum value for an HTTP return code. Enter an integer from 100 to 599. The minimum value must be less than or equal to the maximum value. Maximum value for an HTTP return code. Enter an integer from 100 to 599. The maximum value must be greater than or equal to the minimum value. Checks for HTTP return codes associated with the server farm. Tracks the total number of return codes received for each return code number that you specify. Specifies a syslog error message when the number of events reaches the threshold specified by the threshold_number argument. Specifies a syslog error message when the number of events reaches the threshold specified by the threshold_number argument and the ACE removes the server from service. Threshold for the number of events that the ACE receives before it performs the log or remove action.
number2
threshold_number
For the ACE module, enter an integer from 4 to 4294967295. For the ACE appliance, enter an integer from 1 to 4294967295.
reset seconds1
Specifies the time interval in seconds over which the ACE checks for the return code for the log or remove action.
For the ACE module, enter an integer from 1 to 4294967295. For the ACE appliance, enter an integer from 1 to 2147483647.
resume-service seconds2
(Optional) Specifies the number of seconds that the ACE waits before it resumes service for the real server automatically after taking the real server out of service because the remove option is configured. Enter an integer from 30 to 3600. The default setting is 0.
Command Modes
2-1242
OL-25339-01
Command History
Modification This command was introduced. This command was revised. The lowest integer for the threshold_number argument was changed from 2 to 4.
Usage Guidelines
You can configure multiple return code maps on each server farm. You can view hitcounts for return code checking by using the show serverfarm command. The setting of the remove option affects the behavior of the real server in the failed state, as follows:
When the resume-service option is not configured and has the default setting of 0, the real server remains in the failed state until you manually enter the no inservice command followed by the inservice command. When this option is not configured and has the default setting of 0 and then you configure this option with an integer between 30 and 3600, the failed real server transitions to the Operational state. When you configure this option and then increase the value, the real server remains in the failed state for the duration of the previously configured value. The new value takes effect the next time the real server transitions to the failed state. When you configure this option and then decrease the value, the failed real server transitions to the Operational state. When you configure this option with an integer between 30 and 3600 and then reset it to the default of 0, the real server remains in the failed state for the duration of the previously configured value. The default setting takes effect the next time the real server transitions to the failed state. Then the real server remains in the failed state until you manually enter the no inservice command followed by the inservice command.
The ACE performs the log or remove actions only if the threshold_number value for a particular retcode is reached within a specified period of time. The time period is defined from the receipt of a retcode until the next reset time.
Examples
To check for and count the number of return code hits for all return codes from 200 to 500 inclusive, enter:
host1/Admin(config-sfarm-host)# retcode 200 500 check count
Related Commands
show serverfarm
2-1243
(config-sfarm-host) rserver
To associate one or more existing host real servers with a server farm and access serverfarm host real server configuration mode, use the rserver command. The CLI prompt changes to (config-sfarm-host-rs). For information on commands in serverfarm host real server configuration mode, see the Server Farm Host Real Server Configuration Mode Commands section. Use the no form of this command to dissociate the real server from the server farm. rserver name [port] no rserver name [port]
Syntax Description
name port
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number used for the real server Port Address Translation (PAT). Enter an integer from 1 to 65535.
Command Modes
Command History
Usage Guidelines
The real server must already exist. To create a real server, see the (config) rserver command. You can associate a maximum of 16,384 real servers with a server farm. You can configure a combination of IPv6 and IPv4 servers in a server farm (mixed mode), but a mixed mode server farm will have limited feature support.
Caution
Do not configure under a real server a peer IPv6 address that is calculated from EUI64. In a redundant configuration, if you configure a peer IPv6 address as EUI64 on an interface, the address will not be learned by the active member of an FT group because the address is calculated only on the peer. If you then configure the same calculated IPv6 address on the active under a real server, the CLI accepts it because it does not calculate it. This IPv6 address is not synced to the standby because it conflicts with the interface address. If you subsequently apply a probe to the real server, the state of the real server is PROBE-FAILED on the active and OUTOFSERVICE on the the standby. This same check applies to VIPs, routes, interfaces, and probes. If you choose not to assign a port number for the real server association with the server farm, the default behavior by the ACE is to automatically assign the same destination port that was used by the inbound connection to the outbound server connection. For example, if the incoming connection to the ACE is a
2-1244
OL-25339-01
secure client HTTPS connection, the connection is typically made on port 443. If you do not assign a port number to the real server, the ACE will automatically use port 443 to connect to the server, which results in the ACE making a clear-text HTTP connection over port 443. In this case, you would typically define an outbound destination port of 80, 81, or 8080 for the backend server connection.
Examples
Related Commands
(config) rserver
(config-sfarm-host) transparent
To configure the ACE not to use Network Address Translation (NAT) to translate the ACE VIP address to the server IP address, use the transparent command. Use the no form of this command to reset the ACE to its default of using NAT to translate the VIP address to the server IP address. transparent no transparent
Syntax Description
Command Modes
Command History
Usage Guidelines
Use this command in firewall load balancing (FWLB) when you configure the insecure and secure sides of the firewall as a server farm. For details about FWLB, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
2-1245
Examples
To prevent the ACE from using NAT to translate the ACE VIP address to the server IP address, enter:
host1/Admin(config-sfarm-host)# transparent host1/Admin(config-sfarm-host)#
To reset the ACE to its default of using NAT to translate the VIP address to the server IP address, enter:
host1/Admin(config-sfarm-host)# no transparent host1/Admin(config-sfarm-host)#
Related Commands
Syntax Description
least-loaded
Selects the server with the lowest load based on information obtained from SNMP probes. To use this predictor, you must associate an SNMP probe with the server farm. The ACE queries one user-specified OID (for example, CPU utilization or memory utilization). The ACE uses the retrieved value directly to determine the server with the lowest load. Specifies the name of the SNMP probe that you want to query. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Selects the server with the lowest response time for the requested response-time measurement. If you do not specify a response-time measurement method, the ACE uses the HTTP app-req-to-response method. (Default) Measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request. The ACE does not allow you to configure this predictor response in a generic load-balancing policy map. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives a CLOSE from the server.
probe name
response
app-req-to-resp
syn-to-close
2-1246
OL-25339-01
syn-to-synack
Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives the SYN-ACK from the server. (Optional) Number of samples over which you want to average the results of the response time measurement. Enter an integer from 1 to 16 in powers of 2. Valid values are: 1, 2, 4, 8, and 16. The default is 8.
samples number
Command Modes
Command History
Usage Guidelines
The commands in this mode require the server-farm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To specify the least-loaded predictor method with a probe called SNMP_PROBE for the server farm, enter:
host1/Admin(config-sfarm-host)# predictor least-loaded probe SNNMP_PROBE host1/Admin(config-sfarm-host-predictor)#
To specify the response predictor method that measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request, enter:
host1/Admin(config-sfarm-host)# predictor response host1/Admin(config-sfarm-host-predictor)#
app-req-to-resp
Related Commands
show serverfarm detail (config-sfarm-host) predictor (config-sfarm-host-predictor) autoadjust (config-sfarm-host-predictor) weight connection
2-1247
(config-sfarm-host-predictor) autoadjust
After you specify the predictor least-loaded command, use the autoadjust command to instruct the ACE to apply the maximum load of 16000 to a real server whose load reaches zero or override the default behavior. Use the no form of this command to return the ACE behavior to the reset the behavior of the ACE to the default of average load of the server farm to a real server whose load is zero. autoadjust {average | maxload | off} no autoadjust
Syntax Description
average
Applies the average load of the server farm to a real server whose load is zero. This setting allows the server to participate in load balancing, while preventing it from being flooded by new connections. This is the default setting. Instructs the ACE to apply the maximum load of 16000 to a real server whose load reaches zero. Overrides the default behavior of the ACE of applying the average load of the server farm to a real server whose load is zero. When you configure this command, the ACE sends all new connections to the server that has a load of zero until the next load update arrives from the SNMP probe for this server. If two servers have the same lowest load (either zero or nonzero), the ACE load balances the connections between the two servers in a round-robin manner.
maxload off
Command Modes
Command History
Modification This command was introduced. The average load became the default autoadjust setting for the least-loaded predictor. Previously, the default setting was maximum load. The maxload keyword was added to set the least-loaded predictor to maximum load.
Modification This command was introduced. The average load became the default autoadjust setting for the least-loaded predictor. Previously, the default setting was maximum load. The maxload keyword was added to set the least-loaded predictor to maximum load.
2-1248
OL-25339-01
Usage Guidelines
Whenever a servers load reaches zero, by default, the ACE uses the autoadjust feature to assign an average load value to that server to prevent it from being flooded with new incoming connections. The ACE periodically adjusts this load value based on feedback from the servers SNMP probe and other configured options. Using the least-loaded predictor with the configured server weight and the current connection count option enabled, the ACE calculates the final load of a real server as follows: final load = weighted load static weight current connection count where:
weighted load is the load reported by the SNMP probe static weight is the configured weight of the real server current connection count is the total number of active connections to the real server
The ACE recalculates the final load whenever the connection count changes, provided that the weight connection command is configured. If the weight connection command is not configured, the ACE updates the final load when the next load update arrives from the SNMP probe.
Examples
To instruct the ACE to apply the maximum load of 16000 to a real server whose load reaches zero, enter:
host1/Admin(config-sfarm-host-predictor)# autoadjust maxload
To turn off the autoadjust feature for all servers in a server farm so that servers with a load of zero receive all new connections, enter:
host1/Admin(config-sfarm-host-predictor)# autoadjust off
To reset the behavior of the ACE to the default of applying the average load of the server farm to a real server whose load is zero, enter:
host1/Admin(config-sfarm-host-predictor)# no autoadjust
You can also reset the behavior of the ACE to the default by entering the following:
host1/Admin(config-sfarm-host-predictor)# autoadjust average
Related Commands
2-1249
Syntax Description
Command Modes
Command History
Usage Guidelines
To see how the weight connection command affects the (config-sfarm-host-predictor) autoadjust command for the least-loaded predictor, see the Usage Guidelines section of the (config-sfarm-host-predictor) autoadjust command.
Examples
To instruct the ACE to use the current connection count in the final load calculation for each real server in the server farm, enter:
host1/Admin(config-sfarm-host-predictor)# weight connection
To reset the behavior of the ACE to the default of excluding the current connection count from the load calculation, enter:
host1/Admin(config-sfarm-host-predictor)# no weight connection
Related Commands
2-1250
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
Syntax Description
name port
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number used for the real server Port Address Translation (PAT). Enter an integer from 1 to 65535.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The commands in this mode require the server-farm feature in your user role unless otherwise specified. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The real server must already exist. To create a real server, see the (config) rserver command. You can associate a maximum of 16,384 real servers with a server farm.
Examples
2-1251
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
Related Commands
2-1252
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) backup-rserver
To configure a backup real server for a real server in a server farm, use the backup-rserver command. If a real server associated with a server farm becomes unavailable, the ACE directs flows to the configured backup real server. Use the no form of this command to remove a backup real server from the configuration. backup-rserver name [port] no backup-rserver
Syntax Description
name
Unique identifier of an existing real server that you want to configure as a backup server in a server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number used for the backup real server Port Address Translation (PAT). Enter an integer from 0 to 65535.
port
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. This command now supports cyclic backup of real servers in a server farm.
Usage Guidelines
The real server used as a backup server must already exist. To create a real server, see the (config) rserver command.
Examples
Related Commands
2-1253
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a host real server in a server farm, use the conn-limit command. Use the no form of this command to reset the limits for the real server maximum connections and minimum connections to the default of 4000000. conn-limit max maxconns min minconns no conn-limit
Syntax Description
Specifies the maximum number of connections allowed for this real server. Enter an integer from 2 to 4000000. The default is 4000000. Specifies the connection threshold below which the real server will start accepting connections again after the number of connections exceeds the configured maximum number of connections. Enter an integer from 2 to 4000000. The default is minconns equal to maxconns.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Usage Guidelines
Use this command to specify the maximum number of connections and the minimum connection threshold for a host real server in a server farm. The minconns value must be less than or equal to the maxconns value. The ACE uses the minconns value as a threshold to start accepting connections again after the maxconns limit is exceeded.
Examples
To configure the maximum number of connections and the minimum connection threshold for a host real server, enter:
host1/Admin(config-sfarm-host-rs)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a host real server to the default of 4000000, enter:
host1/Admin(config-sfarm-host-rs)# no conn-limit
Related Commands
(config-sfarm-host-rs) rate-limit
2-1254
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) cookie-string
To configure a cookie string value of the real server for HTTP cookie insertion when establishing a sticky connection, use the cookie-string command. Use the no form of this command to remove the user-defined cookie string value of the real server for cookie insertion and have the ACE generate the cookie string for the associated real server. cookie-string text_string no cookie-string
Syntax Description
text_string
Cookie string value for the real server. Enter a text string with a maximum of 32 alphanumeric characters. When you include spaces and special characters in a cookie string value, enter a quoted text string (for example, test cookie string). The quotes appear in the running-configuration file.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Usage Guidelines
Use cookie insertion when you want to use a session cookie for persistence if the server is not currently setting the appropriate cookie. When you configure a cookie string value, the ACE inserts the cookie in the Set-Cookie header of the response from the server to the client. If you do not configure a cookie string value, when you enable cookie insertion for a sticky group, the ACE generates the cookie string for each real server after sending a connection to it. The ACE-generated cookie string appears as Rxxxxxxx (for example, R2148819051). When configuring a cookie string value, consider the following:
You can configure one cookie string for each real server. The ACE automatically uses the user-defined cookie string for cookie insertion for a sticky group instead of the ACE-generated cookie string. Ensure that there are no duplicate strings configured for real servers. If there are duplicate cookie strings, the old entry will be removed and sticky database will use the latest configured cookie string for the real server.
If you remove the user-defined cookie string from a real server, the ACE generates the cookie string for the associated real server after sending a connection.
2-1255
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
Examples
To configure a cookie string value of the real server for HTTP cookie insertion, enter:
host1/Admin(config-sfarm-host-rs)# cookie-string ABC123
Related Commands
2-1256
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) description
To configure the description of a real server in a server farm, use the description command. Use the no form of this command to delete the description of a real server. description text no description
Syntax Description
text
Text description of a server farm. Enter an unquoted text string with a maximum of 240 alphanumeric characters. If the text string includes spaces, enclose the string in quotes/
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1257
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) fail-on-all
To configure a real server in a server farm to remain in the OPERATIONAL state unless all probes associated with it fail (AND logic), use the fail-on-all command in server farm host real server configuration mode. This command is applicable to all probe types. The syntax of this command is: fail-on-all no fail-on-all
Syntax Description
Command Modes
Server farm host real server configuration mode Admin and user contexts
Command History
Usage Guidelines
By default, multiple probes that you configure directly on a real server in a server farm have an OR logic associated with them. This means that, if one of the real server probes fails, then the real server fails and enters the PROBE-FAILED state. You can selectively configure this command on only certain real servers in the server farm to give those server ADN logic. Any real server that you do not configure with the fail-on-all command, maintains its default OR logic with respect to probes.
Examples
For example, to configure the SERVER1 real server in SFARM1 to remain in the OPERATIONAL state unless all associated probes fail, enter the following commands:
host1/Admin(config)# serverfarm SFARM1 host1/Admin(config-sfarm-host)# rserver SERVER1 host1/Admin(config-sfarm-host-rs)# inservice host1/Admin(config-sfarm-host-rs)# probe HTTP_PROBE host1/Admin(config-sfarm-host-rs)# probe ICMP_PROBE host1/Admin(config-sfarm-host-rs)# fail-on-all
If either HTTP_PROBE or ICMP_PROBE fails, the SERVER1 real server remains in the OPERATIONAL state. If both probes fail, the real server fails and enters the PROBE-FAILED state. To remove the AND probe logic from the real server in a server farm and return the behavior to the default of OR logic, enter the following command:
host1/Admin(config-rserver-host)# no fail-on-all
2-1258
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
Related Commands
2-1259
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) inservice
To place a real server associated with a server farm in service, use the inservice command. Use the no form of this command to take a real server out of service. inservice [standby] no inservice
Syntax Description
standby
(Optional) Used with backup real servers, specifies that a backup real server remain inactive unless the primary real server fails. If the primary fails, the backup server becomes active and starts accepting connections.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Usage Guidelines
This command requires the real-inservice feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To start load balancing connections to a real server in a server farm, you must place the real server in service by using the inservice command. You can modify the attributes of a real server in a server farm without taking the server out of service. In addition to putting a backup real server in service standby, another use of the inservice standby command is to provide the graceful shutdown of primary real servers. Use this command to gracefully shut down servers with sticky connections. When you enter this command for a primary real server, the ACE does the following:
Tears down existing non-TCP connections to the server Allows current TCP connections to complete Allows new sticky connections for existing server connections that match entries in the sticky database Load balances all new connections (other than the matching sticky connections mentioned above) to the other servers in the server farm Eventually takes the server out of service
2-1260
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
Examples
To perform a graceful shutdown on a primary real server with sticky connections in a server farm, enter:
host1/Admin(config-sfarm-host-rs)# inservice standby
Related Commands
2-1261
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) probe
To configure a probe to monitor the health of a host real server in a host server farm, use the probe command. Use the no form of this command to remove the probe from the real server. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to assign to a real server to monitor its health. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can associate multiple probes with each real server. The ACE periodically sends the probes to the real servers. If the ACE receives the appropriate responses from the servers, the ACE includes the servers in load-balancing decisions. If not, the ACE marks the servers as out of service, depending on the configured number of retries.
Examples
Related Commands
2-1262
OL-25339-01
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
(config-sfarm-host-rs) rate-limit
To configure a limit for the connection rate and the bandwidth rate of a real server in a host server farm, use the rate-limit command. The connection rate is the number of connections per second received by the ACE and destined to a particular real server. The bandwidth rate is the number of bytes per second received by the ACE and destined for a particular real server. Use the no form of this command to revert to the ACE default of not limiting the connection rate or bandwidth rate of real servers in a server farm. rate-limit {connection number1 | bandwidth number2} no rate-limit {connection | bandwidth}
Syntax Description
connection number1
For the ACE module, enter an integer from 2 to 350000. For the ACE appliance, enter an integer from 1 to 350000.
There is no default value. bandwidth number2 Specifies the real server bandwidth-rate limit in bytes per second.
For the ACE module, enter an integer from 4 to 300000000. For the ACE appliance, enter an integer from 1 to 300000000.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. The lowest real server bandwidth-rate limit was changed from 2 to 4.
Usage Guidelines
If the connection rate or the bandwidth rate of incoming traffic destined for a particular real server exceeds the configured rate for the server, the ACE blocks any further traffic destined to that real server until the connection rate or bandwidth rate drops below the configured limit. Also, the ACE removes the blocked real server from future load-balancing decisions. By default, the ACE does not limit the connection rate or the bandwidth rate of real servers in a server farm.
Examples
To limit the connection rate of a real server to 100,000 connections per second, enter:
host1/Admin(config-sfarm-host-rs)# rate-limit connection 100000
2-1263
Chapter 2 CLI Commands Server Farm Host Real Server Configuration Mode Commands
To revert to the ACE default of not limiting the real-server connection rate, enter:
host1/Admin(config-sfarm-host-rs)# no rate-limit connection
To limit the real-server bandwidth rate to 5,000,000 bytes per second, enter:
host1/Admin(config-sfarm-host-rs)# rate-limit bandwidth 5000000
Related Commands
(config-sfarm-host-rs) conn-limit
(config-sfarm-host-rs) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight command. The weight value that you specify for a server is used in the weighted round-robin and least-connections predictor load-balancing methods. Use the no form of this command to reset the real server weight to the default. weight number no weight
Syntax Description
number
Weight value assigned to a real server in a server farm. This value is used in the weighted round-robin and least-connections predictor load-balancing algorithms. Enter an integer from 1 to 100. The default is 8.
Command Modes
Serverfarm host real server configuration mode Admin and user contexts
Command History
Usage Guidelines
Servers with higher weight values receive a proportionally higher number of connections than servers with lower weight values. If you do not specify a weight in serverfarm host real server configuration mode, the ACE uses the weight that you configured for the global real server in real server host configuration mode.
2-1264
OL-25339-01
To specify different weight values for a host real server in a server farm, you can assign multiple IP addresses to the server. You can also use the same IP address of a real server with different port numbers. Server weights take effect only when there are open connections to the servers. When there are no sustained connections to any of the servers, the leastconns predictor method behaves like the roundrobin method.
Examples
Related Commands
Syntax Description
name
Unique identifier of the server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
2-1265
Usage Guidelines
The commands in this mode require the server-farm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-1266
OL-25339-01
(config-sfarm-redirect) description
To configure the text description of a server farm, use the description command. Use the no form of this command to delete the description of a server farm. description text no description
Syntax Description
text
Text description of a server farm. Enter an unquoted text string with a maximum of 240 alphanumeric characters.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
Related Commands
2-1267
(config-sfarm-redirect) failaction
To configure the action that the ACE takes if a real server in a server farm goes down, use the failaction command. Use the no form of this command to reset the ACE to its default of taking no action when a server fails. failaction {purge | reassign [across-interface]} no failaction
Syntax Description
purge
Specifies that the ACE removes the connections to a real server in the server farm if that real server fails. The ACE sends a reset (RST) both to the client and to the server that failed. Specifies that the ACE reassigns existing server connections to the backup real server if a backup real server is configured. If no backup real server is configured, this keyword has no effect. (Optional) Instructs the ACE to reassign all connections from the failed real server to a backup real server on a different VLAN that is commonly referred to as a bypass VLAN. By default, this feature is disabled.
reassign
across-interface
Command Modes
Command History
ACE Module Release 3.0(0)A1(2) A2(1.0) A2(3.0) A5(1.0) ACE Appliance Release A1(7) A3(1.0) A4(1.0) A5(1.0)
Modification This command was introduced. This command was revised (reassign keyword added). The across-interface option was added. Added IPv6 support. Modification This command was introduced. This command was revised (reassign keyword added). The across-interface option was added. Added IPv6 support.
Usage Guidelines
If you do not configure this command, the ACE takes the real server out of rotation for new connections and allows existing connections to complete. The ACE does not send the connections to a backup server in the server farm or to a backup server farm if all servers in the primary server farm fail. This feature is required for stateful firewall load balancing (FWLB). For details about FWLB, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
2-1268
OL-25339-01
Examples
To instruct the ACE to remove connections from a failed server in the server farm, enter:
host1/Admin(config-sfarm-redirect)# failaction purge
To reset the ACE to its default of taking no action if a real server fails, enter:
host1/Admin(config-sfarm-redirect)# no failaction
Related Commands
2-1269
(config-sfarm-redirect) predictor
To configure the load-balancing algorithm for the server farm, use the predictor command. Use the no form of this command to revert to the default load-balancing algorithm (the round-robin algorithm). predictor {hash {address [destination | source] [v6-prefix prefix-length | netmask]} | {content [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2]} | {cookie [secondary] name1} | {header name2} | {layer4-payload [offset number3] [length number4] [begin-pattern expression3] [end-pattern expression4]} | {url [begin-pattern expression5] [end-pattern expression6]}} | {least-bandwidth [samples number5] [assess-time seconds]} | {least-loaded probe name3 [samples number6]} | {leastconns [slowstart seconds]} | {response {app-req-to-resp | syn-to-close | syn-to-synack} [samples number7] [threshold milliseconds [resume-timer seconds]]} | {roundrobin} no predictor
Syntax Description
hash address
Selects the server using a hash value based on the source and destination IP addresses. Use the hash address source and hash address destination methods for firewall load balancing (FWLB). (Optional) Selects the server using a hash value based on the destination IP address. (Optional) Selects the server using a hash value based on the source IP address. (Optional) Specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter an integer from 1 to 128. (Optional) Bits in the IP address to use for the hash. If not specified, the default is 255.255.255.255. Selects the server using a hash value based on the specified content string of the HTTP packet body. (Optional) Specifies the portion of the content that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the payload. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the content. (Optional) Specifies the length of the portion of the content (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire payload. The offset and length can vary from 0 to 1000 bytes. If the payload is longer than the offset but shorter than the offset plus the length of the payload, the ACE sticks the connection based on that portion of the payload starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. You cannot specify both the length and the end-pattern options in the same hash content command.
length number2
2-1270
OL-25339-01
begin-pattern expression1
(Optional) Specifies the beginning pattern of the content string and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing the HTTP body immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
end-pattern expression2
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an end pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. You cannot specify both the length and the end-pattern options in the same hash content command.
Selects the server using a hash value based on the cookie name or based on the name in the cookie name of the URL query string. (Optional) Selects the server by using the hash value based on the specified name in the cookie name in the URL query string, not the cookie header. If you do not include this option, the ACE selects a real server using the hash value of the cookie name. Cookie name. Enter a cookie name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
name1
2-1271
Selects the server using a hash value based on the header name. Enter a header name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters, or enter one of the following standard headers:
Accept Accept-Charset Accept-Encoding Accept-Language Authorization Cache-Control Connection Content-MD5 Expect From Host If-Match Pragma Referrer Transfer-Encoding User-Agent Via
hash layer4-payload
Specifies a Layer 4 generic protocol load-balancing method. Use this predictor to load balance packets from protocols that are not explicitly supported by the ACE. (Optional) Specifies the portion of the payload that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the payload. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the payload. (Optional) Specifies the length of the portion of the payload (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire payload. The offset and length can vary from 0 to 1000 bytes. If the payload is longer than the offset but shorter than the offset plus the length of the payload, the ACE sticks the connection based on that portion of the payload starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. You cannot specify both the length and the end-pattern options in the same hash layer4-payload command.
offset number3
length number4
2-1272
OL-25339-01
begin-pattern expression3
(Optional) Specifies the beginning pattern of the Layer 4 payload and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing the HTTP body immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, note that the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
end-pattern expression4
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an end pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. Note: You cannot specify both the length and the end-pattern options in the same hash layer4-payload command.
hash url
Selects the server using a hash value based on the requested URL. Use this predictor method to load balance cache servers. Cache servers perform better with the URL hash method because you can divide the contents of the caches evenly if the traffic is random enough. In a redundant configuration, the cache servers continue to work even if the active ACE switches over to the standby ACE. For information about configuring redundancy, see the Administration Guide, Cisco ACE Application Control Engine. (Optional) Specifies the beginning pattern of the URL and the pattern string to match before hashing. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. If you want to match a URL that contains spaces, you must use \x20 for each space character.
begin-pattern expression5
2-1273
end-pattern expression6
(Optional) Specifies the pattern that marks the end of hashing. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. If you want to match a URL that contains spaces, you must use \x20 for each space character. Selects the server that processed the least amount of network traffic over a specified sampling period. Use this predictor for heavy traffic use, such as downloading a video clip. The ACE measures traffic statistics between itself and the real servers in the server farm in both directions and calculates the bandwidth over the sampling period. Then, it creates an ordered list of real servers based on the sampling results and selects the server that used the least amount of bandwidth during the sampling period. (Optional) Specifies the number of samples over which you want to weight and average the results of the probe query to calculate the final load value. Enter an integer from 1 to 16. Each value must be a power of 2, so the valid values are as follows: 1, 2, 4, 8, and 16. The default is 8. (Optional) Specifies the sampling period over which the ACE measures traffic for all the servers in the server farm. Enter an integer from 1 to 10. The default is 4 seconds. Selects the server with the lowest load based on information obtained from SNMP probes. To use this predictor, you must associate an SNMP probe with the server farm. The ACE queries one user-specified OID (for example, CPU utilization or memory utilization). The ACE uses the retrieved value directly to determine the server with the lowest load. This predictor is not supported with IPv6. Specifies the name of the SNMP probe that you want to query. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the number of samples over which you want to weight and average the results of the probe query to calculate the final load value. Enter an integer from 1 to 16. Each value must be a power of 2, so the valid values are as follows: 1, 2, 4, 8, and 16. The default is 8. Selects the real server with the fewest number of active connections based on the server weight. Use this predictor for processing light user requests (for example, browsing simple static web pages). For information about setting real server weight, see the (config-sfarm-redirect-rs) weight section. (Optional) Specifies that the connections to the real server be in a slow-start mode for the duration indicated by the seconds value. Use the slow-start mechanism to avoid sending a high rate of new connections to servers that you have recently put into service. Enter an integer from 1 to 65535, where 1 is the slowest ramp-up value. By default, slowstart is disabled.
least-bandwidth
samples number5
assess-time seconds
least-loaded
probe name3
samples number6
leastconns
slowstart seconds
2-1274
OL-25339-01
response
Selects the server with the lowest response time for the requested response-time measurement. If you do not specify a response-time measurement method, the ACE uses the HTTP app-req-to-response method. (Default) Measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request. The ACE does not allow you to configure this predictor response in a generic load-balancing policy map. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives a CLOSE from the server. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives the SYN-ACK from the server. (Optional) Specifies the number of samples that you want to average from the results of the response time measurement. Enter an integer from 1 to 16 in powers of 2. Valid values are 1, 2, 4, 8, and 16. The default is 8. (Optional) Specifies the required minimum average response time for a server. If the server response time is greater than the specified threshold value, the ACE removes the server from the load-balancing decision process (takes the server out of service). Enter an integer from 1 to 300000 milliseconds (5 minutes). The default is no threshold (servers are not taken out of service). (Optional) Specifies the number of seconds after which the ACE sends traffic again to a server that was taken out of the load-balancing decision process. The ACE monitors the servers response time. If that response time is less than or equal to the value set with the threshold keyword, the ACE places the server back in service. Enter an integer from 30 to 3600 seconds (1 hour). The default value is 300 seconds (5 minutes) if you configure a threshold without specifying the resume timer. (Default) Selects the next server in the list of real servers based on server weight (weighted round-robin). For information about setting the real server weight, see the (config-sfarm-redirect-rs) weight section.
app-req-to-resp
syn-to-close syn-to-synack
samples number7
threshold milliseconds
resume-timer seconds
roundrobin
Command Modes
Command History
Modification This command was introduced. This command was revised. This secondary option for the hash cookie keywords was added.
2-1275
Modification This command was introduced. This command was revised (reassign keyword added). This secondary option for the hash cookie keywords was added.
Usage Guidelines
Use this command to specify the load-balancing algorithm that the ACE uses in choosing a real server in the server farm. If you do not specify the predictor command, the default algorithm is roundrobin. Using the no form of this command changes the configured predictor algorithm to the default algorithm. The weight assigned to the real servers is used only in the roundrobin and leastconns predictor methods. The hash and the response predictor methods do not recognize the weight for the real servers. For information about setting the real server weight, see the (config-sfarm-redirect-rs) weight section. If you configure the leastconns predictor, you can use a slowstart mechanism (ramp-up) to avoid sending a high rate of new connections to the servers that have just been put in service. The real server with the fewest number of active connections will get the next connection request for the server farm with the leastconns predictor. The ramp-up stops when the duration timer that you specify expires. The only time that the sequence of servers starts over at the beginning (with the first server) is when there is a configuration or server state change (for example, a probe failure). The secondary option allows the ACE to correctly load balance in cases when the query string identifies the actual resource, instead of the URL.
Examples
To configure the ACE to select the real server with the lowest number of connections in the server farm, enter:
host1/Admin(config-sfarm-redirect)# predictor leastconns slowstart 300
Related Commands
(config-sfarm-redirect-rs) weight
(config-sfarm-redirect) probe
Use probes to monitor the health of real servers in a server farm. To associate a probe with a server farm, use the probe command. Use the no form of this command to dissociate a probe from a server farm. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to associate with a server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-1276
OL-25339-01
Command Modes
Command History
Usage Guidelines
The probe must already exist. (To create a probe, see the (config) probe command.) You can associate multiple probes of the same or different protocols with each server farm. You can only configure probes with an IP address in routed mode under a redirect server. You cannot associate a scripted probe with a redirect server.
Examples
Related Commands
(config-sfarm-redirect) rserver
To associate one or more existing redirect real servers with a server farm and access serverfarm redirect real server configuration mode, use the rserver command. The CLI prompt changes to (config-sfarm-redirect-rs). For information on commands in serverfarm redirect real server configuration mode, see the Server Farm Redirect Real Server Configuration Mode Commands section. Use the no form of this command to dissociate the real server from the server farm. rserver name [port] no rserver name [port]
2-1277
Syntax Description
name port
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number used for the real server Port Address Translation (PAT). Enter an integer from 1 to 65535.
Command Modes
Command History
Usage Guidelines
The real server must already exist. To create a real server, see the (config) rserver command. You can associate a maximum of 16,384 real servers with a server farm.
Examples
Related Commands
(config) rserver
2-1278
OL-25339-01
Syntax Description
least-loaded
Selects the server with the lowest load based on information obtained from SNMP probes. To use this predictor, you must associate an SNMP probe with the server farm. The ACE queries one user-specified OID (for example, CPU utilization or memory utilization). The ACE uses the retrieved value directly to determine the server with the lowest load. Specifies the name of the SNMP probe that you want to query. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Selects the server with the lowest response time for the requested response-time measurement. If you do not specify a response-time measurement method, the ACE uses the HTTP app-req-to-response method. (Default) Measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request. The ACE does not allow you to configure this predictor response in a generic load-balancing policy map. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives a CLOSE from the server. Measures the response time from when the ACE sends a TCP SYN to a server to the time that the ACE receives the SYN-ACK from the server. (Optional) Number of samples over which you want to average the results of the response time measurement. Enter an integer from 1 to 16 in powers of 2. Valid values are: 1, 2, 4, 8, and 16. The default is 8.
probe name
response
app-req-to-resp
syn-to-close syn-to-synack
samples number
Command Modes
2-1279
Command History
Usage Guidelines
The commands in this mode require the server-farm feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To specify the least-loaded predictor method with a probe called SNMP_PROBE for the server farm, enter:
host1/Admin(config-sfarm-redirect)# predictor least-loaded probe SNNMP_PROBE host1/Admin(config-sfarm-redirect-predictor)#
To specify the response predictor method that measures the response time from when the ACE sends an HTTP request to a server to the time that the ACE receives a response from the server for that request, enter:
host1/Admin(config-sfarm-redirect)# predictor response host1/Admin(config-sfarm-redirect-predictor)#
app-req-to-resp
Related Commands
show serverfarm detail (config-sfarm-redirect) predictor (config-sfarm-redirect-predictor) autoadjust (config-sfarm-redirect-predictor) weight connection
2-1280
OL-25339-01
(config-sfarm-redirect-predictor) autoadjust
After you specify the predictor least-loaded command, use the autoadjust command to instruct the ACE to apply the maximum load of 16000 to a real server whose load reaches zero or override the default behavior. Use the no form of this command to return the ACE behavior to the reset the behavior of the ACE to the default of average load of the server farm to a real server whose load is zero. autoadjust {average | maxload | off} no autoadjust
Syntax Description
average
Applies the average load of the server farm to a real server whose load is zero. This setting allows the server to participate in load balancing, while preventing it from being flooded by new connections. This is the default setting. Instructs the ACE to apply the maximum load of 16000 to a real server whose load reaches zero. Overrides the default behavior of the ACE of applying the average load of the server farm to a real server whose load is zero. When you configure this command, the ACE sends all new connections to the server that has a load of zero until the next load update arrives from the SNMP probe for this server. If two servers have the same lowest load (either zero or nonzero), the ACE load balances the connections between the two servers in a round-robin manner.
maxload off
Command History
Modification This command was introduced. The average keyword became the default autoadjust setting for the least-loaded predictor. Previously, the default setting was maximum load. The maxload keyword was added to set the least-loaded predictor to maximum load.
Modification This command was introduced. The average keyword became the default autoadjust setting for the least-loaded predictor. Previously, the default setting was maximum load. The maxload keyword was added to set the least-loaded predictor to maximum load.
2-1281
Usage Guidelines
Whenever a servers load reaches zero, by default, the ACE uses the autoadjust feature to assign an average load value to that server to prevent it from being flooded with new incoming connections. The ACE periodically adjusts this load value based on feedback from the servers SNMP probe and other configured options. Using the least-loaded predictor with the configured server weight and the current connection count option enabled, the ACE calculates the final load of a real server as follows: final load = weighted load static weight current connection count where:
weighted load is the load reported by the SNMP probe static weight is the configured weight of the real server current connection count is the total number of active connections to the real server
The ACE recalculates the final load whenever the connection count changes, provided that the weight connection command is configured. If the weight connection command is not configured, the ACE updates the final load when the next load update arrives from the SNMP probe.
Examples
To instruct the ACE to apply the maximum load of the server farm to a real server whose load value reaches zero, enter:
host1/Admin(config-sfarm-redirect-predictor)# autoadjust maxload
To turn off the autoadjust feature for all servers in a server farm so that servers with a load of zero receive all new connections, enter:
host1/Admin(config-sfarm-redirect-predictor)# autoadjust off
To reset the behavior of the ACE to the default of applying the average load value of 16000 to a real server whose load is zero, enter:
host1/Admin(config-sfarm-redirect-predictor)# no autoadjust
Related Commands
2-1282
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
To see how the weight connection command affects the (config-sfarm-redirect-predictor) autoadjust command for the least-loaded predictor, see the Usage Guidelines section of the (config-sfarm-redirect-predictor) autoadjust command.
Examples
To instruct the ACE to use the current connection count in the final load calculation for each real server in the server farm, enter:
host1/Admin(config-sfarm-redirect-predictor)# weight connection
To reset the behavior of the ACE to the default of excluding the current connection count from the load calculation, enter:
host1/Admin(config-sfarm-redirect-predictor)# no weight connection
Related Commands
2-1283
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
Syntax Description
name
Unique identifier of the real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the server-farm feature in your user role unless otherwise specified. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. The redirect real server must already exist. To create a real server, see the (config) rserver redirect command. You can associate a maximum of 16,384 real servers with a server farm.
Examples
2-1284
OL-25339-01
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
Related Commands
2-1285
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
(config-sfarm-redirect-rs) backup-rserver
To configure a backup real server for a real server in a server farm, use the backup-rserver command. If a real server associated with a server farm becomes unavailable, the ACE directs flows to the configured backup real server. Use the no form of this command to remove a backup real server from the configuration. backup-rserver name no backup-rserver
Syntax Description
name
Unique identifier of an existing real server that you want to configure as a backup server in a server farm. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. This command supports cyclic backup of real servers in a server farm. Added support for IPv6.
Usage Guidelines
The real server used as a backup server must already exist. To create a redirect real server, see the (config) rserver redirect command. IPv6 servers can back up IPv4 servers, but only for the HTTP and the HTTPS protocols.
Examples
Related Commands
(config) rserver
2-1286
OL-25339-01
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
(config-sfarm-redirect-rs) conn-limit
To configure the maximum and minimum number of connections that you want to allow for a redirect real server in a server farm, use the conn-limit command. Use the no form of this command to reset the real server maximum connections and minimum connections threshold to the default of 4000000. conn-limit max maxconns min minconns no conn-limit
Syntax Description
Specifies the maximum number of connections allowed for this real server. Enter an integer from 2 to 4000000. The default is 4000000. Specifies the connection threshold below which the real server will start accepting connections again after the number of connections exceeds the configured maximum number of connections. Enter an integer from 2 to 4000000. The default is minconns equal to maxconns.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
Usage Guidelines
Use this command to specify the maximum number of connections and the minimum connection threshold for a redirect real server in a server farm. The minconns value must be less than or equal to the maxconns value. The ACE uses the minconns value as a threshold to start accepting connections again after the maxconns limit is exceeded.
Examples
To configure the maximum number of connections and the minimum connection threshold for a redirect real server, enter:
host1/Admin(config-sfarm-redirect-rs)# conn-limit max 65535 min 40000
To reset the maximum number of connections and the minimum connection threshold for a redirect real server to the default of 4000000, enter:
host1/Admin(config-sfarm-redirect-rs)# no conn-limit
Related Commands
(config-sfarm-redirect-rs) rate-limit
2-1287
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
(config-sfarm-redirect-rs) inservice
To place a real server associated with a server farm in service, use the inservice command. Use the no form of this command to take a real server out of service. inservice [standby] no inservice
Syntax Description
standby
(Optional) Used with backup real servers, specifies that a backup real server remain inactive unless the primary real server fails. If the primary fails, the backup server becomes active and starts accepting connections.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
This command requires the real-inservice feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. To start load-balancing connections to a real server in a server farm, you must place the real server in service by using the inservice command. You can modify the attributes of a real server in a server farm without taking the server out of service. In addition to putting a backup real server in service standby, another use of the inservice standby command is to provide the graceful shutdown of primary real servers. Use this command to gracefully shut down servers with sticky connections. When you enter this command for a primary real server, the ACE does the following:
Tears down existing non-TCP connections to the server Allows current TCP connections to complete Allows new sticky connections for existing server connections that match entries in the sticky database Load balances all new connections (other than the matching sticky connections mentioned above) to the other servers in the server farm Eventually takes the server out of service
2-1288
OL-25339-01
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
Examples
To perform a graceful shutdown on a primary real server with sticky connections in a server farm, enter:
host1/Admin(config-sfarm-host-rs)# inservice standby
Related Commands
2-1289
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
(config-sfarm-host-rs) probe
To configure a probe to monitor the health of a redirect real server in a redirect server farm, use the probe command. Use the no form of this command to remove the probe from the real server. probe probe-name no probe probe-name
Syntax Description
probe-name
Identifier of an existing probe that you want to assign to a real server to monitor its health. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
ACE Module Release A2(3.2). Not applicable for A4(1.0). ACE Appliance Release A3(2.7). Not applicable for A4(1.0).
Usage Guidelines
You can associate multiple probes with each real server. The ACE periodically sends the probes to the real servers. If the ACE receives the appropriate responses from the servers, the ACE includes the servers in load-balancing decisions. If not, the ACE marks the servers as out of service, depending on the configured number of retries. You can only configure probes with an IP address in routed mode under a redirect server. You cannot associate a scripted probe with a redirect server.
Examples
Related Commands
(config-probe-probe_type) ip address
2-1290
OL-25339-01
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
(config-sfarm-redirect-rs) rate-limit
To configure a limit for the connection rate and the bandwidth rate of a real server in a redirect server farm, use the rate-limit command. The connection rate is the number of connections per second received by the ACE and destined to a particular redirect real server. The bandwidth rate is the number of bytes per second received by the ACE and destined for a particular redirect real server. Use the no form of this command to revert to the ACE default of not limiting the connection rate or bandwidth rate of real servers in a server farm. rate-limit {connection number1 | bandwidth number2} no rate-limit {connection | bandwidth}
Syntax Description
Specifies the real server connection-rate limit in connections per second. Enter an integer from 2 to 350000. There is no default value. Specifies the real server bandwidth-rate limit in bytes per second. Enter an integer from 2 to 300000000. There is no default value.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
Usage Guidelines
If the connection rate or the bandwidth rate of incoming traffic destined for a particular real server exceeds the configured rate for the server, the ACE blocks any further traffic destined to that real server until the connection rate or bandwidth rate drops below the configured limit. Also, the ACE removes the blocked real server from future load-balancing decisions. By default, the ACE does not limit the connection rate or the bandwidth rate of real servers in a server farm.
Examples
To limit the connection rate of a real server to 100,000 connections per second, enter:
host1/Admin(config-sfarm-redir-rs)# rate-limit connection 100000
To revert to the ACE default of not limiting the real-server connection rate, enter:
host1/Admin(config-sfarm-redir-rs)# no rate-limit connection
To limit the real-server bandwidth rate to 5,000,000 bytes per second, enter:
host1/Admin(config-sfarm-redir-rs)# rate-limit bandwidth 5000000
2-1291
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
Related Commands
(config-sfarm-redirect-rs) conn-limit
(config-sfarm-redirect-rs) weight
To configure the capacity of a real server in relation to other servers in a server farm, use the weight command. The weight value that you specify for a server is used in the weighted round-robin and least-connections predictor load-balancing methods. Use the no form of this command to reset the real server weight to the default. weight number no weight
Syntax Description
number
Weight value assigned to a real server in a server farm. This value is used in the weighted round-robin and least-connections predictor load-balancing algorithms. Enter an integer from 1 to 100. The default is 8.
Command Modes
Serverfarm redirect real server configuration mode Admin and user contexts
Command History
Usage Guidelines
Servers with higher weight values receive a proportionally higher number of connections than servers with lower weight values. To specify different weight values for a redirect real server in a server farm, you can assign multiple IP addresses to the server.
Examples
2-1292
OL-25339-01
Chapter 2 CLI Commands Server Farm Redirect Real Server Configuration Mode Commands
Related Commands
(config-sfarm-redirect) predictor
2-1293
Syntax Description
pservice_name
Name of the SSL proxy service. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the SSL feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. When you create a SSL proxy service, the CLI changes to the SSL proxy configuration mode, where you define the following SSL proxy service attributes:
Client authentication groupSee the (config-ssl-proxy) authgroup command. CertificateSee the (config-ssl-proxy) cert command. Client authentication using CRLsSee the (config-ssl-proxy) crl command Chain groupSee the (config-ssl-proxy) chaingroup command. Key pairSee the (config-ssl-proxy) key command. Parameter mapSee the (config-ssl-proxy) ssl advanced-options command.
Examples
2-1294
OL-25339-01
Related Commands
(config-ssl-proxy) authgroup (config-ssl-proxy) cert (config-ssl-proxy) chaingroup (config-ssl-proxy) key (config-ssl-proxy) ssl advanced-options
(config-ssl-proxy) authgroup
To specify the certificate authentication group that the ACE uses during the Secure Sockets Layer (SSL) handshake and enable client authentication on this SSL-proxy service, use the authgroup command. Use the no form of this command to delete a certificate authentication group from the SSL proxy service. authgroup group_name no authgroup group_name
Syntax Description
group_name
Command Modes
Command History
Usage Guidelines
When you enable client authentication, a significant performance decrease may occur in the ACE ACE.
Examples
To delete the certificate authentication group AUTH-CERT1 from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no authgroup AUTH-CERT1
Related Commands
2-1295
2-1296
OL-25339-01
(config-ssl-proxy) cert
To specify the certificate that the ACE uses during the Secure Sockets Layer (SSL) handshake to prove its identity, use the cert command. Use the no form of this command to delete a certificate file from the SSL proxy service. cert cert_filename | cisco-sample-key no cert cert_filename | cisco-sample-key
Syntax Description
name
Name of an existing certificate file loaded on the ACE. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. To display a list of available certificate files, use the do show crypto files command. Specifies the self-signed certificate named cisco-sample-cert that is preinstalled on the ACE. This file is available for use in any context with the filename remaining the same in each context.
cisco-sample-cert
Command Modes
Command History
Usage Guidelines
The public key embedded in the certificate that you select must match the public key in the key pair file that you select. To verify that the public keys in the two files match, use the crypto verify command in the Exec mode.
Examples
To delete the certificate in the certificate file MYCERT.PEM from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no cert MYCERT.PEM
Related Commands
crypto verify
2-1297
(config) crypto chaingroup (config-ssl-proxy) authgroup (config-ssl-proxy) chaingroup (config-ssl-proxy) key (config-ssl-proxy) ssl advanced-options
2-1298
OL-25339-01
(config-ssl-proxy) chaingroup
To specify the certificate chain group that the ACE sends to its peer during the Secure Sockets Layer (SSL) handshake, use the chaingroup command. Use the no form of this command to delete a certificate chain group from the SSL proxy service. chaingroup group_name no chaingroup group_name
Syntax Description
group_name
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
The ACE includes the certificate chain with the certificate that you specified for the SSL proxy service. When a change occurs in a chain-group certificate, the change takes effect when you read the associated chain group through the chaingroup command.
Examples
To configure the ACE SSL proxy service to send the certificate chain group MYCHAINGROUP to its peer during the SSL handshake, enter:
host1/Admin(config-ssl-proxy)# chaingroup MYCHAINGROUP
To delete the certificate chain group MYCHAINGROUP from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no chaingroup MYCHAINGROUP
Related Commands
(config) crypto chaingroup (config-ssl-proxy) authgroup (config-ssl-proxy) cert (config-ssl-proxy) key (config-ssl-proxy) ssl advanced-options
2-1299
(config-ssl-proxy) crl
To determine which certificate revocation lists (CRLs) to use for client or server authentication, use the crl command. Use the no form of this command to disable the use of CRL certificates during authentication. crl crl_name | best- effort no crl crl_name | best-effort
Syntax Description
crl_name best-effort
Name that you assigned to the CRL when you downloaded it using the configuration mode crypto crl command. See (config) crypto crl for more information. Specifies that the ACE scans each certificate to determine if it contains a CDP pointing to a CRL in the certificate extension and then retrieves the CRLs from that location, if the CDP is valid.
Command Modes
Command History
Modification This command was introduced. This command was revised for server authentication.
Modification This command was introduced. This command was revised for server authentication and the CRLs per context were increased from four to eight.
Usage Guidelines
By default, the ACE does not use CRLs during client or server authentication. You can configure the SSL proxy service to use a CRL by either of the following methods:
The ACE can scan each certificate for the service to determine if it contains a CRL Distribution Point (CDP) pointing to a CRL in the certificate extension and then retrieve the CRL from that location if the CDP is valid. If the CDP has an http:// or ldap:// based URL, it uses the URL to download the CRL to the ACE module. You can manually configure the download location for the CRL from which the ACE retrieves it.
You can configure a maximum of eight CRLs per context. By default, the ACE does not reject certificates when the CRL in use has passed its update date. To configure the ACE to reject certificates when the CRL is expired, use the expired-crl reject command in parameter map SSL configuration mode.
2-1300
OL-25339-01
The ACE considers only the first four CDPs. From the CDPs obtained from certificate, the ACE only considers valid and complete CDPs for the downloading of the CRLs. If a CDP leads to the successful downloading of the CRL, ACE does not consider the subsequent CDPs for CRL downloads. If none of the first four CDPs present in the certificate are valid to proceed with the downloading of the CRL, the ACE considers the certificate as revoked unless you configured the authentication-failure ignore command in parameter map SSL configuration mode. If the ACE fails to download a CRL after trying four valid CDPs, the ACE aborts its initiated SSL connection unless you configured the authentication-failure ignore command in parameter map SSL configuration mode. If the ACE detects CDP errors in the presented certificates or errors that occur during a CRL download, the ACE rejects the SSL connection unless you configured the cdp-errors ignore command in parameter map SSL configuration mode The ACE skips malformed CDPs and processes subsequent CDPs. To display CDP error statistics including the number of malformed CDPs, use the show crypto cdp-errors command.
Examples
To enable the CRL1 CRL for authentication on an SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# crl CRL1
Related Commands
crypto crlparams (config) crypto crl (config-parammap-ssl) authentication-failure (config-parammap-ssl) cdp-errors ignore (config-parammap-ssl) expired-crl reject (config-ssl-proxy) authgroup (config-ssl-proxy) cert (config-ssl-proxy) chaingroup (config-ssl-proxy) key (config-ssl-proxy) ssl advanced-options
2-1301
(config-ssl-proxy) key
To specify the key pair that the ACE uses during the Secure Sockets Layer (SSL) handshake for data encryption, use the key command. Use the no form of this command to delete a private key from the SSL proxy service. key key_filename | cisco-sample-key no key key_filename | cisco-sample-key
Syntax Description
key_filename cisco-sample-key
Name of an existing key pair file loaded on the ACE. Enter an unquoted text string with no spaces and a maximum of 40 alphanumeric characters. Specifies the sample RSA 1024-bit key pair named cisco-sample-key that is preinstalled on the ACE. This file is available for use in any context with the filename remaining the same in each context.
Command Modes
Command History
Usage Guidelines
The public key in the key pair file that you select must match the public key embedded in the certificate that you select. To verify that the public keys in the two files match, use the crypto verify command in the Exec mode.
Examples
To specify the private key in the key pair file MYKEY.PEM for the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# key MYKEY.PEM
To delete the private key in the key pair file MYKEY.PEM from the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no key MYKEY.PEM
Related Commands
2-1302
OL-25339-01
2-1303
(config-ssl-proxy) ocspserver
To apply an OCSP server to an SSL proxy service, use the ocspserver command. Use the no form of this command to remove the association of an OCSP server with the SSL proxy service. ocspserver ocsp_server_name | best-effort no ocspserver ocsp_server_name | best-effort
Syntax Description
ocsp_server_name Identifier of an OCSP server that you want to apply to this SSL proxy service. Enter the name of an existing OCSP server as a text string with no spaces and a maximum of 64 alphanumeric characters. best-effort Specifies that the ACE attempts to obtain certificate revocation information from an OCSP server on a best-effort basis. When you configure this keyword, the ACE extracts the OCSP server information (up to four OCSP server information elements) from the client certificate. This keyword forces the ACE to look for the AuthorityInfoAccess (AIA) extension in the incoming client or server certificates.
Command Modes
Command History
Usage Guidelines
You can apply a maximum of 10 OCSP servers to an SSL proxy service. The format of the AIA extension is as follows:
authorityInfoAccess = OCSP;URI: http://test1.ocsp.ve/,OCSP;URI:http://test2.ocsp.ve/
If this extension is missing from a certificate when best-effort is configured, the certificate is considered to be revoked.
Examples
to apply the OCSP_SERVER1 OCSP server to the PSERVICE_SERVER SSL proxy service, enter the following commands:
host1/Admin(config)# ssl-proxy service PSERVICE_SERVER host1/Admin(config-ssl-proxy)# ocspserver OCSP_SERVER1
To apply a best-effort OCSP server to an SSL proxy service, enter the following commands:
host1/Admin(config)# ssl-proxy service PSERVICE_SERVER
2-1304
OL-25339-01
To remove an OCSP server from an SSL proxy service, enter the following command;
host1/Admin(config-ssl-proxy)# no ocspserver OCSP_SERVER1
Related Commands
2-1305
(config-ssl-proxy) revcheckprio
When you configure both OCSP and CRLs in the same SSL proxy service, you can control the order in which the ACE uses these two resources to check the revocation status of SSL certificates. To configure the order of revocation checking, use the revcheckprio command. Use the no form of this command to reset the ACE behavior to the default of checking the OCSP server first and then the CRLs for certificate revocation. revcheckprio crl-ocsp | ocsp-crl no revcheckprio crl-ocsp | ocsp-crl
Syntax Description
crl-ocsp ocsp-crl
Instructs the ACE to use a CRLs first and then OCSP to determine the revocation status of a client SSL certificate. (Default) Instructs the ACE to use OSCP first and then CRLs to determine the revocation status of a client SSL certificate.
Command Modes
Command History
Usage Guidelines
If either OCSP or CRLs, but not both methods, are applied to an SSL proxy service, this command is not configurable. The coexistence of CRLs and OCSP server information and traversal through them may lead to extended handshake completion time and the overall performance of the ACE may degrade. You can apply a maximum of 10 OCSP servers to an SSL proxy service. The format of the AIA extension is as follows:
authorityInfoAccess = OCSP;URI: http://test1.ocsp.ve/,OCSP;URI:http://test2.ocsp.ve/
If this extension is missing from a certificate when best-effort is configured, the certificate is considered to be revoked. The default revocation check priority order (revcheckprio ocsp-crl) is not displayed in the output of the show running-config command even if that priority order is configured.
Examples
To configure the ACE to check revocation status with CRLs first and then OCSP, enter the following commands:
2-1306
OL-25339-01
To reset the ACE behavior to the default of checking the OCSP server first and then the CRLs for certificate revocation, enter the following command:
host1/Admin(config-ssl-proxy)# no revcheckprio crl-ocsp
Related Commands
2-1307
Syntax Description
parammap_name
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
Examples
To associate the parameter map PARAMMAP_SSL with the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# ssl advanced-options PARAMMAP_SSL
To remove the association of an SSL parameter map PARAMMAP_SSL with the SSL proxy service, enter:
host1/Admin(config-ssl-proxy)# no ssl advanced-options PARAMMAP_SSL
Related Commands
(config) parameter-map type (config-ssl-proxy) authgroup (config-ssl-proxy) cert (config-ssl-proxy) chaingroup (config-ssl-proxy) key
2-1308
OL-25339-01
Syntax Description
name1
Cookie value from the HTTP header of the client request or from the Set-Cookie message from the server. Enter a unique identifier for the cookie with a maximum of 64 alphanumeric characters. Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
name2
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups in the ACE. By default, the maximum number of bytes that the ACE parses to check for a cookie, HTTP header, or URL is 2048. If a cookie, HTTP header, or URL exceeds the default value, the ACE drops the packet and sends a RST (reset) to the client browser. You can increase the number of bytes that the ACE parses using the (config-parammap-http) set header-maxparse-length command in HTTP parameter-map configuration mode. You can also change the default behavior of the ACE when a cookie, header, or URL exceeds the maximum parse length using the (config-parammap-http) length-exceed command in HTTP parameter-map configuration mode.
2-1309
Examples
Related Commands
show running-config show sticky database (config) sticky http-header (config) sticky ip-netmask
Syntax Description
browser-expire
(Optional) Allows the clients browser to expire a cookie when the session ends.
Command Modes
Command History
Usage Guidelines
With cookie insertion enabled, the ACE inserts the cookie in the Set-Cookie header of the response from the server to the client. The ACE selects a cookie value that identifies the original server from which the client received a response. For subsequent connections of the same transaction, the client uses the cookie to stick to the same server. With either TCP server reuse or persistence rebalance enabled, the ACE inserts a cookie in every client request. See the (config-parammap-http) server-conn reuse or (config-parammap-http) persistence-rebalance commands.
2-1310
OL-25339-01
Examples
Related Commands
(config-sticky-cookie) cookie
To configure the cookie offset and length, use the cookie command. Use the no form of this command to remove the cookie offset and length from the configuration. cookie offset number1 [length number2] no cookie offset number1 [length number2]
Syntax Description
offset number1
Specifies the portion of the cookie that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the cookie. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the cookie. (Optional) Specifies the length of the portion of the cookie (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is 1000.
length number2
Command Modes
Command History
Usage Guidelines
An HTTP cookie value may change over time with only a portion remaining constant throughout a transaction between the client and a server. You can configure the ACE to use the constant portion of a cookie to make persistent connections to a specific server. The ACE stores cookie offset and length values in the sticky table.
2-1311
The offset and length can vary from 0 to 1000 bytes. If the content string is longer than the offset but shorter than the offset plus the length of the string, the ACE sticks the connection based on that portion of the content starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000.
Examples
To remove the cookie offset and length from the configuration, enter:
host1/Admin(config-sticky-cookie)# no cookie offset 300 length 900
Related Commands
Syntax Description
name
Name of the secondary cookie. Enter a cookie name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
You can configure an alternative cookie name that appears in the URL string of the web page on the server. The ACE uses this cookie to maintain a sticky connection between a client and a server and adds a secondary entry in the sticky table.
2-1312
OL-25339-01
Examples
Related Commands
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate HTTP cookie sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate HTTP cookie sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-cookie)# replicate sticky
To restore the ACE to its default of not replicating HTTP cookie sticky table entries, enter:
host1/Admin(config-sticky-cookie)# no replicate sticky
Related Commands
2-1313
(config-sticky-cookie) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1314
OL-25339-01
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-cookie)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
Syntax Description
value
Cookie string value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. Alternatively, you can enter a text string with spaces provided that you enclose the string in quotation marks (). Specifies the hostname of an existing real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
2-1315
Usage Guidelines
You can configure the ACE to use static cookies from entries based on cookie values and, optionally, real server names and ports. Static cookie values remain constant over time. You can configure multiple static cookie entries, but only one unique real-server name can exist for a given static cookie value. When you configure a static entry, the ACE enters it into the sticky table immediately. You can create a maximum of 4096 static sticky entries in the ACE.
Examples
Related Commands
(config-sticky-cookie) timeout
To configure an HTTP cookie sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes. timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Length of time in minutes that the ACE ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 0 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that a sticky entry is timed out when the timer expires even if there are active connections associated with the sticky entry.
activeconns
Command Modes
Command History
2-1316
OL-25339-01
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the HTTP cookie sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. When you configure sticky timeout for an HTTP cookie, the timeout translates into the expiration date for the cookie. This expiration date can be longer than the actual timeout specified in the timeout command, with sometimes as much as 20 to 25 minutes added to the expiration date. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out HTTP cookie sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To set the duration for sticky connections between a client and a real server to 720 minutes, enter:
host1/Admin(config-sticky-cookie)# timeout 720
To configure the ACE to time out HTTP cookie sticky entries even if active connections exist for those entries, enter:
host1/Admin(config-sticky-cookie)# timeout activeconns
To restore the ACE to its default of not timing out HTTP cookie sticky entries if active connections exist for those entries, enter:
host1/Admin(config-sticky-cookie)# no timeout activeconns
Related Commands
Syntax Description
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-1317
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups on the ACE.
Examples
Related Commands
(config-sticky-content) content
To define the portion of the HTTP packet contents that you want the ACE to match, use the content command. Using this command, you can specify offset and length values and a beginning and ending pattern based on a regular expression. The ACE stores these values in the sticky table and uses them to stick a client to a particular server. Use the no form of this command to remove the HTTP content specification from the sticky table. content [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2] no content [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2]
2-1318
OL-25339-01
Syntax Description
offset number1
(Optional) Specifies the portion of the content that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the content. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the content. (Optional) Specifies the length of the portion of the content (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire content. The offset and length can vary from 0 to 1000 bytes. If the content string is longer than the offset but shorter than the offset plus the length of the string, the ACE sticks the connection based on that portion of the content starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. You cannot specify both the length and the end-pattern options in the same content command.
length number2
begin-pattern expression1
(Optional) Specifies the beginning pattern of the HTTP packet content payload and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
end-pattern expression2
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an ending pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. You cannot specify both the length and the end-pattern options in the same content command.
Command Modes
2-1319
Command History
Usage Guidelines
The contents of an HTTP packet may change over time with only a portion remaining constant throughout a transaction between the client and a server. You can configure the ACE to use the constant portion of the HTTP packet content to make persistent connections to a specific server. To define the portion of the packet content that you want the ACE to use, you specify offset and length values and a beginning and ending pattern. The ACE stores these values in the sticky table.
Examples
To create an HTTP packet content specification that the ACE will use to stick traffic to a server, enter:
host1/Admin(config-sticky-content)# content offset 250 length 750 begin-pattern abc123.*
To remove the HTTP packet content specification from the configuration, enter:
host1/Admin(config-sticky-content)# no content
Related Commands
Syntax Description
Command Modes
Command History
2-1320
OL-25339-01
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate HTTP content sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate HTTP content sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-content)# replicate sticky
To restore the ACE default of not replicating HTTP content sticky table entries, enter:
host1/Admin(config-sticky-content)# no replicate sticky
Related Commands
(config-sticky-content) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
backup name2
2-1321
sticky aggregate-state
(Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with an HTTP content sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-content)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
2-1322
OL-25339-01
Syntax Description
value
Content string value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can enter a text string with spaces provided that you enclose the entire string in quotation marks (). Specifies that the static entry is based on the real server name. Enter the name of an existing real server as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
Usage Guidelines
You can configure the ACE to use static sticky table entries based on the HTTP content and optionally, the real server name and port. Static sticky HTTP content entries remain constant over time. You can configure multiple static content entries, but only one unique real-server name can exist for a given static content string. When you configure a static entry, the ACE enters it into the sticky table immediately. You can configure a maximum of 4096 static sticky entries in the ACE.
Examples
To configure a static sticky entry based on the HTTP content and the server name and port number, enter:
host1/Admin(config-sticky-content)# static content STINGRAY rserver SERVER1 4000
To remove the static HTTP content entry from the sticky table, enter:
host1/Admin(config-sticky-content)# no static content STINGRAY rserver SERVER1 4000
Related Commands
2-1323
(config-sticky-content) timeout
To configure an HTTP content sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes (24 hours). timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the sticky timer expires even if there are active connections.
activeconns
Command Modes
Command History
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the HTTP content sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out HTTP content sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To reset the timeout to the default value of 1440 minutes (24 hours), enter:
host1/Admin(config-sticky-content)# no timeout 720
To specify that the ACE time out HTTP content sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-content)# timeout activeconns
2-1324
OL-25339-01
To restore the ACE to its default of not timing out HTTP content sticky entries if active connections exist for those entries, enter:
host1/Admin(config-sticky-content)# no timeout activeconns
Related Commands
Syntax Description
name1
HTTP header name. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. Alternatively, you can enter one of the standard HTTP headers described in Table 1-23. Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
name2
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups in the ACE.
2-1325
By default, the maximum number of bytes that the ACE parses to check for a cookie, HTTP header, or URL is 2048. If a cookie, HTTP header, or URL exceeds the default value, the ACE drops the packet and sends a RST (reset) to the client browser. You can increase the number of bytes that the ACE parses using the (config-parammap-http) set header-maxparse-length command in HTTP parameter-map configuration mode. You can also change the default behavior of the ACE when a cookie, header, or URL exceeds the maximum parse length using the (config-parammap-http) length-exceed command in HTTP parameter-map configuration mode. Table 1-23 lists and describes the standard HTTP header names.
Table 1-23 HTTP Header Names
Description Semicolon-separated list of representation schemes (content type metainformation values) that will be accepted in the response to the request. Character sets that are acceptable for the response. This field allows clients that can understand more comprehensive or special-purpose character sets to signal that capability to a server that can represent documents in those character sets. Restricts the content encoding that a user will accept from the server. ISO code for the language in which the document is written. The language code is an ISO 3316 language code with an optional ISO 639 country code to specify a national variant. Specifies that the user agent wants to authenticate itself with a server, usually after receiving a 401 response. Directives that must be obeyed by all caching mechanisms on the request/response chain. The directives specify behavior intended to prevent caches from adversely interfering with the request or response. Allows the sender to specify connection options. MD5 digest of the entity body that provides an end-to-end integrity check. Only a client or an origin server can generate this header field. Used by a client to inform the server about the behaviors that the client requires. E-mail address of the person who controls the requesting user agent. Internet host and port number of the resource being requested, as obtained from the original URI given by the user or referring resource. The Host field value must represent the naming authority of the origin server or gateway given by the original URL. Used with a method to make it conditional. A client that has one or more entities previously obtained from the resource can verify that one of those entities is current by including a list of their associated entity tags in the If-Match header field. This feature allows efficient updates of cached information with a minimum amount of transaction overhead. It is also used, on updating requests, to prevent inadvertent modification of the wrong version of a resource. As a special case, the asterisk (*) value matches any current entity of the resource.
Accept-Encoding Accept-Language
Authorization Cache-Control
If-Match
2-1326
OL-25339-01
Description Pragma directives that are understood by servers to which the directives are relevant. The syntax is the same as for other multiple-value fields in HTTP. For example, the accept field is a comma-separated list of entries for which the optional parameters are separated by semicolons. Address (URI) of the resource from which the URI in the request was obtained. What (if any) type of transformation has been applied to the message body in order to safely transfer it between the sender and the recipient. Information about the user agent (for example, a software program originating the request). This information is for statistical purposes, the tracing of protocol violations, and automated recognition of user agents for tailoring responses to avoid user agent limitations. Used by gateways and proxies to indicate the intermediate protocols and recipients between the user agent and the server on requests and between the origin server and the client on responses.
Via
Examples
Related Commands
show running-config show sticky database (config) sticky http-cookie (config) sticky ip-netmask
(config-sticky-header) header
To configure the HTTP header offset and length, use the header command. Use the no form of this command to remove the HTTP header offset and length values from the configuration. header offset number1 [length number2] no header offset number1 [length number2]
2-1327
Syntax Description
offset number1
Specifies the portion of the HTTP header that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the HTTP header. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the header. (Optional) Specifies the length of the portion of the HTTP header (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is 1000.
length number2
Command Modes
Command History
Usage Guidelines
The ACE stores header offset and length values in the sticky table. You can configure the ACE to use a portion of an HTTP header to make persistent connections to a specific server. To define the portion of the HTTP header that you want the ACE to use, you specify HTTP header offset and length values. The offset and length can vary from 0 to 1000 bytes. The ACE sticks the connection based on that portion of the HTTP header that starts with the byte after the offset value and ends with the byte specified by the offset plus the length. The total bytes represented by the header offset and length cannot exceed 1000.
Examples
To remove the HTTP header offset and length values from the configuration, enter:
host1/Admin(config-sticky-header)# no header offset 300 length 900
Related Commands
2-1328
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate HTTP header sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate HTTP header sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-header)# replicate sticky
To restore the ACE to its default of not replicating HTTP header sticky table entries, enter:
host1/Admin(config-sticky-header)# no replicate sticky
Related Commands
2-1329
(config-sticky-header) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1330
OL-25339-01
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-header)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
2-1331
Syntax Description
value
Header string value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. Alternatively, you can enter a text string with spaces provided that you enclose the entire string in quotation marks (). Specifies the hostname of an existing real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
Usage Guidelines
You can configure the ACE to use static header sticky entries based on HTTP header values and optionally, real server names and ports. Static sticky header values remain constant over time. You can configure multiple static header entries, but only one unique real-server name can exist for a given static header sticky value. When you configure a static entry, the ACE enters it into the sticky table immediately. You can create a maximum of 4096 static sticky entries in the ACE.
Examples
Related Commands
2-1332
OL-25339-01
(config-sticky-header) timeout
To configure an HTTP header sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes. timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Length of time in minutes that the ACE ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the timer expires even if there are active connections.
activeconns
Command Modes
Command History
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the HTTP header sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out HTTP header sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To reset the timeout to the default value of 1440 minutes (24 hours), enter:
host1/Admin(config-sticky-header)# no timeout 720
To specify that the ACE time out HTTP header sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-content)# timeout activeconns
2-1333
To restore the ACE to its default of not timing out HTTP header sticky entries if active connections exist for those entries, enter:
host1/Admin(config-sticky-header)# no timeout activeconns
Related Commands
Syntax Description
v6-prefix prefix_length
IPv6 prefix that specifies how many of the most significant bits (MSBs) of the IPv6 address are used for the network identifier. Enter an integer from 1 to 128. Network mask that the ACE applies to the IP address. Enter a network mask in dotted-decimal notation (for example, 255.255.255.0).
Note
netmask
(ACE module only) If you configure a network mask other than 255.255.255.255 (/32), the ACE may populate the sticky entries only on one of its two network processors which may reduce the number of available sticky entries by 50 percent. This reduction in resources can cause problems when heavy sticky use occurs on the ACE.
address {source | destination Specifies the IP address used for stickiness. Enter one of the | both} following keywords:
sourceSpecifies that the ACE use the client source IP address to stick the client to a server. You use this keyword in web application environments. destinationSpecifies that the ACE use the destination address specified in the client request to stick the client to a server. You use this keyword in caching environments. bothSpecifies that the ACE use both the source IP address and the destination IP address to stick the client to a server.
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Configuration mode
2-1334
OL-25339-01
Command History
Modification This command was introduced. Added the v6-prefix keyword and argument.
Modification This command was introduced. Added the v6-prefix keyword and argument.
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups on the ACE.
Examples
IPv6 Example
To create a sticky group that uses IPv6 address stickiness based on both the source IPv6 address and the destination IPv6 address, enter:
host1/Admin(config)# sticky v6-prefix 64 address both GROUP1 host1/Admin(config-sticky-ip)#
IPv4 Example
To create a sticky group that uses IPv4 address stickiness based on both the source IP address and the destination IPv4 address, enter:
host1/Admin(config)# sticky ip-netmask 255.255.255.255 address both GROUP1 host1/Admin(config-sticky-ip)#
Related Commands
show running-config show sticky database (config) sticky http-cookie (config) sticky http-header
2-1335
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate IP address sticky table entries on the standby ACE so that, if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate IP address sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-ip)# replicate sticky
To restore the ACE default of not replicating IP address sticky table entries, enter:
host1/Admin(config-sticky-ip)# no replicate sticky
Related Commands
2-1336
OL-25339-01
(config-sticky-ip) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1337
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-ip)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
Syntax Description
source ip-address
Specifies that the static entry is based on the source IP address. Enter an IP address in dotted-decimal notation (for example, 192.168.12.15). Specifies that the static entry is based on the real server name. Enter the name of an existing real server as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
rserver name
2-1338
OL-25339-01
(Optional) Port number of the real server. Enter an integer from 1 to 65535. Specifies that the static entry is based on the destination IP address. Enter an IP address in dotted-decimal notation (for example, 172.16.27.3).
Command Modes
Command History
Usage Guidelines
You can configure static sticky table entries based on the IPv6 or IPv4 source IP address, the destination IP address, or the real server name and port. Static sticky-IP values remain constant over time and you can configure multiple static entries. When you configure a static entry, the ACE enters it into the sticky table immediately. You can configure a maximum of 4096 static sticky entries in the ACE.
Examples
IPv6 Example
To configure a static sticky entry based on the source IP address, the destination IP address, and the server name and port number, enter:
host1/Admin(config-sticky-ip)# static client source 2001:DB8:12::15 destination 2001:DB8:27::3 rserver SERVER1 2000
IPv4 Example
To configure a static sticky entry based on the source IP address, the destination IP address, and the server name and port number, enter:
host1/Admin(config-sticky-ip)# static client source 192.168.12.15 destination 172.16.27.3 rserver SERVER1 2000
2-1339
Related Commands
2-1340
OL-25339-01
(config-sticky-ip) timeout
To configure an IP address sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes (24 hours). timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the timer expires even if there are active connections.
activeconns
Command Modes
Command History
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps (if possible) the IP address sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection or receives a new HTTP GET on an existing connection matching that entry. High connection rates may cause the sticky table entries to age out prematurely. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out IP address sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To specify that the ACE time out IP address sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-ip)# timeout activeconns
To restore the ACE to its default of not timing out IP address sticky entries if active connections exist, enter:
host1/Admin(config-sticky-ip)# no timeout activeconns
2-1341
Related Commands
Syntax Description
name
Unique identifier of the sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups on the ACE.
Examples
2-1342
OL-25339-01
Related Commands
2-1343
(config-sticky-l4payloa) layer4-payload
To define the portion of the payload that you want the ACE to match, use the layer4-payload command. Using this command, you can specify payload offset and length values and a beginning and ending pattern based on a regular expression. The ACE stores these values in the sticky table and uses them to stick a client to a particular server. Use the no form of this command to remove the Layer 4 payload specification from the sticky table. layer4-payload [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2] no layer4-payload [offset number1] [length number2] [begin-pattern expression1] [end-pattern expression2]
Syntax Description
offset number1
(Optional) Specifies the portion of the payload that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the payload. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the payload. (Optional) Specifies the length of the portion of the payload (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is the entire payload. The offset and length can vary from 0 to 1000 bytes. If the payload is longer than the offset but shorter than the offset plus the length of the payload, the ACE sticks the connection based on that portion of the payload starting with the byte after the offset value and ending with the byte specified by the offset plus the length. The total of the offset and the length cannot exceed 1000. You cannot specify both the length and the end-pattern options in the same layer4-payload command.
length number2
begin-pattern expression1
(Optional) Specifies the beginning pattern of the Layer 4 payload and the pattern string to match before hashing. If you do not specify a beginning pattern, the ACE starts parsing immediately following the offset byte. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. When matching data strings, the period (.) and question mark (?) characters do not have a literal meaning in regular expressions. Use brackets ([]) to match these symbols (for example, enter www[.]xyz[.]com instead of www.xyz.com). You can also use a backslash (\) to escape a dot (.) or a question mark (?).
2-1344
OL-25339-01
end-pattern expression2
(Optional) Specifies the pattern that marks the end of hashing. If you do not specify either a length or an ending pattern, the ACE continues to parse the data until it reaches the end of the field or the end of the packet, or until it reaches the maximum body parse length. You cannot configure different beginning and ending patterns for different server farms that are part of the same traffic classification. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters for each pattern that you configure. You can enter a text string with spaces if you enclose the entire string in quotation marks (). The ACE supports the use of regular expressions for matching string expressions. You cannot specify both the length and the end-pattern options in the same layer4-payload command.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
A Layer 4 payload may change over time with only a portion remaining constant throughout a transaction between the client and a server. You configure the ACE to use either a specific portion or the constant portion of a Layer 4 payload to make persistent connections to a specific server. To define the portion of the payload that you want the ACE to use, you specify payload offset and length values and a beginning and ending pattern. The ACE stores these values in the sticky table.
Examples
To create a Layer 4 payload specification that the ACE will use to stick traffic to a server, enter:
host1/Admin(config-sticky-l4payloa)# layer4-payload offset 250 length 750 begin-pattern abc123.*
Related Commands
2-1345
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate Layer 4 payload sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate Layer 4 payload sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-l4payloa)# replicate sticky
To restore the ACE default of not replicating Layer 4 payload sticky table entries, enter:
host1/Admin(config-sticky-l4payloa)# no replicate sticky
Related Commands
2-1346
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
Use this command when you want the ACE to parse both the request from the client and the response from the server. Sticky learning allows the ACE to populate the sticky database with a hash of the response bytes from a server. The next time a client request arrives with those same bytes, then the ACE sticks the client to the same server.
Examples
To instruct the ACE to perform sticky learning on responses from a server, enter:
host1/Admin(config-sticky-l4payloa)# response sticky
To restore the ACE default of not performing sticky learning on responses from a server, enter:
host1/Admin(config-sticky-l4payloa)# no response sticky
Related Commands
2-1347
(config-sticky-l4payloa) serverfarm
To complete a sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1348
OL-25339-01
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a Layer 4 payload sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-l4payloa)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
Syntax Description
value
Payload string value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can enter a text string with spaces if you enclose the entire string in quotation marks (). Specifies that the static entry is based on the real server name. Enter the name of an existing real server as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
2-1349
Usage Guidelines
You can configure static sticky table entries based on the Layer 4 payload and optionally, the real server name and port. Static sticky Layer 4 payload values remain constant over time. You can configure multiple static payload entries, but only one unique real-server name can exist for a given static payload value. When you configure a static entry, the ACE enters it into the sticky table immediately. You can configure a maximum of 4096 static sticky entries in the ACE.
Examples
To configure a static sticky entry based on the Layer 4 payload and the server name and port number, enter:
host1/Admin(config-sticky-l4payloa)# static layer4-payload STINGRAY rserver SERVER1 4000
To remove the static Layer 4 payload entry from the sticky table, enter:
host1/Admin(config-sticky-l4payloa)# no static layer4-payload STINGRAY rserver SERVER1 4000
Related Commands
(config-sticky-l4payloa) timeout
To configure a Layer 4 payload sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes (24 hours). timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the sticky timer expires even if there are active connections.
activeconns
Command Modes
Command History
2-1350
OL-25339-01
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the Layer 4 payload sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out Layer 4 payload sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To specify that the ACE time out Layer 4 payload sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-l4payloa)# timeout activeconns
To restore the ACE to its default of not timing out Layer 4 payload sticky entries if active connections exist, enter:
host1/Admin(config-sticky-l4payloa)# no timeout activeconns
Related Commands
Syntax Description
calling-station-id
(Optional) Specifies stickiness based on the RADIUS framed IP attribute and the calling station ID attribute.
2-1351
username name
(Optional) Specifies stickiness based on the RADIUS framed IP attribute and the username attribute. Unique identifier of the RADIUS sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups on the ACE.
Examples
Related Commands
2-1352
OL-25339-01
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate RADIUS attribute sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate RADIUS attribute sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-radius)# replicate sticky
To restore the ACE default of not replicating RADIUS attribute sticky table entries, enter:
host1/Admin(config-sticky-radius)# no replicate sticky
Related Commands
2-1353
(config-sticky-radius) serverfarm
To complete a RADIUS attribute sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1354
OL-25339-01
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a RADIUS attribute sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-radius)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
(config-sticky-radius) timeout
To configure a RADIUS sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes (24 hours). timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the sticky timer expires even if there are active connections.
activeconns
Command Modes
Command History
2-1355
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the RADIUS attribute sticky group information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out RADIUS sticky group table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To specify that the ACE time out RADIUS sticky group table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-radius)# timeout activeconns
To restore the ACE to its default of not timing out RADIUS sticky group entries if active connections exist, enter:
host1/Admin(config-sticky-radius)# no timeout activeconns
Related Commands
Syntax Description
Session name1
RTSP Session header field. The ACE supports only the RTSP Session header field for stickiness. Unique identifier of the RTSP sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
2-1356
OL-25339-01
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups in the ACE.
Examples
Related Commands
2-1357
(config-sticky-header) header
To configure the RTSP Session header offset and length, use the header command. Use the no form of this command to remove the RTSP Session header offset and length values from the configuration. header offset number1 [length number2] no header offset number1 [length number2]
Syntax Description
offset number1
Specifies the portion of the RTSP Session header that the ACE uses to stick the client on a particular server by indicating the bytes to ignore starting with the first byte of the RTSP header. Enter an integer from 0 to 999. The default is 0, which indicates that the ACE does not exclude any portion of the header. (Optional) Specifies the length of the portion of the RTSP header (starting with the byte after the offset value) that the ACE uses for sticking the client to the server. Enter an integer from 1 to 1000. The default is 1000.
length number2
Command Modes
Command History
Usage Guidelines
The ACE stores header offset and length values in the sticky table. You can configure the ACE to use a portion of the RTSP header to make persistent connections to a specific server. To define the portion of the RTSP header that you want the ACE to use, you specify RTSP header offset and length values. The offset and length can vary from 0 to 1000 bytes. The ACE sticks the connection based on that portion of the RTSP header that starts with the byte after the offset value and ends with the byte specified by the offset plus the length. The total bytes represented by the header offset and length cannot exceed 1000.
Examples
To remove the RTSP header offset and length values from the configuration, enter:
host1/Admin(config-sticky-header)# no header offset 300 length 900
2-1358
OL-25339-01
Related Commands
2-1359
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate RTSP header sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate RTSP header sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-header)# replicate sticky
To restore the ACE to its default of not replicating RTSP header sticky table entries, enter:
host1/Admin(config-sticky-header)# no replicate sticky
Related Commands
2-1360
OL-25339-01
(config-sticky-header) serverfarm
To complete an RTSP header sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1361
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-header)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
Syntax Description
value
Header value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can enter a text string with spaces provided that you enclose the entire string in quotation marks (). Specifies the hostname of an existing real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
2-1362
OL-25339-01
Usage Guidelines
You can configure the ACE to use static header sticky entries based on the value of the RTSP Session header field and optionally, real server names and ports. Static sticky header values remain constant over time. You can configure multiple static header entries, but only one unique real-server name can exist for a given static header sticky value. When you configure a static entry, the ACE enters it into the sticky table immediately. You can create a maximum of 4096 static sticky entries in the ACE.
Examples
To remove the static RTSP header entry from the sticky table, enter:
host1/Admin(config-sticky-header)# no static header-value 12345678 rserver SERVER1 3000
Related Commands
(config-sticky-header) timeout
To configure an RTSP header sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes. timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the timer expires even if there are active connections.
activeconns
Command Modes
Command History
2-1363
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the RTSP header sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out RTSP header sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To reset the timeout to the default value of 1440 minutes (24 hours), enter:
host1/Admin(config-sticky-header)# no timeout 720
To specify that the ACE time out RTSP header sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-content)# timeout activeconns
To restore the ACE to its default of not timing out RTSP header sticky entries if active connections exist for those entries, enter:
host1/Admin(config-sticky-header)# no timeout activeconns
Related Commands
Syntax Description
name1 name2
SIP header field. The ACE supports only the SIP Call-ID header field for stickiness. Enter Call-ID. Unique identifier of the SIP sticky group. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
2-1364
OL-25339-01
Command Modes
Command History
Usage Guidelines
The commands in this mode require the sticky feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. You can create a maximum of 4096 sticky groups in the ACE.
Examples
Related Commands
2-1365
Syntax Description
Command Modes
Command History
Usage Guidelines
If you are using redundancy, you can configure the ACE to replicate SIP header sticky table entries on the standby ACE so if a switchover occurs, the new active ACE can maintain existing sticky connections. The timer of a sticky table entry on the standby ACE is reset every time the entry is synchronized with the active ACE entry. Thus, the standby sticky entry may have a lifetime up to twice as long as the active entry. However, if the entry expires on the active ACE or a new real server is selected and a new entry is created, the old entry on the standby ACE is replaced.
Examples
To instruct the ACE to replicate SIP header sticky table entries on the standby ACE, enter:
host1/Admin(config-sticky-header)# replicate sticky
To restore the ACE to its default of not replicating SIP header sticky table entries, enter:
host1/Admin(config-sticky-header)# no replicate sticky
Related Commands
2-1366
OL-25339-01
(config-sticky-header) serverfarm
To complete a SIP header sticky group configuration, you must configure a server farm entry for the group. To configure a server farm entry for a sticky group, use the serverfarm command. Use the no form of this command to dissociate a server farm from a sticky group. serverfarm name1 [backup name2 [sticky] [aggregate-state]] no serverfarm
Syntax Description
name1
Identifier of an existing server farm that you want to associate with the sticky group. You can associate one server farm with each sticky group. Enter a name as an unquoted text string with no spaces and a maximum of 64 characters. (Optional) Specifies the identifier of an existing server farm that you want the ACE to use as a backup server farm. If the primary server farm is unavailable, the ACE uses the configured backup server farm. The backup server farm becomes sticky when you enter the sticky keyword. Enter a name as an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the backup server farm is sticky. (Optional) Specifies that the state of the primary server farm is tied to the state of all the real servers in that server farm and in the backup server farm, if configured. The ACE declares the primary server farm down if all real servers in the primary server farm and all real servers in the backup server farm are down.
backup name2
sticky aggregate-state
Command Modes
Command History
Usage Guidelines
If all the servers in the primary server farm fail, the ACE sends all connections to the backup server farm. When the primary server farm comes back up (at least one server becomes active):
backup server farm are stuck to the same real servers in the backup server farm.
All new non-sticky connections and those sticky connections that do not have an entry in the
sticky table are load balanced to the real servers in the primary server farm.
2-1367
If the sticky option is not enabled, then the ACE load balances all new connections to the real servers in the primary server farm. Existing non-sticky connections to the servers in the backup server farm are allowed to complete in the backup server farm.
You can fine-tune the conditions under which the primary server farm fails over and returns to service by configuring a partial server farm failover. For details about partial server farm failover, see the Server Load-Balancing Guide, Cisco ACE Application Control Engine.
Examples
To associate a server farm with a sticky group and specify a sticky backup server farm, enter:
host1/Admin(config-sticky-header)# serverfarm SFARM1 backup BKUP_SFARM2 sticky aggregate-state
Related Commands
Syntax Description
value
SIP header value. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You can enter a text string with spaces provided that you enclose the entire string in quotation marks (). Specifies the hostname of an existing real server. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Port number of the real server. Enter an integer from 1 to 65535.
rserver name
number
Command Modes
Command History
2-1368
OL-25339-01
Usage Guidelines
You can configure the ACE to use static header sticky entries based on the value of the SIP Call-ID header field and optionally, real server names and ports. Static sticky header values remain constant over time. You can configure multiple static SIP header entries, but only one unique real-server name can exist for a given static SIP header sticky value. When you configure a static entry, the ACE enters it into the sticky table immediately. You can create a maximum of 4096 static sticky entries in the ACE.
Examples
To remove the static SIP header entry from the sticky table, enter:
host1/Admin(config-sticky-header)# no static header-value 12345678 rserver SERVER1 3000
Related Commands
(config-sticky-header) timeout
To configure a SIP header sticky timeout, use the timeout minutes command. Use the no form of this command to reset the sticky timeout to the default of 1440 minutes. timeout {minutes | activeconns} no timeout {minutes | activeconns}
Syntax Description
minutes
Number of minutes that the ACE remembers the last real server to which a client made a sticky connection. Enter an integer from 1 to 65535. The default timeout value is 1440 minutes (24 hours). Specifies that sticky entries are timed out when the timer expires even if there are active connections.
activeconns
Command Modes
Command History
2-1369
Usage Guidelines
The sticky timeout specifies the period of time that the ACE keeps the SIP header sticky information for a client connection in the sticky table after the latest client connection terminates. The ACE resets the sticky timer for a specific sticky-table entry each time that the ACE opens a new connection matching that entry. By default, the ACE times out a sticky table entry when the timeout for that entry expires and no active connections matching that entry exist. To specify that the ACE time out SIP header sticky table entries even if active connections exist after the sticky timer expires, use the timeout activeconns command.
Examples
To reset the timeout to the default value of 1440 minutes (24 hours), enter:
host1/Admin(config-sticky-header)# no timeout 720
To specify that the ACE time out SIP header sticky table entries even if active connections exist after the sticky timer expires, enter:
host1/Admin(config-sticky-content)# timeout activeconns
To restore the ACE to its default of not timing out SIP header sticky entries if active connections exist for those entries, enter:
host1/Admin(config-sticky-header)# no timeout activeconns
Related Commands
2-1370
OL-25339-01
Syntax Description
group_name
Name assigned to the group of TACACS+ servers. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
The commands in this mode require the AAA feature in your user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine. A server group is a list of server hosts. The ACE allows you to configure multiple AAA servers as a named server group. You group the different AAA server hosts into distinct lists. The ACE searches for the server hosts in the order in which you specify them within a group. You can configure a maximum of 10 server groups for each context in the ACE. You can configure server groups at any time, but you must enter the aaa authentication login or the aaa accounting default commands to apply the groups to the AAA service.
Examples
2-1371
Related Commands
(config-tacacs+) deadtime
To specify a dead-time interval for the TACACS+ server group, use the deadtime command. Use the no form of this command to reset the TACACS+ server group dead-time request to the default of 0. deadtime minutes no deadtime minutes
Syntax Description
minutes
Length of time that the ACE skips a nonresponsive TACACS+ server for transaction requests. Valid entries are from 0 to 1440 (24 hours). The default is 0.
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
During the dead-time interval, the ACE sends probe access-request packets to verify that the TACACS+ server is available and can receive authentication requests. The dead-time interval starts when the server does not respond to an authentication request transmission. When the server responds to a probe access-request packet, the ACE retransmits the authentication request to the server. Use of the deadtime command causes the ACE to mark as dead any TACACS+ servers that fail to respond to authentication requests. Using this command prevents the wait for the request to time out before trying the next configured server. The ACE skips a TACACS+ server that is marked as dead by additional requests for the duration of minutes.
Examples
To globally configure a 15-minute dead-time for TACACS+ servers that fail to respond to authentication requests, enter:
host1/Admin(config-tacacs+)# deadtime 15
2-1372
OL-25339-01
Related Commands
2-1373
(config-tacacs+) server
To specify the IP address of one or more previously configured TACACS+ servers that you want added to or removed from a AAA server group, use the server command. Use the no form of this command to remove the TACACS+ server from the AAA server group. server ip_address no server ip_address
Syntax Description
ip_address
IP address of the TACACS+ server. Enter the address in dotted-decimal IP notation (for example, 192.168.11.1).
Command Modes
Command History
Modification This command was introduced. Modification This command was introduced.
Usage Guidelines
You can add multiple TACACS+ servers to the AAA server group by entering multiple server commands in this mode. The same server can belong to multiple server groups.
Examples
Related Commands
2-1374
OL-25339-01
2-1375
Syntax Description
name
Name of an existing VM controller (vCenter) that the ACE queries for VM load information. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
All commands in this mode require the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
Related Commands
2-1376
OL-25339-01
(config-vm) credentials
To configure the credentials that the ACE uses to log in to the VM controller in a DWS configuration, use the credentials command. Use the no form of this command to remove the VM controller credentials from the ACE configuration. credentials {username} {[encrypted] password} no credentials {username} {[encrypted] password}
Syntax Description
Username that the ACE uses to access the VM controller. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. (Optional) Specifies that the ACE encrypts the VM controller password. Password that the ACE uses to access the VM controller. The password does not appear in the output of the show running-config command whether the password is encrypted or not. Enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To configure the credentials that the ACE uses to log in to the VM controller, enter:
host1/Admin(config-vm)# credentials admin encrypted myvmpassphrase
To remove the VM controller login credentials from the ACE configuration, enter:
host1/Admin(config-vm)# no credentials admin encrypted myvmpassphrase
Related Commands
2-1377
(config-vm) url
To configure the URL of the VM controller (vCenter) in a DWS configuration, use the url command. Use the no form of this command to remove the URL of the local VM controller from the ACE configuration. url string no url string
Syntax Description
string
Specifies the host name or IP address of the local VM controller. Enter an unquoted text string with no spaces and a maximum of 255 alphanumeric characters. You must append /sdk at the end of the host name or IP address string.
Command Modes
Command History
Usage Guidelines
This command requires the Admin user role. For details about role-based access control (RBAC) and user roles, see the Virtualization Guide, Cisco ACE Application Control Engine.
Examples
To remove the URL of the VM controller from the ACE configuration, enter the following command:
host1/Admin(config-vm)# no url https://192.168.12.15/sdk
Related Commands
2-1378
OL-25339-01
2-494 2-495
2-502 2-504
2-507
2-509
(config-actlist-optm) flashforward-object
2-517
2-522 2-523,
IN-1
2-567 2-570
2-534 2-535
2-571
2-573 2-575
(config-cmap-sip-insp) match im-subscriber (config-cmap-sip-insp) match message-path (config-cmap-sip-insp) match request-method (config-cmap-sip-insp) match third-party registration 2-583 (config-cmap-sip-insp) match uri
2-585
(config-cmap-http-lb) match class-map (config-cmap-http-lb) match http content (config-cmap-http-lb) match http cookie (config-cmap-http-lb) match http header (config-cmap-http-lb) match http url
2-550 2-552
2-586
2-593
clear acl-merge statistics clear buffer stats clear capture clear cde
2-14 2-13 2-12
2-14
IN-2
OL-25339-01
2-20
(config) banner
2-292
clear logging clear netio stats clear np clear ntp clear probe clear rserver clear rtcache clear screen
2-31 2-32
(config) clock summer-time (config) clock timezone (config) config-register (config) context
2-303
2-300
2-297 2-301
2-32 2-34
(config) crypto chaingroup (config) crypto csr-params (config) crypto ocspserver (config) dci-device (config) domain (config) end (config) exit
2-314 2-314 2-315 2-377
2-41
(config) ft auto-sync
2-44 2-46 2-46
clear sticky database clear syn-cookie clear tcp statistics clear telnet clear user clear xlate clock set
2-47
2-317
2-48
(config) ft track host (config) ft track hsrp (config) hostname (config) hw-module (config) interface (config) ip dhcp relay
2-262
(config) ip domain-lookup
2-341
IN-3
(config) ipv6 nd sync disable (config) ipv6 nd sync-interval (config) kalap udp
2-345
2-343 2-344
(config) rate-limit
2-371 2-403
(config) ldap-server host (config) ldap-server port (config) line console (config) line vty
(config) role
(config) rserver
(config) service-policy
2-353 2-355 2-357
(config) logging buffered (config) logging console (config) logging device-id (config) logging enable (config) logging facility (config) logging fastpath (config) logging history (config) logging host (config) logging message (config) logging monitor (config) logging persistent (config) logging queue (config) logging standby
(config) snmp-server community (config) snmp-server enable traps (config) snmp-server engineid (config) snmp-server host (config) snmp-server location
2-420
2-414 2-415
2-418
(config) snmp-server trap-source vlan (config) snmp-server user (config) ssh key
2-428 2-429 2-430 2-425
(config) logging supervisor (config) logging timestamp (config) logging trap (config) login timeout (config) ntp
2-379 2-380 2-376 2-352
(config) sticky http-content (config) sticky http-cookie (config) sticky http-header (config) sticky ip-netmask
2-285, 2-382
2-382
(config) sticky layer4-payload (config) sticky radius framed-ip (config) sticky rtsp-header
2-386 2-385
(config) parameter-map type (config) peer hostname (config) policy-map (config) probe
2-392
2-441 2-442
2-443 2-445
(config) tacacs-server deadtime (config) tacacs-server host (config) tacacs-server key (config) telnet maxsessions
2-401 2-402 2-446 2-448 2-396
(config) radius-server attribute nas-ipaddr (config) radius-server deadtime (config) radius-server host (config) radius-server key
2-397 2-400
2-449
2-451
2-452, 2-453
2-454
IN-4
OL-25339-01
(config) vm-controller
2-456
2-2
copy capture
copy checkpoint copy core copy disk0 copy ftp copy image copy licenses copy probe
2-59 2-60
copy startup-config
2-72
2-69
2-73
crypto generate csr crypto generate key crypto import crypto verify debug
2-83 2-86 2-78 2-82
invoke context
2-96
2-95
mkdir disk0
2-97
IN-5
2-98 2-99
reprogram bootflash
2-105 2-107
(config-ft-peer) heartbeat
2-636 2-637
(config-ft-peer) query-interface
rmdir disk0
2-110
set sticky-ixp
2-108
2-111
(config-ft-track-host) peer priority (config-ft-track-host) peer probe (config-ft-track-host) priority (config-ft-track-host) probe (config-ft-track-host) track-host (config-ft-track-host) peer track-host
2-645 2-646
system internal system watchdog tac-pac telnet terminal traceroute undebug all untar disk0 write
2-259 2-260 2-251 2-253 2-254 2-255
2-647
2-256 2-258
xml-show
2-627
ICMP
types
2-277, 2-764
(config-ft-intf) peer ip
(config-ft-intf) shutdown
IN-6
OL-25339-01
(config-if) ipv6 nd ra hop-limit (config-if) ipv6 nd ra interval (config-if) ipv6 nd ra lifetime (config-if) ipv6 nd ra suppress
(config-if) bridge-group (config-if) carrier-delay (config-if) channel-group (config-if) description (config-if) duplex
(config-if) ipv6 verify reverse-path (config-if) ip verify reverse-path (config-if) mac-sticky enable (config-if) mtu
2-718 2-719 2-720 2-672
2-669
(config-if) nat-pool
2-673
2-722
2-677
2-725
(config-if) ip dhcp relay enable (config-if) ip dhcp relay server (config-if) ip options
2-683
2-684
(config-if) switchport trunk allowed vlan (config-if) switchport trunk native vlan (config-if) syn-cookie (config-if) udp
2-740 2-738
(config-if) ipv6 dhcp relay enable (config-if) ipv6 dhcp relay server (config-if) ipv6 enable
2-691
(config-if) ipv6 extension-header (config-if) ipv6 fragment chain (config-if) ipv6 fragment timeout (config-if) ipv6 mtu
2-698
(config-if) ipv6 nd dad-attempts (config-if) ipv6 nd icmp-guard (config-if) ipv6 nd ns-interval (config-if) ipv6 nd prefix
2-703
2-702
(config-ldap) baseDN
2-747 2-748
IN-7
(config-ldap) server
2-749
(config-parammap-conn) set timeout inactivity (config-parammap-conn) slowstart (config-parammap-conn) syn-data (config-parammap-conn) tcp-options (config-parammap-conn) urgent-flag
2-792 2-793 2-794 2-798 2-800 2-804
(config-parammap-dns) description
(config-parammap-generi) description (config-parammap-http) description (config-parammap-optmz) description (config-parammap-rtsp) description (config-parammap-sip) description
(config-parammap-http) cookie-error-ignore
2-810 2-838 2-855 2-865 2-859
2-809
(config-parammap-skinny) description
(config-parammap-ssl) description
2-880
(config-optimize) concurrent-connections
2-770
2-772
(config-parammap-conn) reserved-bits
(config-parammap-conn) set tcp ack-delay (config-parammap-conn) set tcp buffer-share (config-parammap-conn) set tcp mss min (config-parammap-conn) set tcp reassembly-timeout 2-786 (config-parammap-conn) set tcp syn-retry (config-parammap-conn) set tcp timeout
(config-parammap-http) compress
2-811
2-784
(config-parammap-http) persistence-rebalance
IN-8
OL-25339-01
2-819
2-861
2-868
(config-parammap-optmz) clientscript-default (config-parammap-optmz) expires-setting (config-parammap-optmz) extract meta (config-parammap-optmz) flashforward refresh-policy 2-843
2-841 2-842
(config-parammap-optmz) ignore-server-content (config-parammap-optmz) parameter-summary parameter-value-limit 2-845 (config-parammap-optmz) post-content-buffer-limit (config-parammap-optmz) rebase (config-parammap-optmz) request-grouping-string
2-846 2-847
2-876
(config-parammap-ssl) close-protocol
2-883 2-885
2-848
(config-parammap-ssl) version
2-887
IN-9
2-917
(config-pmap-ftp-ins) description
2-921
(config-pmap-ftp-ins-m) mask-reply
2-907
(config-pmap-c) loadbalance vip advertise (config-pmap-c) loadbalance vip icmp-reply (config-pmap-c) loadbalance vip inservice (config-pmap-c) nat dynamic (config-pmap-c) nat static (config-pmap-c) ssl-proxy
2-912
2-927
(config-pmap-ins-http) description
2-934
2-942 2-944
2-948
(config-pmap-ftp-ins-c) mask-reply
2-952
IN-10
OL-25339-01
2-986
2-989
2-979
(config-pmap-ins-sip) description
Policy Map Load Balancing Generic Class Configuration Mode Commands 2-999
2-969 2-970 2-972 2-973 2-974
(config-pmap-ins-sip) match called-party (config-pmap-ins-sip) match calling-party (config-pmap-ins-sip) match content length (config-pmap-ins-sip) match im-subscriber (config-pmap-ins-sip) match message-path
(config-pmap-lb-generic-c) drop
(config-pmap-lb-generic-c) serverfarm
(config-pmap-ins-sip) match request-method (config-pmap-ins-sip) match third-party registration 2-976 (config-pmap-ins-sip) match uri
2-978
(config-pmap-lb-generic-c) sticky-serverfarm
(config-pmap-lb-generic) description
2-986
Policy Map Load Balancing Generic Match Configuration Mode Commands 2-1004
(config-pmap-lb-generic-m) drop
2-1006 2-1006
(config-pmap-lb-generic-m) forward
IN-11
2-1047 2-1048
(config-pmap-lb-generic-m) sticky-serverfarm
Policy Map Load Balancing HTTP Class Configuration Mode Commands 2-1025
(config-pmap-lb-c) action (config-pmap-lb-c) drop (config-pmap-lb-c) forward (config-pmap-lb-c) insert-http (config-pmap-lb-c) nat dynamic (config-pmap-lb-c) serverfarm (config-pmap-lb-c) set ip tos
2-1026 2-1029 2-1030 2-1031 2-1032 2-1033 2-1035 2-1036 2-1037
Policy Map Load Balancing RADIUS Class Configuration Mode Commands 2-1055
(config-pmap-lb-radius-c) drop
2-1056 2-1057 2-1058 2-1059 2-1060
(config-pmap-lb-radius-c) serverfarm
(config-pmap-lb-radius-c) sticky-serverfarm
(config-pmap-lb-radius) description
Policy Map Load Balancing RADIUS Match Configuration Mode Commands 2-1060
(config-pmap-lb-radius-m) drop
2-1062 2-1063 2-1064 2-1065 2-1066
(config-pmap-lb) match http content (config-pmap-lb) match http cookie (config-pmap-lb) match http header (config-pmap-lb) match http url
2-1023 2-1024
(config-pmap-lb-radius-m) serverfarm
(config-pmap-lb-radius-m) sticky-serverfarm
Policy Map Load Balancing HTTP Match Configuration Mode Commands 2-1038
(config-pmap-lb-m) action (config-pmap-lb-m) drop (config-pmap-lb-m) forward (config-pmap-lb-m) insert-http (config-pmap-lb-m) serverfarm (config-pmap-lb-m) set ip tos
2-1038, 2-1040 2-1041 2-1043 2-1044 2-1045 2-1046
Policy Map Load Balancing RDP Class Configuration Mode Commands 2-1069
(config-pmap-lb-rdp-c) drop
2-1071 2-1072 2-1073 2-1074 2-1075
(config-pmap-lb-rdp-c) serverfarm
(config-pmap-lb-rdp-c) sticky-serverfarm
IN-12
OL-25339-01
(config-pmap-lb-sip-c) serverfarm
2-1066
Policy Map Load Balancing SIP Configuration Mode Commands Policy Map Load Balancing RTSP Class Configuration Mode Commands 2-1084
(config-pmap-lb-rtsp-c) drop
2-1085 2-1086 2-1087 2-1088 2-1089
2-1095
(config-pmap-lb-sip) class
(config-pmap-lb-rtsp-c) serverfarm
(config-pmap-lb-rtsp-c) sticky-serverfarm
Policy Map Load Balancing SIP Match Configuration Mode Commands 2-1108
(config-pmap-lb-sip-m) drop
2-1109 2-1110 2-1111 2-1112 2-1113
2-1076
(config-pmap-lb-sip-m) sticky-serverfarm
2-1082
2-1117
Policy Map Load Balancing RTSP Match Configuration Mode Commands 2-1090
(config-pmap-lb-rtsp-m) drop
2-1091 2-1092 2-1093 2-1094 2-1095
2-1113
(config-pmap-lb-rtsp-m) serverfarm
(config-pmap-mgmt) description
(config-pmap-lb-rtsp-m) sticky-serverfarm
Policy Map Load Balancing SIP Class Configuration Mode Commands 2-1102
(config-pmap-lb-sip-c) drop
2-1103 2-1104
2-1128
(config-pmap-lb-sip-c) forward
IN-13
(config-probe-probe_type) script
2-1119
(config-probe-probe_type) send-data (config-probe-probe_type) ssl cipher (config-probe-probe_type) ssl version (config-probe-probe_type) version (config-probe-sip-udp) rport enable
(config-pmap-optmz) description
2-1171 2-1173
(config-pmap-optmz) match http cookie (config-pmap-optmz) match http header (config-pmap-optmz) match http url
2-1127
Probe SNMP OID Configuration Mode Commands 2-1174 Policy Map Optimization Match Configuration Mode Commands
(config-pmap-optmz-m) action
2-1130 2-1129
2-1176 2-1178
2-1183 2-1185
(config-probe-vm) vm-controller
2-1139 2-1140
(config-probe-probe_type) expect address (config-probe-probe_type) expect regex (config-probe-probe_type) expect status (config-probe-probe_type) faildetect (config-probe-probe_type) hash (config-probe-probe_type) header (config-probe-probe_type) interval (config-probe-probe_type) ip address (config-probe-probe_type) oid (config-probe-probe_type) open (config-probe-probe_type) port
2-1157 2-1159 2-1149 2-1150 2-1153
2-1189
2-1148
2-1154 2-1156
(config-probe-probe_type) passdetect
2-1162
2-1160
2-1198 2-1199
(config-probe-probe_type) receive
2-1164
2-1201
IN-14
OL-25339-01
2-1251
2-1208 2-1209
2-1254 2-1255
(config-rserver-redir) webhost-redirection
2-1258 2-1260
2-1262 2-1263
(config-sfarm-host-rs) rate-limit
2-1264
2-1276 2-1277
(config-sfarm-redirect) rserver
2-1279 2-1281
(config-sfarm-host) inband-health check (config-sfarm-host) partial-threshold (config-sfarm-host) predictor (config-sfarm-host) probe (config-sfarm-host) retcode (config-sfarm-host) rserver
2-1234 2-1240 2-1242 2-1244 2-1245
2-1233
(config-sfarm-host) transparent
2-1287
2-1290 2-1291
(config-sfarm-redirect-rs) rate-limit
2-1292
IN-15
2-112
show kalap udp load show lcp event-history show ldap-server show license show line show logging show nat-fabric show netio
2-181 2-176 2-177
2-170 2-172
2-173
2-174
2-179
2-180
show backup show bootvar show buffer show capture show cde show cfgmgr show clock show conn show context show copyright show crypto show dc show debug show domain show eobc show fifo show file show ft show hyp
2-141
2-121 2-122
2-182
2-189
show checkpoint
2-134 2-135
show processes
show radius-server
2-228
show resource allocation show resource internal show resource usage show restore show role show rserver
2-149 2-201 2-203 2-204
2-136 2-137
2-138
2-145 2-148
2-206
2-211
show fragment
2-156
show hardware
2-159
show icmp statistics show interface show inventory show ip show ipcp show ipv6
2-164 2-167 2-168
show sticky cookie-insert group show sticky database show sticky hash show syn-cookie show system
2-224 2-227 2-229
2-223
2-230
IN-16
OL-25339-01
2-1315
show terminal
show udp statistics show user-account show users show version show vlans show vnet show xlate
2-239 2-240 2-242
2-238
(config-sticky-content) content
2-1318 2-1320
2-1321 2-1323
show vm-controller
2-244 2-245
(config-sticky-content) timeout
2-1324
2-1330 2-1332
(config-ssl-proxy) chaingroup
2-1300 2-1302
2-1337 2-1338
2-1348 2-1349
IN-17
2-1354
2-1361 2-1362
2-1367 2-1368
2-1374
IN-18
OL-25339-01